Categories
Writers Solution

IT security policy

 Collaborate and discuss with the team’s Security Specialist about the security and privacy of the software and hardware solution for Verbania. Provide best security practices and guidelines to implement and follow, as well as the creation of formal security policies and a security plan. Include the following policies in your IT security policy:

  • Disaster recovery
  • Password creation and protection
  • Remote access
  • Routers and switches security
  • Wireless communication
  • Server security
  • Acceptable encryption
  • E-mail

Document the team’s security plan, security policy and security solution.

Within the template, prepare 5-7 pages of content addressing the team’s System Design. Insert content into the template document under Section Three.

Read also CMGT 400 Intro To Information Assurance and Security – Individual Assignment Help

Sample Security and Privacy of the Software and Hardware Solution for Verbania

Software and hardware security of the computer system has presented a bigger challenge on the current pattern of technology. The software and hardware used in the present computer systems have been designed to handle important information from clients with complete transparency to the user. Normally, the storage, transmission and the recipient or who access the data is beyond the control of the user (Chess, & Arkin, 2011). Typically, hardware security is perceived as most basic feature since it is a physical device that host and secure networking system. While seeking for solutions to the security and privacy issues affecting hardware, the engineers and designer need to ask themselves how the social networking should be structured in order to provide secure services. The major security concerns associated with hardware are location of the servers and handling of data. These challenges are addressed using security policies which were designed to bring uniformity and standard throughout the world.

Read also Cybercrimes Development Chronology – Hacking, Email Wiretapping, Phishing And Vishing

            Software security solution focus on design and development of software to function properly and correctly even under attack (Dent, et al., 2015). Some of the security and privacy of the software solutions that are handled using security policies include access control, confidentiality, authentication, integrity and non-repudiation. In order to address the challenges of hardware and software security issues, Verbania should adopt IT security governance from ISO 38500.

Disaster recovery

The designers of the social networking should ensure that backup and database recovery process meets the security requirements. Disaster recovery is necessitated by a phenomenon that leads to destruction of networking components. Natural disasters that can destroy networking components include storms, earthquakes, floods and landslide. The backup and recovery processes must comply with legal, regulatory, legislative and policy obligations (OCIO, 2016). The security policies that must be considered in disaster recovery include access controls, environmental and physical security, use of digital signature and encryptions. The disaster recovery plan ensures that network continues to function properly even in the event of interruption or IT emergency. This allows for the restoration of the vital services and resource in a reasonable time.

Read also Backup Strategies and Use of Cloud Backup Strategies

            The backups and recovery of the users as well as essential data system must be identified and protected in offsite location. The technical and physical measures must be considered in order to enhance recovery after the failure, compromised or disruption of networking components. The security measures include configurations, firmware installation, software and operating systems.

Read also CIS 523 – Disaster Recovery Plan And Critical Success Factors

Password security policy

The main objectives of password policy is to establish a standardize methods of setting up and managing strong passwords by network administrators and network users. Passwords are important aspects of information security especially in the social networking. This is the first line of protection for the user accounts (Chess, & Arkin, 2011). The social networking system should be designed and developed to encourage the users to set up a strong password that composed of alphabets, numerical and symbols in order to ensure that social networking applications are not compromised. It is the responsibility of the social networking users to create strong passwords while opening their accounts.

Read also CIS 523 – Password Management Tips

            The password security policy applies to all Verbania employees which include the end users and system administrators. Also, agents, vendors and business partners are required to create their own personalized passwords. Some of the baseline password policy include requiring all the users to have authentication and identification such as one-time passwords or pass-phrase to permit access to the services (OCIO, 2016). The passwords must be confidential and the users cannot reveal to anyone except under specific circumstance outline in social networking IT security policy. It is the responsibility of the account holders and social networking user to be liable to all the actions such as use of their password to communicate and carry out transaction. The critical system password must be changed immediately whenever the network administrator leaves Verbania.

Email security policy

The objectives of email security policy is to define an acceptable use of email infrastructure and protect the security of information exchange over the email. The email security policy will be applied in two aspects: the employees of Verbania and those having social media accounts with Verbania. The policy should specifically accept the email usage on specific conditions (Chess, & Arkin, 2011). These include access to the email service only based on business requirements. Also, network administrators who are responsible for managing email servers must adhere to password policy.  User receiving spam emails via the Verbania social networking should be encouraged to report or forward such emails to the Information Security department through help desk. The creation of user account must follow a formal approval process. Lastly, anonymous and spoofing should be strictly forbidden.

            The security controls put in place to ensure protection of the information and data transmitted via the email include blocking of any suspicious emails, all email servers must have security appliance installed such as AV Scanners and spam filters, private and public key infrastructure must use encrypting emails, only approved mail infrastructure shall be permitted to transit through the network by using unauthorized mail relays for explicit protection.

Access control policy

The main objectives of access control policy is to implement control measures that ensures only authorized persons access the information. The access control policy ensures that the network operates under acceptable level of protection and meet the security requirements. The access control policy restrict the individual accessing hardware, software and infrastructure (Dent, et al., 2015). These include making sure that all systems have a user access lifecycle, the access of information by the user be restricted to base on security requirements and business requirements. Also, all the operating systems and application within the network are access only through login with user ID and password. In addition, all the devices and equipment used in the network must be authorized, registered and identified.

Read also Confidentiality, Access Control and Data Integrity – Network Security Policy

            In the case of end-user, access control policy requires the end users to have unique ID that identifies them. The network system must be configured to disable or remove all user accounts after a specified period of inactivity. The network system must be designed to approve end-user account before created and enabled.

Cryptographic usage policy           

The main objectives of cryptographic usage policy is to protect integrity, authenticity and confidentiality of the information transmitted and stored. Normally, cryptographic policy is used when protecting information considered as sensitive. The security measures of encryption control include ensuring that data transferred via WAN between stakeholder and Verbania through the internet must be protected using appropriate encryption (Chess, & Arkin, 2011). All the emails that contain sensitive and confidential information must be encrypted. All the business data that contain vital information about the business operations must be stored encrypted. Lastly, the network administrators must determine a standardize encryption methodology that works well with all the users

Assignment statusSolved by our Writing Team at CapitalEssayWriting.comCLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

Categories
Writers Solution

Globalization on homeland security

EACH POST 100 WORDS MIN EACH**

1. This week we were asked to discuss what the implications were of globalization on homeland security. Globalization is the international integration of markets for goods, services, and capital. Globalization has allowed for countries to trade and communicate in ways they never could before and faster than ever before. This does lead to complication when it comes to national security. The United States has been one of the leading technology and economic produces within the world. It is targeted by adversaries because of its strengths in these areas. Globalization has lead to cyberspace crimes, intellectual property theft, and attacks on critical infrastructures. While it has made life simpler it has created a huge target upon the United States. Jobs, goods, technology have been diminished because they are being produced in other countries for a cheaper price. (Lewis, 2004) Terrorist organizations have been utilizing the advancements in cyberspace and communication to their advantages by being able to reach and train individuals virtually without bringing them to their training camps. This makes conducting business less visible and keeps them from being detected. They can also use the internet and social media to spread propaganda and their messages are open for anyone to see at any time. This causes major security concerns because of the steady increase of homegrown extremists and lone wolf actors. While globalization has brought people together it has also opened the door to those who wish harm upon the United States. 

2. Good afternoon Professor and Classmates, For this week’s question, we were asked to identify what the implications of globalization on homeland security are.  Globalization is multifaceted and includes IT (information technologies) as well as other tech, stateside and global trading, and interdependencies.  These are not all inclusive, however, the evolution of globalization has the ability for us here in the United States to achieve economic prosperity, sharing of political freedom, and promoting peace.  Meanwhile, the implications which are produced from globalization include social divides, critical vulnerabilities, and conflicts including violence.  Globalization can create numerous implications for us here in the United States. It was interesting to find out from the readings how it is believed that our national security is becoming more concentrated, centralized, and consolidated across three dimensions.  These three dimensions are power across spheres, power across jurisdictions, and power within any government agency.  Furthermore, power across jurisdictions (public-private, federal-state, and Intra-agency) is where I will focus as there was some interesting information I discovered during my readings. The public-private relationships have created a bond where if this relationship became limited, this would affect what the government knows and be limited to information as well as increasing the workload.  There are some things the private sector can do which the public sector cannot do and vice versa.  The private sector can meet the globalization demands increasing national security, intel, and homeland security operations.  Therefore, implications arise when either the private or public sector cannot assist due to certain laws restricting them. Federal-state entities assist with homeland security operations globally.  All together federal, state, and local sectors combine to form what is known as a fusion center.  These fusion centers are a relatively newer concept of operations which also incur implications.  Communication flaws, interagency information sharing, and independent operations impact overall missions.  A hierarchy of personnel in charge is defined which helps alleviate issues such as these. Lastly, intra-agency is unique as it is a consolidated national security entity that falls in any one government agency.  The implication of inter-agencies is the apprehension of information sharing, competition like environment, as well as antagonistic towards others and/or goals.  Intra-agency operations actually work quite well thanks to those who fully support the mission

Categories
Writers Solution

You have been hired as the CSO (Chief Security Officer) for an organization

 You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

Categories
Writers Solution

The Department of Homeland Security, created in 2002, created the second largest government agency in the country

Two discussions Module 7 and 8. 125 words initial post for each and two replies of 50-60 words each discussion. I will post the replies later. 

Module 7 Discussion 

The Department of Homeland Security, created in 2002, created the second largest government agency in the country (second only to the Department of Defense). The creation of this agency was highly controversial in the United States Congress for two primary reasons. First, the cost of administration of the new agency immediately created a new, huge financial obligation of the government that did not exist previously and, secondly, the new agency became an “umbrella” agency that managed twenty-two previously autonomous agencies already assigned the basic mission directives of security within the United States. Are these alleged criticisms valid, or did a new need exist? 

Module 8 Discussion 

 The living will is a relatively new doctrine and instrument in the English Common Law. The living will is a creation of necessity that came about due to the huge and unforeseeable medical advances that occurred in the 20th century due primarily to technological breakthroughs. Prior to this time, the common law allowed an individual to make her medical decisions only during such time as she was physically competent to do so. If and when such competency ended, the law imposed a strict protocol of persons to whom the duty of decision-making would fall. No allowances were made for what we now call advance directives. Is this an improvement of the law or do living wills and advance directives create more problem than they solve? Please use a concrete example to support your argument. 

Categories
Writers Solution

A suspect is apprehended in a department store by the security guard.

A suspect is apprehended in a department store by the security guard. The suspect is placed in handcuffs and taken to the manager’s office. The police are called and advised of the situation. Officer Martinez arrives at the department store approximately 15 minutes later. Officer Martinez takes a statement from the security guard and views the in-store camera film of the shoplifting incident. Officer Martinez places the suspect under arrest, reads the suspect the Miranda warnings, and asks the suspect if he would like to make a statement. The suspect replies, “No, I would like a lawyer”. The suspect is then transported to the local jail and booked. Six hours later, the suspect is interviewed by a detective who again reads him the Miranda warning. The detective then asks the suspect if he would like to talk. The suspect says, “Yes.” He eventually confesses to the crime.

Write a 1- to 2-page paper in which you:

Identify and discuss the constitutional amendments that would relate to this situation.

Discuss how the Edwards rule is related to this situation.

In your opinion, determine if the suspect’s confession to the detective is admissible. Support your opinion with specific case law or contemporary cases.

Use at least three quality references. Note: Wikipedia and other similar websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

This course requires the use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Research and analyze procedures governing the process of arrest through trial.

Critically debate the constitutional safeguards of key amendments with specific attention to the 4th, 5th, 6th, and 14th Amendments.

Explain key law enforcement regulatory procedures and rules and requirements of law enforcement in the evidence collection phase.

Explain and debate fundamental Supreme Court cases associated with criminal procedure.

Use technology and information resources to research issues in the criminal procedure.

Write clearly and concisely about the criminal procedure using proper writing mechanics.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Assignment statusSolved by our Writing Team at PrimeWritersBay.comCLICK HERE TO ORDER THIS PAPER AT PrimeWritersBay.com

Categories
Writers Solution

Develop a security Infrastructure for a Medium-Size Network

 ITNE2005Develop a security Infrastructure for a Medium-Size Network
Assignment
Objective(s)
This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to evaluate student’s ability on working with the routers, firewalls and VPN tunnels and adopting those technologies in enterprise level networks.
The following ULOs are assessed in this assent assessment.
LO 1
Explain network security issues and develop a comprehensive network security policy to counter threats against information security
LO 2
Analyse and configure routers on the network perimeter with router software security features
LO 3
Evaluate and configure firewall protocols and features to perform basic security operations on a network
LO 4
Critically review the enterprise network requirements and configure site-to-site virtual private networks using standard router software features
LO 5
Analyse the enterprise security requirements and configure intrusion prevention systems on network routers
LO 6
Monitor network traffic and implement security policies to control access, resist attacks, and protect network devices
INSTRUCTIONS
These instructions apply to Assignment
Assignment (Weightage 20%) – The report should be uploaded on the LMS by Session 12
Demonstration: Due on Lesson 12 in class
This Assignment will focus on student’s ability to work on an enterprise level network and handle network devices. Upon the implementation of the network, student should produce a comprehensive report, which includes screenshots of entering configuration commands and brief explanation of the screenshots. The devices should be named with the respective student ID
If any third-party content is used. The citation of sources is mandatory and should follow IEEE style.
What to Submit.
Submit your report to the Moodle drop-box for Assignment. Note that incidents of plagiarism will be penalized.
Please Note: All work is due by the due date and time. Late submissions will be penalized at the rate of 10% per day including weekends.
Assignment Description:
Figure 1: Network Topology
Note: Integrated Services Routers (ISR) have Fast Ethernet interfaces instead of Gigabit Ethernet interfaces.
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway Switch Port
R1-S0000 F0/0 209.165.200.225 255.255.255.248 N/A ASA G0/0
S0/0 (DCE) 10.1.1.1 255.255.255.252 N/A N/A
Loopback 1 172.20.1.1 255.255.255.0 N/A N/A
R2-S0000 S0/0 10.1.1.2 255.255.255.252 N/A N/A
S0/1 (DCE) 10.2.2.2 255.255.255.252 N/A N/A
R3-S0000 F0/1 172.16.3.1 255.255.255.0 N/A S3 G0/0
S0/0 10.2.2.1 255.255.255.252 N/A N/A
S1-S0000 VLAN 1 192.168.2.11 255.255.255.0 192.168.2.1 N/A
S2-S0000 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 N/A
S3-S0000 VLAN 1 172.16.3.11 255.255.255.0 172.16.3.1 N/A
ASA VLAN 1 (G0/1) 192.168.1.1 255.255.255.0 N/A S2 G0/0
VLAN 2 (G0/0) 209.165.200.226 255.255.255.248 N/A R1 F0/0
VLAN 3 (G0/2) 192.168.2.1 255.255.255.0 N/A S1 G0/0
PC-A NIC 192.168.2.3 255.255.255.0 192.168.2.1 S1 G0/1
PC-B NIC 192.168.1.3 255.255.255.0 192.168.1.1 S2 G0/1
PC-C NIC 172.16.3.3 255.255.255.0 172.16.3.1 S3 G0/1
In this Assignment you are required to complete all the following parts:
Task 1: Configure Basic Device Settings:
• Configure host names as shown in the topology plus your student ID.
• Configure interface IP addresses as shown in the IP Addressing Table.
• Configure static and dynamic routing
Task 2: Configure Secure Router Administrative Access
• Configure encrypted passwords and a login banner.
• Configure the EXEC timeout value on console and VTY lines.
• Configure login failure rates and VTY login enhancements.
• Configure Secure Shell (SSH) access and disable Telnet.
• Configure local authentication, authorization, and accounting (AAA) user authentication.
• Secure the router against login attacks and secure the IOS image and the configuration file.
• Configure a router NTP server and router NTP clients.
• Configure router syslog reporting and a syslog server on a local host.
Task 3: Configure a Zone-Based Policy Firewall and Intrusion Prevention System
• Configure a Zone-Based Policy Firewall (ZPF) on an R3 using the CLI.
• Configure an intrusion prevention system (IPS) on an R3 using the CLI.
Task 4: Secure Network Switches
• Configure passwords and a login banner.
• Configure management VLAN access.
• Secure access ports.
• Protect against Spanning Tree Protocol (STP) attacks.
• Configure port security and disable unused ports.
Task 5: Configure ASA Basic Settings and Firewall
• Configure basic settings, passwords, date, and time.
• Configure the inside and outside VLAN interfaces.
• Configure port address translation (PAT) for the inside network.
• Configure a Dynamic Host Configuration Protocol (DHCP) server for the inside network.
• Configure administrative access via Telnet and SSH.
• Configure a static default route for the Adaptive Security Appliance (ASA).
• Configure Local AAA user authentication.
• Configure a DMZ with a static NAT and ACL.
• Verify address translation and firewall functionality.
Task 6: Configure a DMZ, Static NAT, and ACLs on an ASA
• Configure static NAT to the DMZ server using a network object.
• View the DMZ Access Rule (ACL) generated by ASDM.
• Test access to the DMZ server from the outside network.
Task 7: Configure ASA Clientless SSL VPN Remote Access Using ASDM
• Configure a remote access SSL VPN using the Cisco Adaptive Security Device Manager (ASDM).
• Verify SSL VPN access to the portal.
Task 8: Configure a Site-to-Site VPN between the ASA and R3
• Configure an IPsec site-to-site VPN between the ASA and R3-S0000 using ASDM and the CLI.
• Activate and verify the IPsec site-to-site VPN tunnel between the ASA and R3.
Upon Completion of the above configuration tasks, you have been asked to draft a Policy on using of VPN by telecommuters. The policy should include the following sections:
1. Objectives 3. Audience 5. Exceptions
2. Purpose 4. Policy 6. Violations
NOTE: To complete the Assignment, refer to Assignment Supplementary Document.
Marking Guide: 100 Marks
Please note that the Assignment will contribute towards 20% of the final grade.
Task Description Marks
Final Report 80
Report Layout The report style, language and structure should be appropriate. All screenshots and descriptions need to be compiled and in a single final report and any given suggestions need to be incorporated.
The report must contain
i. Cover page with Unit Code, Unit Name and Student ID
ii. Table of Contents
iii. Introduction iv. Technical Discussion
v. Policy Document on using of VPN by telecommuters
vi. Critical Analysis
vii. Conclusion 5
Introduction The introduction should include purpose of the report, sections covered which should convince the reader that the report is worth reading. Word count limit – 125 words
4
Technical
Discussion
This section should include the configurations done in the virtualized network environment. You should break down this section into eight tasks and include at least 6 screen shots from each of these tasks and a brief description
i. Task 1: Configure Basic Device Settings: ii. Task 2: Configure Secure Router Administrative Access
iii. Task 3: Configure a Zone-Based Policy Firewall and Intrusion
Prevention System iv. Task 4: Secure Network Switches
v. Task 5: Configure ASA Basic Settings and Firewall
vi. Task 6: Configure a DMZ, Static NAT, and ACLs on an ASA
vii. Task 7: Configure ASA Clientless SSL VPN Remote Access Using
ASDM
viii. Task 8: Configure a Site-to-Site VPN between the ASA and ISR 45
5
5
5
5
5
5
5
10
Policy Document on using of VPN by
telecommuters
The policy should comprehensively cover all the aspects related to connecting to an enterprise network by a telecommuter 10
Critical Analysis The students are required to provide a critical analysis of the deployed network considering:
a) Confidentiality 10
b) Integrity
c) Availability
d) Performance
e) Scalability
Conclusion Summarize your findings. Word count limit – 125 words
4
References Should follow IEEE style.
2
Demonstration
In class
demonstration – 10 mins The students are required to demonstrate in class, during Lesson 12 20

Categories
Writers Solution

emergency managers and homeland security professionals at all levels and across all sectors—coordinating plans with all potential stakeholders.

There is a notably challenging requirement for all emergency managers and homeland security professionals at all levels and across all sectors—coordinating plans with all potential stakeholders. Prospective partners can range from one incident to the next, but plans and planners must accommodate the needs, interests, and capabilities of all potential contributors so as to create the most comprehensive and integrated plan, policy, or strategy. One might consider such coordination a matter of common sense, but this is often overlooked, at least in part, for various reasons.

Causes might stem from the actions—or lack thereof—of EM/HS team members, external partners, or both. Lethargy; lack of resources such as time, funding, or expertise; lack of interest on any stakeholder’s or planner’s part; lack of understanding the criticality of advance collaboration; or a simple failure to follow up with organizations and individuals upon whom an EM/HS may depend, may each play a part in explaining why collaboration is not fully accomplished. It can also be difficult for individuals at the planner level, or those inexperienced in incident response, to have the vision that is necessary to foresee an assortment of circumstances requiring relationships with agencies and people and their attendant special capabilities.

Stakeholders may include fire, police, emergency services, and community leadership. Providers of public services, including public utilities, school leadership and networks, city engineers, and others, are also probably key players to consult. However, threats, conditions, hazards, limitations, geography, climate, and many other factors also combine to create the need for tailored planning, which will probably require special relationships. In other words, there is no one-size-fits-all template to employ for identifying, developing and nurturing requisite partnerships.

Advance coordination—that is, developing relationships, sharing information, and understanding the various contributors’ capabilities before you need them for managing emergencies—is essential. Knowing what specific skills, resources, and capacities entities can bring to bear in preventing or responding to crises allows planners to incorporate these capabilities into strategies, plans, and exercises. This knowledge also aids leaders and resource managers in identifying gaps in capacity, which will need filling somehow. At the same time, once an incident occurs or seems immediately likely, the ability to contact vital participants to literally assemble and join the active response effort makes for an optimally efficient and effective endeavor.

What type of information is coordinated? Everything from listing points-of-contact and their current, tested contact information to knowing what special skills an organization or individual might have. For example, if the community believes that certain hazardous materials are a threat, say by accidental spill or if used in a weapon, the EM/HS planners should determine whether the local hospital personnel are trained, equipped, and able to perform chemical, biological, or radioactive decontamination. The planners’ motive for determining this is knowing whether the hospital staff’s abilities may be degraded if personnel are exposed to unknown substances or the facility become contaminated. If decontamination is a skill that has not been trained for, if equipment and supplies are not available, or if it is considered too remote a threat to spend time on, planners may identify and liaise with a different hospital for select crises.

Yet, as mentioned above, the vision that is required to establish comprehensive and integrated strategies and plans can be elusive. Gathering myriad prospective partners together can assist in identifying vulnerabilities, allaying fears, clearing up confusion, establishing a functional baseline for all responders, etc. Note the lessons from the following real world illustration:

A small western town is home to several prisons. Trains carrying—among other things—chemical corrosives, travel close enough to the prisons that a spill might require a prison’s evacuation. This scenario had been planned for and exercised by EM/HS and other stakeholders, yet the prison planners had not been consulted when that plans were being developed. When the many partners were together one day, quarreling about timelines and priorities during such a scenario, a local police officer calmly asked the prison officials, “Where will you evacuate the prisoners to?” The official responded, “To the high school.” The police officer replied, “Have you mentioned this to the high school’s folks?” The answer was no, and there were no high school representatives at the meeting. The police officer and many others did not believe that prisoners being transported to schools that could be in session or hosting year-round activities presented security concerns. This idea hadn’t been thought of, yet one person’s casual question had identified an enormous gap in a specific plan.

Your assignment for this unit requires you to continue employing your selected real world county (using the pseudonym, but focusing on their real world conditions). In completing the requirements, you may consult members of the actual county EM/HS team to get insight into specific partners and capabilities that they rely on and with whom they develop relationships. You may also read their actual plans and strategies and determine how rigorously they have coordinated with external partners.

In a 7 page detailed outline, you will do the following:

  • List and describe fully your selected county’s central strategy or plan. These are often emergency operations plans with various subordinate annexes and appendices, but because plan designs can vary widely by community, research and report your county’s version.
  • Note that your county will probably have other plans as well, such as a school evacuation plan or a pandemic influenza response plan. You are free to mention and describe these as well.
  • List and fully describe 7–10 of your selected county’s core stakeholders that it includes (or should include) in its most central plan.
  • Core stakeholders include entities that you would reasonably expect any or all counties to coordinate with.
  • In selecting and describing these, provide depth in explaining the following:
    • Rationale as to why the relationship between EM/HS and the organization or individual does or should exist
    • How specifically coordination and collaboration benefits the EM/HS and each of the external core partners
    • At least three ways that these core relationships will provide the most comprehensive and integrated preparedness and incident response and promote information sharing specifically
  • List and fully describe five of your selected county’s unique stakeholders that it includes (or should include) in its most central plan.
  • Unique stakeholders include entities that you would reasonably expect this specific county to coordinate with. (An example is the prison’s officials in the scenario described earlier.)
  • In selecting and describing these, provide depth in explaining the following:
    • Rationale as to why the relationship between EM/HS and the stakeholder organization or individual does or should exist
    • How specifically coordination and collaboration benefits the EM/HS and each of the external unique partners
    • At least three ways that these unique relationships will provide the most comprehensive and integrated preparedness and incident response and promote information sharing specifically
  • List and describe fully at least three methods for conducting coordination sessions for partners to attend.
  • Include tactics on how to elicit robust participation.
  • Describe measures that the EM/HS team might use to encourage vibrant and productive discussions.
  • Describe what baseline information the county should provide to prospective partners to elicit optimal contributions. (An example might be defining what vulnerabilities are, demonstrating a risk analysis, or brainstorming as to what threats and hazards exist in the county, and how they should be prioritized.)
  • List and describe at least two tactics that the EM/HS team does or might employ to gain viable cooperation from potentially recalcitrant partners.
  • Mention any last lessons you’ve learned while working on this assignment, or advice that you would give the county’s team to aid in their writing or improving their core plan.

Be sure to reference all sources using APA style.

Categories
Writers Solution

Fill out a site security assessment that is going to be based on the site security assessment guide from Zurich.

Zurich Assessment of campus or other organizational facility:

Fill out a site security assessment that is going to be based on the site security assessment guide from Zurich. If you have been to the NKY campus or the main University Campus in Williamsburg, KY then you can use these for the site that you will fill out the document about. I realize that not everyone is going to be familiar with both of these sites, but maybe one of them. If you are not familiar with one of them then you can use a site that you choose, but please be careful if you are using a workplace, not to divulge a name and definitely do not use a US Government institution of any sort, you can make up a fictitious one as last resort, but you need to make sure that the story is consistent. I want some effort put into the paper, this could actually be a previous employer and now is your chance to document some of those problems that you saw every day that you wanted to say something about.

Take a look at the .pdf supplied Site security assessment guide from Zurich

  1. Look at the sections that need to be filled in.
  2. Decide on what location you are going to be assessing.
  3. Fill in the assessment using the knowledge that you have gathered this semester.

Most of the information can be pretty generic and please do not use real names. You will see that the information gathering begins in earnest on the ‘site information’ page on the 3rd page of the .pdf file. Please use the rating system that is provided and enter some comments in each of the areas. You can use any program that you want to do this, as long as, the format is retained. After you are done with the assessment, please write a few paragraphs to share what you have learned from this practical exercise. Additionally, please write out a few paragraphs on what you are going to say to management, you want to make some suggestions to the management of the company and let them know your expert opinion of where they stand at this point in time.

https://www.zurichna.com/_/media/dbe/zna/docs/kh/tech/site-security-assessment-guide.pdf

Categories
Writers Solution

International Relations, National Security, Military Studies, and Intelligence Studies = Turabian.

Select two articles from the list below and in 1-2 pages single-spaced (per article) address the following:

Include the full reference for the article using the writing style specific to your program on the title page.

Criminal Justice = APA

International Relations, National Security, Military Studies, and Intelligence Studies = Turabian.

Since multiple writing styles are in use within this course, on your title page, please note which style you are using within your assignment.  This will help me cater my comments to the style you are using.  The style you use need to be the one that is used within your program of study.

State the main goal(s) of the study

Summarize the research design, and discuss the research method(s) used to answer the research question or assess the hypothesis.

Summarize the results of the study.

Discuss the advantages and disadvantages of the study’s research design.

Provide a discussion on how the study can be moved forward.  For example, how can the methods be used in your own research proposal? In what other research might these methods apply?  Include two well phrased research questions that could be used in follow-on studies to the one reviewed.

Format:  You should have 1-inch margins on all 4 sides of your papers; your title page should include your name and date; you should use 12-point times new roman font throughout.

Phillips, Matthew D. 2016. “Time Series Applications to Intelligence Analysis: A Case Study of Homicides in Mexico.” Intelligence and National Security 31, no. 5: 729-745.

Parker, Karen F., Richard Stansfield, and Patricia L. McCall. 2016. “Temporal Changes in Racial Violence, 1980 to 2006: A Latent Trajectory Approach.” Journal of Criminal Justice 47 (December), 1-11.

Categories
Writers Solution

Cyber security

Subject name: Cyber security

question:

Project Written Report and Presentation:

You will choose any information security topic from our textbook and/or discussions to write a paper and develop a PowerPoint presentation. The final report should be 10-12 pages, 12 font size, 1” margins, double-spaced, including figures, tables, etc. Follow the current APA format guide for your report. Use spell check, grammar check, etc. to make sure that your report is written in professional form with no keyboarding or grammatical errors. No abstract is required. However, a cover page and a reference page are required. Make sure the cover page and reference page are also in current APA format. Your project paper will be assessed as follows:

• Is the paper of optimal length?

• Is the paper well organized?

• Is the paper clear and concise?

• Is the title appropriate

• Are individual ideas assimilated well?

• Are wording, punctuation, etc. correct?

• Is the paper formatted correctly?

 • Is the paper well motivated?

• Is an interesting problem/issue addressed?

• Is knowledge of the area demonstrated?

• Use of diagrams or other graphics?

• Have all key references been cited?

 • Are conclusions valid and appropriate?

Note: You will need to develop a PowerPoint presentation to summarize your final report. Use transition and animation in your slides. Ten to twenty slides are required to highlight your project.