Designing Compliance Within the LAN-to-WAN Domain (3)

Assignment 4: Designing Compliance Within the LAN-to-WAN Domain

Due Week 8 and worth 70 points

Imagine you are an Information Systems Security Officer for a medium-sized technology firm that has two (2) sites (one located in Virginia, and the second in California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

  • Protecting data privacy across the WAN
  • Filtering undesirable network traffic from the Internet
  • Filtering traffic to the Internet that does not adhere to the organizational AUP for the Web
  • Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
  • Having an area designed to trap attackers in order to monitor attacker activities
  • Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • Hiding internal IP addresses
  • Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a four to six (4-6) page paper in which you:

  1. Suggest a solution for the provided scenario that will:
    1. filter undesirable network traffic from the Internet
    2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
    3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
    4. allow for an area designed to trap attackers in order to monitor attacker activities
    5. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
    6. hide internal IP addresses

Note: The graphically depicted solution is not included in the required page length.

  1. Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.
  2. Examine and describe how your solution will protect the privacy of data transmitted across the WAN and why this solution would be effective.
  3. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
  4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Analyze information security systems compliance requirements within the Workstation and LAN Domains.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Designing Compliance Within the LAN-to-WAN Domain (3) appeared first on My Nursing Experts.

What Exceptions To Privilege Or Confidentiality Do You Have In The Jurisdiction Where You Live?

What exceptions to privilege or confidentiality do you have in the jurisdiction where you live?
I live in Smyrna (Cobb County) Georgia. United States of America
Confidentiality
Purpose
A hallmark of psychological practice is the privacy and confidentiality that psychologists must observe to protect the well-being of their clients. This session will focus on the intricacies of maintaining confidentiality and when it is required by law to be disclosed.
Objectives
1. Define confidentiality and its limitations and exceptions.2. Examine situations where there may be a duty to warn or protect third parties.
3. Introduction to HIPAA
In most situations the law recognizes the psychologist(therapist)/patient relationship. There are exceptions. All states now have rules for reporting child abuse, most have rules for reporting elder abuse. The “Duty to Warn” (from Tarasoff) is often written into the practice act or rules of state psychology licensing boards but not in all jurisdictions. Indeed, there is no duty to warn in some jurisdictions. This is complicated, because if you follow the law a person could be harmed due to your lack of action. While there is no affirmative (must do) requirement to intervene in threat to others, you can assume that you will be found negligent if your patient is actively suicidal and you do nothing.Privilege relates to the legal protection from being forced to break the expectation of confidentiality. Parents are the holder of privilege for minor children but many jurisdictions allow exceptions for some types of confidences.Remember, like the attorney or priest, the confidentiality between psychologist and client is “sacred.” It is protected by law and tradition. However, unfortunately, some state laws increasingly infringe on that indispensable element. Thus, psychologists face increasing conflict among their professional ethics, their concern for clients, and their legal obligations.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Benchmark – analyzing cognitive and educational evaluation | Education

  

The cognitive and educational evaluation is a main data source for MET teams to determine eligibility and placement for special education services. All team members must make decisions and advocate for educational instruction, strategies, and placement based on evaluation report results. Collaboration with parents about sharing evaluation results and seeking consent for special education services is also a required professional and legal element. Teachers should gain valuable skills and knowledge regarding analysis, decision-making, and sharing results that pertain to cognitive and educational evaluations.

Part 1: Formal and Informal Assessment

Read the “Analyzing Cognitive and Educational Evaluation Report” provided for student Adam Gallery. Based on the report, create a table with a column for each formal and informal assessment. Complete the table with the following information, labeling each column and row:

1. In the first row, clearly identify each assessment.

2. In the second row, describe how each assessment is technically sound and minimizes rater bias

3. In the next row, provide a summary of Adam’s results on each assessment that will help guide appropriate educational decisions. (Do not simply cut and paste the findings.)

4. In the last row, explain why the selected assessment tool is appropriate for diagnosing Adam’s strengths and needs.

Beneath the table, in a 500-750 word analysis, advocate for the appropriate educational decisions for this student based on the assessment results. The analysis should include:

Recommendations for any needed classroom accommodations or modifications, and placement for specific content areas.

Appropriate accommodations for Adam’s assessments or testing conditions, including the use of technology for these accommodations.

Reflection on the role of special education teachers as advocates for students to help students realize and develop their unique talents and skills.

Part 2: Parent Script

Using the “Analyzing Cognitive and Educational Evaluation Report,” compose a 250-500 word script seeking consent for special education services from Adam’s parents. Your script should include a hypothetical conversation (e.g., provide the actual verbiage/wording that would be exchanged) with the parents where results of the MET report are appropriately relayed and specific wording seeking consent for services is included.

Support your findings by citing the “Analyzing Cognitive and Educational Evaluation Report” where appropriate.

While APA format is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

This benchmark assignment assesses the following programmatic competencies [and professional standards]:

MED in Special Education 

COE 4.1 

Select and use technically sound formal and informal assessments that minimize bias. [CEC 4.1, ICSI.4.K1, ICSI.4.K2, ICSI.4.K4. ICSI.4.S1, ICSI.4.S5, ICSI.4.S2, ICSI.4.S8, IGC.4.K1, IGC.4.K3, IGC.4.S1, IGC.4.S2, IGC.4.S3, IGC.4.S4; InTASC 6(a), 6(b), 6(h), 6(j), 6(k); GCU Mission Critical 2, 3, 5]

COE 4.2: 

Use knowledge of measurement principles and practices to interpret assessment results and guide educational decisions for individuals with disabilities. [CEC 4.2, ICSI.4.K1, ICSI.4.K2, ICSI.4.K3, ICSI.4.K4, ICSI.4.S1, ICSI.4.S5, ICSI.4.S6, ICSI.4.S8, IGC.4.K1; InTASC 6(c), 6(k), 7(l), 7(q); GCU Mission Critical 2,5]

COE 4.3: 

In collaboration with colleagues and families, use multiple types of assessment information in making decisions about individuals with disabilities. [CEC 4.3, ICSI.4.K1, ICSI.4.K2, ICSI.4.S4, ICSI.4.S1, ICSI.4.S6, ICSI.6.K4, ICSI.7.K2, ICSI.7.K3, ICSI.7.K4, ICSI.7.S2, ICSI.7.S3, ICSI.7.S4, ICSI.7.S5, ICSI.7.S3, ICSI.7.S10, IGC.4.K1, IGC.4.K2, IGC.4.K3, IGC.7.K2, IGC.7.S2; InTASC 6(g), 6(i), 6(o), 6(t), 6(v), 9(c), 9(l) 10(a); GCU Mission Critical 1, 2, 3, 4, 5]

COE 4.5: 

Prepare all students for the demands of particular assessment formats and make appropriate accommodations in assessments or testing conditions for students with disabilities. [CEC 4.1, ICSI.4.K4, ICSI.4.S2, ICSI.4.S3, ICSI.4.S4, IGC.4.S3; InTASC 6(e), 6(h), 6(p), 6(u); ISTE-T 2d, 4b; GCU Mission Critical 2, 4, 5]

COE 6.5: 

Advance the profession by engaging in activities such as advocacy and mentoring. [CEC 6.5, ICSI.6.K2, IGC.6.K4, ICSI.6.K6, ICSI.6.S1, ICSI.6.S2, ICSI.6.S4, ICSI.6.S5, ICSI.6.S6, IGC.6.K5, IGC.6.S2; InTASC 10(j); GCU Mission Critical 1, 3, 4]

Topic 3 Dq2

dentify any unusual environmental problems (for example: heavy metals due to mining, water pollution due to farming or industry) in your neighborhood and research possible health effects of potential environmental hazards in the area. Who is at risk, what is the environmental hazard, where does this hazard come from and what health problems caused by the pollutant? Before you get started, review the terminology.

Terms:

Environmental Hazard: Something (chemical, physical or microbiological) with the potential to cause harm; however, it does not always put you at risk.

Risk: The combination of the probability or frequency, of occurrence of the identified hazard and the magnitude of the consequences of the occurrence.

Risk assessment: Risk assessment is the process of estimating the potential impact of a chemical, physical, or microbiological hazard on a specified human population or ecological system under a specific set of conditions and for a certain time frame.