+1 (951) 902-6107 info@platinumressays.com

Application of Course Knowledge

  1. Application of Course Knowledge: Answer all questions/criteria with explanations and detail.
    • Explain the relationship of self-leadership to leadership competency. How does a leader’s self-leadership skills impact those they lead?
    • Identify one self-leadership skill that you consider to be a strength.
    • Identify one self-leadership skill in which you have an opportunity for improvement.
    • Discuss two strategies to cultivate your self-leadership skills.

Diversity

 In this module, you will be summarizing your work up to this point on the Diversity Project and then you will give a clear indication of how such a study will enhance diversity within the organization and promote the best interests of the company. Please fill in the Diversity Assignment Download Diversity Assignmentdocument to complete this assignment. 

Diversity Assignment: [Title of Study]

Student Name: Course: Section number:

1. Description of Organization: Use your Organization Outline Template to create a summary of the organization you chose for your project. Use in-text citations when referencing facts about the company.

2. Diversity Problem: What is the problem you identified? Include in-text references to your first source as evidence of the problem.

3. Subjects: Taking the information from your Guiding Question worksheet, summarize who your subjects are for this study.

4. Guiding Question: Put your guiding question from the worksheet here. You can modify it based on instructor feedback. Include a 50 word explanation of why you chose this question based on the second source you researched. Use in-text citations when referencing the source.

5. Promotion of the company through diversity: In five hundred words, with in-text citations from a third source, explain how such a study will enhance diversity within the organization and promote the best interests of the company.

References

Include all three references in the current APA format.

Legal & Ethical Principles – Nursing – Med. Admin.

Review/summarize a scholarly source/article that addresses ethics in medication administration (Lisinopril), consider how this supports, adds to, or differs from your required academic activity post, and address a follow-up reflection question.   

Compare the legal and ethical principles related to medication administration.

In your Required Academic Activity, you noted how evidence-based practice related to your daily practice of medication administration, medication education, or assessment of medication effectiveness. Your textbook does not overtly discuss ethical principles about medication administration. Rather, ethical principles are considered in sections of the fundamentals of drug therapy, individualization of therapy, minimizing adverse effects, promoting adherence, and in the summary of major nursing implications.

For your Final – Paper assignment, revisit your Required Academic Activity post ( Lisinopril Pamphlet), review/summarize a scholarly source/article that addresses ethics in medication administration, and consider how this supports, adds to, or differs from your required academic activity post, and address a follow-up reflection question.

Final paper submission requirements:

APA 7th ed. formatted paper

Title page

Running head from p2 onward

Use headings

Introduction: the purpose of your paper

Principles: referencing at least two scholarly sources/articles and your textbook, discuss a legal principle related to medication administration AND discuss an ethical principle related to medication administration.

Summary: summarize your findings

Reflection: Based on your scholarly sources, explain how the legal and ethical principles relate to your evidence-based practice for medication administration, medication education, and assessment of medication effectiveness.

· Have you experienced ethical challenges in medication administration or in the review of a medication ordered? Does your application of evidence-based practice guidelines in pharmacology and drug therapy take on a new meaning when considering ethical principles? Explain your answer.

Conclusion

APA 7th ed. in-text citations and APA 7th ed. formatted reference page, to include your textbook, and at least two scholarly sources/articles.

Attach the scholarly sources/articles to the assignment.

A screenshot of a computer  Description automatically generated

image1.png

db 654

2.1

 Detail one of the techniques used to analyze portfolio risk. Explain how and why you would use it. 

2.2

 What is the value of PPO (Project Portfolio Optimization)? 

    Module 7 Discussion Prompt – Correctional Programming and Treatment

    Rigorous primary studies and meta-analyses have found that rehabilitative correctional interventions/treatment programs can significantly reduce recidivism. However, these same studies have found that there is a great deal of variability regarding the effectiveness of rehabilitative interventions. What does this variability mean for practice? How does the risk, needs, responsivity (RNR) model help make sense of this variability? Finally, given this reality, how should rehabilitative programs be implemented in contemporary correctional practice to maximize their recidivism reduction potential?

      Discussion 10: Data Collection II

      In Module 10, we took a look at data collection involving secondary and official data, which is commonplace in criminal justice research that involves agency-level response and policy evaluation questions. The assigned readings for this module commented on the validity and reliability of secondary and official data, with some interesting pros and cons for each type.

      In this week's discussion, consider this hypothetical: let's say that you read two different studies about crime trends, published at the same time, one that concludes that crime is on the rise and one that concludes that crime is declining. You notice in the methodology that one of these studies utilizes survey-based data collection, and one utilizes official data that comes from law enforcement. How do you reach a conclusion about whether crime is actually increasing or decreasing? What factor(s) are most important for you to help determine the facts? Which factor(s) that represent flaws or limitations in survey data and/or official data are most likely to diminish or negate the findings in either of the two hypothetical studies? Use material from class/readings to help make your argument, if possible!

        Economic Debate #3- Progressive Income Tax

         

        Economic Debate- Progressive Income Tax

        For this Economic Debate, we are going to discuss the tax system in the United States.  We currently operate under a progressive income tax.  I encourage you to look this up, but in essence, it means that the more money you earn (through income, we are not talking about investments and capital gains), the more, in taxes, you pay.

        Advocates of the progressive tax argue that if you make so much more, you can afford a higher share of the government expense.  After all, if you’ve been blessed with so much wealth, you should pay a little extra so that others can benefit from government services!

        Opponents to the progressive tax argue that more factors go into wealth than just luck.  If you work harder and put in more time, you deserve the extra earnings.  After all, if you work more hours, invest more in yourself, and sacrificed more in the short-term, you should reap the benefits and benefit from those good decisions you’ve made!

        I’ve attached a few resources to give you deeper insight to the debate on the progressive income tax.  Some of the material is heavily in favor, some is heavily opposed, and some argue a slightly different approach. Also, you are not bound to the resource I have provided. If you do your own research, that is fine as long as you are using reputable sources. 

        Using your understanding of economics, answer the question:

        Do you think the Progressive Income Tax is overall good or bad for America?  Why or why not?

        Remember, if we are thinking like economists, the word “greed” should not factor into our discussion.  “Self-Interest” exists, which means that we expect each person to make the most rational decision that will benefit them.  

        So, given this discussion and the attached material, in 175 words or more, tell which approach you would implement if you were the sole decision maker.  Be sure to include the BEST arguments from both sides in your discussion, but ultimately, you should choose one side. (You may offer a third solution if interested, but it should be very clear where you stand on the issue). 

        You will need to respond to TWO classmates for this post. (75+ words each) —try to find someone who disagrees with you and directly address their concerns.  (It is not a requirement to find someone who disagrees with you, but it makes for a more robust conversation if you do). Remember!! Be respectful in your responses. Any disrespect whatsoever will be an automatic 0 and will result in disciplinary actions.

        https://www.youtube.com/watch?v=S6HEH23W_bM&t=1sLinks to an external site.
        Minimize Video

        https://www.brookings.edu/policy2020/votervital/who-are-the-rich-and-how-might-we-tax-them-more/Links to an external site.

        https://www.youtube.com/watch?v=pTwPHuE_HrU&feature=emb_logoLinks to an external site.

        https://vittana.org/11-biggest-progressive-tax-pros-and-consLinks to an external site.

          PLAN

            

          System Security Plan Presentation

          For this presentation, you will prepare a System Security Plan (SSP) presentation slide deck to present your system security plan for CMI. The SSP may include artifacts discovered from the CMI risk assessment, the security policy report, and/or the ROE. This SSP presents the current security posture to the organization's stakeholders and employees by describing security controls, procedures, & techniques to deter, detect, prevent cyberattacks. You may include technical, administrative, and operational controls to harden the network operations and bolster the enterprise security in your plan.

          This assignment is based on the Cyber Marketing Inc. Case Study provided in this course. The CMI network diagramLinks to an external site. (opens in a new browser window) is shown below for your convenience but is also available in the CMI Case Study.

            

          Procedures

          You will prepare an SSP slide presentation to convey your findings of the CMI security posture and a proposed solution. Your SSP should include best security practices to build strong enterprise security for CMI from the areas of securing wireless systems, secure web content/access, perimeter security, audit, authentication, encryption, incident response, mobile device security, data hiding/forensics, reverse engineering, social engineering, cyber threat intelligence, cyber awareness/training and written security policy.  Utilize what you have learned in the areas of network host/server/communications device port scanning, malware & threat detection, vulnerability assessment, packet components & flows, risk assessment, application of security policy, and penetration testing. As you are presenting this SSP to your client in a presentation format, you will summarize your solutions with highlighted prioritized security controls to build a strong enterprise security.

          While you are free to create your own SSP to best prevent cyber vulnerabilities and improve the CMI security posture, and build a defense in depth, you will, at a minimum, include the following sections.

          1. Executive Summary

          2. Brief Description of the organization

          3. Brief Description of the system(s) or technology(s) under review and their requirements in Confidentiality, Integrity & Availability (CI&A).

          4. Summary of Systems Threat, Vulnerability, Impact and Likelihood (TVIL) findings,

          5. Selection of Controls to be applied to their systems for CI&A given their TVIL, and

          6. Brief outlook on expected implementation timetable and resources for maintaining assurance.

          Use the document System Security Plans (SSP) Guidelines for CMI Presentation Links to an external site.in Module 8 of the Google drive as a directive.

            

          Slide Deck & Presentation

          Your system security presentation should incorporate a slide deck of between 10-20 slides, with annotation in the Notes section and take about 10 minutes to deliver. The presentation should be a deliverable to CMI who will make decisions about hardening the CMI network operations and enforcing the security policy to improve the CMI enterprise security posture. A typical SSP would include many pages of documents. You will present your solutions in a Slide-based presentation to convey your security controls and solutions for CMI.

          Post your slide presentation to the Discussions Section once you are ready for others to view it.

          The following are recommended tool options for creating and sharing your presentation:

          · You may use VoiceThreadLinks to an external site. to create a slide-based presentation to share. For information about creating slides in VoiceThread, please click hereLinks to an external site..

          · You may upload a video to YouTube Links to an external site.and post a link to it in the discussion forum.

          · You may record your video using Screen-cast-o-maticLinks to an external site. and post a link to it in the forum.

          · You may record your video directly in the forum or upload directly to the forum by clicking reply and then selecting the Media icon.Links to an external site.

          For more detailed instructions regarding how to create and share a video using the content editor in the discussion board, click hereLinks to an external site..

            

          Grading

          Presentation Grade Weighting

          Systems Security Plan Points

          Content

          SSP Executive Summary 5 points

          Organizational Description & Mission 5 points

          System(s) Under Review Description 10 points

          Threats to & Vulnerabilities of the System, Likelihood &

          Impact of Destruction points

          10

          Controls Selection, Justification, & Application 15 points

          Implementation & Maintenance Timetable & Resources 10 points

          References 5

          Support

          Slide Core Content & Organization 10 points

          Recorded Oral Presentation Quality 10 points

          Slide Annotation 10

          Diagrams, graphs, tables 10

          Case study

          Cyber Marketing, Inc. (CMI) is a marketing company that markets its products and services to thousands of its clients across North America. As a marketing company, the products and services catalog is an important corporate asset to keep up-to-date for its clients. In order to keep its products and services updated at all times, its corporate IT infrastructure plays an important role in processing data within and between the company and the clients. The following organization chart depicts the CMI executive management team.

          Org chart

          Your Role

          For the assignments related to this case study, you will assume the role of a Cybersecurity Manager at Cyber Marketing Incorporated. You have been educated, trained, and hired to protect the physical, logical, and operational security of CMI’s corporate information system. CMI has experienced several cyber-attacks from outsiders over the past a few years. In 2013, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. CMI ended up paying its customers a large sum of settlement for their loss of customer data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected, the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.2 Million in revenue and intangible customer confidence.

          CMI Network Diagram

          You are responsible for a corporate WAN spanning 10 remote facilities and interconnecting those facilities to the central data processing environment. Data is transmitted from a remote site through a VPN appliance situated in the border layer of the routing topology; the remote VPN connects to the internal Oracle database to update the customer data tables. Data transaction from the remote access to the corporate internal databases is not encrypted.

          A bulk of the data processing for your company is handled by Oracle database on a high-end supercomputer. The trusted computing based (TCB) internal network is situated in a physically separated subnet. This is where all corporate data processing is completed and the internal support team has its own intranet web server, a SUS server, an internal DNS, an e-mail system, and other support personnel workstations. Each corporate department is segregated physically on a different subnet and shares the corporate data in the TCB network.

          Additional Information

          In addition to the context provided above, you will find some other considerations regarding the CMI case study below:

          Recently, your network engineers report that they’ve noted a significant spike in network traffic crossing into the internal networks. They report that they cannot be certain what or who is generating this traffic, but the volume and frequency of traffic are certainly abnormal. The management is very concerned about securing the corporate confidential data and customer information.

          Increasingly, CMI’s CEO Thompson attempts to outsource IT competency. In fact, you’ve been told of a plan from COO Willy to outsource network management and security functions away from your department and to a service integrator. COO Willy warns you that the political environment will only become more contentious over time; you must make a compelling case as to what value your department can bring over an integrator that can provide secure services at 40% less annual cost than you.

          The interrelationship between data and operations concerns you. Increasingly, some of the 10 remote sites have been reporting significant problems with network latency, slow performance, and application time-outs against the Oracle database. The company’s business model is driving higher and higher demand for data, but your capability to respond to these problems are drastically limited.

          Mobility is important for the organization to interact with the customers and other co-workers in near real-time. However, the CEO is concerned with the mobility security and would like to research for the best practice for mobile computing. The CEO is willing to implement a BYOD policy if security can be addressed.

          Employees enjoy the flexibility of getting access to the corporate network using a WiFi network. However, the CEO is concerned over the security ramifications over the wireless network that is widely open to the company and nearby residents.

          The company plans to offer its products and services online and requested its IT department to design a Cloud Computing based e-commerce platform. However, the CEO is particularly concerned over the cloud computing security in case the customer database was breached.

            Platinum Essays