54509

Should we believe in other possible worlds, besides the actual world? Should we believe in other times, besides the present? How are questions a) and b) similar, and how are they different?

55184

The assignment is for an intro computer science class and the assignment is due by tomorrow at midnight. You are basically taking a code from the previous assignment prog5begin.c (http://people.cs.clemson.edu/~psterli/1110/samples/prog5Begin.c) – here is the link to the code that will be later modified Then, you will modify the code using the specifications listed in the link here – http://people.clemson.edu/~psterli/1110/pdf/1501Prog5.pdf You will be converting arrays to pointers, using File I/O, and dynamic allocation. I

55825

The probation officer instructs the offender on supervision conditions specified by the court, stays informed of the offender's conduct and condition, and makes reports to the court. The officer also maintains records of case activity. The purpose of supervision is to enforce offender compliance with the imposed sentence, to bring about improvements in the conduct and condition of the offender, and ultimately, to ensure community safety. Review the Colorado Probation Research in Brief before beginning this assignment.

cloud computing security policy

Project 6 – Cloud Computing Security Policy

 

This week you will prepare a cloud security policy. The first CIO of the US mandated that cloud services be implemented in organizations whenever possible. Review the scenario below and prepare a cloud security policy for the organization. Complete the following section readings from “Challenging Security Requirements for US Government Cloud Computing Adoption,”

 

NIST Cloud Computing Public Security Working Group, NIST Cloud Computing Program,

 

Information Technology Laboratory, sections 1.1, 1.3, 1.6, 1.8, and 1.9; prior to starting your work on the policy:

PROCESS-ORIENTED SECURITY REQUIREMENTS

1.1 NIST SP 800-53 SECURITY CONTROLS FOR CLOUD-BASED INFORMATION SYSTEMS: page 10

1.3  CLOUD CERTIFICATION AND ACCREDITATION: page 17

1.6 CLARITY ON CLOUD ACTORS SECURITY ROLES AND RESPONSIBILITIES: page 27

1.8 BUSINESS CONTINUITY AND DISASTER RECOVERY: page 31

1.9 TECHNICAL CONTINUOUS MONITORING CAPABILITIES: page 34

 

Background
A small non-profit organization (SNPO-MC) has received a grant which will pay 90% of its cloud computing costs for a five year period. But, before it can take advantage of the monies provided by this grant, it must present an acceptable cloud computing security policy to the grant overseers. 

 

Tasking
You are a cybersecurity professional who is “on loan” from your employer, a management consulting firm, to a small non-profit organization (SNPO-MC). You have been tasked with researching requirements for a Cloud Computing Security Policy and then developing a draft policy for the non-profit organization, SNPO-MC. The purpose of this policy is to provide guidance to managers, executives, and cloud computing service providers. This new policy will supersede (replace) the existing Enterprise IT Security Policy which focuses exclusively upon enterprise security requirements for organization owned equipment (including database servers, Web and email servers, file servers, remote access servers, desktop computers, workstations, and laptop computers) and licensed software applications. The enterprise IT security policy also addresses incident response and disaster recovery.

 

As part of your policy development task you must take into consideration the issues list which was developed during brainstorming sessions by executives and managers in each of the three operating locations for the non-profit organization.

 

Your deliverable for this project is a 5 to 8 page, single spaced, professionally formatted draft policy. See the following resources for suggested formats.

https://it.tufts.edu/cloud-pol

https://www.american.edu/policies/upload/IT-Security-Policy-2013.pdf 

Organization Profile
The organization is headquartered in Boston, MA and has two additional operating locations (offices) in New Orleans, LA and San Francisco, CA. Approximately 50 employees work in a formal office setting at one of these locations. These employees use organization owned IT equipment. The remaining 1,000 staff members are volunteers who work from their home offices using personally owned equipment.

 

The organization provides a variety of management consulting services for its clients (charities and non-governmental organizations) on a fee for service basis. Fees are set on a sliding scale based upon the client’s ability to pay. The organization receives additional funding to support its administrative costs, including IT and IT security, through grants and donations from several Fortune 500 companies.

 

The non-profit organization is in the process of hiring its first Chief Information Officer. The organization has a small (3 person) professional IT staff that includes one information security specialist. These staff members are located in the Boston headquarters office.

 

Definitions
Employees of the organization are referred to as employees.

 

Executives and other staff who are “on loan” from Fortune 500 companies are referred to as loaned staff members. Loaned staff members usually telework for the organization one to two days per week for a period of one year.

 

Volunteers who perform work for the organization are referred to as volunteer staff members. Volunteer staff members usually telework from their homes one to two days per week.

 

Cloud Computing includes but is not restricted to:

·         Platform as a Service

·         Infrastructure as a Service

·         Software as a Service

 

Issues List:

·         Who speaks with authority for the firm?

·         Who monitors and manages compliance with laws and regulations?

·         Ownership of content

·         Privacy and confidentiality

·         Enforcement

·         Penalties for violations of policy

·         Use by sales and marketing

·         Use by customer service / outreach

·         Use by public relations and corporate communications (e.g. information for shareholders, customers, general public)

·         Use for advertising and e-commerce

·         Use by teleworkers

·         Review requirements (when, by whom)

·         Use of content and services monitoring tools

·         Content generation and management (documents, email, cloud storage)

·         Additional issues listed in http://www.cloud-council.org/Security_for_Cloud_Computing-Final_080912.pdf

 

Resources (suggested by the organization’s IT Staff for your consideration):

1.      http://www.nsa.gov/ia/_files/support/Cloud_Computing_Guidance.pdf

2.      http://www.cloud-council.org/Security_for_Cloud_Computing-Final_080912.pdf

3.      http://www.sans.org/reading-room/whitepapers/analyst/cloud-security-compliance-primer-34910

4.      http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf

 

The documents below are useful resources in planning your cloud security policy:

Cloud Security: A Comprehensive Guide to Secure Cloud Computing by Ronald L. Krutz and Russell Dean Vines John Wiley & Sons © 2010(384 pages), ISBN: 9780470589878 Chapter 3: Cloud Computing Software Security Fundamentals http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=34770

 

NIST Guide to Information Technology Security Services at http://www.nist.gov/customcf/get_pdf.cfm?pub_id=906567 

 

25 point implementation plan to reform information technology http://www.dhs.gov/sites/default/files/publications/digital-strategy/25-point-implementation-plan-to-reform-federal-it.pdf

 

Understanding Cloud Computing (NIST SP 500-291) and (NIST SP 500-292) http://www.nist.gov/customcf/get_pdf.cfm?pub_id=909024 500-291 – Standards: Chapter 3 and Chapter 5.5

 

White Paper: “Challenging Security Requirements for US Government Cloud Computing Adoption,” NIST Cloud Computing Public Security Working Group, NIST Cloud Computing Program, Information Technology Laboratory

 

 

Discussion 1: Malpractice, law homework help

Discussion 1: Malpractice”

  • Part A: Discuss why the Indiana court In Vergara vs. Doan, at 593 N.E. 2d 185 (Ind. 1992) and at p. 435 of your textbook decided to replace the modified locality rule in favor of adopting the national standard rule re: the standard of care at applicable to doctors in determining liability in medical malpractice cases.
  • Part B: Give your opinion on what standard of care is appropriate for doctors who provide patient advice over the internet and telephone to patients in any, or all, of the 50 states?

If you need help with completing discussions please click here for more information.

  • [img alt=”” src=”https://www.studypool.com/images/ci/icons/generic_updown.gif”>

    “Discussion 2: Professionals”

    • Part A: Describe the “trial within a trial” method of determining damages caused by a lawyer’s malpractice. See Fishman v. Brooks at 487 N.E.2d 1377 (Mass. 1986) and at p. 460 of your textbook.

      In this case, Fishman charged attorney Brooks with legal malpractice for urging that Fishman settle, when in fact the attorney was not prepared for trial, and for mistakenly representing that driver’s insurance policy limits were $250,000. Brooks urged Fishman to settle for $160,000 when the policy limits were, in fact, $1,000,000.00.

      Assuming the hypothetical facts that you knew that this single successful malpractice action had happened 20 years ago, while this attorney was going through a personal divorce, would you trust him to handle a traffic accident in which you were involved?

    • Part B: The court in Carbone v. Tierney at 864 A. 2d 308 (N.H. 2004) and at p. 464, discusses the requirements for a plaintiff to collect on a malpractice claim against an attorney.

      That is, this court decided that to successfully prove that the lawyer’s malfeasance was the proximate cause of plaintiff’s loss, he would have to demonstrate two (2) things. First, that if the defendant would have performed adequately, and then the plaintiff would have succeeded on the merits in the underlying case. And second, that the plaintiff would have succeeded in collecting on the resultant judgment.

      This means that if the attorney can prove that the judgment, if won, would not have been collectible, then this uncollectability is a complete defense to the malpractice action and the plaintiff receives nothing.

      Give your opinion on whether or not you believe collectability should be a complete defense to legal malpractice actions. Provide a rationale for your response.

  • significant experience

    high school level

    General Review Questions – Public Administration

    1. Explain the politics of administrative reforms
    2. From what you have learned so far, briefly explain the key responsibilities of public administrators and the best way of meeting the responsibilities.
    3. How does administrative responsibility contribute to the attainment of public interest

    4. Discuss the importance of administrative communication to public decision making and performance.

    5. Explain how public budget could be political

    6. Discuss the various uses of public budget

    7. Why is the issue of illegal immigration a good example of the intergovernmental relations mess in the US

    8. Explain how ethical choices influence the decision making and performance of public administrators in recent times

    9. Discuss the benefits and weakness of bureaucratic discretion to public sector management

    10. Explain the pros and cons of the politics- administration dichotomy as espoused by Woodrow Wilson

    The comparative essay has a three-fold purpose: (1) to test your understanding of formal analysis…

    Assignment Name: Comparative Essay
    Course Prefix, Number, Section (s): GEND 300-90
    Instructor: Alisa Schreibman
    Page | 1
    Purpose
    The comparative essay has a three-fold purpose: (1) to test your understanding of formal analysis and interpretation in a context that provides you some control
    over the timing and the subject matter of the work; (2) to develop your ability to write about the arts in a persuasive, thoughtful manner; (3) to provide a short,
    polished writing sample for future use in a portfolio, job application, or graduate school application.
    Assignment
    In an essay of no more than four pages, compare and contrast two pre-approved works of art.
    The essay will begin with an introduction that forecasts your argument and conclusion, introduces the chosen art, and offers a thesis statement or hypothesis
    about how the works relate to each other. It will contain a paragraph for each work that provides a brief description, the historical background and use context.
    Following the description paragraphs will be your comparing and contrasting, which will include the formal aspects of the works and interpretation. You will
    conclude with a paragraph that wraps up the argument and explains the significance of your conclusion.
    Details:
    • 2-3 pages with a hard maximum of 4; not including the figures.
    • A bibliography of at least 5 sources that include:
    o One or more of the course texts.
    o One or more articles or books about each work of art. They may be internet sources but may not be encyclopedia type entries. Wikipedia is
    often a good place to begin research, but it is not acceptable to quote or paraphrase or use in any fashion.
    o Each of the works of art.
    • At least two properly cited quotations from the bibliographical resources. These will be cited in text, so you may use the simple form of last name and
    date, e.g. (Schreibman 2018).
    • At least two properly labeled Figures, one for each work. You may have more Figures if you would like to point to specific details of works for
    comparative purposes. These will not count for your page length. For an example of a proper citation, see class lectures for Week 5.
    • APA format. If you don’t know what this means, ask.
    Assignment Name: Comparative Essay
    Course Prefix, Number, Section (s): GEND 300-90
    Instructor: Alisa Schreibman
    Page | 4
    Plagiarism
    Plagiarism is defined as passing off someone else’s work as your own. It is cheating and a violation of the terms of this course. If you plagiarize, you will be
    caught, and you will receive a zero for any portion of the assignment that you have plagiarized. Each of the following are examples of plagiarism and are,
    therefore, unacceptable. All assignments will go through Turnitin.
    • Using the exact words from any source without quotation marks and proper citation. This pertains to sources you put in your bibliography and sources
    you don’t.
    • Paraphrasing (revising words) from any source without proper citation. This also pertains to sources you put in your bibliography and sources you don’t.
    • Submitting a paper that has been written all, or in part, by another person.

    Accounting Principles and Conservatism

    Accounting Principles and Conservatism

    Hello everyone,

    Week 1 DQ 2.  Due by Friday.  Accounting Principles.

    Please respond to the following discussion question by replying to this thread.  Your response should fully address all elements of the question and be a minimum of 200 to 300 words long.

    Chapter 1 discusses ethics in business and accounting.  The notes to the financial statements describe the accounting principles used by a company to record its transactions.  Accountants apply the convention of conservatism when analyzing economic events and recording them.  The following is a definition of conservatism:

    In the application of accounting principles and the development of estimates, accountants should be conservative.  Given choices between various methods of recording economic events, accountants should apply principles that result in revenues being stated at lower amounts versus higher amounts and expenses being stated at higher amounts rather than lower amounts.  In general, accountants should apply accounting principles that would tend to understate revenues, net income and assets versus overstating them.

    What are some of the ethical issues of selecting accounting principles for a company? Do you believe accountants have been properly conservative in the past few years with financial statement presentation?  Why?

    Offer

    Imagine you are a public administrator who has just been promoted to a higher position but must relocate to another city and purchase a different home. Using the five distributing bargaining skills, present the steps and various aspects you would consider implementing in buying a house. Be sure to address the following:

    1. Analyze the bargaining situation and whether or not it is distributive. If so, determine the reservation price.
    2. Present the initial offer you would make and apply bracketing to achieve your target price of $310,000.
    3. Indicate and frame the norms you would utilize in presenting your initial offer.

    Your paper should be four- to- five- pages in length (not including title and reference pages). Format your paper according to APA style as outlined in the Ashford Writing Center, and utilize three to four scholarly sources in addition to the textbook. Be sure to cite your sources within the body of your paper and on the reference page.