Windshield survey community health

Goal: Using a variety of instruments (Windshield Survey, Community Assessment Tool, Screening

interviews, etc.) while in your community, you will assess the community location. This will lead to a list of

identified, prioritized health needs and your recommendations for intervention.

Instructions
You will complete a windshield survey of your community. The objective of a windshield survey is to assess

a community in a short, simple way, compiling data to help form an analysis of that community. Simply put,

a windshield survey is the equivalent of a community head-to-toe assessment. There are 6 elements that

should be included in your windshield survey . You will drive through your community and document your

findings on a powerpoint presentation. Take pictures of your community to enhance your powerpoint

presentation.

A. Familiarize yourself with the instruments for a Windshield Survey (Website Resource 15C, p. 425) and

The Community Assessment Tool applied to Phenomenological Communities (Website Resource 15A, p.

425). You may also wish to review Chapter 13, Box 13-1 (p. 343) for examples of assessments that may be

appropriate for your community population, since the Community Assessment Tool includes some

screening data and information from clients.

B. Plan how you will obtain the information for the assessments.

  1. Conduct a Windshield Survey assessment.
  2. Drive around your community and take pictures.
  3. Create a PowerPoint presentation No more than 10 slides addressing each area of the windshield

study.

Sample Solution

The post Windshield survey community health appeared first on homework handlers.

Creating a policy for the cloud

Information security uses administrative, technical (logical), and physical controls to mitigate risks related

to organization’s assets. A policy is an administrative control.

If no policy exist in the IT department, research shows that employees will default to a defacto policy. A

defacto policy means a policy that is in effect ,but not formally recognize. To stop this for happening, It is

important for students to understand how to take the cloud best practices discussed throughout this

course and use them to create a cloud security policy. Cloud security fundamentals and mechanisms is a

huge part of the cloud security policy.

For this assignment, read the attached article: “Our Journey to the Cloud”. Use the

https://ucumberlands.blackboard.com/bbcswebdav/pid-2309553-dt-content-rid-34628598_1/xid-

34628598_1
to create a policy for the cloud. Please note, the SANS policy is a template you can use to structure your

policy. If you are having trouble with the links above, these supporting documents can be found in the

Cloud Policy Assignment Documents folder.

Sample Solution

The post Creating a policy for the cloud appeared first on homework handlers.

Create a program that will read in the text file containing graph specifications and write to the std out the “Kevin Bacon” connectivity between two nodes on the graph.

Create a program that will read in the text file containing graph specifications and write to the std out the “Kevin Bacon” connectivity between two nodes on the graph. The program should be able to create the directed graph from the input file and output the results to the output file.

“Explosive Growth of Digital Crime and Fighting Digital Crime”

Identify at least two factors that have led to the explosive growth of cyber crime over the past few

decades.
Next, describe the most common forms of cyber crime and give your opinion as to why those forms you
described are so common. Provide a rationale for your response.
List three types of cyber crime and name the main federal agencies that have primary responsibility to

enforce cyber crime laws. Next, recommend one way for the federal agencies in question to improve the overall public response to computer crimes. Include the role of an individual citizen in the fight against cyber crime in your discussion.

Sample Solution

The post “Explosive Growth of Digital Crime and Fighting Digital Crime” appeared first on homework handlers.