Hearsay Rule

 Do a bit of research on the hearsay rule in legal proceedings. In your own 250 words, explain the hearsay rule and describe how it relates to the concept of an expert witness. 

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

Discussion 1

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Need it in APA Format 

NO Plagiarism 

1 Page, Remember the APA cover page and the references 

Information Security Standard or Compliance Law

Decide on an Information Security Standard or Compliance Law that is applicable to your fictional organization that is just big enough to have a Chief Technology Officer. Explain to your CTO what the rule/law is and what your organization needs to do to ensure compliance. Feel free to vibrantly describe what can happen if you don’t comply. It’s okay to strike fear into the CTO by referring to examples of punishment for non-compliance, even if those are merely in the court of public opinion.

You can use any type of communication that you feel is appropriate, whether that is a letter, memo, slide deck, infographic, interpretive dance, etc.

You should assume your CTO is technical and communicate accordingly. Remember that CTOs can be either women or men and have names other than “Dear CTO” 🙂 Pretend letterhead is always a worthwhile investment of time.

CSIA

Before you begin read: https://www.energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf

Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance.  Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be used by external assessors to evaluate the maturity level of an organization’s cybersecurity management program.

For this discussion paper, you will need to research the Department of Energy’s Cybersecurity Maturity Model and then compare it to the NIST Cybersecurity Framework and other frameworks listed in the course readings. After you have done so, write a position paper in which you recommend a cybersecurity framework or maturity model as the basis for assessing the cybersecurity program for Padgett-Beale Financial Services. Assessments will be performed on an annual basis beginning one year after the company launches its new operations.

Your 5-7 paragraph position paper must answer the following questions (at a minimum). (You will need to write clearly and concisely to fit all required information into this restricted length.)

  • What approach should the organization take in developing the Cybersecurity Management program? (What standards or frameworks should be used?)
  • What laws and regulations must be addressed by the Cybersecurity Management Program in a financial services firm?
  • What are the best practices that should be put into place to assess the maturity of PBI-FS’s cybersecurity management program?

Post your position paper as a reply to this topic. Remember to cite your sources and place your reference list at the end of your posting.

Your paper should meet these requirements:

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

Be approximately three to four pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignement

 

Week 1 Assignment

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.
Complete your answers on a WORD Document.