10 Slide Powerpoint Needed In 18 Hours

the company is 3M You are also required to prepare a brief PowerPoint file of no more than 10 slides (do not exceed) for the SEC-10K Report. Make sure you include a reference list in APA format. (does not count toward 10 slide total – should be the final slide) PowerPoint Presentation You are also required to prepare a brief PowerPoint draft and post it to Peer Review of SEC 10K Project: Post Your Draft. Please use the PowerPoint Slide Notes (located below the slide itself – not on the slide itself) to “say” what you would say if you were in the classroom giving the presentation to the class.  The notes section is the place to explain your numbers, discuss the analysis, relate the weekly learning activities from the homework/reading material to the SEC 10k project, and say anything else about the company you came across that you think is valuable for this project. Your presentation in the notes section should be on each slide including the introduction slide. Notes are not required for the reference page slide as it is not included in the slide count.

paper:

Report Layout Write a 2- to 3-page ( a full page typically has at least 500 words) report, single spaced, one-inch margins, 12-point font, with a double space between paragraphs. Please keep your report to no more than 4 pages. Page count does NOT include title page, tables and exhibits, table of contents, and reference list. Include a title page (include your name on the title page). Use headings in your report such as Accounts Receivable and Inventory (topics from the textbook); other examples would be Balance Sheet and Income Statement. Include a brief introduction of your company as well as a conclusion/summary at the end. The bulk of your report should cover the accounting topics in Weeks 1 through 5. (Course material from the class as well as the discussion postings. Consider using definitions of Assets, Liabilities, Equities, Gross Profit, Gross Profit Percentage, etc to help explain what the amounts mean and why they are important.) You will also be required to include the Income Statement and Balance Sheet as an attachment to your report. You can cut and paste directly from the SEC 10-K Report for these. (Only the Income Statement and Balance Sheet should be copy/pasted from the financial statements as an exhibit at the end of the report. All paragraphs and writing should be in your own words.) These are considered attachments and are not part of the required page count for the report. All graphs, tables, or charts you wish to include in the report should be included as an exhibit at the end of the paper. These should not be inside the paragraphs. These are considered attachments and are not part of the required page count for the report. APA style is required for citations and a reference list. Include in text citations. The reference list is the most important. If you are unsure of APA style you can use the PurdueOwl website or the UMUC websites for assistance. Your report should use one-inch margins on the left, right, top, and bottom of each page, and font set at 12 point. Resources Visit the Accounting Toolbox in the Course Content > Course Resources of the ACCT 220 LEO classroom. The Accounting Toolbox is a constant resource in our UMUC undergraduate accounting courses. Links and explanations to assist you with this report may appear in this resource. Additional information will be posted on SEC Project: Request a Corporation to Study posting . 

The post 10 Slide Powerpoint Needed In 18 Hours appeared first on nursingessayswriters.com.

enterprise network security project

Step 1: Conduct a Security Analysis Baseline

As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:

  • Are companies going through an M&A prone to more attacks or more focused attacks?
  • If so, what is the appropriate course of action?
  • Should the M&A activities be kept confidential?

Now, look at the existing security policies in regard to the acquisition of the media streaming company. You have to explain to the executives that before any systems are integrated, their security policies will need to be reviewed.

Conduct a policy gap analysis to ensure the target company’s security policies follow relevant industry standards as well as local, state, and national laws and regulations. In other words, you need to make sure the new company will not inherit any statutory or regulatory noncompliance from either of the two original companies. This step would also identify what, if any, laws and regulations the target company is subject to. If those are different from the laws and regulations the acquiring company is subject to, then this document should answer the following questions:

  • How would you identify the differences?
  • How would you learn about the relevant laws and regulations?
  • How would you ensure compliance with those laws and regulations?

The streaming company that is being acquired has a current customer base of 150,000 users, who on average pay $14.99 in monthly fees. Based on the overall income, use PCI Standards DSS 12 requirements, and the PCI DSS Quick Reference Guide to identify a secure strategy, and operating system protections to protect the credit card data.

Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.

Step 2: Review Protocols for Streaming Services

After reviewing the policies from the company and the policy gap analysis, the M&A leader asks you about the protocols used by the streaming company. He wants to know if the protocols used would affect the current state of cybersecurity within the current company environment. For this section, review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks. Start with researching the commonly known streaming protocols and the vulnerabilities of those protocols. Some examples are the Real-Time Streaming Protocol (RTSP), Real-Time Transport Protocol (RTP) and the Real-Time Transport Control Protocol (RTCP).

Additionally, the leadership wants to know if any vulnerabilities identified would or could lead to a no-go on the M&A.

In other words:

  1. You need to identify what streaming the companies are doing and the specific technology they are leveraging.
  2. What are the technical vulnerabilities associated with the protocols involved?
  3. Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced somewhat, shifted to a third party, etc.)?
  4. What residual risk to the target company’s assets and IP remain?
  5. Would those risks extend to the current (takeover) company after the merger?
    a. Would that be bad enough to cancel the M&A?
  6. If the response to #5 is yes, then, what should the target company do to further mitigate the risk? How should the takeover company mitigate the risk?
  7. What are the costs associated to the target company (implementing the appropriate mitigation)? If the takeover firm has to take additional measures, identify those costs as well.

Step 3: Assess the Merged Network Infrastructure

You’ve just reviewed the streaming services of the companies, and now you will assess the infrastructure of the new network. The networks of the two companies could be configured differently, or they could use the same hardware and software, or completely different hardware and software.

The purpose of this section is to understand what tools the company is using, the benefits and shortcomings of those tools, and the gaps within the network. Explain what tactics, techniques, and procedures you would use to understand the network. You should identify firewalls, DMZ(s), other network systems, and the status of those devices.

When your assessment of the infrastructure is complete, move to the next step, where you will assess any existing policies for wireless and bring your own device (BYOD) within the companies.

Step 4: Review the Wireless and BYOD Policies

Within Project 2, you learned about and discussed wireless networks. An M&A provides an opportunity for both companies to review their wireless networks. Within your report, explain the media company’s current stance on wireless devices and BYOD. However, the company that is being acquired does not have a BYOD policy. Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.

Step 5: Develop a Data Protection Plan

You’ve completed the review of the wireless and BYOD policies. In this step, you will develop the recommendations portion of your report in which you will suggest additional mechanisms for data protection at different levels of the acquired company’s architecture.

Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys. You also want to convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support. Describe what this would entail and include Trusted Platform Module (TPM) components and drivers. How are these mechanisms employed in an authentication and authorization system? Include this in the report and whether the merging company has this.

Step 6: Review Supply Chain Risk

The data protection plan is ready. In this step, you will take a look at risks to the supply chain. Acquiring a new company also means inheriting the risks associated with its supply chain and those firm’s systems and technologies. Include supply chain risksand list the security measures in place to mitigate those risks. Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations to explain the areas that need to be addressed.

Step 7: Build a Vulnerability Management Program

After your supply chain review, you conduct an interview with the company’s current cybersecurity team about vulnerability management. The team members explain to you that they never scanned or had the time to build a vulnerability management program. So, you need to build one. Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to meet the missing need.

Explain to the managers how to implement this change, why it is needed, and any costs involved.

Step 8: Educate Users

You’ve completed your vulnerability management program, but it’s important to educate all the users of the network about the changes. During the process of acquiring a company, policies, processes, and other aspects are often updated. The last step in the process is to inform the users for the new and old company of the changes. Within your report, explain to the acquisition managers the requirements for training the workforce.

Step 9: Prepare and Submit Your Report, Executive Briefing, and Executive Summary

You’re ready now for the final step, in which you will compile and deliver the Cybersecurity for a Successful Acquisition report for the company leaders to enable them to understand the required cybersecurity strategy.

Again, keep in mind that companies undergoing an acquisition or merger are more prone to cyberattacks. The purpose of this paper is to analyze the security posture of both companies and to develop a plan to reduce the possibility of an attack.

The assignments for this project are as follows:

  1. Executive briefing: This is a three- to five-slide visual presentation for business executives and board members.
  2. Executive summary: This is a one-page summary at the beginning of your report.
  3. Cybersecurity System Security Report for Successful Acquisition: Your report should be a minimum 12-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post enterprise network security project appeared first on My Nursing Experts.

Ethical Dimensions Of Meaningful Use And Chapter Work Products

Ethical Dimensions of Meaningful Use and Chapter Work Products
Your Lesson 1 Assignment has five parts:
1. Please read the article titled Ethical Dimensions of Meaningful Use Requirements for Electronic Health Records at this link: http://journalofethics.ama-assn.org/2011/03/pfor1-1103.html
Summarize the important points you took away from that article in a well-written narrative (250-300 words) and submit to your instructor for evaluation.
2. Please produce and save the patient logs for the three patients you created in Chapter 3 (see pages 39-41 for detailed instructions).
3. Please produce and save work you created in Chapter 5 (see pages 65-66 for detailed instructions). Make sure you complete the Self-Assessment to make very certain your work is error-free before submitting. Your instructor will also be able to view your work online.
4. Please produce and save all three schedule prints (for your location, for Dr. Stimson, and for Dr. Carver) you created in Chapter 6. See pages 103-106 for detailed instructions.
5. Please produce and save the clinical notes for the two patients you registered in Chapter 7. See page 128 for detailed instructions.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

audio project

here is the project, for jack jones only

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.


Buy Custom Nursing Papers