Discuss what performance management is and how it influences effective teams

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what performance management is and how it influences effective teams.
  2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
  3. Note at least two organizational capabilities and compare and contrast each.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

· Answer a question posted by another student in detail

· Share an applicable personal experience

· Provide an outside source

· Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

week 6 group

  

This assignment should be in APA format and have to include at least two references.

1. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? 

Hardening the Firewall

 

In this assignment, students will demonstrate methods and techniques of adjudicating systems configured in a manner consistent with general practice.

Research methods for hardening PFSense.

Using the virtualized PFSense system created in Topic 3, harden the PFSense system using Snort.

  1. Start the Snort service.
  2. Update Snort and download the latest community rules.
  3. Ensure that you have configured Snort to detect port scans.

Using the Kali VM from Topic 3, run another port scan.

Using screenshots of the results, explain if Snort detected the port scan.

Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Make sure to:

  1. Explain what hardening is, what Snort does, and why it is being used in this scenario.
  2. Explain any other methods by which PFSense can be hardened.
  3. Include at least five screenshots.

10_Imoprtance of strategic IT planning

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

UFO Sightings- building website

 

Do certain areas have higher concentrations of sightings?

What is the most common shape of a sighting?

What is the average duration of a sighting?

Is there a higher concentration of sightings at night?

Data sets are here:   

https://www.kaggle.com/NUFORC/ufo-sightings/metadata (Century of data)Attached

http://www.nuforc.org/webreports/ndxe202004.html (April sightings 2020) 

Sketch ideal visuals 

Bubble Map to view concentration levels of sightings (Leaflet)

example: https://www.d3-graph-gallery.com/bubblemap.html

Lollipop Chart to view the most common shapes of a sighting 

example: https://www.d3-graph-gallery.com/lollipop.html

Violin Chart to view the bins of duration for a sighting

example: https://www.d3-graph-gallery.com/violin.html

Word Cloud of submitted summaries for each sighting (D3)

example: https://www.d3-graph-gallery.com/graph/wordcloud_size.html

Requirements: 

Your assignment should: 

Include A dashboard page with multiple charts that updates from the same data

Should include Json amCharts (https://www.amcharts.com/javascript-maps/) 

Must include some level of user-driven interaction(e.g, menus, dropdowns. textboxes)

Main web page with navbar (possible separate pages for charts as well)           

Main page with a filter for selected dates/locations with a collective chart change 

Main Chart on top of screen – Map of locations (Bubble)

Secondary chart below or beside Bubble: Amchart pictorial 

(This chart will show how many sightings per period selected) 

Filtered charts per date or location:  

Violin, Lollipop, Word Cloud                                                 

A combination of web scraping and Leaflet or Plotly 

Wireless Security-2

1) You need to bypass security on a phone to gather evidence. Describe the forensic process used to allow bypassing user the PIN or other forms of security as a forensics analyst? Explain the process of SIM security?

2) You have a phone that has been retrieved during an arrest. You need to identify the type of phone. Summarize the process of phone identification. Compare and contrast the steps of triaging a phone is powered on versus powered off status.

. No Plagiarism 

· Should be 400 words without References.

REFER chapter-5 to 8

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

Week 7 Assignment

 

The scenario:

The Prime National Properties Group is considering selling some of its educational facilities. The facilities have been tracked in an Access database. Shelly Williams, the President of the company, has asked you to prepare a report. Import the Access data in the file Facilities_Data as a table into Excel. Using the PMT function, calculate the monthly payments the company could expect. The company would charge an 8% rate over 10 years. The result should be a positive number. Mr. Williams also asked you to calculate an extra processing fee for monthly loan payments using the IF function. If a monthly loan payment is less than $6000, the company would charge a processing fee of $150; otherwise, there would be no processing fee. Filter the rows to display only those facilities where there is a $0 processing fee. Hide all of the address fields and the processing fee column. Save the Excel file as Lastname_Firstname_Educational_Facilities

For this assignment, you will need the following files:

New blank Excel workbook

Facilities_Data

Educational_Report

You will save your files as:

Lastname_Firstname_Educational_Facilities

Lastname_Firstname_Educational_Report

  1. Open the Word document Educational_Report, and then save the file as Lastname_Firstname_Educational_Report
  2. Add a cover page of your choice, and then complete the content controls on the cover page.
  3. In the report, format headings as Level 1 or Level 2, and then insert a table of contents on a new page.
  4. In the worksheet, hide all of the address fields and the processing fee column
  5. paste the Excel data into the Word document.
  6. Add an appropriate heading formatted as Level 1, and then update the table of contents.
  7. In each file, insert the your name as a field in the footer

Upload the completed assignment files in the Assignment area. 

EH Week14 DB

 

Hello,

i need this paper by 12/10 afternoon.

Strictly No plagiarism please use your own words.

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Physical Security

 Topic: Discuss the LEED certification process and comment on a classmates post. 

 You must have at least 3 references and 1 must be from the textbook. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission. 

Business intelligence Discussion Questions

Question 1:

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Question 2:

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

-each question with 500 words and 2 references in apa format