Organizing HR Projects

Your company has had embedded HR generalists in business units for the past several years. Over that time, it has become costlier, and more difficult to maintain standards, and is a frustration for business units to have that budget “hit.” The leadership has decided to move to a more centralized model of delivering HR services and has asked you to evaluate that proposition and begin establishing a project team to initiate the needed changes. The project team is selected and you must now provide general direction.

Write a five to six (5-6) page paper in which you:

  1. Review and define the five (5) steps of strategic planning . Based on the information, provide a statement of overall importance of these steps to your project team.
  2. Develop a vision and mission statement for the project team specific to the current project. HINT: It is highly recommended to follow the guidance offered in the textbook about vision and mission statement.
  3. Explain to the project team what a project charter is and why it is used. Then, select any 3 charter elements you feel are more important and explain why.
  4. Provide a “Statement of Emphasis” to your project team based on the information you provided in the previous 3 sections above. The goal is to ensure your team understands the importance of the information.

Your assignment must:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Threats, attacks and vulnerabilities of mobile devices

Assignment Guidelines

Course Code: CS685

Course Title: Information Security Legal and Ethical Issues

Subject: Threats, attacks and vulnerabilities of mobile devices

You are requested to write review, survey or state-of-art article within the domain of following topics. Your article has to give an overview of existing literature in a field, often identifying specific problems or issues and analyzing information from available published work on the topic with a balanced perspective. Review articles can be of four types, broadly speaking opinion, literature reviews, systematic reviews, comparison or fields analyses.

Guidelines:

Course Materials: Santos, C. (2019). Developing cybersecurity programs and policies (3rd ed.). Pearson IT Certification. ISBN:
9780789759405

  • High Importance Note:

The submission should be 100% the students’ work. It is about writing a short paper, so students must do a survey of the literature and must do it by themselves. At grading, it will be easy to recognize who did the work and who copied it online. We will use plagiarism tools. These tools are used by conferences and journals to detect whether submitted papers contain copied and pasted sections and sentences.

———–

I need also a simple PowerPoint presentation.

P6-1_3_5_6: Windows & Linux

P6-1_3_5_6: Windows & Linux

DO the following Hands-on Projects:

  • Project 6-1 (p. 298 from textbook): Use the Add a Device Wizard in Windows 10:
    • Perform Steps 1 & 2 ONLY, and
    • Submit the snapshot of the window on Figure 6-12
  • Project 6-3 (p. 301 from textbook): Use Device Manager in Windows 10:
    • Perform Steps 1-4 and “Click the Driver tab” ONLY from Step 5
    • Submit the snapshot of the window on Figure 6-14
  • Project 6-5 (p. 304 from textbook) View Devices in Linux:
    • Perform Step 5 ONLY, and
    • Submit the snapshot of its output
  • Project 6-6 (pp. 304-305 from textbook): Use the Settings Menu in Linux:
    • Perform Steps 1 & 2 ONLY, and
    • Submit the snapshot of the window on Figure 6-16

reply to discussion post below-wk7cmis,aerial

The current web browser I am using now is Google Chrome like many other people I heard about the security and efficiency of the program and decided to download it. I currently have Norton anti-virus protection on my laptop as well. My Norton has a safe web search option that turns my google chrome into a different web browser called “Safe Search” and allows me to go in the internet with my VPN protected and less danger of malware, spyware, etc. I also have internet explorer on my laptop but I never use it due to google chrome and safe search being more effective and safer. I could use the internet explorer if I wanted to due to the protection I get from my Norton anti-virus, but I decide not to take the chance at introducing my laptop to any viruses. I feel that my laptop and web browsers are as secure as they can be at this time and I wouldn’t make any changes. If I didn’t have the protection of Norton that would be a different story, I would probably still stick to Google Chrome definitely.

paraphrase the answers below

Layer 1 – The Physical Layer

The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other attributes are defined by physical layer specifications. The physical layer is vulnerable to wire taps and reconnaissance. Fiber media is much more secure, but both copper and fiber media are vulnerable to cutting. This type of vandalism can bring down hosts, segments, and entire networks. Also, power instabilities, natural disasters, and severe storms can affect network devices to the extent that they can become inoperative (see Appendix on Physical Security).

Layer 2 – The Data Link Layer
The data link layer provides reliable transit of data across a physical link. The data link layer is concerned with physical, as opposed to logical addressing, network topology, network access, error notification, ordered delivery of frames, and flow control. Frame-level exploits and vulnerabilities include sniffing, spoofing, broadcast storms, and insecure or absent virtual LANs (VLANs, or lack of VLANs). Network interface cards (NICs) that are misconfigured or malfunctioning can cause serious problems on a network segment or the entire network.

Layer 3 – The Network Layer
The network layer provides connectivity and path selection between two host systems that may be located on geographically separated networks. Packet-level exploits include ping scans, sniffing, DoS, Address Resolution Protocol (ARP) poisoning, nuking, ping of death, and spoofing. DDoS attacks such as SMURF, Stacheldraht, and TFN are especially dangerous to target networks and devices.

Layer 4 – The Transport Layer
The transport layer segments data from the sending host system and reassembles the data into a data stream on the receiving host system. In providing communication service, the transport layer establishes, maintains, and properly terminates virtual circuits. In providing reliable service, transport-error detection-and-recovery and information flow control are used. The transport layer is especially vulnerable to an attack. Many applications and protocols use well-known TCP and User Datagram Protocol (UDP) ports that must be protected. This is analogous to locking the door but leaving all the windows wide open. These windows must also be closed or secured. Segment-level attacks such as DoS, spoofing, and hijacking can be performed. Numerous port scanners are available to perform reconnaissance on a host or network.

Layer 5 – The Application Layer
Application layer attacks can be implemented using several different methods. One of the most common methods is exploiting well-known weaknesses in software commonly found on servers, such as Send mail, Hypertext Transfer Protocol (HTTP), and File Transfer Protocol (FTP). By exploiting these weaknesses, hackers can gain access to a computer with the permission of the account running the application, which is usually a privileged system-level account. These application layer attacks are often widely publicized in an effort to allow administrators to rectify the problem with a patch. Unfortunately, many hackers also subscribe to these same mailing lists, a scenario that results in their learning about the attack, if they have not discovered it already. The primary problem with application layer attacks is that they often use ports that are allowed through a firewall. For example, a hacker executing a known vulnerability against a Web server often uses TCP port 80 in the attack. Because the Web server delivers pages to users, a firewall must allow access on that port. From the perspective of the firewall, it is merely standard port 80 traffic. Application layer attacks can never be completely eliminated. New vulnerabilities are always being discovered and publicized to the Internet community. Driven by the demands of the Internet market, companies continue to release software and hardware with many known security issues and bugs. Furthermore, users continue to make security difficult by downloading, installing, and configuring unauthorized applications that introduce new security risks at an alarming rate.

Toxicology Question

1. Find a lay article (non-scientific publication, e.g., news or magazines) on the Internet that addresses an

area of food safety (pesticide, industrial contamination, food additives, bacterial contamination,
genetically modified organisms, etc.)

2. Read and summarize the article. Your summary should be an objective summary of the arguments and conclusions made by the author(s), do not interject your own thoughts in this summary.

3. This summary is one page. Please include title, author, where and when the article was published.

See a sample writing below:

Example:

Title of article: Safety Questions Over Ephedra Spark Clash Between FDA, Industry Officials

Article published in: the Marketplace section of The Wall Street Journal

Date published: Aug. 9, 2000

Article written by: Sarah Lueck, Staff Reporter

Link: https://www.wsj.com/articles/SB965776631416126532 (Links to an external site.)

Summary (type double-spaced):

Ephedra is a dietary supplement advertised as a stimulant that helps in weight loss and body

building. This article reports on a public meeting in Washington DC, held the day before, to

discuss the safety of ephedra. FDA (Food and Drug Administration) officials told of 100 reports

of serious health problems linked to ephedra, including 7 deaths by cardiac arrest, and said that

such effects are commonly underreported. Industry representatives countered that millions of

people have used ephedra without any problems, and that most of the cases reported to the FDA

were probably caused by other health problems. The reason for the clash is that, as a dietary

supplement, the burden of proof is on the FDA to show ephedra is harmful so as to take it off the

market. If ephedra were classified instead as a drug, the burden of proof would be on industry to

show that it was safe and effective before the FDA would allow it to be sold. The FDA wants

ephedra out of dietary supplements; industry does not

Consulting for the Caring Angel Hospital, management homework help

Final Case Study: Consulting for the Caring Angel
Hospital

Imagine that you
are a senior consultant at Practical Health Care Consulting firm. Your
supervisor has instructed you to spend three (3) months at the Caring Angel
Hospital to help improve the quality of care, add value to the organization,
improve employee morale, design an efficient organizational chart, create a
strong team environment, and create the hospital’s competitive advantage. The
hospital has traditionally made losses year after year. Furthermore, it is not
performing well financially, and the banks are not willing to lend it large sums
of money for more effective marketing.

After spending two (2) months
within the hospital, you are very happy with your progress, and you think you
are capable of acquiring more patient base and expanding the hospital market.
However, with a closer look, you notice that your patients are still hopping
from one specialized hospital to another in search of various specialized
treatments. You also notice that the seats are not comfortable in the waiting
area, and the patients continuously show up for appointments on the wrong dates.
The nurses and the employees are not smiling during patient conversations, and
everyone looks for ways to blame others for failures in the patient treatment
process. Everyone seems to work alone and hide what they do from their
colleagues.

At the end of the three (3) month period, you must provide a
report with your recommended strategies designed to help Caring Angel Hospital
achieve its goals.

Note: You may create and / or make
all necessary assumptions needed for the completion of this
assignment.

Write a four to six (4-6) page paper in which you:

  1. From a consulting perspective, propose the major steps that Caring Angel
    Hospital could take to achieve each of the following goals:

    1. Improve the quality of care
    2. Add value to the organization
    3. Improve employee morale
    4. Design an efficient organizational chart
    5. Create a strong team environment
    6. Create the hospital’s competitive edge.
  2. Recommend one (1) approach that the hospital could use for acquiring a
    larger market share given the prevailing financial circumstances. Justify your
    recommendation.
  3. Investigate at least two (2) value-added services that Caring Angel Hospital
    could offer to strengthen its value proposition. Provide at least two (2)
    examples of the advantages of these value-added services to the hospital.
  4. Use four (4) recent (within the last five [5] years) quality academic
    resources in this assignment.
    Note: Wikipedia and other
    websites do not qualify as quality academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch
    margins on all sides; citations and references must follow APA or
    school-specific format. Check with your professor for any additional
    instructions.
  • Include a cover page containing the title of the assignment, the student’s
    name, the professor’s name, the course title, and the date. The cover page and
    the reference page are not included in the required assignment page
    length.

Keeping It Relevant and “Authentic”, EDU 645 Learning Assessment for the 21st Century help

  According to Chapter 1 of the required text, Formative assessment is assessment FOR learning. Summative assessment is assessment OF learning. Formative assessments occur during the lesson as opposed to the end of a unit of instruction and should be the primary focus of assessment in schools. Additionally, formative assessments allow the teacher to support learning by generating feedback to students to determine their current progress and where they are in relation to mastering the objective and/or standard.

View the following short videos:

Discuss:

  • How each teacher models what you read and learned about formative assessments?
  • What evidence did you see and hear regarding formative assessments being an assessment FOR learning?  More specifically, how did each teacher assess during learning?
  • How were they able to determine the current progress of their students in relation to mastering the objective?  How did each teacher model the provision of feedback?
  • What connections can you make between the teachers’ strategies to assess for learning and their eventual assessment of learning through a summative assessment? In other words, what can you see coming as preparation for a larger, more comprehensive summative assessment?

EDU

After having reviewed the Content section of this module and read chapter 1-2 & 4-7 students will make an on-line submission of their response to the assignment question below. The book The Great Conversation 7th or 8th edition is required

*( The book The Great Conversation 7th or 8th edition is required ) The purpose of this assignment is to assess your familiarity with some of the key issues from the Greek mythical tradition in contrast to the distinguishing characteristics of the early Greek naturalist (Pre-Socratics). Examples should be used to illustrate and support your points. The assignment is to be 2-3 pages in length (approx. 1300 words or 100 lines) using standard 12″ font size with 1.5 spacing. You may use bullet lists sparingly for only part of your essay. The essay is your comparison and contrast of Greek myth to the logos of the early Greek naturalist that lead to Socrates.

PSYC 101memory

Reply back to these 3 post with 300 word minimum.

-This week’s forum really hits home for me. I work in the legal community, and I guess I could say I have seen examples of distorted memory in many criminal cases. Sometimes the distortion is just an exaggeration of certain facts – whether the exaggeration is intentional or accidental, who am I to judge? The exaggerations tended to be against a person the witness did not like, like a drill instructor or a mean supervisor. And, unfortunately, I have listened to expert witnesses explain why some victims’ memories may be completely false or incorrectly reconstructed. It is heartbreaking because either the person really did experience the traumatic event, and they have to listen to a stranger convince a jury that they are fabricating a story; or on the other hand, nothing did happen but based on circumstantial evidence or provoking comments made by friends or family, they are led to believe something traumatic did happen to them.

One case in particular comes to mind. There was a young girl whose parents claimed she was sexually assaulted. Based on the testimony of expert witnesses, and what the appeals court ultimately determined, one of the parents took one of her comments out of context, applied her personal bias against the defendant to it, and reported it. There were several interviews of the young girl, and the expert psychologists for both sides at trial agreed that the forensic interviews for her were not conducted appropriately. The girl was never able to independently provide a narrative and her story was constructed based on prompts and repeated suggestions.

-Hello everyone,

I thought this week’s lesson was very interesting and I became more knowledgeable in the memory field. I would really like to meet professor Elizabeth Loftus because she seems like a fun person to be around. I was shocked finding out that in 2002 she was ranked 58th out of 100 in the Review of General Psychology’s list. She was also the highest ranked women on this list. After reading through this week’s lesson and the LA Weekly website article I found several implications that human memory has on the use of eye-witness testimony in criminal and civil court cases. One implication is suggestibility. An example of suggestibility is when a witness is easily and often accidentally misled with misinformation from sources that ultimately leads to false memories. Another implication of human memory is the misinformation effect. Elizabeth Loftus developed the misinformation effect paradigm, which is described as holding the after exposure to incorrect information. By doing this a person could misremember the original event. Loftus states that an eyewitness’s memory of events can be very flexible due to the misinformation effect. False memories are another type of limitation of human memory that could affect an eye witness testimony. False memory syndrome relates to memories of events that do not have eye witnesses. Most of the time the only witnesses are the victim and perpetrator. In a criminal or civil court case, false memories could negatively affect the juror’s verdict. In 1993 John Briere and Jon Conte conducted a study on childhood sexual abuse. The results revealed that 59% of 450 men and women who received treatment for sexual abuse that happened before age 18 had forgotten their experiences. Elizabeth Loftus believes sexually abused victims can recover these memories through therapeutic techniques like hypnosis, age regression, and guided visualization. I mentioned before, I have become more knowledgeable in the memory field after reading this lesson. I look forward to ready the rest of the classes posts.

-There are several different kinds of limitations human memory could have one the use of eye witness testimony in civil and criminal court cases. There’s only so much research and investigation you can do with in a certain time frame before you have to conclude your findings with the court. False memory syndrome can go either way, whether it be victim, witness, or the one on trial. Memories, dreams and such, the whole mind is susceptible to manipulation. Whether it be drugs, alcohol, age, abuse, even dreams are manipulated.I have memories that I often question myself in my life. It just depends on the case. If a witness recants and due to any circumstance it’s because the memory was manipulated in some way. Each human mind is so very different, so there are many factors including health reasons. For example Traumatic Brain Injury occurring at any given time and point and any person in any case, the memory, the whole mind, vision etc could be possibly manipulated and or compromised. Another case could be the witness could possibly have been color blind and compromised what was seen as a witness. You can use a psychologist or you can use many forms of medical doctors, investigators, specialists until you get to the deadline to present your findings to the court. Short term memory loss, blindness, medication, and even genetics could also be implicated depending on the case. It’s an endless web of possibilities, however the goal is to achieve the truth or the closest thing to when it comes to science. That’s the side i’ll always stand on when it comes to civil or criminal court cases. Anywhere really. If science backs it up, I know it’s legitimate. I’m interested to hear what all of you have to take from this.