Author: admin

  • cmap 665 – cybersec policy management

    Step 1

    Review NIST SP 800-161 Rev. 1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations.

    Your review should focus on understanding the cyber risks posed by supply chains to organizations and how cybersecurity professionals can address and mitigate these risks.

    Supply chains, in their complexity and interconnectedness, present significant cyber risks to organizations. These risks stem from various factors such as:

    1. Third-Party Dependencies: Organizations often rely on numerous third-party vendors, suppliers, and service providers within their supply chains. Each of these entities represents a potential vulnerability that could be exploited by threat actors.
    2. Information Sharing: Supply chains involve the sharing of sensitive information across multiple parties. This increases the likelihood of data breaches or unauthorized access to proprietary information.
    3. Product Integrity: The introduction of compromised or counterfeit components into the supply chain can compromise the integrity and security of products or systems, leading to potential vulnerabilities.
    4. Complexity and Opacity: Supply chains can be highly complex and opaque, making it challenging for organizations to fully understand and manage the cyber risks associated with each link in the chain.

    To address and mitigate these potential risks, cybersecurity professionals can implement several key strategies:

    1. Risk Assessment and Management: Conduct thorough risk assessments to identify vulnerabilities and potential threats.
    2. Vendor Management: Implement robust vendor management practices, including due diligence assessments, contractually binding security requirements, and regular monitoring of vendor compliance with security standards.
    3. Information Sharing and Collaboration: Foster collaboration and information sharing with supply chain partners to enhance collective cybersecurity posture.
    4. Supply Chain Resilience: Develop strategies to enhance the resilience of the supply chain against cyber threats, such as redundancy planning, diversification of suppliers, and contingency measures.
    5. Security Controls and Standards: Implement robust cybersecurity controls and adhere to industry standards and frameworks.

    By adopting these proactive measures, cybersecurity professionals can help organizations mitigate the inherent cyber risks associated with supply chains, thereby safeguarding critical assets and ensuring business continuity.

    Requirements: 3p

  • How does Angkor Wat integrate cosmology and landscape throug…

    I would like to confirm that my essay title will be:

    How does Angkor Wat integrate cosmology and landscape through monumental planning in the Khmer Empire

    I have shared the PDF with the detailed guidelines. If you refer to the last slide, you will find the checklist of all the required deliverables. I will ensure that the essay meets the following requirements:

    • Total word count of 2,000 words (with 10% tolerance: 1,8002,200 words)
    • Clear structure including introduction, three main parts (description, analysis, and critique), and conclusion
    • Inclusion of at least three illustrations (two in the description and one in the analysis), with proper references and captions
    • Use of 24 academic sources, including at least two in the description and two supporting the analysis
    • Inclusion of scholarly quotations from all academic sources used
    • Use of the required academic citation style
    • Inclusion of footnotes, bibliography, and list of figures
    • Focused critical analysis directly addressing Angkor Wats integration of cosmology and landscape through monumental planning

    Attached Files (PDF/DOCX): CC1 Illustrated essay(1).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Diversity, Equity, and Inclusion Research Paper

    The text highlights several examples of disproportionality across the child welfare system. Disproportionality in the child welfare system occurs when a racial/ethnic group is overrepresented in the child welfare system compared to their percentage in the general population.

    Select a problem related to Diversity, Equity, and Inclusion (DEI) as it relates to disproportionality in the child welfare and/or foster care system that you want to learn more about. Diversity, equity, and inclusion (DEI) in the child welfare system means creating a system that works for all families by acknowledging and addressing the diverse backgrounds, cultures, and experiences of the people the child welfare system serves, dismantling systemic biases, and providing fair access to resources based on individual needs.

    As part of the assignment, complete a literature review that includes the following:

    • Describe the issue/problem of disproportionality within the child welfare/foster care system.
    • Describe the causes of the problem.
    • Describe the consequences of the problem if not addressed.
    • Based on the causes identified, describe possible solutions aimed at reducing disparities.

    NOTE: If you select racial/ethnic disproportionality, select a specific racial/ethnic group. The reason is because we can’t lump all racial/ethnic groups into one as each group has distinct experiences within and outside the child welfare/foster care system.

    This paper should be approximately 5 7 pages (excluding the title page and references) and include at least 5 peer-reviewed sources. Use appropriate APA citations and references. Be sure to proofread your work for correct grammar and spelling.

  • The jones act under the tramp regime

    Olney, William W. (2019) Cabotage Sabotage? The Curious Case of the Jones Act Journal of International Economics. Pagel, Jeffrey / Brannon, Ike / Kashian, Russ (2019) Jones Act: Protectionist Policy in the Twenty-First Century. Lewis, Justin S. Veiled Waters: Examining the Jones Act`s Consumer Welfare Effect (working paper).

  • Tariffing a Market

    Writing Assignments Objective: To apply relevant economic concepts and knowledge learned in the course to business practice. Task: For the writing component of this course, you will make a total of two posts in the Discussions section of Canvas. The minimum requirement is 400 words for each post. How: After reading (Managerial Economics – Author: Christopher Thomas) the chapters related (Chapter 8,9,10&12) to the topic and completing the chapter quizzes, answer the question as if you were taking a take-home exam based on the material covered in this course. Each post should meet all basic requirements listed in the bullet points for each topic, even if you resubmit a post or respond to another post. Keep in mind, economic or business writing is considered technical writing that must make logical common sense. You must justify all your points or opinions. Specific academic formats ( APA) that must be followed. References are required. Plagiarism Policy: You are welcome to use AI or learn from peers, but at your own risk. Turnitin will be used to check each individual assignment for matching its content with all contents accessible on the World Wide Web, including student submissions posted prior to your submission. A 50% or more matching by Turnitin will result in a 50% deduction to the total score, and matching over 75% will result in a zero score.

    Attached Files (PDF/DOCX): Tariffing a Market.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Week 7 assignment

    Social welfare policies contribute to our social well-being. Answer the following questions in your assignment:

    1. Identify two pieces of legislation that you think have directly affected your own well-being.
    2. Briefly explain the legislation and how your life has been directly affected.

    Formatting:

    Your document should be in APA 7 format and include references as appropriate. Include the questions with your answers. Support your work with material from the videos and assigned reading.

  • cmap 645 – cybersec law and regulations

    JKL Corporation offers end-to-end encryption services to customers in its proprietary messaging application. JKL prides itself in offering private communications that are not subject to eavesdropping. Given their high level of encryption, the messages of suspected criminals cannot be viewed by law enforcement. Court orders and authorized search warrants demanding access to customer communications have begun to be served on JKL to access customer profile information and content. JKL faces a dilemma of not wanting to provide user content, which it claims it cannot independently access and being unwilling to grant law enforcement access to its encryption keys. Before responding, consider the following prompts:

    • Reflect on the significance of the constitutional concerns and legal implications of government surveillance addressing cybersecurity.
    • How do we evaluate the government’s need to offer cybersecurity safety?
    • Reflect on the importance of existing federal legislation allowing for eavesdropping on electronic communications.

    Discussion Prompts

    1. Mandatory Prompt
      • How does the Fifth Amendment apply to the governments request for decryption?
    2. Choose One Additional Prompt
      • What ethical concerns and theories apply to JKLs dilemma?
      • How can JKL avoid compliance with court-ordered action forcing decryption?
      • If JKL software engineers were able to access customer data and messaging along with discovered illegal activity, to whom should they report it?

    Initial Post

    • All students are required to respond to the mandatory prompt. Next, select and answer one of the additional prompts provided above. Your initial post should fully address both prompts and include real-world links/applications.
    • When constructing your initial post, remember to critically analyze the topic and add substantial thought to the subject area. Utilizing the resources provided in your course materials will enhance your understanding and response to the questions.
    • Use concrete examples drawn from current events, historical instances or personal experiences to illustrate your points in discussing your selected prompt…..

    Reply to at least two peers considering the following prompts

    • Provide substantive replies to at least two classmates’ initial posts, utilizing at least one reference to support your argument. These replies should offer new insights and critique or expand upon the ideas presented.
    • Add at least one concept or fact that your peer did not consider in their initial post.
    • Replies that only say things such as good job or that regurgitate the initial post of your peer are not sufficient and should be avoided.

    Posting Guidelines

    Requirements: 2p

  • week 7 social

    After reading Chapter 13, discuss the following questions with your peers.

    1. What services and programs do you think should be provided for immigrants? Refugees? Undocumented people?
    2. What limits to programs would you implement?
  • SUPPLY CHAIN RESILIENCE: ADDRESSING OBSOLESCENCE, LEAD TIME…

    Please make all changes that the professor noted on the annotated copy.

    Attached Files (PDF/DOCX): annotated-Hughley_Task20120Problem20Statement20and20Purpose_05Feb26-1docx.pdf, Hughley_Task 1 Problem Statement and Purpose_05Feb26.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Social

    Each state has laws including a mandate on who must report suspected cases of child abuse and neglect. In your assignment, answer the following questions:

    1. What are the laws in your state? Include the names and statue numbers of the law and a brief description of the laws.
    2. To whom does the mandate apply? Does it apply to you, as a social work student?
    3. Is anyone excluded? If so, name them and why they are excluded.