Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
I’m studying for my Computer Science class and need an explanation.
Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Microsoft approach.
Write between 300 and 400 words.
Use your own words NO PLAGIARISM, APA format
Required Videos
VIDEO. Using deception and Honey Pots for security.
Click HERE to watch or click embedded video below.Read the article, pick a quote and and write about it in 500 words.
I don’t understand this Management question and need help to study.
After reading “Digitizing the consumer decision journey” select a specific quote from the reading that resonated with you and state it in quotations at the beginning of your paper. Cite the reading and selected quote you chose and then write about this quote from the article and how/why it resonated with you. Please ensure your writing is thoughtful, substantive and connects not only to specific information in the supporting reading but incorporates course concepts your own personal professional examples of the issues explored in the readings. Aim for about a page or roughly 500 words, not including the selected quote and reference information. Please make sure to site all your sourcesTask 4: Certification and Accreditations: nursing assignment help
I’m studying and need help with a Computer Science question to help me learn.
Scenario
You have been hired to review a conducted risk assessment for the Healthy Body Wellness Center since information security management systems should be regularly reviewed, updated, and maintained. To prepare for an upcoming audit and accreditation review, you will use current guidelines from ISO 27002, COBIT, NIST, or ITIL (e.g., NIST Special Publication 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach) and the attached “Healthy Body Wellness Center Risk Assessment” case study.
You will apply the current guidelines to the risk management framework for the Healthy Body Wellness Center’s information systems. The organization has recently had a risk assessment completed that includes recommendations for implementing security controls and mitigating risks. In your new role, a team of people will be assigned to help you with the task. You are tasked with creating a to-do list by completing the “Task 4 RMF To-Do List” attachment for the specific tasks outlined in each of the six steps in the risk management framework (RMF). The first row of the “Task 4 RMF To-Do List” has been completed for you. You will then evaluate and create a document that compares the ISO 27002, COBIT, NIST, and ITIL standards with regard to the certification and accreditation process.
Assumptions
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Complete the attached “Task 4 RMF To-Do List” by using the attached “Task 4 Healthy Body Wellness Center Risk Assessment” and doing the following:1. Identify whether the tasks are done or not done based on the attached “Task 4 Healthy Body Wellness Center Risk Assessment”.2. Discuss how you determined the status of the tasks if they are done, and include the page numbers from the risk assessment to support that discussion; or, if the tasks are not done, provide recommendations for completing the tasks in compliance with current guidelines from ISO 27002, COBIT, NIST, or ITIL, including where the results should be saved.3. List the external documents needed for each task that is not done.
B. Compare the ISO 27002, COBIT, NIST, and ITIL frameworks by creating a document in which you do the following:1. Discuss how each framework is most commonly used.2. Analyze the purpose of each framework design.3. Compare the strengths of each framework.4. Compare the weaknesses of each framework.5. Discuss the certification and accreditation process for each framework.6. Explain which type of business each framework applies to according to the certification and accreditation process.
C. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
D. Demonstrate professional communication in the content and presentation of your submission.
File Restrictions
File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )File size limit: 200 MBFile types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
Rubric
A1
:
Task Statuses
Not Evident
The status of each task in the “Task 4 RMF To-Do List” attachment is not indicated.
Approaching Competence
The status of each task in the “Task 4 RMF To-Do List” attachment is not correct based on the risk assessment.
Competent
The status of each task in the “Task 4 RMF To-Do List” attachment is correct based on the risk assessment.
A2:Discussion of Statuses
Not Evident
A discussion is not provided, or, for tasks that are done, the discussion does not provide how the status of each task was determined. Page numbers from the risk assessment are not provided for each task that is done. Or, for tasks that are not done, the response does not include a recommendation for completing each task.
Approaching Competence
For tasks that are done, the discussion provides information about how the status of each task was determined, but the discussion is not based on the risk assessment or does not include correct page numbers from the risk assessment to support that discussion for each task. Or, for tasks that are not done, the response includes a recommendation for completing each task, but the recommendations are not in compliance with ISO 27002, COBIT, NIST, or ITIL. For tasks that are not done, the location where the results should be saved is not provided for each task.
Competent
For tasks that are done, the discussion provides how the status of each task was determined based on the risk assessment and includes page numbers from the risk assessment to support that discussion for each task. Or, for tasks that are not done, the response includes a recommendation for completing each task in compliance with ISO 27002, COBIT, NIST, or ITIL. For tasks that are not done, the location where the results should be saved is provided for each task.
A3:External Documents
Not Evident
External documents are not listed for each task that is not done.
Approaching Competence
External documents are listed for tasks that are not done, but 1 or more of the documents are inappropriate.
Competent
External documents are listed for tasks that are not done, and all of the documents are appropriate.
B1:Framework Use
Not Evident
A discussion is not provided, or the submission does not discuss how the ISO 27002, COBIT, NIST, and ITIL framework is used.
Approaching Competence
A discussion of the ISO 27002, COBIT, NIST, and ITIL frameworks is provided, but the discussion for at least 1 framework does not accurately describe how it is most commonly used.
Competent
A discussion of the ISO 27002, COBIT, NIST, and ITIL frameworks is provided, and the discussion accurately describes how each framework is most commonly used.
B2:Framework Purpose
Not Evident
A submission is not provided, or the submission does not attempt to describe the purpose of the ISO 27002, COBIT, NIST, and ITIL framework designs.
Approaching Competence
The submission describes the reasons for the ISO 27002, COBIT, NIST, and ITIL framework designs but does not analyze the purpose of the design by explaining how each framework design is suited to its use.
Competent
The submission analyzes the purpose of the ISO 27002, COBIT, NIST, and ITIL frameworks by explaining how each framework design is suited to its use.
B3:Framework Strength
Not Evident
A submission is not provided, or the submission does not compare the strengths of the ISO 27002, COBIT, NIST, and ITIL frameworks.
Approaching Competence
The submission does not accurately compare the strengths of the ISO 27002, COBIT, NIST, and ITIL frameworks.
Competent
The submission accurately compares the strengths of the ISO 27002, COBIT, NIST, and ITIL frameworks.
B4:Framework Weakness
Not Evident
A submission is not provided, or the submission does not compare the weaknesses of the ISO 27002, COBIT, NIST, and ITIL frameworks.
Approaching Competence
The submission does not accurately compare the weaknesses of the ISO 27002, COBIT, NIST, and ITIL frameworks.
Competent
The submission accurately compares the weaknesses of the ISO 27002, COBIT, NIST, and ITIL frameworks.
B5:Certification and Accreditation
Not Evident
A discussion is not provided, or the submission does not discuss the certification and accreditation process for the ISO 27002, COBIT, NIST, and ITIL frameworks.
Approaching Competence
The submission inaccurately discusses the certification and accreditation process for the ISO 27002, COBIT, NIST, and ITIL frameworks.
Competent
The submission accurately discusses the certification and accreditation process for each of the ISO 27002, COBIT, NIST, and ITIL frameworks.
B6:Framework Choice
Not Evident
An explanation is not provided, or the response does not attempt to explain which type of business each framework applies to.
Approaching Competence
The response explains which type of business each framework applies to, but the response is irrelevant to the certification and accreditation process.
Competent
The response explains which type of business each framework applies to according to the certification and accreditation process.
C:Sources
Not Evident
The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.
Approaching Competence
The submission includes in-text citations for sources that are quoted, paraphrased, or summarized, and a reference list; however, the citations and/or reference list is incomplete or inaccurate.
Competent
The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.
D:Professional Communication
Not Evident
Content is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.
Approaching Competence
Content is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.
Competent
Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.virtual team and working as and within a virtual team Questions: nursing coursework help
I’m working on a Business exercise and need support.
Due to the remarkable raise and advancement of technology, lots of large companies are moving forward to digitalize and virtualize how they do business internally and externally, such as virtual teams. Moreover, one of the virtual team advantages is the ability for a company to create the dream team without boundaries as it eliminates the element of desistance, core knowledge and skills limitation. With all these wonderful components there are many issues and might have a large negative impact to the whole process of creating a virtual team and working as and within a virtual team. These concerns can be outlined as the following:
Communication Trust Productivity
Questions:
Define each negative factor and explain why it is an issue. Outline 2 solutions for each of the presented issues.
Guidelines
Your answer must be supported by different resources. At least 4 references sources. Any proof of copying will result to 0 mark. Use font Times New Roman, Calibri or Arial. Use 1.5 or double line spacing with left Justify all paragraphs. Use the footer function to insert page number. Ensure that you follow the APA style in your project. Your project report length should be Not less than the word 600 600research paper.
I don’t know how to handle this History question and need guidance.
Details on the Paper
All students enrolled in History 1301 at Kilgore College must write a research paper.
Choose from one of the following controversial decisions. You will be writing your essay as one of the participants in the decision (so it will largely be in first person). The paper will have three parts: explain the background leading up to the/your decision, the decision itself, and the aftermath.
Ex: The Supreme Court’s Dred Scott decision. You could write the paper as Roger Taney. Explain the buildup to the case, why you made the decision you did, and the aftermath. Or you could write the paper as Dred Scott, explaining why you chose to sue, what happened during the case, and the aftermath. (You can now no longer do the Dred Scott decision as a topic, BTW)
The paper MUST include the following criteria: one primary source, one secondary source, a works cited page, and in-text citations. This means that you MUST cite where you get your information from WITHIN the paper and not just in the works-cited page. So when you, as whatever historical actor you choose, says “I made the decision because of this, this, and that” you would need to follow it up with the citation. All citations and the paper itself will be in MLA.
Primary sources: (these are sources that are created by people who lived during the time of your topic. This would include letters, diaries, government documents, newspapers, interviews, pictures, paintings, maps. For example, if you do one of the topics on a Supreme Court case, the decision of the court would be a primary source. A book written in 2011 by a historian about the case would not be a primary source. Secondary sources are written by historians after an event has taken place. This would include articles, webpages, and books. Encyclopedias and textbooks are NOT secondary sources; they are a summary of secondary sources. However, you can use encyclopedias and textbooks, they just won’t count as your required secondary source. Your secondary source needs to be scholarly. How do you know if it is? It will cite its sources.
The paper will be 1000 words, minimum.
You will submit it through SafeAssign for plagiarism issues.
Here are the controversial choices you can choose from.
Investigate a particular decision that Christopher Columbus made regarding his relationship with the first natives he encountered on his first voyage