1 page in APA 6th Format Operational Excellence

1 page in APA 6th Format, no Plagiarism with at least one scholarly (peer-reviewed) resource.

Reflect on a below key concepts :

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Security controls

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Security breach

Review a Security Breach which occurred over the past year and present a research paper providing the below point!! 

Describe the incident

Provide Specifics about the incident.

What data or information was impacted?

Describe threat modeling techniques which could have assisted in the mitigation of breach.

How can the organization be better postured for future attacks?

This assignment should be in APA format and have to include references and 650 words

Discussion 55

 

Mr. Bradley Willman Against Superior Court Judge C. Kline

  • The Law enforcement officers are excessively zealous, striving retrospectively to justify their interest in vulnerable, innocent children and imploring the judiciary system’s sympathy.
  • Yet again, most police officers have been convicted for possessing child pornography despite pretense claims as undercover investigators. Masquerading and demonstration to justify the overzealous interest in innocent children, the victim of sex offenders can be counterproductive, as verified in the case against Superior Court Judge Ronald C. Kline.

Preamble

  • Bradley Willman, Canadian vigilante sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual fantasies involving children and approximately 100 images alleged to be child pornography. 
  • Judge Kline’s defense team. At first, the team suggested that the intruder may have planted the evidence.
  • Judge Ronald C. Kline. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.
  • Judge Kline’s Defense Team. As the case remains in litigation, the defense team argued that all evidence obtained by Mr. Willman must be suppressed because his actions were criminal and was acting as an agent of law enforcement when he broke into Judge Kline’s computer. 
  • On behalf of Mr. Willman, the prosecuting team denied the allegation that Mr. Willman acted as a police agent but was a cooperative suspect in the case and accused as potential suspect in at least three U.S. Customs Service investigations of child pornography. 
  • Ruling and Consequence.  A federal judge ruled that Mr. Willman acted as a police informant, corrupted all evidence he obtained from Judge Kline’s computer. It is worth noting that the outcome of Mr. Willman’s case against Judge Kline can put forth an across-the-board implication for Judge Kline Defense team and the prosecuting team in the encounter with online informants.
  • Lesson Learned. Before conducting an undercover investigation, investigators must take steps to protect their identity and assumed the position of anonymity, if possible. Also, investigators must use expressly designate computers and mobile devices used in the process of undercover investigations. Investigator Must do so to avoid commingling of evidence, possible allegations of personal pedophilic interests, and permanently circumvent far-reaching implications, shame, and humiliation in court.
    1. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.

Question 1. Describe in detail the plan of action, amplifying steps to submit court appeal on behalf of Judge Ronald C. Kline.

  1. Bradley Willman sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual illusions and imaginations involving children and approximately 100 images alleged to be child pornography. However, Judge Kline’s defense team alleged that the evidence was planted by (the Intruder) Mr. Bradley William.

Question 2. Describe in detail the plan of action, amplifying steps to submit court petition on behalf of Mr. Bradley Willman.

Signature Assignment

  • Assignment Requirements: Integration: One Piece of a Large Puzzle. 

Refer back to the Marseille Urban Planning Project article you read in the Week 1 Content folder within your course Documents and Resources. In this article, you can visually see how multiple departments came together using Esri’s CityEngine tool to create and implement an urban plan to restructure a city within a matter of months.

To complete this assignment, choose a large public works project, such as the construction of a new high school. For the public works project you can select any project – this could be a local project or a hypothetical situation (adding a city park, expanding a freeway, creating more housing, building a new commercial complex, adding a neighborhood school, building out a train system, etc.). 

Write a two page paper, using the newest APA formatting edition within a Microsoft Word Document, that identifies two phases that can be independent projects. Discuss each phase and discuss how each phase is an independent project and what makes them independent projects.  Specifically, state how each project meets the definition of a project, and describe the product, service, or result of each project, and why it is temporary.

Complete the Unix scripts

| Firewall // 1pt

Open the following ports and services: 443, http

| Account Management // 3 pts

From the csv, use the OS as the filter to complete the following tasks.

– Add each username and make sure to place it on the correct base dir. You can check the /etc/passwd to ensure it is correct.

roary001:x:1000:1000::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each username must be part of the right primary group. See filter below

roary001:x:1000:1020::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each home folder must contain the corresponding files. See filter below

– Add the right content to the about file.
* All text must be lower case
* Single space characters
* No extra characters at the end of the document

| MAC

– Base directory = /home/mac/

– Primary group = color

$ ls /home/mac/canada/roary001/

.DS_Store
about

$ cat /home/mac/canada/roary001/about
first last

dob

| WINDOWS

– Base directory = /home/windows/

– Primary group = fruits

$ ls /home/windows/mexico/roary002/

Thumbs.db
about

$ cat /home/windows/mexico/roary002/about
last first

shell

Ubuntu // 4pts

| Firewall // 1pt

Open the following ports and services: 21, 22, 53, 143, 443

| Apache2 // 3pt

Install Apache on the server

$ apt-get install apache2

From the csv, use the permission as the filter to complete the following tasks. 

– Create a base directory under the /var/www/html for each permission

/var/www/html/permission/   // all, create, delete, drop, execute, insert, select, update

– From the CSV, filter all users that match each permission and create a new directory for each month of the year for which your users were born. 

fh7058,forrester,hochstein,m,august 9 1998,ghana,plum,bananas,mac,/bin/tcsh,execute

gm1513,greydon,merrick,m,september 21 1992,bahrain,medium_aquamarine,grapes,mac,/bin/csh,select

iw7165,iriana,weick,f,august 20 1987,cyprus,medium_purple,plums,windows,/bin/tcsh,select

/var/www/html/select/september

– Inside of each folder above, create an index.html file and add all matching users data int the following order: country,color,fruits,os,shell,username,first,last,gender

cat /var/www/html/select/september/index.html

bahrain,medium_aquamarine,grapes,mac,/bin/csh,gm1513,greydon,merrick,m

Fedora // 2pts

// scripts

All scripts must be placed on the /root folder.

Scripts can not be executed prior to submission. This will cause issues.

Make sure to test your scripts before turning in the assignment.

* Ensure that all file references in your scripts are absolute paths.

| useradd

Create a script named useradd.sh. This script will complete the same steps outlined on CentOS, but will run them on demand.

| httpd

Create a script named httpd.sh. This script will complete the same steps outlined on Ubuntu, but will run them on demand.

* Keep in mind that to install apache2 on Fedora you need to use the command below. The folder structure for the web server is the same.

$ dnf install httpd.

math

an aqurium is 10m long, 5m wide and 6m deep 

what is the volume of the aquarium?