Why is this important?
At some point early in your career you will most likely be asked to brief executives on some IT related issues. This is not your standard  summary report – This is a C-Level Executive briefing in the form of a very tight, to the point write-up.
This type of situation presented for a briefing is common. It is very easy to make decisions/choices based upon what you think you know or worse, what you think you want because of some preference, slick technology or coolness factors then, worse yet, bias your analysis. Remember that this is not an essay – the CIO in the case needs clear, fact based answers.
Content
The Briefing is a continuation of the Case Analysis and Presentation. As such, use as much of the information as possible learned from the analysis and presentations. There is an absolute limit of 1 page of written content single spaced, block justified plus a separate cover page with an Executive Summary plus a separate endnote page. (See the module on C-Level Briefing for a full description of the requirements.) Do not deviate from the questions asked. Your task is to answer them very precisely and with a minimum of words.
  • attachment

    speakernotesforthepresentation.docx
  • attachment

    CasePresentation119b.pptx
  • attachment

    BriefingDecisionsDecisions.docx
  • attachment

    ExecutiveBriefing.pptx
  • attachment

    SMBCaseRockSolidIndustrialParts.docx
  • attachment

    WrittenCaseAnalysisfinal1-1-1.docx
Part 1: Hypervisors
Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.
Case 8-3 Hyper-V (Jamsa page 115)
Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.
or
Case 8-4 VmWare (Jamsa page 115)
Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.
Part 2: Cloud Security
Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.
Requirements:
Total page count should be a minimum of 3 pages.
Make sure to cite any content provided from your sources.
Minimum number of references for the assignment is 5.

Your answers should be at least 150 words for each of the three questions for each video.

Questions

  1. Briefly explain the speaker’s point (s). What did you think was the most interesting thing(s) he or she said?
  2. What philosophical ideas we have read about do you think is informing the speaker’s thoughts? You can use general theories  or specific theorists. ( Make sure to fully explain your answer, showing what it is that the speaker said that led to your answer.
  3. Do you agree with the speaker’s reasoning? Why or why not? Be sure to explain your own reasoning.  Do you agree with the speakers conclusions?  Why or why not?

Video
1. https://youtu.be/CuQHSKLXu2c
2.https://youtu.be/uhRhtFFhNzQ
3.https://youtu.be/SJMm4RAwVLo

Integrating Evidence-Based Practice
Write a 1000-1500 word essay addressing each of the following points/questions. Be sure to completely answer all the questions for each bullet point. There should be two main sections, one for each bullet below. Separate each section in your paper with a clear heading that allows your professor to know which bullet you are addressing in that section of your paper. Support your ideas with (2) sources (1 outside source and the textbook) using citations in your essay. Make sure to cite using the APA writing style for the essay. The cover page and reference page in correct APA do not count towards the minimum word amount. Review the rubric criteria for this assignment.
Part 1:
Describe the eight steps to integrating evidence-based practice into the clinical environment. What barriers might you face in implementing a new practice to address your research topic (as identified in Module 1)? Describe strategies that could be used to increase success including overcoming barriers.
Part 2:
Describe six sources of internal evidence that could be used in providing data to demonstrate improvement in outcomes.
Assignment Expectations:
Length: 1000 – 1500 words
Structure: Include a title page and reference page in APA format. These do not count towards the minimum word count for this assignment. Your essay must include an introduction and a conclusion.
References: Use appropriate APA style in-text citations and references for all resources utilized to answer the questions. A minimum of one (1) scholarly source and the textbook are required for this assignment.
Rubric: This assignment uses a rubric for scoring. Please review it as part of your assignment preparation and again prior to submission to ensure you have addressed its criteria at the highest level.
Preamble
An organization chief executive officer (CEO) was suspected of fraud, and digital forensic investigators were assigned to acquire a forensic duplicate of his laptop without his knowledge, and his laptop was configured with full disk encryption.
Restrain 
The best option was to shut down the laptop, create a forensic duplicate of the hard drive, and decrypt the hard drive using an administrative decryption key. Notably, investigators had insufficient time for such laid down approach.
Plan of Action
The forensic duplicate of the data must be acquired from the live laptop while the system was left running in the chief executive Officer’s unit. The CEO was called out for an interview germane to the suspected fraud charges. The digital forensic investigators were then, able to interact with the CEO’s laptop, made changes to the system, acquire vital data on the laptop hard drive in an unencrypted format, including deleted data.
Lack of Decorum 
During the acquisition process, digital investigators documented findings and enabled unauthorized access to concluding evidence. It must be recognized and acknowledged that the fundamental principle for handling forensic investigation in the most unstable environment, such as the CEO’s office, is not a smooth sailing event. Also, forensic investigators must be incredibly careful not to violate any laws and give rise to liability.
Answer All Questions (1:1 – 1:6)
Question 1:1 Do you, as an investigator, believe that forensic investigators charged with the case vehemently violated the laws and rise to liability?
Question 1:2 Do you, as an investigator, have confidence and willing to support digital forensic investigator’s conclusive evidence of this case in court?
Scenario: Try extremely hard to make allowances for forensic investigators’ operation in the most uneven crime scene to avoid breaching the fundamental principle of forensic investigation. 
Question 1:3 Provide a comprehensive plan of action to guide digital forensic investigators in an unbalanced crime scene of this nature.
Question 1:4 Do you support the option that digital forensic investigators charged with this case should have obtained extra search warrant?
Question 1:5 Describe the Benefits and Drawbacks of Search Warrant on the organization’s Chief Executive Officer in such a given situation.
Question 1:6 Describe the Benefits and Drawbacks of extra Search Warrant on forensic investigators in the same given situation.

QUESTION

Nursing Question – Models for Change – Master’s Level

Discussion Post – 300 Words – APA Format

Scholarly Articles – must be less than 5 years old

Describe the fundamental elements of a model for change, such as steps involved in the process, approach in mobilizing the change process, and what is needed to sustain the results.  

Use Kotter’s 8 Step Change Model for this discussion post model for change

Here are weekly assignments to address for each week which will contribute to the Final Project: Each weekly assignment will between 250-350 words.

· Week 1 – Develop your network boundary based on the requirements provided, see Appendix A of the syllabus. Follow the assignment in Appendix A. You will need to draw the network boundary and provide a detailed network description of the network boundary.

· Week 2 – Describe the security and privacy requirements for the network boundary. This is a physician’s office, so please describe the HIPAA security and privacy requirements you need to follow for your network boundary. Use the HIPAA, HiTech, and Omnibus Laws to help you create HIPAA security and privacy requirements.

· Week 3 – We need to ensure the physician’s office is secure and the HIPAA data is protected. Read NIST SP 800-53 rev 4. How can this document help you ensure your physician’s office is secure? Out of the 18 control families, pick two control families and address the controls in complete sentences for your network boundary.

· Week 4 – We need to ensure the network boundary is hardened. Please review the DOD STIG for Oracle 12. Select 20 controls and address how the Oracle server has been hardened in the physician’s office.

· Week 5 – We are preparing for an audit of the system for HIPAA compliance. What are all of the documents we will need to have prepared for the upcoming audit? Please explain why each document is important. What scans should you run on the system, please describe the scan and on why systems the scan ought to be facilitated.

· Week 6 – The auditors have finished their assessment. In Appendix B, we have the findings from the audit. Please address in detail how each finding should be mitigated. Match up each control to the SP800-53 control family and control number.

· Week 7 – The physician’s office now wants to add tele-medicine to the functionality of their network. Explain in great detail, 500 words or more how this will impact the physician’s office and what we need to do from an information assurance perspective. Make sure you include change management in this discussion.

· Week 8 – Turn-in of FINAL PROJECT. Bring together your past 7 weeks of work. Add narrative transitions where appropriate and ensure you have addressed the instructor’s feedback provided each week. Conclude your project with a 500 word narrative explaining why information security is important in the Healthcare field. Cite Scripture to demonstrate your understanding of how faith integrates with the information technology and healthcare fields. Check to ensure that APA format has been used and you have at least 14 peer-reviewed references.

APPENDIX A

Information Assurance Project
In order to understand the practical impact of Information Assurance, we will work on a project over the next 8 weeks. One of the major requirements in information assurance is documentation and being able to articulate your understanding of a security requirement or control. Please design a network for a hypothetical physician’s office and provide a network description with the following:
1 Server with Scheduling software (pick one)
1 Server for billing (pick one)
1 Server with a data base for patient data – Oracle 12
1 Server for email – Microsoft Exchange Email
The office has 10 patient rooms with a desktop in each room running Windows 10 for the OS
The office is based on wireless networking with TCP/IP.
There are two doctors in this office.
This office has an Internet connection to the mother company. 
The network boundary for this assignment is just this physician’s office.
In your network description please provide the following:
Describe the purpose of this network. 
Describe the network and equipment, the servers and the software in place.
Describe the security you have in place.

APPENDIX B
The auditors have completed their assessment. The following are the findings determined during the audit. Please address in detail how each finding should be mitigated.
  
Identified   Vulnerability

Identify   the Matching Control in the SP 800-53 – Control Family and Control Number

What would   be the appropriate mitigations?
 
1. People can gain physical access to the physician’s office   without anyone checking ID.

 
2. The server room does not have a lock on the door.

 
3. There are default admin accounts with elevated privileges

 
4. The receptionist of the office provided the password to the   server via an inbound phone call.

 
5. There are unused open ports on all of the servers.

 
6. The scheduling software shows verbose code.

 
7. There is no encryption on the network. PHI/PII data is sent over   the wireless network in clear text.

 
8. The PHI/PII data on the database server resides on unencrypted   drives.

 
9. In an interview with the Nurse, she stated there is no training   for HIPAA Security or Privacy provided.

 
10. On the desktops, there are Microsoft vulnerabilities in the   Windows 10 OS which have not been patched.

 
11. The auditor watched an employee make changes to the Oracle   server without following change management.

What does your State Board of Nursing say about Unlicensed Assistive Personnel and their role, and the role of the Registered Nurse? Describe the responsibilities of the Registered Nurse when delegating patient care tasks.

How does the ICU environment differ from a general medical-surgical unit as far as assigned responsibilities for Unlicensed Assistive Personnel? from your textbook(Weiss, S. A. & Tappen, R. M. (2015). Essentials of nursing leadership and management (6th ed.). Philadelphia, PA: F. A. Davis Company). or from a scholarly source from a previous discussion or assignment from this course and write about its application to nursing practice. Provide definitions, history/background, and major concepts of chosen topic.  Describe the topic’s function in nursing practice by examining at least three different nursing roles (for example, bedside nurse, public health nurse, CNO, unit manager, etc.). Discuss how the leadership topic can be used in your own practice. Discuss your personal growth in regard to your chosen leadership topic. Evaluate personal strengths, weaknesses, opportunities, and threats to your career advancement.

Then, discuss the top three traits you feel makes a good nurse leader. Support your statements with examples from your practice experience and scholarly sources. 

Assignment Expectations:

Length:  2000 words in length

Structure: Include a title page and reference page in APA format. These do not count towards the minimum word count for this assignment. Your essay must include an introduction and a conclusion.

References: Use appropriate APA style in-text citations and references for all resources utilized to answer the questions. A minimum of three scholarly sources plus the textbook are required.

Assignment: Cultural analysis recipe and report. Three to five pages total of reported content. Reference page does not count toward this total. Format requirements are outlined in the course syllabus.

  1. Find an “authentic” and “traditional” cultural recipe from a culture that is different then your own and different from the one covered in the Interview and Acculturation assignments.
    1. Recipe must come from a cookbook (see “Important Information About References” below)
  2. Prepare the recipe for yourself and a friend or family member.
  3. Take a photo of the recipe to include in your report.
  4. Evaluate the recipe (based on the provided sensory evaluation form). Evaluate the recipe for texture, flavor, color, appearance and overall acceptability. Be detailed and descriptive. Use a variety of sensory words.

Elements of Paper:

  1. Introduction:
  • Clearly state your own cultural identity and the culture of the recipe you have chosen.
  • State why you choose this cultural recipe.
  • Describe your preparation methods of the recipe that you selected to prepare.
  • Evaluate the recipe for texture, flavor, color, appearance and overall acceptability (form provided below). Be detailed and descriptive. Use a variety of sensory words.
  • Make sure to include your completed sensory evaluation form (does not count towards page count)
  • Compare and contrast the information found in the preface of the cookbook or book and other source with the information provided in the textbook. Include a compare and contrast for the following:
  • Cooking/preparation methods.
  • Traditional flavor notes/principles.
  • Typical staple foods.
  • Meal/eating patterns or habits.
  • Discuss how your cultural perceptions may have affected your perception of the food you ate and reviewed.
  • Include a References page (detailed below).
  • Attach a picture of the final product at the END of your paper. Do not embed or include in the body of the text.

Important Information About References:
Before you begin your search for sources, make sure that you clearly understand and can define what are considered staple foods, flavor notes or principles, cooking/preparation methods, and eating/meal patterns.  Refer to the chapter readings in your Introduction Modules (chapters 1-4).

  • At least 3 references should be used: 1) textbook, 2) ethnic cookbook or published book on chosen culture, 3) plus one other reference of choice.
  • Locate two resources that detail food and cooking practices of this culture.
    • One of these resources MUST be a COOKBOOK on a specific cultural cuisine or ethnic background OR a published book on a particular culture. The book or cookbook must detail staple foods(sometimes listed as pantry items), common flavor notes (seasonings & herbs traditional used), traditional cooking and preparation methods of the culture, and traditional eating/meal patterns.
    • The second resource can be from a website that also provides similar detail on the culture. It does not have to be in agreement with the book or cookbook, but it should provide additional insights or details about food in the chosen culture.
  • attachment

    CulturalRecipeAnalysisInstructions.docx
  • attachment

    CulturalRecipeAnalysisRubric1.docx
  • attachment

    PamelaGoyanKittler_MarciaNelms_KathrynP.Sucher-FoodandCulture2016WadsworthPublishing-libgen.lc.pdf
please write a research paper that answers the following questions:

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are the challenges of mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.