How-do-regulatory-agencies-state-departments-of-health-state-departments-of-insurance

How do regulatory agencies–state departments of health, state departments of insurance, Centers for Medicare and Medicaid Services, and others–control your ability to develop new health care delivery models? 100 word one reference Thanks

UNIX-file-directory-and-permissions

The project team is ready to create the directory structure for the Web site. You are tasked with creating the directories and implementing the security mechanism. For this assignment, you need to create the following directory structure and permissions:

Ensure that you are starting in your individual Home directory:

+- apache/
|
|- bin/
|
|- conf/
|
|- lib/
|
+- www/
|
| – html/
|
| – cgi-bin/
|
| – ftp/

The following file permission should be enabled for the directories:

  • The owner can read, write and execute All.
  • The group can read and execute All Directories.
  • Everyone else can only read and execute the files in Apache only (and no permissions in www).
  • Change the wwwftp directory to allow the User and group to read, write, and execute, but everyone else to only write to the directory.

In addition, create the following empty files and set the following file permissions:

apache/bin/httpd – 755

www/html/index.html – 644

www/cgi-bin/process.pl – 711

Finally, create a file called apache/conf/httpd.conf, and add the following lines to the file:

#
# This is the main Apache HTTP server configuration file. It contains the
# configuration directives that give the server its instructions.

# Do not add a slash at the end of the directory path.
#
ServerRoot “/usr”

#
# DocumentRoot: The directory out of which you will serve your documents.
#

Save the file and exit the editor. Set the file permission for this file to be: 664.

Show the command used to show content of the file and the content of the file.

Using the grep command, write comment to find the line containing the word(s) ServerRoot and DocumentRoot in the httpd.conf file.

Write a sed command that will change the ServerRoot value from /usr to the absolute directory patch for your apache directory.

Write a sed command that will change the Document value from /Library/WebServer/Documents to the absolute directory patch for your www directory.

Write an awk command that will print only the comment field and the login id of all users in the /etc/passwd file in this format: <Comment Field> – <login id>.

Your submission should include the following, as well as a description about each step (what you did and why you are performing each command) and associated screenshots:

  • All commands to create the above structure
  • Changing to your Home directory
  • Creating the directories
  • Creating the empty files
  • Changing all file permissions
  • Show the directory list of the new structure, including a list of permissions
  • A grep, sed, and awk command

Identify-three-events-on-the-HISTORY-OF-RACISM-AND-IMMIGRATION-TIMELINE-writing-homework-help

TIMELINE ASSIGNMENT (Written):

1. Identify three events on the HISTORY OF RACISM AND IMMIGRATION TIMELINE that are explicitly or implicitly related to African- American racial and religious identity.

2. Identify an event that pertains to a group with whom you identify (religiously, culturally, ethnically, racially, by ancestry, by nationality, by gender) . Are there groups whose experiences are missing from this timeline? (1-2 pages)

Read-the-case-In-re-Winthrop-848-N-E-2d-961-Ill-2006-

INSTRUCTIONS:

  1. PRIOR TO POSTING:
    1. Read the case In re Winthrop, 848 N.E.2d 961 (Ill. 2006).
  2. Use this case as a starting point to discuss the following:
    1. Do you think a two-year suspension was appropriate? Why or why not?
    2. Do you think lawyers should have a heightened duty to clients in this type of situation? Why or why not?

Testing-Framework-and-Basic-Security-Controls

SDEV 460 – Homework 2
Testing Framework and Basic Security Controls
Overview:
This homework will demonstrate your knowledge of creating a testing framework and using that
framework to conduct some basic server and web application security controls.
Assignment: Total 100 points
Using

the readings from weeks 3 and 4 as a baseline, first develop a testing

framework with these phases as guidelines for your organization or an

organization you would like to work for in the future.
• Before development begins
• During definition and design
• During development
• During deployment
• Maintenance and operations
You

will need to fill in the details for each phase by 1) describing what

each phase encompasses and 2) 3 or more activities you will engage in

for each phase. In addition, you will apply part of this framework in

the phase “During development” by engaging in three tests/security

controls outlined below to the existing SDEV virtual machine in the

default root website.
Security Controls to Test
1. Fingerprint Web Server (OTG-INFO-002)
ï‚· Use netcat, httprint or other tool to discover the web server software vendor and release. Show output of the tool output.
ï‚·

Perform online research about the discovered software vendor and

release. Report upon documented vulnerabilities with the release.
ï‚· Report upon how you would mitigate any documented vulnerabilities.
2.

Review webpage comments and metadata for information leakage

(OTG-INFO-005). Manually review the sample HTML applications in the

Apache Web Server directories
ï‚· Based upon online research, what are

three or more categories of information that would be considered

information leakage that is not acceptable?
ï‚· Review the web site to

see if there is information leakage in the SDEV information. Report upon

what you have discovered and your method of discovery.
3. Test HTTP Methods (OTG-CONFIG-006) – See which HTTP methods are available on the virtual
machine. Use Netcat or other tool against this SDEV site.
ï‚· What HTTP methods are enabled and disabled on this site? Show the output of your tool indicating the HTTP methods.
ï‚· Which methods (and why) have potentially pose a security risk for a web application. Describe
how these pose a risk.
Site Configuration:
Note: The SDEV Virtual Machine you downloaded and used for SDEV 300. The URL is here if you need to download it again: https://citeapps.umuc.edu/SDEV/
The

VM runs on the latest version of Oracle Virtual Box. Also review the

instructions for installing and configuring the VM and application under

the “Course Materials” section of the course portal. It also contains

the necessary password(s) to login as well.
Deliverables:
You should submit your source testing framework document along with the results testing the three
security

controls listed above. Screen captures should be clearly labeled

indicating exactly what the screen capture represents. Your document

should be well-organized, include page numbers, include all references

used and contain minimal spelling and grammatical errors.
Grading Rubric:
Attribute
Meets
Does not meet
Testing Framework
50 points
Develops and fills in details for the “before development begins” phase testing framework.
(10 points)
Develops and fills in details for the “during definition and design” phase testing framework.
(10 points)
Develops and fills in details for the “during development” phase testing framework.
(10 points)
Develops and fills in details for the “during deployment” phase testing framework
(10 points)
Develops and fills in details for the “maintenance and operations” phase testing framework.
(10 points)
Does not develop or fill in details for the “before development begins” phase testing framework.
Does not develop or fill in details for the “during definition and design” phase testing framework.
Does not develop or fill in details for the “during development” phase testing framework.
Does not develop and fill in details for the “during deployment” phase testing framework.
Does not develop or fill in details for the “maintenance and operations” phase testing framework.
Security Controls
30 points
Fingerprints Web Server (OTG-INFO-002) in the Apache Web Server main site. Identifies and researches Apache software version.
(10 points)
Reviews webpage comments and metadata for information leakage (OTG-INFO-005).
(10 points)
Tests

HTTP Methods (OTG-CONFIG-006) and documents which HTTP methods are

available on the virtual machine main web site. Describes risks in HTTP

methods.
(10 points)
Does not fingerprint Web Server

(OTG-INFO-002) in the Apache Web Server main site. Does not identify and

research Apache software version.
Does not review webpage comments and metadata for information leakage (OTG-INFO-005).
Does

not test HTTP Methods (OTG-CONFIG-006) and document which HTTP methods

are available on the virtual machine main web site. Does not describe

risks in HTTP methods.
Documentation and Submission
20 points
Submits source testing framework document.
(5 points)
Document includes the results from testing the three security controls listed in the instructions.
(5 points)
Screen captures are clearly labeled indicating exactly what the screen capture represents.
(5 points)
Document

is well-organized, includes page numbers, includes all references used,

and contains minimal spelling and grammatical errors.
(5 points)
Does not submits source testing framework document.
Does not include the results from testing the three security controls listed in the instructions.
Screen captures are not clearly labeled indicating exactly what the screen capture represents.
Document

is not well-organized, or include page numbers, or include all

references used, and contains multiple spelling and grammatical errors.

Defining-Goals

The Define phase of DMAIC is the first stage towards establishment of the most ultimatum decision. The fact is that a problem does exist at Phone Systems Inc. The problem at hand is trying to determine the branch of the company in the US whose closure would have the least detrimental impacts on the customer, employees and all other relevant stakeholders of the company. This decision has to be made as fast as possible to pave way for plans to establish a branch of the company in India. The decision to establish a branch in India is already made and there is no question about it.

A comprehensive stakeholder analysis of this situation can help evaluate the impacts of a decision on the different parties at Phone Systems Inc. In this conflict, there are the primary stakeholders. These include the employees and customers of this company, those that would be directly affected by the decision that would be made. Secondary stakeholders include the intermediaries, perhaps the relatives of the employees that shall have been rendered jobless as a result of the closure. Key stakeholders are those like the governments of India or USA whose influence on the decision is as well of a critical importance as the primary and secondary stakeholders.

According to (Turner, et al 2002) this analysis should involve a process that identifies, assesses awareness, and leads to best strategies of communication while assessing the satisfaction of all stakeholders in the project to abandon the attitude of supporting or opposing without a distinctive reason of worth. Use of statistics could provide a justifiable reason for the actions/ decisions made by the company. The need to expand the customer base to a global oriented venture could help market the company in the global scene.

The best decision would be to close the Minneapolis site and open a new site in India. Taking into account that this site is one of the two oldest sites of the company, its insignificant progress in performance delivery is worrying. Compared to the sites at Tampa, FL and San Antonio, TX which were established much later, this site has failed in service delivery, even after going through a major restructuring in 2013. Setting a new site in India could help utilize the Minneapolis resources better.

The reason behind this decision is because of the poor performance of this site even though it is the second oldest establishment of the company. Secondly, closure of Syracuse, NY site is not advisable as it is the world headquarters of the company. San Antonio site is largely profit making and is critical for economic sustainability of Phone Systems Inc. Statistical survey of the Tampa site shows that it has highest rating of employee survey. Business decisions calls for a detailed analysis of a situation to come with most effective decision for the benefit of company. Such decisions must surpass personal interests of individual stakeholders within the organization.

Turner, Kristoffer and Thurloway, 2002 statistical analysis. Place of publication not identified: Princeton University Pres.

Weathington, B. L., Cunningham, C. J. L., & Pittenger, D. J. (2012). Understanding business research. Hoboken, N.J: John Wiley & Sons.

Phone Systems, INC is my current company. The above is from my discussion board for reference. My mod 2 assignenment is also attached if needed.

WileyPLUS-pre-calc-assignment-

I have 2 assignment on WileyPlus for a pre calc class, one is about The Vertex of a Parabola & and the other one is Introduction to Exponential Functions. they wont take more than 10min to finish, but i dont have time to do them, ill send you my account and you can login and do them

Opening-paragraph-of-an-argumentative-essay-on-whether-or-not-Brutus-was-a-patriot-or-betrayer-

For this assessment you must demonstrate your understanding of claims and counterclaims by writing an opening paragraph to your argumentative essay. This paragraph must clearly state your claim and counterclaim.

Remember! Your opening paragraph must respond to the following prompt:
Was Brutus a betrayer or a patriot?

This information is part of your argumentative writing project for this unit.

project-on-any-topic-oriented-to-Project-and-change-management-subject

The exercise in the scope statement, Responsibility matrix and Image is just a guidance for the project. The Exercise in the scope statement must be a different one.

Your final project submission should look like these documents in terms of there formats is one of the requirements.

And no plagiarism must be seen.

Project Format Examples are below

Thank you.

MG-study-case-

Answer the four case questions on p.cture I give to you. Please type this in Word and upload to the dropbox. The instructions state to be as specific as possible in your responses and to provide concrete suggestions/examples in your answers. There is no specific requirement with respect to “length of answers”; however to fully answer these case questions you must provide sufficient detail and explanations (i.e., one or two sentences is most likely insufficient).