Public Opinion Poll Paper

Design a public opinion poll or survey to elicit information from the key actors about the selected public policy.

Include the following in your poll:

The key actors (legislators, interest groups, and activists, etc.)
Five survey questions for each key actor
The survey instrument you intend to use
Include the following in your paper:
Why the key actors were chosen
Why the particular questions were chosen

paper is to be 250-350 words

Diabetes Among American Indians

Please watch all three Youtube videos and write a reaction paper about them. The rubric and guidelines are attached please follow them.
1. https://youtu.be/aYz3FBGt3UA
2. https://youtu.be/iGQlaXKqVSg
3. https://www.youtube.com/watch?v=TL5Od4ML4L4

English Revolution- Causes of the Revolution

What were the religious, political and economic causes of the English Civil War (1641-49)?  Write a detailed answer and be sure to include the religious, and political and economic causes. At the end of the paper, you must list your sources using MLA citation. Please list the sources you used in your answer. 
Please use the MLA form of citations. The answer must be based on the sources that are attached, no outside research is permitted!!!

Defensive Security – Assignment: Conducting a Risk Assessment

Defensive security involves focusing on reactive measures to breaches and includes processes such as finding system vulnerabilities, patching security flaws, and retiring software that introduces excess risk into an environment. For this assignment, you will be given a networked information system with an access control matrix. You need to conduct a risk assessment by evaluating network security threats, physical media vulnerabilities and auditing system security. You will then deliver a 1,000-1,500 word report detailing the types of risk discovered. Your report should also include the creation of a contingency plan for breach or failure.

Scenario
The Book Blazer Publishing Company just found out they may have been hacked! They have been concerned for quite some time that a competitor has been stealing book ideas from their content management system (CMS). As the city’s premier security consultant, they retain you to verify whether this is true or not. You are given an architecture diagram of the CMS which consists of:

Web server to house the web site front-end
Application server to provide data processing functions
SQL server to house content metadata
File server on which content is stored
Firewall to protect the system
VPN appliance so employees can reach the CMS from the outside
You are also provided the following access control matrix showing each group and what access they have to each component: