Problem 3- Org behavior

1. You have been hired as the manager of a casual dining restaurant. After a few days on the job, you notice that one server, Graham, seems to be unhappy and his attitude might be spreading. Please articulate what plan of action you would take to address Graham’s attitude. What is the reasoning for your actions?

This is to be in narrative form. Bullet points should not to be used. This should be at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Android security

 

  1. Describe Android security features
  2. What concerns do you have after reading about the Android?
  3. What evidence is available to an investigaton?
  4. What is Hashcat?

Activity- 10 Exe Project

Given the following information, answer the questions about this project: ActivityExpected DurationPredecessors

  1. Draw the network as a Gantt chart.
  2. What is the critical path?  Which activities have slack time?
  3. What would happen if activities B and D each took 5 extra days to complete instead of the expected duration?  How would the critical path change?

KP – Cloud Chapter 3-7

 Kavis, Michael J. (2014). Architecting the Cloud: Design Decisions for Cloud Computing
Service Models, (3rd Edition). Hoboken, New Jersey: John Wiley & Sons, Inc., ISBN-
13: 978-1118617618 

Risk management project part 4

 Please see the attached requirements.

Project Part 4: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.For this part of the project:

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 6–10 pages 

Assignment : Layers of Protection Analysis (LOPA)

Topic: Perform a LOPA (Layers of Protection Analysis) of your local living area or work location. Remember to get permission from security. 

Instructions: Please download the Assignment 7 Layers of Protection Analysis (LOPA) template (MS Word) PFA , which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.

Need Plagiarism report as well.

Regulatory Compliance for the Healthcare Sector

Explain healthcare-related information security regulatory compliance requirements.

Write HIPAA-related policies and procedures.

 it should follow APA Citation rules.Please proofread, spell, and grammar check your paper before  submission. This SyncSession paper should be 1-2 pages long, not including the title page and reference page. Please use Times New Roman,12points font. Please double -space the paper

Computer Forensics

  

Short Research Paper #1 – Alice and Super Secure Bank

Prepare a short research paper of approximately 5 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures (if used) can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Microsoft Word attachment (.docx or .doc format) with the following file name: yourlastnameSSB.doc

For example, a submission file would be called JonesSSB.doc

Alice, a high net worth customer, banks on-line at Super Secure Bank (SSB) and has agreed to use 3DES in communicating with SSB. One day, Alice received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Bob, transferred the money out of Alice’s account and into an account of his own in an offshore bank. When reached via long distance in the Cayman Islands, Bob produced a message from Alice, properly encrypted with the agreed upon 3DES keys, saying: “Thanks for your many years of fine service, Bob. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alice.”

Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for damages for pain and suffering.  Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter.

Your report to the Board of Directors should address the following issues:

· What can be determined from the facts as presented about whether Alice intended to make Bob a gift of $1,000,000?

· Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?

· Would this controversy have arisen if SSB had been using AES rather than 3DES?

Your report should clearly address these issues, with sufficient detail and background to allow the “cryptographically challenged” Board of Directors to understand the issues involved and formulate plans for how to approach the immediate issue with Alice, and to continue business in the future, assuming that they want to continue using 3DES.

Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm.