Gun Ownership in America

5 sources

Intro- your intro can be similar to the other two papers remember you will need to change the thesis to reflect the main focus of the paper.

Intro- 1 page Pro
            1 page Con
2-2 and a half pages middle ground conclusion

Take your best 2 pro paragraphs and use them in your paper.

Then take your best to con paragraphs and use them.

Find people who are trying to solve the problem or fix whatever problems you see in your topic. Those are the people you want to quote and reference.

Then conclusion and works cited.

Make sure you center Work Cited and do it MLA style.

Anything but Ordinary

1. Read the case for understanding and facts.
Write a summary or problem statement for your particular case
2. Analyze the case facts with your work from this course in the assignments.  Apply your work from reflection papers that are relevant to this case.
3. Draw a conclusion about the case from the Micro, Mezzo, and Macro perspective.  Apply each perspective to the strengths and weaknesses of the case decision.

supplemental materials:
https://www.youtube.com/watch?v=G7YCncaE1Ho&feature=emb_title

United States National Environmental Policy Act

The purpose of this assignment is to provide you the opportunity to understand the regulatory process as it is followed by the Environmental Protection Agency (EPA). Students should become familiar with regulation and policy language in order to help educate the public about new regulations being enacted by the EPA. Also, being environmental stewards as well as public health professionals, all should be knowledgeable of the major environmental acts and how they have helped to protect the health of U.S. citizens.

First, go to the Federal government regulations website: http://www.regulations.gov (You may have to type the address into your web browser). Click on the “Learn” tab and read through the policy process. Make sure you click on the five tabs that will guide you through the entire regulatory process.

Then, click on the “Search” tab. Search for an environment-related proposal by typing “environmental protection” in the Search box. You will find both state and federal policies in the review process. Select a current policy that is accepting commentary. Provide a summary of the policy, what rules or standards it is proposing, where, and its overall purpose. If the proposal has a series of questions for you to answer for your comments, please provide the responses to those questions. Otherwise, in one or two paragraphs, provide your written comments on why you support the proposal using evidence to support your statements.

Then, write on the National Environmental Policy Act, define it, and explain how it has helped to ensure a safe environment in the U.S.

The paper should be typed and five (5) pages in length, and follow the APA Style which includes using a cover page, one-inch margins, double-spaced, 12-inch font (Times New Roman, Arial or Verdana) with a reference page.

Enterprise Network Security

1. Cybersecurity For A Successful Acquisition Report: (12 page min) w/ Executive Summary
Conduct a Policy Gap Analysis
Executive summary: This is a one-page summary at the beginning of your report.
Are companies going through an M&A prone to more attacks or more focused attacks?
If so, what is the appropriate course of action?
Should the M&A activities be kept confidential?
explain to the executives that before any systems are integrated, their security policies will need to be reviewed
Conduct a policy gap analysis to ensure the target company’s security policies follow relevant industry standards as well as local, state, and national laws and regulations.
Identify what, if any, laws and regulations the target company is subject to.
How would you identify the differences?
How would you learn about the relevant laws and regulations?
How would you ensure compliance with those laws and regulations?
Use PCI standards to identify a secure strategy, and operating system protections to protect the credit card data
Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.
Review Protocols for Streaming Services
review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks.
Identify what streaming the companies are doing and the specific technology they are leveraging.
What are the technical vulnerabilities associated with the protocols involved?
Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?
What residual risk to the target company’s assets and IP remain?
Would those risks extend to the current (takeover) company after the merger?
a. Would that be bad enough to cancel the M&A?
If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?
What are the costs associated to the target company (implementing the appropriate mitigation)? If the takeover firm has to take additional measures, identify those costs as well.
Assess the Merged Network Infrastructure
Explain what tactics, techniques, and procedures you would use to understand the network.
identify firewalls, DMZ(s), other network systems, and the status of those devices.
Review the Wireless and BYOD Policies
Explain the media company’s current stance on wireless devices and BYOD.
Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.
Develop a Data Protection Plan
Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys.
Convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support
Describe what this would entail and include Trusted Platform Module (TPM) components and drivers.
How are these mechanisms employed in an authentication and authorization system?
Review Supply Chain Risk
Include supply chain risks and list the security measures in place to mitigate those risks.
Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations to explain the areas that need to be addressed.
Build a Vulnerability Management Program
Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to scan and build a vulnerability management program
Explain to the managers how to implement this change, why it is needed, and any costs involved.
Educate Users
Inform the users for the new and old company of the changes, including policies, processes, and other aspects that were updated
Explain to the acquisition managers the requirements for training the workforce.