Conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization’s systems.

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization’s operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system’s and organization’s IT resources.
For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization’s systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.
The following are the  project deliverables:

Update the Operating Systems Security Policies document title page with a new date and project name.
Update the previously completed sections based on the instructor’s feedback.
New Content: Security Threat Detection

Security Tool Analysis

Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization’s systems.
Include the types of threats that the tools identify.
Discuss the total threat coverage for the operating systems provided by these tools.
Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

Built-in Security Analysis

Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).
Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

Be sure to update your table of contents before submission.

Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization’s systems.

One of the first tasks in the development of operating system security policies is to identify the tools that can be used for the detection and prevention of security threats to the organization’s operating systems. The operating systems form the core of the system operations, and security violations at the operating system-level could compromise every aspect of the system’s and organization’s IT resources.
For this assignment, you will conduct an analysis and selection of tools that would be appropriate for the detection of operating system security threats in the organization’s systems. You will also summarize the strengths and weaknesses of the built-in security of each of the 3 OS categories (UNIX, open source, and Windows) so that you will be able to determine which areas may need additional security support from other tools.
The following are the  project deliverables:

Update the Operating Systems Security Policies document title page with a new date and project name.
Update the previously completed sections based on the instructor’s feedback.
New Content: Security Threat Detection

Security Tool Analysis

Review and identify at least 3 tools that would be effectively used in the detection and prevention of operating system security threats in the organization’s systems.
Include the types of threats that the tools identify.
Discuss the total threat coverage for the operating systems provided by these tools.
Given that implementation of security tools requires significant investment, management will likely be reluctant to approve them unless the investment can be justified. As part of your analysis, describe why these tools are necessary for the company and how the investment can be justified to management.

Built-in Security Analysis

Summarize the strengths and weaknesses of the built-in security of each of the 3 major OS categories (UNIX, open source, and Windows).
Discuss how the weaknesses can be strengthened using the tools identified in the Security Tool Analysis section.

Be sure to update your table of contents before submission.

Why must learning to celebrate diversity be a part of every early childhood curriculum and program?

Chd 222
Read Chapter 6 and answer the following questions:
1.  Define culture.
2.  List the nine (9) manifestations or evidence of a culture (see Table 6.1).
3.  Define each approach:  Contributions Approach; Additive Approach; Transformation Approach; Social Action Approach.
4.  List three (3) things a teacher must understand in order to incorporate respect for individuals. 
5.  Pick one of the six (6) questions about examining your own attitude and values toward people of different classes.  Tell how you personally are addressing that question as you encounter people of different cultures.
6.  Why must learning to celebrate diversity be a part of every early childhood curriculum and program?
7.  List five (5) principles you should understand in order to teach children to celebrate diversity.
8.  Explain each term:  Interconnectedness and interdependency; Multiculturalism; conflict resolution.
9.  What are values?
10.  List and explain the three (3) ways children learn values.
11.  Explain indoctrination.  Why does this method not work?
12.  List three (3) ways teachers can plan for children to explore their own feelings, reactions and values within a safe and secure environment.
13.  List the six (6) steps in value analysis.
14.  Why is teaching values controversial?
15.  How might you encourage anti-bias values in the classroom?
16.  List four (4) suggestions for play props and materials that encourage anti-bias values in the classroom.
17.  List three (3) suggestions for immediately addressing prejudice and discrimination in the classroom.
18.  List three (3) instructional strategies that support the creation of an anti-bias learning environment.
19.  List six (6) suggestions for deciding whether to ban war toys from the classroom.
20.  List three (3) strategies that can help uncover children’s ideas about war and peace.

What dietary changes would you recommend for Harold? Would you recommend any specific diet plans? Why or why not?

Question 1: Using the Case: 8-2– Acting on Questionable Practice 

Does the Code of ethics for nurses with interpretive statements provide guidance for this situation? Explain?

** View Video & Answer Question 2 **

https://www.youtube.com/watch?v=eDm9hEOn8zcQuestion

Question 2: Discuss the role insulin and glucagon play in blood sugar regulation?

** Read Below & Answer Question 3**

Question 3: This week pick a scenario or situation that illustrates either a sympathetic or parasympathetic response. Explain what happens to the body during this situation and how the body will respond to return to homeostasis.
 
** Read Below & Answer Question 4**

Question 4: In an effort to treat diseases through diet therapy, various groups get together to release evidence-based therapeutic diets. Many of these diets come from the Academy of Nutrition and Dietetics or the NIH. Two diets that are commonly implemented to combat diseases are the DASH and TLC diets. The DASH is the Dietary Approaches to Stop Hypertension, which addresses high blood pressure, and the Therapeutic Lifestyle Changes, or “TLC” diet, addresses high cholesterol.

Take a look at your own diet and see how you match up to one of these two diet plans. Track your diet for a day. What goals are you already meeting? Which ones are challenging for you? How do you think others would do in following these diets and what are some tools that might help them?

** Read Mini Case Study & Answer Question 5**

                                         Mini Case Study #3: Harold’s Heartache

Harold is 46 and recently divorced. Since he and his wife separated, he noticed that he has been eating a lot of premade processed foods and putting on some extra pounds, and his weight has climbed from 185 to 205 lbs (height is 5’11”) within the past 9 months. He’s been stressed with the divorce settlement and has started smoking again. Both of Harold’s parents had heart disease and he’s been on hypertension medications for 5 years. When he went to see his doctor, his blood pressure was143/85 mmHg and a lipid panel revealed that his total cholesterol is 260 mg/dL with an LDL level of 167 mg/dL and an HDL level of 35 mg/dL. He shared with his doctor that he used to exercise regularly, but had been physically inactive for over 6 months. When asked if he would like to start exercising again, Harold responded, “I definitely know I should, and I remember it used to make me feel so good! I was thinking of buying a new bike!” 

What factors put Harold at risk for heart disease? Discuss which are modifiable and which are not.

What is Harold’s risk of developing heart disease? Please show your work for any calculations.

Discuss Harold’s cholesterol levels and ratio and compare them to recommendations.

What dietary changes would you recommend for Harold? Would you recommend any specific diet plans? Why or why not?

How would you assess Harold’s readiness to change, and what might be some meaningful goals for him to work towards?