Need Help ?

Expert Answers

(Solved): 1 6 Discussion Cognitive Domain Question Description Identi...

1 6 Discussion Cognitive Domain

Question Description

Identify the level within a cognitive domain, such as Bloom’s,from which your learning experience derived. 400 words minimum.

(Solved): 1 7 National And International Maintenance Regulations Aviat...

1 7 National And International Maintenance Regulations Aviation

Question Description

For this activity, research the differences between national and international maintenance regulations and what is needed to ensure compliance. Also, assess and provide recommendations on ways the national and international regulations governing aircraft inspections can improve the schedule maintenance process and outcomes.

Activity Guidelines:

  • Write a 1-2 page report, not including the title page and reference page.
  • The structure must be submitted in the following order:
    • Title Page
    • Body
    • Reference page containing a minimum of 2 sources
  • Your paper must be written in current APA style.
  • Ensure the words contained within the document are entirely your own and that all sources have been properly cited and referenced.
  • Support your conclusions with a minimum of two or more references, such as articles found through the Hunt Library's research database.

(Solved): 1 About Art History 2 At Least Four Pages 3 Include At Least...

1 About Art History 2 At Least Four Pages 3 Include At Least Three Resources As Evidence Of Your Research In A Bibliography No Wikipedia Please

Question Description

You will choose ONE topic on which to write. The paper should be at least four pages typed, double-spaced and use a 12 point font. You must include at least three resources as evidence of your research in a bibliography (No Wikipedia please).

1) Examine the influence of the Protestant Reformation on the art of Northern Europe. Choose at least two artists to use as examples.

2) Looking at the work of Michelangelo, examine how the changing politics and religious beliefs of the day affected his artistic output.

3) Using two to three artists as your examples, explain why the center of the art world shifted to New York after the two World Wars.

4) Using two artists as your examples, examine the difference in artistic approach between the Neo-Classicists and the Romantic artists of the late 18th and early 19th century.

(Solved): 1 Amp 2 Different Docs Need Apa With References Citations Mu...

1 Amp 2 Different Docs Need Apa With References Citations Must More Than 2 Reference R Amp D

Question Description

1)Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/pr...

After reading chapter 1 and looking at the link above, you're ready to participate in the first discussion.

Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.

You must do the following:

Create a new thread. As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.



2)

WK4 - Annotated Bibliography

This assignment will be one of several throughout the Ph.D. program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you will have to identify related research, read the papers, and assimilate prior work into your research. An annotated bibliography helps you develop and hone these research skills.

Your paper must be an in a correct APA format, use correct grammar, and will need to include at least seven (5) resources, ALL of which must:

1) Be current. Published within the last 5 years.

2) Be peer-reviewed.

3) Relate directly to defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I am interested enough to read the paper, and also how you perceive the paper. Do not go skimpy on these annotations, but DO NOT write too much here. Quality is far more critical than quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer-reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not merely assume that a resource is a peer-reviewed - check it out.

Here are a few URLs with additional information: (I Strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf

http://libguides.enc.edu/writing_basics/annotatedbib/apa <<<< Check out the "Rules! Rules! rules!" section

http://guides.library.cornell.edu/annotatedbibliography

https://owl.english.purdue.edu/owl/resource/614/03/

Note: Attach your MS Word document to the wiki.



(Solved): 1 Amp 2 In Different Docs Please Apa And References And Cita...

1 Amp 2 In Different Docs Please Apa And References And Citations Must Pridivy

Question Description

1)Discussion: Improving risk management capabilities

Discuss actions required to develope an effective risk management capability.

Forum rules:

    • Your answer must be substantive, which usually requires 300 words or more
    • Your answer must be well written and well organize

    2)Week 6 - Annotated BibliographyThis assignment will be one of several throughout the Ph.D. program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you'll have to identify related research, read the papers, and assimilate prior work into your research. An annotated bibliography helps you develop and hone these research skills.Your paper must be in a correct APA format, use correct grammar, and will need to include at least five (5) resources, ALL of which must:1) Be current. Published within the last few years.2) Be peer-reviewed.3) Relate directly to defense in depth in the context of protecting National Infrastructure.Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I'm interested enough to read the paper, and also how you perceive the paper. Do not go skimpy on these annotations, but DO NOT write too much here. Quality is far more critical than quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. Every resource you choose must be peer-reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not merely assume that a resource is peer-reviewed - check it out. Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)https://sites.umuc.edu/library/libhow/bibliography...https://www.bethel.edu/library/research/apa-annobib-sixth.pdfhttp://libguides.enc.edu/writing_basics/annotatedb... <<<< Check out the "Rules! Rules! rules!" sectionhttp://guides.library.cornell.edu/annotatedbibliog...https://owl.english.purdue.edu/owl/resource/614/03...Attach an MS Word document with your wiki.

(Solved): 1 Amp 2 In Different Docs Please Apa References And Citation...

1 Amp 2 In Different Docs Please Apa References And Citations Must More Than 2 References

Question Description

1)Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/pr...

After reading chapter 1 and looking at the link above, you're ready to participate in the first discussion.

Letâ??s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defenseâ??s [DODâ??s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.

You must do the following:

1) Create a new thread. As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.

2)

  1. Read the mini case, Delivering Business Value with IT at Hefty Hardware (pp. 76-79).Submit a Word document with the following:
    • Complies with the APA and writing standards for this course
    • Has a SafeAssign score of less than 25%. You may submit your assignment multiple times to check the SafeAssign score. Only the final submission will be graded. Final submissions with a SafeAssign score over 25% will not be graded.
    • Has three scholarly sources, not including our textbook.
    • Answer question one and two on page 79. Your answer to question one should be about a page long. Your answer to question two should be about two pages long.

(Solved): 1 Amp 2 In Different Docs Please Apa With Proper References ...

1 Amp 2 In Different Docs Please Apa With Proper References And Citations

Question Description

1)Security Specialists conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security, personnel security, and information security. May work in fields such as health care, banking, gaming, security engineering, or manufacturing.

Read this week's article "Being A Security Specialist: What You Really Do." What duties and roles of a security specialist do you like and do not like? Why did you mention those particular duties and roles?

2)Discuss IT leaders can promote innovation. Use your own experiences as good or bad examples.

Forum rules:

    • Your answer must be substantive, which usually requires 300 words or more
    • Your answer must be well written and well organized
    • Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available.

(Solved): 1 Amp 2 In Different Docs Please Follow Apa And References C...

1 Amp 2 In Different Docs Please Follow Apa And References Citations Must Noplagarism

Question Description

1)As noted by Fennelly (2017), there are different stages to identifying vulnerabilities of a physical protection system (PPS). The vulnerability assessment (VA) process can be segmented into the following three phases:

  • Planning the VA
  • Conducting the VA
  • Reporting the results of the VA

Select 1 of the phases and discuss the details of that phase. Also comment on why you selected that phase.


2)Discuss the textbook's recommendations for improving business-IT communication. Provide examples from your own experience to support your ideas.

Forum rules:


    • Your answer must be substantive, which usually requires 300 words or more
    • Your answer must be well written and well organized
    • Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available.

(Solved): 1 Amp 2 In Different Docs References With Citations And Plea...

1 Amp 2 In Different Docs References With Citations And Please More Than 300 Words At Least 2 References Prichai

Question Description

1)How can IT improve the customer experience. Use your own experience as good or bad examples.

2)Countermeasure can be defined as actions taken to counteract a danger or threat. Fennelly (2017) tells us that external and internal countermeasures can be conceptualized around the following five “Ds:”

  • Deter
  • Detect
  • Delay
  • Deny
  • Destroy

Select and discuss one of the "Ds." Also provide an example of your selected countermeasure in a real-world scenario.

(Solved): 1 Amp 2 In Different Docs With 2 References Each And Citatio...

1 Amp 2 In Different Docs With 2 References Each And Citation Follow Instructions

Question Description

1)Description: Defense-in-Depth, an IA concept refers to multiple layers of security controls placed throughout an IT system. Post a brief summary of examples of these types of controls in action and your experience with at least one of type of control. Illustrate whether or not you believe, in your experience, this approach is effective. Be sure to indicate in what domain your example occurs:

  • User domain - any user of our systems falls in this domain, whether inside or outside our organization
  • Workstation domain - not just computers, but any device our users use
  • LAN domain - each LAN and the devices that make a LAN work
  • WAN domain - the system that links devices across long distances; typically this is the Internet which is used by most businesses
  • LAN-to-WAN domain - the infrastructure and devices that connect our organization's LANs to the WAN system
  • Remote Access domain - the technologies used by our mobile and remote users to connect to their customary resources; can include VPN solutions and encryption technology
  • System/Application domain - technologies used to actually conduct business functions, as opposed to making connections of various types

2)Chapter 1 and 2 provided a high-level overview of Threat modeling and Strategies for Threat Modeling. For some additional reading, take a look at how other organizations view threat modeling:

https://www.varonis.com/blog/threat-modeling/

After reading chapter 1 and 2 and looking at the link above, you're ready to participate in the first discussion.

Let’s look at a possible real-world scenario and how the Department of Homeland Security (DHS) plays into it. In this scenario, the United States was hit by a large-scale, coordinated cyber attack organized by foreign entity. Lessons learned indicated that DHS was not utilizing any threat modeling strategies and would like to get discussion started immediately to better understand what it is. You are brought in and need to provide the following to DHS:

a. What is threat modeling?
b. How can threat modeling help protect key assets (this could be information, infrastructure, personnel, etc) going forward?

c. What should the next steps be for DHS now that they have a better understanding?

You must do the following:

Create a new thread. As indicated above, please answers the three questions above for DHS described in the preceding paragraph. Must use a minimum of three references for your initial posts. Also, please cite all references and use proper APA formatting.