Find an article on the internet outline a security breach or cyber attack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy.

 

Comment on someone else’s post. Either agree or disagree with their suggest and provide a reason why you agree or disagree.

 

In your main post,  thoroughly describe the attack and how it occurred.  Also,  if the article identifies a way to prevent the attack,  also describe it in your main post.  Your main post should be a minimum of 300 words.
Comment should be 150 words

Please provide proper citation with page numbers of the material you are referencing in your Main Post.
Please write 1 paragraph for each of the following (total 3 paragraphs) and each paragraph shall be no less than 3 sentences and no more than 6 sentences.

 

  1. Discuss one of the following: STEMI, Non-STEMI; congestive heart failure; murmurs; ventricular tachycardia; asystole
  2. What is a safe treatment plan for a patient with Atrial Fibrillation?
  3. What is a safe treatment plan to reduce a patient’s bilateral lower extremities pitting edema?
  • Ask  a probing question.
  • Share  an insight from having read your colleague’s posting.
  • Offer and support an opinion.
  • Validate an idea with your own experience.
  • Make a suggestion.
  • Expand on your colleague’s  posting.

Classmate: Tcj

 

The two influences that have changed the nature of work are the continually evolving technology and all kinds of researched and invented tests. In the 1990s job performance was still searching for predictors that show workplace standard performance (Borman, Ilgen, & Klimoski, 2003). The world of work most importantly in the industrial and organizational psychology field focuses on human behavior in the workplace with the help of technology. New software’s and fast technologies have made an incredible change in the workplace and how the roles become more efficient and cost-effective in organizations. Databases and networking technology make it possible for operations to function effectively (Bridges, 1994). Additionally, new technology allows us to create automate both assembly and production lines to help cut human labor to increase production. As we grow in our work environments, services and technologies along with new trends have allowed the workforce to emerge and grow. The economy is on the rise with different organizations and firms 

Historically providing testing for different reasons still questions the data obtained and the variables. Researchers have done very well isolating tests to perform what it is intended to measure. Testing is used widely to fill certain job positions and seek certain characteristics in an individual for specialized careers. Mr. Alfred Binet who invented the first intelligence test commonly known today as the Binet-Simon scale. The French doctor specialized in a neurological lab in Paris then went to explore the field of psychology (Binet’s Intelligence Test, n.d.).

 
 
 

You have been promoted to manager for the e-Commerce site for the company you made up in Assignment 1. You are concerned about the recent SQL attack. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the Website and database to be compromised by a SQL injection attack. 

 

Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all of the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.

 

For Part I, you’re going to write a memo (4-5 pages) to the CEO and CSO documenting your guidelines based on your findings when you evaluated your company’s processes. 

 

  1. Justify why it is less expensive to build secure software than to correct security issues after a breach. 
  2. Outline the objectives and purpose of your company’s “best secure coding practices” and explain how it will influence your division.   
  3. Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing your thoughts into your existing processes. 
  4. Identify three resources that can be used as “reference material” and act as a beginner’s guideline for new employees. Outline the importance of each resource and how each resource can assist new coders.
  5. Use at least four quality references in this assignment. Note: Wikipedia and similar websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Test the links to ensure they work before submitting your paper
  6. Format your assignment according to the following formatting requirements: 
    • Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    • Include a reference page. Citations and references must follow professional business language format.

 

Part II: PowerPoint Presentation

 

Create a PowerPoint presentation for your team in which you:

 

  1. Outline the all of the major aspects of the Best Practice Coding guideline, including objectives, purpose, resources, and methodology. Note: Please include your fictional company’s name on each slide of your presentation. Remember, you’re planning on using this experience when you take what you’ve learned out into the real world.

Apple iPads continue to be successful. The Samsung Galaxy Tab is one (1) of iPad’s competitors. Use the Internet and Strayer Library to research the advantages and disadvantages of these devices and to determine if they are comparable. Research the features of both tablets, such as the operating systems used and their capabilities, cameras (front and rear) resolution, processors, display resolution, battery life, display size, internal memory, ports, etc. Also research any available accessories, potential for future upgrades, warranties, and available support for both the iPad and Galaxy Tab.   

 

Write a three to four (3-4) page paper in which you:

 

  1. Compare and contrast the features of both the Apple iPad and the Samsung Galaxy Tab.
  2. Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab.
  3. Recommend the type of user for which the iPad is best suited. Provide a rationale for your response.
  4. Recommend the type of user for which the Galaxy Tab is best suited. Provide a rationale for your response.
  5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

From Chapter 2, page 59; answer Jobs vs. Cook case:

Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook, who became CEO in 2011, embraces a more collaborative leadership style. Do research to compare and contrast the leadership styles of the two CEOs. (You may wish to view the 2013 movie JOBS, which portrays the story of Steve Jobs’ ascension from college dropout to Apple CEO.) Which CEO—Jobs or Cook—do you think developed and executed the most effective strategic plan? What evidence can you find to support your opinion?

Once your Graded Assignment is uploaded, a program called Turn It In will analyze your submission for plagiarism.  Submissions with more than 40% will not be accepted!  If your submission is greater than 40%, you have the option of removing your submission, reworking the paper, and resubmitting again.  This can be done as many times as needed until the due date has passed for this Graded Assignment. 

 
 
 

 Discussion 1

 

 

 

When gathering information about a student, it is important to not jump to conclusions and make adaptations before you have carefully analyzed the information.

 

 

 

 In this unit, you will meet Johnny, a six-year-old who is repeating kindergarten. You will view his case study and see what types of information may be gathered and how that knowledge can help to develop an appropriate learning environment. 

 

First, read the transcript to review the information provided in the presentation about Johnny that is uploaded below. Then, in your posting, describe what the information tells you and why. Base your analysis on what you have learned in the course so far regarding such things as learning styles, cognitive processes, and instructional strategies, as well as on your experience. Also include in your posting what additional questions you would want to ask to gather more information. 

 

 

 

Discussion 2

 

 

 

 

 

Reasons for Case

 

Share an overview of the child you will look at in your case study ( must be a special need child) and the reason you chose the particular child for your case. ( You can pretend that you observe a child and just answer the question pertaining to that child). What about this case suggests the need for additional differentiation to be able to successfully include the child in the learning environment with his or her peers?

 

To protect confidentiality, please do not mention real names of those you observe or their school.

The threat of public stigma, as well as self-stigma, can prevent individuals from receiving the mental health treatment they need. In this Assignment, you analyze the influence of stigma on experiences with and treatment of mental illness.

 

 

 

Watch the TED Talk by Sangu Delle and then review the readings for this week. Focus on Delle’s examples illustrating Corrigan’s model about the stages of stigma and the hierarchy of disclosure. Consider Delle’s experience against that model.

 

 

 

Required Readings:

 

     

 

Campbell, R. D., & Mowbray, O. (2016). The stigma of depression: Black American experiences. Journal of Ethnic & Cultural Diversity in Social Work, 25(4), 153–269. doi:10.1080/15313204.2016.1187101

 

 

 

Corrigan, P. W., & Rao, D. (2012). On the self-stigma of mental illness: Stages, disclosure, and strategies for change. Canadian Journal of Psychiatry, 57(8), 464–469. doi:10.1177/070674371205700804

 

 

 

Corrigan, P. W. (2007) How clinical diagnosis might exacerbate the stigma of mental illness. Social Work, 52(1), 31–39. doi:10.1093/sw/52.1.31

 

 

 

Johnson, J. L., Oliffe, J. L., Kelly, M. T., Galdas, P., & Ogrodniczuk, J. S. (2012). Men’s discourses of help‐seeking in the context of depression. Sociology of Health & Illness, 34(3), 345–361. doi:10.1111/j.1467-9566.2011.01372.x

 

 

 

Watch Video Link of Delle:

 

https://www.ted.com/talks/sangu_delle_there_s_no_shame_in_taking_care_of_your_mental_health

 

 

 

Assignment

 

  

 

Submit a 3-page paper that addresses the following:

 

· Briefly explain Corrigan’s model of the stages of stigma and his recommendations and hierarchy about recovery. 

 

· Explain whether Delle’s experience follows that model. Use specific examples to argue your perspective. If you agree, identify which stage of recovery Delle is in. 

 

· Analyze Delle’s reports about his own experiences with both types of stigma. Provide specific examples, and in your analysis consider the following questions: 

 

  

 

       o Does one type of stigma predominate in his talk?

 

       o Which of Delle’s personal values or beliefs were challenged by his internalizations about his own illness and help-seeking?

 

       o What strengths does he exhibit?

 

       o What was the primary benefit of his diagnosis?

 

       o Do you think his experience would be different if his culture was different? Explain why or why not?

 

 

 

Use APA format, intext citations and references from Required reading and any creditable outside sources.