Total entropy change of the system physics homework help
helpp neededdd
helpp neededdd
Assignment 3: Staffing Your Intrapreneurship Plan
Introduction-This project is an opportunity to discuss what you think should be the highest priority (aka: national interest) in the future of American foreign policy regarding one specific country. Step 1 – Identifying the Issue- Identify a critical issue in the US foreign policy relationship with one other nation.. Identify strategies that could be used to improve the policy (a thesis statement). Step 2 – Gathering Sources-Conduct research to locate three peer-reviewed academic journal articles (aka: scholarly sources) that specifically address issues within the foreign policy relationship you selected and meet the following criteria: The article must be no more than ten (10) years old and more than five (5) pages of actual content (without graphs, charts, footnotes, citations, etc.). Carefully choose those sources that provide a variety of perspectives on your selected topic. In addition to the (3) minimum research requirements, you may offer “supplemental sources” for essential current events information relevant to your topic. These may include academic sources that are not peer-reviewed (position papers), newspaper articles, magazine articles, and other legitimate sources. Textbooks, Dictionaries, Encyclopedias (including Wikipedia), Almanacs, or an Atlas are reference materials and are not to be listed as sources on the collegiate level. Provide the formal MLA or APA citation for each source.
Step 3– The Memo- Prepare a formal policy memo for the President of the United States (POTUS). Your document should quickly explain how the President can take your advice and put it into action. He is a busy man, so you must convey information quickly and on point. This document should quickly articulate (in 2-3 paragraphs) the relevance of the issue, the current policy position (citing the supporting evidence) and conclude with suggested reforms. The memo is to be 1.5 pages(single space) in your own words and a maximum of 2 full pages in length with citations. No more and no less is necessary for this activity. Keep citations to an absolute minimum.The formatting is to be single spaced; this is the protocol for a memo. Finally, add a cover page to the front of the document and include the works cited page at the end. This assignment should not be more than 4 pages total.
Topic: My POTUS Memo will focus on the relationship between the United States and Syria, specifically humanitarian assistance the U.S. provides in response to the Syrian crisis.
Sources that could help:
1. Achiume, E. Tendayi. “Syria, Cost-Sharing, And The Responsibility to Protect Refugees.” Minnesota Law Revie w 100.2 (2015): 687-762. Academic Search Complete. Web. 24 Oct. 2016.
2. Crook, J. R. (2012). United states pursue multitrack strategy to address conflict in Syria. The American Journal of International Law, 106(3), 652-655. Web. 24 Oct. 2016
3. Margesson, R., & Chesser, S. G. (2015). Syria: OVERVIEW OF THE HUMANITARIAN RESP ONSE.Current Politics and Economics of the Middle East, 6(2), 347-381. Web. 24 Oct. 2016
4. Rugh, W. A. (2013). Obama’s policy towards Syria.The Fletcher Forum of World Affairs, 37(3), 147-150.Web. 24 Oct. 2016
write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.and muake sure that all references must be in APA format This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.
Before you start this assignment, please read the story below
As Clive started his typical Wednesday morning routine, he was checking his e-mail. He saw a familiar name in his inbox. It was Jane, an information technology (IT) security manager at a competitive company. Clive and Jane have a good working professional (and ethical) relationship in which they often share information relating to security breaches and issues. Clive opens the e-mail, eager to see what new attack Jane has found. But in this case, Jane is pointing Clive to a pastebin link that contains the customer database content from Clive’s company.
Clive is now in a panicked but controlled state. His mind starts to race. How did these data get from the company database to this Web site? Who did it? What systems were compromised to generate this list of data? Clive takes a moment and composes himself, and then he begins to analyze the situation.
The first task Clive does after he settles down is to inform the appropriate people. He calls his manager and tells her of the situation, and assures her that he and his team are analyzing the situation and will keep her informed of progress. Clive’s next calls are to the team leaders of the network, database, and system administration organizations. The incident response plan is initiated.
Initial assessments from the three team leaders report the following:
• Network: After review of the intrusion detection system and firewall logs, there appears to be no abnormal activity; no alerts were generated.
• Database: After a review of database accounts, user and data definition (DDL) and data manipulation (DML) audit logs and database integrity checks, the database appears to show no abnormal activity.
• System administration: The system integrity checks and system audit logs show no abnormal activity.
After reviewing the reports, Clive is skeptical of the results, and he asks the teams to verify and confirm that log cleanup and deletion did not take place, and all leaders confirm that to be the case. Clive reports these findings to the management team. They are not pleased. They ask, “If no sign of break-in can be detected, then how did the list get generated and leave company premises?”
The incident response team heads back for more investigations. They next decide to review the application that the company uses. The application is an off-the-shelf application with a full and rich feature list. The various organizations use the features and insist that all of them are needed. Upon Data Breach an All-Too-Often Occurrence 2 review and investigation, they find that there are several pieces to the application that are not actively used by any team, yet certain people in the company have access to them. When reviewing these applications, a little hidden feature is found that allows users to write and run raw structured query language (SQL) statements in the database using the database application accounts.
The incident response team is curious about this feature and starts to investigate this path as the possible source of the data breach. Unfortunately, the application does not have auditing enabled for this area in the application. But the database administrator declares that there might be something that he can investigate.
The database auditing is only for DDL and DML, so SELECT statement access is not monitored, but the database does store all executed SQL statements in the Data Dictionary. A review of this information shows 1 query:
SELECT *
FROM app.customers;
All other statements accessing the app.customer table utilize a WHERE clause to limit the data to specific customers. The incident response team reviews this information and agrees this is how the data were extracted. Clive takes this information and reports back to the management team. They are pleased to know that progress is being made, but demand to know who did it and what can be done to prevent it from happening again in the future. The team now faces a new set of questions that need to be addressed:
• How was this access given?
• Who performed the SQL?
• How did it leave the company and make it to the paste bin site?
The incident response team added a new member to assist. The application support team was brought in and briefed on the situation and was asked to find out who performed the SQL statement and how he or she did it. Unfortunately, the company has all employees log into a shared application account. The application does not offer detailed connection logging. It was determined that there are 2 departments with about 25 people who have the access to perform the task in question.
The human resources (HR) organization was engaged and conducted interviews with all 25 employees, but in the end, no one was found to have Data Breach an All-Too-Often Occurrence 3 conducted the data breach, and the incident was closed with no employee blamed for the incident. In the meantime, while accountability was being reviewed, the incident response team had the obligation to resolve the incident. Two major resolutions were implemented:
• The application in question was modified, and direct SQL access was revoked.
• Generic accounts were no longer permitted; all users were now given named user accounts.
Moral of the Story
The use of software products without a full review of the application features and functionality led to the breach described in the story. In addition, the implemented access control model created accountability. A full review of any implemented software package needs to take place, and an understanding of all features and functionality is critical. Those features that pose a security risk should be disabled.
The use of the generic account with no additional auditing provided no accountability to the users for their actions. In this case, no one was ultimately held to blame for the incident except for the infrastructure and application support team for the lack of controls. The use of granular access controls is fundamental to any implementation.
In the end, the addition of a data loss prevention (DLP) network appliance could have alerted the company about the event. DLP devices monitor the network and look for data in motion and if sensitive data is detected alerts are raised. In this event, the large amounts of customer data being transmitted from the database to a client computer—and then potentially from the client computer out to the Internet—might have been detected.
Finally, security personnel must remember that not all security breaches are conducted from the Internet by expert hackers. The majority of incidents result from employees of the company performing malicious or, in most cases, accidental activities.
After reviewing the story, conduct research online into the various possibilities for analyzing and approaching the system documentation problems presented, and propose possible solutions. Address the following:
Many types of back-up technologies exist including disk to disk and disk to tape libraries. Given that tape has been around for many decades, why have companies slowly continued to move away from it? Should they? Explain your answer.
i want 300 to 400 words and cited refernce
Watch the video titled “Mark Zuckerberg on team dynamics located on you tube . Then express whether or not you agree with Mark Zuckerberg’s opinion on managing team dynamics. Half a page to one page
For this assignment, write a summary paragraph about your chosen article. The summary should include:
Answer the following in 1-2 sentences each.
Assignment 2: Project Paper
The Project Paper focuses on a suggested topic related to art, architecture, history, music, or literature. The project will reflect your views and interpretation of the topic. This project is designed to help you stretch your mind and your abilities to be the creative, innovative, and critical thinker you already are!
Choose one (1) of the topics from the list of topic choices below. Read the topic carefully. Write a four (4) page paper (850-1,000 words) that responds to each of the items described in the topic.
For the topic you choose:
Topic choices (pick 1):
The Project Paper will be graded on:
Your assignment must follow these formatting requirements:
Bestdissertationtutors.com is a custom writing service that provides online on-demand written work for assistance purposes. All the work should be used in accordance with the appropriate policies and applicable laws.