Organ Leader & Decision Making

 

Week 10 Assignment

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth ten (20) points. You are required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date. If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment. There is a grading criterion associated with this assignment. Your work will be compared to other’s work, using SafeAssign for plagiarism, so please note that copying other people’s responses will not be tolerated.

wk 14

Prepare a 4 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.

strengths finder Paper

This paper will allow you to examine your strengths and develop a plan for moving forward.

  1. What Do You Do Best?
    • Of all the things you do well, which two do you do best and why?
    • Which activities do you seem to pick up quickly and why?
    • Which activities bring you the greatest satisfaction and why?
  2. STRENGTHSFINDER Results
    • What are your top five Signature Themes as identified by the Clifton STRENGTHSFINDER? Which theme resonates with you the most and why?
    • Based on your Signature Themes, what should a manager/supervisor know about working with you and why?
    • Based on your Signature Themes, what should a co-worker know about working with you and why?
    • How can a manager/supervisor help you with your strengths more within your current role and why?
  3. Celebrating Successes
    • What was your most significant accomplishment in the past 12 months?
    • When do you feel the most pride about your work?
    • How do you like to be supported in your work?
  4. Applying Talents to the Role
    • What things distract you from being positive, productive, or accurate? 
    • Which talents do you have that could benefit the team if you had better opportunities to use them? 
    • What steps could be taken to ensure you have an opportunity to apply your natural talents to your role?  
  • Submit a 5-page paper double spaced
  • Include a cover page and a reference page (not to be included in the 5 pages of paper content)
  • Use the questions and bullets above as the framework and outline of your paper.
  • Please provide at least four (4) scholarly references to support your paper in addition to the STRENGTHSFINDER text.
  • All references should be used as in-text citations. 
  • All work must be completed in APA format. 
  • You MUST submit your paper to the Smarthinking tool for review prior to submission.

Project Part 2- Info Security & Risk Mgmt (ISOL-533)

For the Project Part 1 I have identified risk for the given healthcare company, for the part 2 we need to write a risk mitigation plans for addressing the risk identified in the first part. 5 pages APA with Intext citations. I am attaching the Part 1 so you can look at the risk identified in the part 1. Let me know if you have questions.

Parametric and Non Parametric Analyses

 

Part 1

A principal wants to determine if a new ACT preparation program is effective. The data are contained in the schools.sav data file. Open the schools.sav file in SPSS. Use SPSS to determine whether a significant improvement existed between student performance on ACT tests in 1993 (act93) and ACT tests in 1994 (act94). Assume that the same students were involved in 1993 and 1994 testing. (This requires a t-test. Review Chapter 10 of the Green & Salkind text for information on paired t-tests and reporting APA results interpretation and writing.)

Create a report that answers the principal’s question. Write these conclusions in formal APA results format. Include your SPSS output to support your conclusion.

Part 2

A pharmaceutical company wants to determine whether there is a need for a new medication based on the data in the electric.sav file. Specifically, they want to determine whether a person is alive or dead 10 years after a coronary incident and whether that is reflected in a significant difference in the patients’ cholesterol levels (chol58) taken when the event occurred. Use chol58 as a dependent variable and VITAL10 as your independent variable. Complete the following:

  • Analyze these conditions to determine whether there is a significant difference between the cholesterol levels (vital10) of those who are alive 10 years later compared to those who died within 10 years.
  • Include the SPSS output, which validates your conclusion.
  • Write a brief paragraph describing your conclusions.

Refer to Unit 6 in the Green & Salkind text for specific information about SPSS tests and APA results interpretation and writing. Pay attention to the Levene’s test throughout for determining whether the assumption of equal variance was met when you make your final decisions about the analysis.

What conclusion did you reach? Write these conclusions in formal APA results format. Include your SPSS output to support that conclusion.

Part 3

Occasionally, you have 1 independent variable that has 3 or more levels or groups. For a parametric data set, an analysis of variance (ANOVA) is the proper calculation. Use an ANOVA to address the following scenario:

A financial planner is interested in understanding the relationship between the dependent variable of the income level of respondents (rincdol) and the independent variable of their education level (ndegree) from the gss.sav data file. Use SPSS to complete the following:

  • Run an ANOVA to determine the overall conclusion.
  • Use the Bonferroni correction as a post-hoc analysis to determine the relationship of specific levels of degree level to income.
  • Explain the overall conclusions based on the analysis, and describe the relationship(s) between the levels of the degree earned and income.
  • Write your conclusion of the findings based upon the output using proper APA formatting.

Submit both the SPSS output file and your Word summary. (Refer to the Green & Salkind section about a one-way ANOVA for information on APA results interpretation and writing.)

Research project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.

End product

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.

disc

 Identify the  FOUR (4) questions to ask about Collaborative Tools as stated by Jamsa (2013). List the four questions as level 1 headings

Then, in YOUR  OWN words, and in response to the four questions,  and from a business owner’s perspective, explain possible issues that could arise in the business if the questions are NOT answered. 

Response Required Discussion

please prepare the 2 responses for below discussion post in 50 to 75 words

Post#1

 

The response to incidents is a phase, not an isolated event. Teams should take a cohesive and structured approach to any incident in order for incident reaction to be successful. In order to effectively resolve the broad range of security incidents that an organization might encounter, there are five essential steps that any response program should cover – that includes preparation, detection and reporting, analysis, containment and neutralization and the post incident activity (Bandos, 2019).

Preparation:

The secret to efficient incident response is planning. Without predetermined protocols, even the best incident management team cannot handle an incident effectively. To help the staff, a strong strategy must be in place. These features should be included in an incident response plan in order to resolve security incidents successfully – Create and document IR policies, establish communicate protocols, incorporate threat intelligence feeds, conduct cyber hunting exercises and access the threat detection capabilities.

Create and Document IR policies: Define incident response management policies, procedures and agreements.

Establish Communication Protocols: Develop criteria and guidelines for communication to allow for smooth communication during and after an incident.

Incorporate Threat Intelligence Feeds: Execute the threat intelligence feeds constantly capture, evaluate, and synchronize.

Conduct cyber hunting exercises: To identify incidents occurring within your environment, execute operational threat hunting exercises. This encourages more constructive reaction to accidents.

Assess the threat Detection Capabilities: Assess your existing capability for threat detection and upgrade systems for risk evaluation and enhancement.

Detection and reporting:

In order to identify, warn and report possible security incidents, the aim of this process is to track security events.

Controlled monitoring: Use firewalls, intrusion prevention systems, and data loss prevention to monitor security incidents in your network.

Detect: Detect by correlating warnings inside a SIEM solution to possible security incidents.

Alert: Analysts build a ticket for an incident, record initial observations and allocate an initial classification for an incident.

Report: The reporting process should provide room for escalations in regulatory reporting.

Analysis:

During this point, the bulk of the effort is made to correctly scope and interpret the security incident. To collect data from instruments and systems for further study and to recognise signs of compromise, resources should be used. In-depth expertise and a comprehensive understanding of live device responses, digital forensics, memory analysis, and malware analysis should be accessible to individuals.

Containment and neutralization:

This is one of the most important incident response levels. The containment and neutralization strategy are based on the intelligence gathered during the review process and the compromise indicators. Normal operations will resume after the system is restored and security is checked.

Post Incident Activity:

After the incident is settled, there is more work to be done. Make sure that any details that can be used to avoid similar events from occurring again in the future is properly recorded.

A proper IR plan design is important for any organization to respond to the incidents. To make a rapid and thorough determination of who, what, how, where, and why the IR plan should be straightforward, easy and direct the incident response team (Kashalkar, 2016). The strategy should also provide detailed instructions so that the company can identify the under-attack structure and data and take steps to protect vital assets. The functions and duties of all the stakeholders are clearly set out. Businesses, and each individual employee in particular, must have a clear understanding of their tasks to be performed in the event of an incident, and adequate steps must be taken to minimize the effect and protect the loss of confidential data. The IR plan should not be limited only to the department of IT or defense. The IR plan is only successful if both the technical and non-technical teams are dedicated and engage in the implementation of the IR plan, such as Legal, Compliance, Human Resources, Public Relations, etc. Take the time to establish relationships with internal and external stakeholders that might be able to respond to a critical incident by supporting the organization. Establish a system for incident classification so that you can prioritize the tasks of incident response properly. For future remediation purposes, classification will also assist you to extract meaningful metrics such as form, intensity, attack vector, effects, and root cause. Finally, the IR approach should fit with the corporate objectives. Identify what matters most to your company and weave those goals into your IR operations.

Post#2

 

An incident is an unplanned interruption or reduction of quality in any network. Incident response management is the hero of software development and IT operations. A good incident response process works behind the scenes to ensure issues are resolved quickly so that communication, performance, and development can continue to operate the network. In a world where security and business risks are at a high point, companies must invest in an incident response management process. “The modern cloud architecture dictates the requirements for the forensic investigation and incident response model such as being scalable, elastic, easy to integrate – integration with data plane, and easy to manage – integration with control plane” (Adamov, & Carlsson, 2016). 

Incident response in the cloud brings its challenges and unique requirements as well. By using some cloud incident response best practices to make sure incidents don’t become crises. Some best practices of cloud computing are discussed below.

Put a process in place before an incident happens: We can’t be able to predict every type of incident or situation that needs to address. So, it’s important to be prepared. 

Incident response in the cloud helps in many factors like resolve incidents faster, improve internal and external communication, reduce revenue losses, and promote continuous learning and improvement. “Cloud is able to combine numerous heterogeneous resources (hardware platforms, storage back ends, file systems) that may be geographically distributed” (Urias, et. al., 2016).

Where the data and event occurs, we will have to implement a response immediately. When we work with stakeholders, legal counsel, and organizational leadership to determine only the goal of incident response. Some common goals include containing the issue, recovering the affected resources, preserving data for forensics, resolve the issue rapidly, and attribution.

In incident response, we can assess the impact and prioritize risks using key monitoring systems and escalation and diagnosis processes. But before that, make sure to clear channels of communication between team members, as well as outlined expectations for responsibility. Explain all the priority and severity levels before an incident occurs so incident managers can quickly assess and determine priorities in the heat of the moment. Address all future incidents response in order of the priority list of any organization. “A large number of research efforts have focused on intrusion detection in industrial networks, however, few of them discuss what to do after an intrusion has been detected” (Piedrahita, et. al., 2018). 

Cloud computing is large and complex as well, with many moving parts to track and monitor to any network. It’s important to invest in the right incident management tools to support cloud incident response processes. Visualize all the processes and map cloud architecture to keep everyone on the same page and prevent incidents from falling through the cracks or prevent networks from cyber attacks (Adamov, & Carlsson, 2016). 

When we come to incident response, there’s no such thing as too much communication. We take advantage of incident response playbooks, messaging scripts, and process flows to ensure every one of our team is on the same page.