In larger organisations including multi-national companies, there will be a dedicated department called the Human Resource Department. Describe four (4) key functions of human resource department.
[30 marks]
Question 2
A high-performance culture can be defined as an organisational culture where the corporate values for achieving the organisation goals are deeply embedded in the hearts and minds of all employees.
Describe the essential characteristics in High Performance Work System.
[30 marks]
Question 3
Person-Job fit and Person-Organisation fit are important aspects to be considered to ensure the right selection of candidate for a position. Describe the concepts of:
Task: Multi-Tenancy Cloud with a Secured Logical Isolation Storage
1.Proposed topic:
In 100 words identify a proposed topic in your discipline?
Users of a public or private cloud can pool their computing resources in a multi-tenant cloud. Each renter’s personal information is confidential and not accessible to other residents. In a multi-tenant cloud infrastructure, users can store their projects and data. Multi-tenant cloud architecture has several permission levels to ensure users have exclusive access to their data and prevent other cloud tenants from accessing it. If the cloud provider permits you, you may access a tenant’s data (M.V., 2018). Numerous companies can share a single server in a private cloud, but multiple organizations can securely share a single server in a public cloud. In a multi-tenant cloud, more than one user can access the same virtual machine at once. This means that businesses may run fewer servers for less money, making it easier to keep them up and running.
2.Theoretical Background:
What theories covered in the program are associated with your topic?
Theories associated with multi-tenancy cloud storage and logical isolation include information security, access control, and data management. These theories are essential for understanding how to securely store data in a shared environment and ensure that only authorized users can access it. Storage cloud solutions realize economies of scale by serving many customers from a single pool of disks and servers. A single device will be used to hold the information of many different renters (Agade et al., 2012). All tenants’ report is available to a single app, which can then verify a user’s identification and authorization before completing the requested action. A single cloud flaw could compromise all renters’ data. The cloud is considerably less safe than dedicated physical resources because security is only supplied at the application level. For multi-tenancy environments, we offer Secure Logical Separation for Multi-tenancy to achieve security comparable to physical separation while allowing complete sharing of resource usage (SLIM).
3.Population and sampling
What is the population you would like to address? Where will you select your sample from?
The companies thinking about adopting a multi-tenant cloud with protected logical isolation storage are the audience I would like to reach with the information I am trying to spread. To get a sample that is indicative of the whole, I would look for businesses already utilizing cloud services but are interested in increasing the level of safety they offer their customers. Young people in the United States who are just starting in information technology would benefit tremendously from my study’s findings. We would use a range of methods, such as questionnaires, focus groups, and individual interviews, to obtain the data we need (Rowley, 2014).
References
Agade, A., Arohi Kumari, A., Kadlag, A., & Hadule, S. (2012). Towards Secured and Trusted Multi-Cloud Storage with Backup Links. International Journal Of Scientific Research, 3(4), 183-184. https://doi.org/10.15373/22778179/apr2014/62
M.V., B. (2018). Multi-Cloud Based Secure Storage System. HELIX, 8(5), 4019-4023. https://doi.org/10.29042/2018-4019-4023
Rowley, J. (2014). Designing and using research questionnaires. Management research review
The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted.
[removed]
Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.
[removed]
Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations.
[removed]
NetWitness Investigator is available at no charge while Wireshark is a commercial product.
5 points
Question 2
1. Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.
[removed]
.packcng
[removed]
.paccapnextg
[removed]
.pcnextgen
[removed]
.pcapng
5 points
Question 3
1. The Wireless Toolbar (View > Wireless Toolbar) is used only:
[removed]
when using a pre-captured file.
[removed]
when capturing live traffic.
[removed]
when reviewing wireless traffic.
[removed]
in a virtual lab environment.
5 points
Question 4
1. In the frame detail pane, which of the following was a field unique to wireless traffic, confirming that it is a wireless packet?
[removed]
The Encapsulation type: Per-Packet Information header
[removed]
The Arrival time: May 11, 2007 15:30:37 041165000 Pacific Daylight Time
[removed]
The Capture Length: 181 bytes
[removed]
The Epoch Time: 1178922637.041165000 seconds
5 points
Question 5
1. Which of the following tools provides information about the antennae signal strengths, noise ratios, and other antennae information during a captured transmission?
[removed]
Windows Explorer
[removed]
DemoCapture
[removed]
Wireshark
[removed]
NetWitness
5 points
Question 6
1. Which of the following can be used to map who is able to communicate with whom, the measured strength of signals, and what frequencies are used, as well as be used for jamming certain frequencies and for determining which devices were likely used to set off remote bombs and Improvised Explosive Devices (IEDs)?
[removed]
MAC+PHY (MAC and Physical Layer)
[removed]
IEEE Layer
[removed]
Flags fields
[removed]
Quality of Service information
5 points
Question 7
1. In the IEEE 802.11 Quality of Service information and Flags fields, Wireshark displays information about the __________, which enables the network administrator to determine which Media Access Control (MAC) addresses match each of them.
[removed]
antennae and signal strength
[removed]
transmitters and receivers of the data
[removed]
payload and frame information
[removed]
Domain System and Internet Protocol version
5 points
Question 8
1. In the lab, Wireshark displayed the transmitter/receiver address in both full hexadecimal (00:14:a5:cd:74:7b) and a kind of shorthand, which was:
[removed]
IEEE 802.11.
[removed]
GemtekTe_IEEE.
[removed]
GemtekTe_00:14:a5.
[removed]
GemtekTe_cd:74:7b.
5 points
Question 9
1. Matching the __________ to their appropriate transmitter and receiver addresses can provide the needed forensic evidence of which devices are involved in a particular communication.
[removed]
MAC addresses
[removed]
IP addresses
[removed]
brand names
[removed]
IEEE numbers
5 points
Question 10
1. Which of the following statements is true regarding the fields displayed in Wireshark?
[removed]
There are hundreds of fields of data available and there are many different ways to interpret them.
[removed]
There are a few dozen fields of data available but there are many different ways to interpret them.
[removed]
There are very few fields of data available and most administrators will interpret them in the same or a similar way.
[removed]
Although there are very few fields of data available, most administrators will interpret them differently.
5 points
Question 11
1. Which of the following is a packet capture add-on that is frequently installed with Wireshark that enables the capture of more wireless information?
[removed]
3Com
[removed]
QoS
[removed]
GemtekTE
[removed]
AirPcap
5 points
Question 12
1. Regardless of whether the packet is sent through the air or on a wire, the ultimate payload in an investigation is:
[removed]
information regarding the transmitters and receivers of the data.
[removed]
detail about the Internet Protocol version.
[removed]
a Domain Name System query.
[removed]
evidence of any suspicious activity.
5 points
Question 13
1. In the lab, the DNS query indicated an IP address of __________ for www.polito.it.
[removed]
172.30.0.100
[removed]
130.192.73.1
[removed]
177.390.13.6
[removed]
172.30.121.1
5 points
Question 14
1. What is the actual Web host name to which www.polito.it is resolved?
[removed]
web01.polito.gov
[removed]
web01.polito.it
[removed]
web01.polito.com
[removed]
www.polito.com
5 points
Question 15
1. In order to use NetWitness Investigator to analyze the same packets that you analyzed with Wireshark, you first had to save the DemoCapturepcap.pcapng file in the older __________ format.
[removed]
.libpcap
[removed]
.tcpdump-libcap
[removed]
.pcapng
[removed]
.pcap
5 points
Question 16
1. Which of the following statements is true regarding NetWitness Investigator?
[removed]
NetWitness Investigator is available for free so it is only used for some initial analysis.
[removed]
NetWitness Investigator is often used only by skilled analysts for specific types of analysis.
[removed]
Investigators with little training typically can capture needed information using NetWitness Investigator.
[removed]
Wireshark provides a more in-depth, security-focused analysis than NetWitness Investigator.
5 points
Question 17
1. Which of the following statements is true regarding NetWitness Investigator reports?
[removed]
NetWitness reports contain only low-level wireless information, such as command and control.
[removed]
NetWitness reports do not provide the kind of sophisticated analysis that is found within Wireshark.
[removed]
NetWitness and Wireshark both provide the same information but the two tools differ in how that information is displayed.
[removed]
NetWitness is unable to provide information about the geographic location of the transmitter and receiver.
5 points
Question 18
1. Which of the following tools displays the MAC address and IP address information and enables them to be correlated for a given capture transmission?
1. When you were using NetWitness Investigator in the lab, the Destination City report indicated that the Destination Organization of www.polito.it was recorded as:
[removed]
Turin Polytechnic.
[removed]
Politecnico de Tourino.
[removed]
Republic of Italia.
[removed]
Turin, Italy.
5 points
Question 20
1. Which of the following statements is true regarding the information in the Destination City report?
[removed]
The Top Level Domain (TLD) “.it” belongs to Italy.
[removed]
The Top Level Domain (TLD) “.it” is proofthat the Web site is physically located in Italy.
[removed]
The Top Level Domain (TLD) was actually registered in the United States.
[removed]
It indicates that it will be impossible to determine the actual physical location of the server
Multi-Party Negotiation For the Unit VII Essay, you will explore the complexities that occur with multi-party negotiations and groupthink. Your essay will address the following points.
Describe two-party, coalitions, and multi-party negotiations.
Within your description, include a real-life example of how these types of negotiation are used in the business world.
Describe the social complexities of the Space Shuttle Challenger explosion. Please start by reviewing Figure 13.1 located on page 406 of your course textbook for background information on the event.
What is “groupthink,” and how did it affect the Challenger?
Make sure you include your source used for this portion of your research.
What do you think you would have done if you were in that Challenger meeting?
Be sure to include an introduction in your essay. Your essay must be at least three pages in length, not including the title page and reference page. You are required to use your textbook as a reference and one additional source for your paper. Follow proper APA format, including citing and referencing all outside sources used
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals Complexities that occur with multi-party negotiations and groupthink
Topic: The Strengths and Weaknesses of Multi-Site Provider Organizations
Early on the concept of an HMO was of multi-site staff or group model practices with some integrated facilities and integrated financing. Some h ave reported advantages of multi-site operations which could be achieved by an HMO. They include:
Exploiting intellectual capital by replicating successful models and methods Improved access to capital markets Exploitation of increased purchasing power Economies of scale in back room operations Diversification of local market risks Branding and marketing to regional and national accounts Ability to conduct and amortize research, such as access to large data bases for analysis and implementation of the findings over a larger population. Look at an “HMO” in your area and assess the extent to which it has been able to achieve these advantages. The choices range from a Blue Cross-type organization to a Kaiser-type to a for-profit such as one of new Medicare HMOs subsidized by the federal government.
Since 1970s, beneficiaries of Medicare have had the alternative to get their benefits in Medicare via individual health plans, for example Health Maintenance Organizations (HMOs) and Preferred Provider Organizations (PPOs), as alternatives to the nationally administered conventional Medicare Scheme. Apparently called Medicare Advantage plans, their individual health covers get capitated costs to give to enrollees of the plan services covered by Medicare. This paper will give reasons why HMO has been successful in my region in achieving certain advantages such as enhanced contact to capital markets, marketing and branding to national and regional accounts among others.
Consumers in this region started to accept HMOs not just because they charged reduced premiums but because they provided benefits that were extensive such as cover of preventive amenities, women’s and children’s preventive healthcare visits, as well as drugs prescription. The conventional insurance of Blue Cross and Blue Shield (BCBS) plans did not provide these services at the time. However, with changes in health sector, BCBS plans merged and started giving enrollees a wide selection of physicians and hospitals compared to members in cluster health clinics. Both plans include all services of hospitals apart from items of convenience within certain contracts (Fox & Kongstvedt, 2013). This enables the HMOs to maximize its increased purchasing power. At each level, the state triggered the growth of managed care in added ways. For example, the biggest employer agreement with HMOs on a two way basis was amid U.S Office of Personnel Management (OPM) plus the Kaiser Foundation Health Plans. This method was taken by several big employers. This method of Medicare pays phy………………………………………………………………………………………………