Week 7 – Assignment: Reflecting on Multicultural Education

Instructions
Your written reflection for this class will be a critical reflection on how and what you will take with you, in terms of multicultural education, when you leave this class.

The first part of your paper will include your Multicultural Education Plan of Action (answer the questions below).
The second part of your paper will include your personal considerations of the possibilities and challenges of multicultural education.
Reflect on your burning questions, your course work, the class discussions and activities and the readings particularly from Affirming Diversity. Write a letter to yourself that reflects your hopes and dreams for your future as a multicultural person/educational leader. Use your plan of action to assist you in writing your personal (narrative) letter. (Keep a copy of this letter and Plan of Action. My hope is that you will refer back to your thoughts and add to it over time! Think of it as a gift to yourself rather than an assignment.)

Multicultural Education Plan of Action:

What was something that surprised you about multicultural education?
What new insights have you had as a result of this class?
What has challenged you?
What will you take with you into your classroom or school as an educational leader?
What are your hopes for becoming a multicultural person and educational leader?
What are your fears of becoming a multicultural person and educational leader?
Now that you know what you know, what are you going to do about it?
The last section of your paper should include your personal reflections related to multicultural education.

Length: 5-7 pages with a minimum of 3 scholarly resources.
References: A minimum of five scholarly resources required

RESOURCES:

Nieto and Bode charge us with the responsibility of becoming a multicultural teacher, which means first becoming a multicultural person. There are three ways that we can re-educate ourselves to become a multicultural person.

We simply need to learn more.
We need to confront our own racism and biases
Becoming a multicultural person means learning to see reality from a variety of perspectives.

How do you personally define a multicultural person? How has your definition evolved through your years of educational practice? What has influenced you and shaped your personal definition?

Office Supply Store Data Analysis

An office supply store tests a telemarketing campaign to its existing business customers. The company targeted approximately 16,000 customers for the campaign. Assume you are a consultant brought on board to help the company leverage and use the findings from the tests to its advantage. Refer to the accompanying spreadsheet, which contain the results of the tests.
The detailed requirements and expected deliverables are mentioned in Capstone Assignment.docx.
Three sample presentations are attached for reference. Data to be used are in excel file.

Mobile System Security and the Home Front

READING MATERIAL

Joseph Migga Kizza, Guide to Computer Network Security (4th Edition):
    o  Chapter 23: Mobile Systems and Corresponding Security Issues
    o  Chapter 24: Conquering the Last Frontier: The Home Front

ARTICLE

Android Security Concerns That Scare IT
https://www.informationweek.com/mobile/8-android-security-concerns-that-should-scare-it/d/d-id/1319412?image_number=8

ASSIGNMENT 1 – Enterprise Mobile Security Policy(1 – page)

Use this weeks reading material and article along with the Web, to find an organizations security policy for its mobile devices. Suggest what you might change in the policy to enhance security.

ASSIGNMENT 2 – Home LAN Security (1 – page)

Using this weeks reading material. In your experience at home, school, or work, what types of weak security practices have you seen on networks?

ASSIGNMENT 3 – Cumulative Essay Questions (3 – pages)

In a typed, double-spaced document. Each answer should be preceded by its corresponding question and number. Answers should be about 2 to 3 paragraphs long. APA formatting will NOT apply but be sure to spell-check before submitting your work. Each submitted answer will be worth 20 points.

The focus of this exam is on the content and thought in your answers. You may use the book or outside sources as PART of your answer, but the expectation is for you to cite your sources, while also including your own thoughts and ideas. I’m looking for your critical thinking skills as they emerge from what you’ve read and contemplated.

QUESTIONS (Choose 5 questions):

1.    A colleague asks for your assistance to further secure a department wireless network. Which of the following wireless security measures would you configure (WPA2-Enterprise, WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise) and why? Describe in detail the security configuration settings you would use. Also describe why you did NOT choose the others.

2.    You have recently become the system administrator of a new database server. The requirements for the server are as follows: 7 x 24 operational access, an annual 99.99% system uptime, and data not being at risk of being viewed by unauthorized individuals. Describe in detail which of the following security design goals ensure these requirements are met: confidentiality, integrity, availability, accountability?

3.    If you are an enterprise security director, how would you go about choosing security best practices? How might any of the standards you wrote about in Week 1’s paper specifically help in this area? Is it good security policy to always use a best practice? What are the advantages (or disadvantages) of using a best practice?

4.    The rapid growth of the Internet is a contributing factor to the security threat of cyberspace. Discuss other contributing factors to the overall security threat of cyberspace.

5.    Your organization has just recovered from an intrusion, and as a proactive measure your CISO has mandated all vulnerabilities be located and remediated in the network. Describe in detail how you would go about doing this, ie, software, procedures, policies? Is it even possible?

6.    Your enterprise security director has recently mandated two-factor authentication for your critical network systems. Describe in detail all the factors of authentication and how you would implement a two-factor system. What factors would you choose? What do you think about the privacy (personal intrusiveness) implications of some authentication factors?

7.      You have been tasked with evaluating firewalls in order to upgrade the platform currently in place. What types of features and services would you consider necessary to maximally reduce the likelihood of intrusions into your network while also managing outbound traffic from users on your network?

8.    Virtualization and cloud computing are rapidly expanding into the enterprise as viable solutions. Discuss the connections between these two technologies and the security implications of a virtual network infrastructure in the cloud vs. a physical network infrastructure onsite.

‘Ogilvy on Advertising’ Book Report

Please include written discussion on the following elements in your book reports/papers.

1. Please briefly mention the overall premise of the book, why it was written, and to whom it was written – This should take about 250-275 words

2. Introduction of the author(s). This is a synopsis of his/her current career status and what made them attain enough notoriety to have written a book about their area of expertise. This should take about – 250-275 words

3.
Please summarize each chapter of the book, then make commentary on how applicable that chapter’s message is to a particular audience, consumer or reader. Each chapter should be at least 50 words,( 20 chapters total would be 1100 words at least)

4. A brief summary of what have others, (i. e, reviews, critics) have said about the book? You must include at least two professional reviews. These cannot include iAmazon, Goodreads, etc, reviews. These are to be advertising, marketing or journalistic critics, such as business magazines and blogs

5. Summarize the premise of the book in some form of conclusion. Include a brief summary of your personal conclusions or beliefs concerning the book and its purpose and applications to your future careers. Also, include A brief discussion of the value of the book to the communication practitioner? Make a recommendation to others who may want to read this book.
This should be about 250-275 words or so

The part 3 summary would be 1100words, and 4 other parts should be at least 250 words, not including references

you can access the book here: http://sendanywhe.re/2541YQUG

The book is your only source, please do not use any other sources, make sure to read the book briefly for each chapter summary, please do not plagiarise.