Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness.

Please see the attached project instructions word file for detailed instructions. I provided you many resources for this project. The more in text citations the better.
Step 1: Conduct a Security Analysis Baseline
In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).
You will get your information from this data-flow diagram and report, which is generated by the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization.
Include the following areas in this portion of the SAR:
• Security requirements and goals for the preliminary security baseline activity.
• Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization.
• Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: local area network (LAN), metropolitan area network (MAN), wide area network (WAN), enterprise. Use these questions to guide you:
o What are the security risks and concerns?
o What are ways to get real-time understanding of the security posture at any time?
o How regularly should the security of the enterprise network be tested, and what type of tests should be used?
o What are the processes in play, or to be established to respond to an incident?
o Workforce skill is a critical success factor in any security program, and any security assessment must also review this component.
o Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?
o Describe the ways to detect these malicious codes and what tactics bad actors use for evading detection.
• Public and private access areas, web access points. Include in the network diagram the delineation between open and closed networks, where they coexist, and show the connections to the internet.
• Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?
• Operating systems, servers, network management systems as they relate to data in transit vulnerabilities:
o endpoint access vulnerabilities
o external storage vulnerabilities
o media access control and Ethernet vulnerabilities
o virtual private network vulnerabilities
• Possible applications. This network will incorporate a BYOD (bring your own device) policy in the future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations.
Step 2: Determine a Network Defense Strategy
Now it’s time to determine the best defenses for your network.
Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness. Write them in a manner to allow a future information systems security officer to use them in preparing for an IT security audit or IT certification and accreditation. Within this portion of the SAR, explain the different testing types (black, white, and gray box testing).
Include these test plans in the SAR. The strategy should take up at least two of the 12 pages of the overall report.
Step 3: Plan the Penetration Testing Engagement
Now that you’ve completed your test plans, it’s time to define your penetration testing process. Include all involved processes, people, and time frame. Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE). The process and any documents can be notional or can refer to actual use cases.

Explain how information from the application and system are displayed on your computer screen as the user.

Week 2 Discussion HRM 520

Watch the following two videos from the LinkedIn Learning course Relational Database Fundamentals with Adam Wilbert.

“Database Management Systems (DBMS)” (4m 36s).

“Relational Structures” (3m 57s).

Review Figure F2.1 Database, Database Management System, and Business Applications on page 28 of the textbook. Based on the videos and your readings this week, please do the following:

Choose a set of data from the database list (e.g., Performance data).

Next, select the appropriate application program that the data interfaces with via the database management system (i.e., Performance program).

Now, explain how information from the application and system are displayed on your computer screen as the user.

Explain how you use the program and what functions are available to you.

Provide recommendations you would make to improve the program’s functionality to make it easier for end users.

https://blackboard.strayer.edu/bbcswebdav/institution/HRM/HRM520/200400/Course_Files/cf_Week2_Chapter%202_PowerPoint.pptx

Outline the broad responsibilities of the organisation to meet cyber security strategy of Australia

Outline the broad responsibilities of the organisation to meet cyber security strategy of Australia, including one of the following responsibilities: a. Ethical b. Government policy concerns c. Cyber storm preparedness

Select a particular technology in your discipline and write a 4–5 page (about 300 words per page) paper in APA format providing an overview addressing two of the four specific topics below.

The focus on the first part of this project is to select a particular technology in your discipline and write a 4–5 page (about 300 words per page) paper in APA format providing an overview addressing two of the four specific topics below. You should also include as part of this paper any acknowledgements and resources used (e.g., websites, textbooks, articles). Each written assignment should include four or more references.
1. Technology selected including what it does and how it works
2. Benefits and disadvantages of the technology
3. Identify the major competitors in the marketplace
4. Origins of technology

Propose three hypotheses for why an antibiotic might not be effective.

Based on the knowledge that you learned in the last three weeks, if you could develop an antibiotic what would be its characteristics? Key points to remember:

Spectrum of coverage
Resistance patterns
Structure of bacteria
Disease processes
Propose three hypotheses for why an antibiotic might not be effective. These should also explain why the ineffectiveness of the antibiotic results in failure to treat the disease. Use references for your answer.

Similarity Score
After submitting your assignment, select Submission Details to view your similarity score.
Your similarity score will appear as a percentage next to your submitted file.
It may take up to 24 hours for your similarity score to appear.

What price should be charged? What price would allow Polyphonic to break even on HSS?

1. What price should be charged? What price would allow Polyphonic to break even on HSS?
Was the price for call-out research a good guideline for pricing decisions? Or was the higher price justified?

Discuss which two you would consider to be strong in and which two you plan to work on to master. What obstacles exist?

In Chapter 10 (Moore) several coaching skills are listed and defined. Based on the nine detailed in the chapter, discuss which two you would consider to be strong in and which two you plan to work on to master. What obstacles exist?

Americans of Japanese ancestry were placed in detention during the war. Was the detention justified and necessary?

This discussion will focus on American homeland security during World War II. Americans of Japanese ancestry were placed in detention during the war. Was the detention justified and necessary?
To post a response to the discussion topic, click Week 5 Discussion, click Start a New Thread, type Homeland Security in the Subject field, compose your response, and click Post to submit your response.
To reply to a classmate’s posting, click Reply to Thread, type Reply to [classmate’s name] in the Subject field, compose your reply, and click Post to submit your reply.
You must start a thread before you can read and reply to other threads

It’s easy to tell that some stars in the sky are brighter than others.How much brighter are they,though?And why are they brighter?

2-1Astronomy103Lab#5PHOTOMETRYOFSTARSINCLUSTERSIt’seasytotellthatsomestarsintheskyarebrighterthanothers.Howmuchbrighterarethey,though?Andwhyaretheybrighter?Ifyoulookmoreclosely,perhapswithbinocularsoratelescope,differentstarscanalsobedifferentcolors–theycanrangefromwhitetobluetoyellowtored.Whatcreatesthosedifferences?Inthislabexercise,youwilllearnhowtointerpretandanalyzephotometricmeasurementsofstars,firstindividuallyandthenaspopulationsofstarsinclusters.

Compare the differences between product advertising and institutional advertising and the variations within each type.

1: Compare the differences between product advertising and institutional advertising and the variations within each type. (CLO 1 & 5)

 4: Consider the nature and scope of personal selling and sales management in marketing. (CLO 1 & 3)