Discussion–Enterprise Risk Management

Chapters 30, 31, and 34 presented three mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Suppose General Motors wants to replace one of their traditional lines of vehicles with all electric models. How could GM use game theory to identify and assess the major risks to this decision? Identify two major risks that would result from GM converting an existing line to an all-electric line. Provide a brief discussion of each risk, and your assessment of the levels of inherent, current, and residual risk, using GM’s five point scale.

Unauthorized access of confidential data and information

Each of us perceives “ethics” from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistle-blowers. Select one of the behaviors listed below for your discussion posting. Base your posting on your relationship with the “unethical person” and any risk involved in “whistle blowing”.

1. Stealing from an employer

2. Falsifying a time sheet

3. Padding an expense account

4. Falsifying any document or record

5. Lying about the conduct of a co-worker

For all discussions questions a primary response of 300 word must be posted to the discussion forum, the post must be submitted by Wednesday at midnight. Each student is to post a reply to another students’ posting (minimum 200 words) and must be posted Sunday by Midnight. All late submissions will receive a zero grade. 

Requirements (please read)

For each discussion, you are required to write an initial post (300 words) and one secondary post (200 words).  The discussion forums will be worth 40 points apiece—25 points for the initial post and 15 points for the secondary post.  For your initial and secondary posts, you must have at least two academic peer-reviewed articles for references.  You must get them from the library.  There are directions at the top of our Moodle page showing how to utilize the library. 

Grading for discussions.

· All discussions must be completed on-time and must include in-text citations and references in APA style formatting. If you do not use in-text citations or they are not in APA format you will lose 3 points.  If you do not have references or if they are not in APA format, you will lose 5 points. (You do not need citations and references for secondary posts).

·  You will lose 10% based on word count if your posts are too short.  For example, your initial post is 300 words, if you have 250 words you will lose 5 points.  50 words short times 10% (50 x .10 = 5).

·  If any part of your post is copied and pasted (ANY POST), you will receive a “0”.  I will not ask you about it and you will not have a chance to resubmit the post.

Response -1 (Vidhya)

The term whistleblowing can cause an issue of interest among the social, organizational and personal spheres. In this paper, I have selected the fourth option, i.e., falsifying any document or record. As per my point of view, from my point of reference morals are determined through my moral values, and these values oversee my moral code, stand, values and my standards of wrongs and rights. Falsifying any record or document is an unethical achievement that affects the working of an entire organization and corporation. It includes modifying, altering or changing a complete document or record to mislead a person. With this point of view, I would deliberate falsifying any record or document – either through myself or through any of my classmates as morally unethical.

Falsifying of records and documents may assist in promoting some personal benefits but will detriment the complete interest of the organization with its stakeholders. This action goes beside the principles of the asset, duty (or deontological) and consequentialist ethics. According to consequentialism whether an act is wrong or right depends on the consequences of the act  (Musa & Willis, 2014). The action of falsifying records and documents will be probable to have undesirable results for the whole organization because it can lead to several losses for the organization with it goodwill. Therefore this act is obviously unethical. As per a whistleblower, it will be my obligation and duty to raise the conflict through the whistle-blowing mechanism of my corporation or an organization. This action also assists in reducing the conflicts for the organization.

In many countries, falsifying any record or document is a big mistake punishable as an offense (Professor David Ormerod, 2011).  Hence, this fault is related to the unethical individual. Whistling is an example where an organization member notifies someone else of criminal activities happening. It has also been observed that once a business or an organization is against whistleblowing, an unethical performance usually gets work. Several things or actions come under falsifying documents or records, including:

·       Misrepresenting and altering factual evidence like monetary or price amounts

·       Asserting wrong data and information when essential to offer instant statements

·       Unauthorized access of confidential data and information

·       Concealing property or assets

·       Knowingly distributing or using a fake document

References:

Musa, B. A., & Willis, J. (2014). From Twitter to Tahrir Square: Ethics in Social and New Media Communication [2 volumes]: Ethics in Social and New Media Communication . ABC-CLIO.

Professor David Ormerod, T. R. (2011). Blackstone’s Criminal Practice 2012 (book only) . OUP Oxford.

Response-2(Prachi)

Employee honesty is a difficult task that begins when an application for employment is taken. Employee-related thefts are increasing as are the cost of recovery and time to take legal actions. However, 3 factors can lead to wrong-doing:

1) level of personal integrity (life and personal experiences)

2) situational pressures (need for extra money)

3) the opportunity to commit the act (temptation).

Small, harmless “offenses” in the office are often punished only with a wink from the boss: These include, for example, the short private call at home, or even visit on Facebook during lunch break. What is tolerated and what is not, the unwritten rules are an important part of the corporate culture and vary from company to company. However, the rules governing the handling of company information and confidential data are handled much stricter: Employees in certain sectors and areas of work usually must sign a confidentiality agreement before starting work. In addition, good practice and management should prevent data and corporate secrets from being leaked out. However, if an employee violates the rules, they are in a dilemma: on the one hand, it is unpleasant to “whistle” a colleague, on the other hand, the incident must be reported to prevent further violations.

Gather substantial evidence of suspicion before you go to your supervisor. Do this as quickly and comprehensively as possible and write the case down when prompted. If the case is settled internally, one can, of course, insist on anonymity. “It’s also important that you do not tell anyone about what you are doing to others – both inside and outside the company – after you’ve reported the problem, it’s up to the company to think ahead.” What to do if there is an urgent suspicion, but there is no evidence? Without relevant evidence, you should not blame anyone and keep the incident for yourself. However, if you are sure of what you are doing, you can still address your supervisor – of course, without naming a name. If he listens carefully and promises to follow up on the matter, it’s out of your hands, and if he makes excuses and advises you to take care of your own business, you’ll have to decide whether to turn to someone else.  Basically, there are cases where it is your duty to “whistle” a colleague and those in which it is less clear who you should give your loyalty to. This decision requires diligence and sound judgment, be careful not to overreact or turn a blind eye, such situations are likely to be the hardest test of your personal, professional integrity.

References:

Feinberg, M. R. (1982). Employee stealing on the rise. Restaurant Business, 81(2), 92.

Bouville, M. (2008). Whistle-blowing and morality. Journal of Business Ethics, 81(3), 579-585.

Near, J. P., & Miceli, M. P. (2013). Organizational dissidence: The case of whistle-blowing. In Citation classics from the Journal of Business Ethics (pp. 153-172). Springer, Dordrecht.

Vandekerckhove, W. (2016). Whistleblowing and organizational social responsibility: A global assessment. Routledge.

IFSM 300 Stage 3 Assignment

Please note: This will need to be incorporated to the end of the document that I have uploaded. 

 

Assignment

 

The first step is to incorporate the feedback you received on your Stage 2 assignment, making any needed corrections or adjustments.  (If you have not incorporated the feedback from your Stage 1 assignment, you should do so prior to submitting Stage 3.) For this assignment, you will add Section III to Sections I and II, as outlined below.  Note:  In addition to the criteria for Stage 3, as indicated in the grading rubric, the incorporation of improvements based on substantive feedback (more significant problems with content) from the previous stage will also be evaluated. 

 

Section III of the Business Analysis and System Recommendation Report analyzes the organization’s strategy and processes to determine how technology solutions can be used to support organizational processes and enable strategic and operational outcomes.  For this assignment, you will list requirements for a new hiring system. This analysis leads into Section IV – System Recommendation section of the BA&SR (the Stage 4 assignment) that will propose an IT solution to meet CIC’s organizational strategy and fulfill its operational needs.

Using the case study, assignment instructions, Course Content readings, and external resources, develop your Section III on Strategic and Operational Outcomes.   Approximate lengths for each section are provided as a guideline; be sure to provide all pertinent information.  A key to successful business writing is quality and conciseness rather than quantity.

The case study tells you that the executives and employees at Chesapeake IT Consultants (CIC) have identified a need for an effective and efficient hiring system.  As you review the case study, list three goals (or strategies) from the description of the company, as well as from the “interviews” that are documented.  Then, to focus on operational outcomes, you will analyze the hiring process in use at CIC by identifying specific steps.

 

Note:  Refer to the Week 6 Content “Good Practices for Developing User Requirements” in particular for this assignment.  Business Requirements – why the project is being undertaken – aligns with the Strategic Outcomes section III- A.   User Requirements and Software Requirements are addressed in III-C – Requirements below.

 

III.                Strategic and Operational Outcomes

 

A.      Strategic Outcomes – Identify three strategic goals or objectives mentioned in the company description and interviews in the CIC Case Study, and explain how the new hiring system would help achieve those goals/objectives.  (2-3 sentences for each goal/objective)

1.  Strategic Goal/Objective 1 and explanation: 

2.  Strategy Goal/Objective 2 and explanation:

3.  Strategy Goal/Objective 3 and explanation:

 

B.      Process Analysis – To understand what the new hiring system needs to do for CIC, you will first analyze the current hiring process.  The Interviews in the CIC Case Study provide the information you need about how the process is currently conducted.  You will need to combine the steps that each interviewee discusses and organize them into a logical sequence showing the high level start to finish process.  First, insert an introductory opening sentence for this section.  Then, for each of the elements listed below, complete the table with the requested information. The beginning and ending step have been provided for you.  Each process step should be concise and start with an action verb.  (Provide an introductory sentence and copy the table and insert information within.)

 

 

Hiring Process Step Responsible CIC Position
1.    Receive application from job hunter Recruiter
2.  
3.  
4.  
5.  
6.  
7.  
8.  
9.  
10.  
11.  
12. Extend Hiring Offer to Selected Candidate Recruiter/Hiring Manager

 

 

C.      Requirements – The next step is to identify the essential requirements for the information system.  Refer to the Week 6 Content -Good Practices for Developing User Requirements. Here you are focusing on the Business Requirements and the Software Requirements. Each requirement is one sentence in length and addresses one thing the system must do.  The requirements are documented in a table, as shown below.  For a full requirement specification, there will be many requirements statements; you only need to provide the number of requirements identified for each category.  The requirements should be derived from the Case Study; an analyst should not “invent” requirements.

 

For this assignment, you will identify:

·         4 user requirements (what users will be able to do with the product (functional) requirements (numbered in the table as U-#).  requirement in this section

·         1 reporting requirement (UR-#)

·         5 software requirements related to security (SS-#)

·         3 software requirements related to system performance requirements (SP=-#)

Text Box: Example

 

 

Here’s an example of a business requirement:

Requirement Number Requirement Source (individual) from Case Study
U-1 Prepare job offer for chosen candidate Recruiter – Paul O’Brien  

 

First, insert an introductory opening sentence for this section.  Then, for each of the rows listed below, complete the table with the requested information.  (Provide an introductory sentence and copy the table and insert information within.

 

Requirement Number Requirement Source (individual) from Case Study – name and title
U-1    
U-2    
U-3    
U-4    
UR-1    
SS-1    
SS-2    
SP-1    
SP-2    
SP-3    

 

 

Formatting Your Assignment

For academic writing, the writer is expected to write in the third person. In third person, the writer avoids the pronouns I, we, my, and ours. The third person is used to make the writing more objective by taking the individual, the “self,” out of the writing. This method is very helpful for academic writing, a form in which facts, not opinion, drive the tone of the text. Writing in the third person allows the writer to come across as unbiased and thus more informed.

 

·         Include Sections I and II, revised according to any feedback received and add Section III.

·         Write a short concise paper:  Use the recommendations provided in each area for length of response.  Content areas should be double spaced; table entries should be single-spaced. It’s important to value quality over quantity.  Section III should not exceed 4 pages.

·         Ensure that each of the tables is preceded by an introductory sentence that explains what is contained in the table, so the reader understands why the table has been included.

 

·         Use at least two resources with APA formatted citation and reference.  Use at least one external reference and one from the course content.

 

 

 

 

Criteria

 

90-100%

 

Far Above Standards

 

80-89%

 

Above Standards

 

70-79%

 

Meets Standards

 

60-69%

 

Below Standards

 

< 60%

 

Well Below Standards

 

Possible Points

Strategic Outcomes

Three strategic goals or objectives derived from Case Study and explained how new hiring system would help achieve.

13-15 Points

Clearly derived from the Case Study and are strongly and fully explained using a sophisticated level of writing.

12 Points

Derived from the Case Study and are clearly explained.

10-11 Points

Related to the Case Study and are explained.

 

 

 

 

 

 

9 Points

Not related to the Case Study and/or are not explained.

0-8 Points

Too few strategic goals/ objectives are presented, are not explained or exhibit little effort.

15
Process Analysis

Analysis describes the hiring process in terms of CIC requirements.

20-22 Points

Fully describes and is clearly derived from the Case Study, and demonstrates sophisticated analysis.

17-19 Points

Describes all aspects, is derived from the Case Study, and demonstrates effective analysis.

15-16 Points

Describes most aspects of the process being analyzed, and is related to the Case Study.

13-14 Points

Does not describe some aspects, and/or is not related to the Case Study, and/or contains significant incorrect information.

0-12 Points

Not included, is extremely incomplete, or is not related to the Case Study.

 

22
Requirements

5 user (1 addresses reporting) and 2 system security and 3 system  performance requirements

31-35 Points

Correctly identified and sourced; clearly derived from the Case Study; demonstrates sophisticated analysis.

28-30 Points

Identified and sourced; requirements are derived from the Case Study; demonstrates effective analysis.

24-27 Points

Identified and sourced; requirements are related to the Case Study.

21-23 Points

Less than 10 requirements are identified and sourced; and/or information provided is not correct; and/or requirements are not all related to the Case Study.

0-20 Points

Few or no requirements are listed; sources are incorrect; and/or requirements are not related to the Case Study.

35
Incorporation of Feedback on Previous Stage

Substantive feedback related to key content is addressed and previous sections are improved

 

8 Points

Substantive corrections very effectively incorporated to reflect feedback received on Stage 2.

6-7 Points

 

Substantive corrections incorporated to reflect feedback received on Stage 2.

5 Points

 

Corrections incorporated to reflect feedback received on Stage 2. May not have addressed all key points or sufficiently corrected.

3-4 Points

 

Minimal corrections made based on feedback received on Stage 2 – Some improvements still needed.

0-2 Points

 

No corrections made based on feedback received on Stage 2 and/or incorrect changes made.

8
Research

Two or more sources–one source from within the IFSM 300 course content and one external (other than the course materials)

9-10 Points

Required resources are incorporated and used effectively. Sources used are relevant and timely and contribute strongly to the analysis.  References are appropriately incorporated and cited using APA style.

8 Points

 

At least two sources are incorporated and are relevant and somewhat support the analysis. References are appropriately incorporated and cited using APA style.

7 Points

 

Only one resource is used and properly incorporated and/or reference(s) lack correct APA style.

 

 

 

 

 

 

 

 

 

6 Points

 

A source may be used, but is not properly incorporated or used, and/or is not effective or appropriate; and/or does not follow APA style for references and citations.

0-5 Points

 

No course content or external research incorporated; or reference listed is not cited within the text.

10
Format 9-10 Points

Very well organized and easy to read.  Very few or no errors in sentence structure, grammar, and spelling; double-spaced, written in third person and presented in a professional format.

8 Points

Effective organization; has few errors in sentence structure, grammar, and spelling; double-spaced, written in third person and presented in a professional format.

7 Points

Some organization; may have some errors in sentence structure, grammar and spelling. Report is double spaced and written in third person.

6 Points

Not well organized, and/or contains several grammar and/or spelling errors; and/or is not double-spaced and written in third person.

0-5 Points

Extremely poorly written, has many grammar and/or spelling errors, or does not convey the information.

10
          TOTAL Points Possible 100

What happens if you attempt to add workgroup servers to Server Manager?

Choose the best answer for each question in the “Best Answer” at the end of these chapters, and write a few sentences for each question to justify your choice. Note that just choosing the letter for your best answer only will not earn you full credit for this assignment.

 

LESSON 6:

 

1. What happens if you attempt to add workgroup servers to Server Manager?
a. Server Manager allows only servers that are members of an Active Directory Domain
Services (AD DS) domain to be managed.
b. Server Manager adds and allows management of any computer, whether a member of
an AD DS domain or workgroup.
c. Server Manager will not permit workgroup servers to be added and managed.
d. Server Manager usually allows you to add workgroup servers, but attempts to access
the remote server fail with a “Credentials not valid” error.

 

2. Once a server is added to Server Manager, what actions are taken to permit remote server
management?
a. No further action is needed. For example, you may immediately use the Add Roles
and Features Wizard.
b. No further action is needed, because Windows Remote Management (WinRM) is
enabled on the source Windows Server 2012.
c. No further action is needed because WS-Management Protocol is already running.
d. No further action is needed thanks to Windows Management Instrumentation
(WMI) and Windows PowerShell.

 

3. What is the primary difference between the Windows Server 2012 Server Manager and
previous versions?
a. Windows Server 2012 Server Manager allows management of multiple remote servers
at once.

b. Windows Server 2012 Server Manager allows management of remote servers, categorized
in role groups.
c. Windows Server 2012 Server Manager allows remote management of other servers,
including down-level Windows servers.
d. Windows Server 2012 Server Manager has been tested with nearly 100 servers added
to the interface.

 

4. What functional benefit is derived from creating server groups?
a. Server groups allow administrators to add roles to several servers at once.
b. Server groups allow administrators to navigate and organize several servers at once.
c. Server groups allow administrators to navigate several servers at once.
d. Server groups allow administrators to organize several servers at once.

 

5. The security configuration of the Windows PowerShell Web Access Gateway server is
crucial, employing a security certificate from a trusted certification authority and userspecific
authorization rules. Why are these security measures so crucial?
a. There is often both client and server side security, but only server end measures are
controlled.
b. There is no mandatory security on the client side of the application, relying more on
server side security.
c. There is no security on the client side of the application, instead relying on robust
server side security.
d. There is often both client and server side security, but only client end measures are
controlled.

 

LESSON 7:

 


1. Hyper-V in Windows Server 2012 is a Type I virtualization architecture. What is
the fundamental difference between Hyper-V and older, Type II virtualization
architectures?
a. Hyper-V creates environments called partitions, each with its own operating system
installed.
b. Its hypervisor designates the first partition as the parent partition and all subsequent
partitions as child partitions.
c. Its hypervisor is an abstraction layer and interacts directly with computer hardware,
rather than as a host OS application.
d. Computer subsystems such as Plug and Play and power management are managed by
Hyper-V’s parent partition.

 

2. Windows Server 2012 includes Hyper-V in which edition(s)?
a. All editions
b. The Datacenter edition
c. The Standard and Datacenter editions
d. The Essentials, Standard, and Datacenter editions

 

3. After installing the Hyper-V role, what is the startup procedure for Windows Server
2012?
a. The newly installed hypervisor starts first, and then loads the operating system as the
primary or parent partition.
b. The actual startup procedure is not altered.
c. The newly installed hypervisor starts first, and then loads the operating system as a
child partition.
d. The newly installed hypervisor starts second, after the operating system loads as a
partition.

 

4. What is the primary purpose of the software package offered by Hyper-V called guest
integration services?
a. Guest integration services improves communications between the parent partition
and child partitions.
b. Guest integration services resolves compatibility issues of certain guest operating
systems experiencing non-functioning features.
c. Guest integration services improves data exchange between the parent partition and
child partitions.
d. Guest integration services improves time synchronization between the parent partition
and child partitions.

 

5. What is Resource Monitoring in Windows Server 2012?
a. Resource Monitoring is a PowerShell-based feature that enables you to document
virtual machine usage.
b. Resource Monitoring is a Server Manager feature that enables you to monitor virtual
machine resources.
c. Resource Monitoring is a PowerShell-based feature that enables you to redistribute
virtual machine resources.
d. Resource Monitoring is a Server Manager feature that enables you to document
virtual machine communications.

 

LESSON 8:

 


1. Deciding between two virtual disk formats (VHD and VHDX), you need one to accommodate
image sizes up to 2 TB (terabytes) and be compatible with both Windows Server
2012’s Hyper-V and Microsoft’s older product, Virtual PC. Which format do you choose
and why?
a. VHD, because it supports up to 2 TB image files.
b. VHDX, because it supports file sizes far beyond 2 TB—up to 64 TB.
c. VHD, because it supports both new and old hypervisor products.
d. VHDX, because it supports larger block sizes for tuning storage performance.

 

2. You need to connect a virtual hard disk with a virtual machine (VM). What disk format
do you choose and why?
a. VHDX, because it’s the only one available when creating a new disk.
b. VHD or VHDX if using an existing virtual hard disk.
c. VHD with an existing hard disk and a Type II hypervisor product.
d. Either one is possible and applicable.

 

3. You intend to create a new virtual hard disk, specifying a 700 GB VHDX image file with
a logical sector size of 4 KB. How do you proceed?
a. With Server Manager, using Hyper-V Manager’s New Disk feature.
b. With the utilities included in Hyper-V’s guest integration services.
c. Those exact specifications are not possible in Hyper-V Manager.
d. With PowerShell, using the New-VHD cmdlet with appropriate parameters.

 

4. Is it possible for a VM to access a hard disk directly?
a. No. VMs access virtual hard disks, areas of space on the physical hard disk.
b. Yes. VMs can have “pass-through disks,” a special virtual disk that directly accesses
the physical disk if made exclusively available to the VM.
c. No. VMs can never access physical hardware, but only through the hypervisor.
d. Yes. VMs use virtual hard disks, which are essentially the physical hard disks.

 

5. What is a key benefit of using differencing disks?
a. They enable you to use baseline images.
b. They enable you to keep a fixed image in its original state.
c. They allow you to experiment without repercussions.
d. They let you create parent and child-differencing disks.

Transforming Risk Management at Akawini Copper

This week’s chapter readings focused on four mini-case studies with unique challenges presented that are highly relevant in the context of ERM.  Provide a brief summary of each of the four case studies by discussing for each case what was the challenge presented and some strengths and weakness in the risk management approaches. Conclude your discussion, based on the case study from chapter 29 “Transforming Risk Management at Akawini Copper”, by providing your thoughts on risk management transformations, specifically discussing  how we can monitor risk transformation progress and performance.

To complete this assignment, you must do the following:
A) Create a new thread.  Provide a brief summary of each of the four case studies by discussing for each case what was the challenge presented and some strengths and weakness in the approaches. Conclude your discussion, based on the case study from chapter 29 “Transforming Risk Management at Akawini Copper”, by providing your thoughts on risk management transformations, specifically discussing how we can monitor risk transformation progress and performance.

: A handbook for data driven design.

Write a Discussion on topic :

As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your editorial thinking.

Select 1 of these perspectives and mention why you selected it.

Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.

A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University’s library and comment on it in the discussion post.

Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
Send Initial Discussion and 2 replies Send Initial one As soon as possible as it is due by today 
Sample Discussion to send replies to  :
Sample 1 : 

I would like to discuss about Framing from perspectives that help to shape your editorial thinking.While endeavoring to elucidate thinking behind data visualization, Andy Kirk Compares data Visualization to photography. In Data visualization this can be related to what is being evaluated and by which estimations it is isolated. Example an analyst may choose to display sales over a period of time. This is selected based on what is considered to be relevant and sufficient to convey the analysis.The need to judge based on what the audience might to looking for in a data analysis is key.This along with what us considered  relevant from the presenters context helps in narrowing down one key angle which can best explain the analysis to the audience. Here the one who is presenting is in control and can decide which angles in sufficient and also filter out the angle that is not relevant to the context of the analysis.

There are few constructs that are as ubiquitous across traditions of management and organizational research, and indeed the social sciences more generally, as that of frame or framing. The widespread popularity and use of the concept has led to rich streams of research, ranging from work in managerial cognition and decision-making to strategic and organizational change, and social movements and institutions. At the same time, the popularity of framing across these literatures has perhaps also come at a price. Indeed, it has meant that these streams of research have essentially developed along separate paths, despite the prospect and promise of a greater connection between them. In this paper, our general aim is to consolidate and advance the current body of research on framing in the management and organizational literature. We do this by providing an extensive review of the key research traditions on framing across this literature, noting the salient contributions to date and highlighting potential areas for further theoretical development and research. Building on this review, we also elaborate on connections across traditions of research; we hope these will serve as pointers to instigate further research on framing processes across different levels of analysis

Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Sample 2 :

I think focus is important perspective among three that helps to shape editorial thinking, but we cannot undermine the importance of other two perspectives. We need focus to think, write, and edit an editorial piece to bring our editors intentions. Focus helps to ensure attention is given to what an editor wants communicate. One of the key aspects which makes focus an important perspective of editioral thinking is that it helps to create ideas for editiorial content. With focus ideas keeps flowing and after the ideas are born they are analyzed, prioritized and then they are utilized.

Focus also helps in maintain quality content. Focused editiors are easily able to thoroughly edit their work, giving value to its content. According to (Kirk, 2016) focused editing ensures accuracy of meaning, facts and appropriate formatting of content.

Reference

Kirk, A. (2016). Data Visualization: A handbook for data driven design. Los Angeles: Sage Publications.

Computer System Analysis Discussions

See attachments for discussions and posts.

1. Follow instructions.

2. No Plagiarism whatsoever, I will find out if there is any percentage (even 1%).

3 Prove your answers, and provide references and citations where they are needed.

4. Do NOT subit your answer if I am not online when you do so. (FAILURE TO COMPLY WITH THIS RULE WILL AUTOMATICALLY GET YOU FIRED AND NEVER USED AGAIN. AND I WILL NOT PURCHASE YOUR ANSWER.)

5. AFTER YOU SUBMIT WITH ME ONLINE……I WILL PAY AND DOWNOAD QUICKLY SO I CAN CHECK YOUR WORK……YOU WILL PULL THE ANSWER OFF THE SITE SO NO ONE ELSE CAN BUY IT. (FAILURE TO COMPLY WITH THIS STEP WILL PUT YOU ON THE BLACKLIST OF PEOPLE TO NEVER USE AGAIN)

6. IF THERE ARE CORRECTIONS TO BE MADE i WILL LET YOU KNOW AFTER CHECKING AT WHICH POINT YOU CAN DO CORRECTIONS AND REPEAT SUBMISSION STEPS. DO NOT SUBMIT YOUR REVISION WITHOUT ME BEING ONLINE OR YOU ARE FIRED. ETC.

7. FOLLOW THE INSTRUCTIONS FULLY

How You Would Reduce Potential Vulnerabilities

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

You must do the following:

1) Create a new thread. As indicated above, please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

Do some Internet research on the use of VLANs in hospitals

Discussion Questions

1. Visit the NetMotion Web site (www.netmotionwireless.com) and access and read other Mobility XE success stories. Discuss the patterns that can be observed in the benefits that Mobility XE users have realized via its deployment and use.

 

 

2. Do some Internet research on the security implications of HIPPA requirements for hospital networks. Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements.

 

3. Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify examples of how St. Luke’s could further enhance its wireless network by implementing VLANs

Describe the company network, interconnection, and communication environment.

Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth.

GFI’s network has historically been fairly stable, and the company has not experienced many full scale network outages. GFI has hired three (3) network engineers to keep up with the network growth, as well as the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.

The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has experienced DoS network attacks twice this year, and its Oracle database and email servers had been down for a total of one (1) week as a result. The recovery process required GFI to utilize $25,000 to restore its operations to the normal operating baseline. GFI estimated the loss from these network attacks at more than $1,000,000, as well as lost customer confidence.

Write an eight to ten (8-10) page formal risk assessment proposal in which you:

  1. Describe the company network, interconnection, and communication environment.
  2. Assess risk based on the GFI, Inc. network diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will utilize this risk assessment to determine what actions to take; therefore, it must be comprehensive for the business leaders to make data-driven decisions.
    1. Defend your assumptions where pertinent information from the scenario isn’t available.
    2. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
    3. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.
  4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Note: The graphically depicted solution is not included in the required page length.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.