It 380 final project | Accounting homework help




You are the training manager at CyberLeet Technologies, a midsized firm that provides cybersecurity services to other businesses. CyberLeet’s core customer base is sole proprietorships and other mom-and-pop shops that are too small to have their own IT departments and budgets. Generally speaking, your clients have a reasonably high risk tolerance, and put a premium on the functionality of their IT systems over stringent security measures. However, you also have clients that must protect highly sensitive information in order to continue operating successfully. For example, CyberLeet supports a few small public-accounting firms that need to maintain important tax-related information, as well as several day-care businesses that must keep children’s health records private while allowing necessary access for certain caregivers. In the past year, CyberLeet has experienced rapid growth, which means you can no longer personally provide one-on-one training to every new information security analyst as they are hired. Therefore, you have decided to create a training manual that will explain to the current and future cohorts of new hires the essential principles and practices that they must understand in order to be successful in their role as information security analysts at CyberLeet. 


Manual Layout


There are four sections in the manual, which cover all the components of a new employee training manual. As the training manager, you must complete each section using information you learned in this course. Refer to the background information on CyberLeet and apply the appropriate information that best matches based on the size of the company, the value of cybersecurity, and its core tenets. Apply best practices of cybersecurity principles for addressing the common threat scenarios of a sole proprietary business. The main sections of the manual you are responsible for completing are the following:


· Introduction


· Core tenets of cybersecurity


· Developing cybersecurity policies



· Threat mitigation scenarios


  1. Introduction: Welcome to CyberLeet 
    1. Explain the value of CyberLeet Technologies as a provider of cybersecurity services to its client businesses. Why is there demand for information 
      security in a business environment? How do cybersecurity issues impact business resources, including finances, people, and time? 
    2. Describe the overall role of the new hire as an information security analyst. What are the main functions of the job? What should be their 
      ultimate goal once they are assigned to clients? 
    3. Finally, explain the purpose for this manual. Why is it important that information security analysts apply the principles and practices outlined in 
      this manual? What is at stake if they do not appropriately apply their training and provide high-quality services to the client businesses? 
  2. Core Tenets of Cybersecurity 
    1. Explain the significance of confidentiality as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to 
      illustrate its meaning in a business context. 
    2. Explain the significance of integrity as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to illustrate 
      its meaning in a business context. 
    3. Explain the significance of availability as a core tenet of cybersecurity. Be sure to define the term and use specific details and examples to 
      illustrate its meaning in a business context. 
  3. How to Develop Cybersecurity Policies 
    1. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you 
      address confidentiality, integrity, and availability of information, as well as each of the following aspects: 
      1. Password length and composition of the password (e.g., uppercase, numbers, special characters) 
      2. Time period between resets and ability to reuse a prior password 
      3. Differentiated policies for different types of users (e.g., administrator vs. regular user) 
    2. What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information, as well as each of the following questions: 
      1. What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? 
      2. What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? 
      3. When and why should users be aware of acceptable use policies and how can organizations keep track of these policies? 
    3. What principles should the information security analyst apply in order to develop appropriate user training policies for the client? Make sure 
      you address confidentiality, integrity, and availability of information, as well as each of the following: 
      1. How to determine who would be trained 
      2. How to determine how often trainings would occur 
      3. How to determine whether certain staff receive additional training or whether they should be held to higher standards 
        D. What principles should the information security analyst apply in order to develop appropriate basic user policies for the client? Make sure you address confidentiality, integrity, and availability of information, as well as each of the following questions: 
        1. When and why should users have to display some type of identification while in the workplace? 
        2. What types of physical access (with or without ID) to company areas is acceptable? Why? 
        3. When and why should employees with identification be allowed access to all areas of the company? 
        4. When and why should employees be allowed to take work home or bring guests into the workplace? 
        5. IV. Threat Mitigation Scenarios: For each of the hypothetical scenarios listed below, illustrate for the new hires the strengths and weaknesses of the different approaches. This will help new hires gain a more practical understanding of how to deal with these types of issues that they are likely to face in their day-to-day job. 
        6. Theft: In the last month, two break-ins have occurred at a client’s office, which resulted in the theft of employee laptops during both incidents. The first incident occurred in the evening when the thieves broke through a ground-floor window. The second incident occurred during the day when the thieves walked right into the business area and removed two laptops. What physical and technical controls would be helpful to address the issue and prevent this type of vulnerability in the future? Compare and contrast the different methods that could be used to mitigate the given threat. 
        7. Malware: Recently, one of your client’s staff has been inundated with phishing emails that are targeted at individuals and related to current business opportunities for the company. These messages are linked to malware and sent by known threat actors. What physical and technical controls would be helpful to address the issue and prevent this type of vulnerability in the future? Compare and contrast the different methods that could be used to mitigate the given threat. 
        8. Your choice: Create your own illustrative scenario of a common threat that an information security analyst may face. Explain what physical and technical controls would be helpful to address your chosen issue and prevent that type of vulnerability in the future, and compare and contrast the different methods that could be used to mitigate the given threat. 

Integrative negotiation | Computer Science homework help

 Integrative Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 100 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSISUsing 100-150 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Research project research proposal | Applied Sciences homework help

Proposed Capstone Topic


Embry-Riddle Aeronautical University

Proposed Topic: Aviation safety data sharing.

What is the significance of your proposed topic? Shared aviation safety data can be aggregated and analyzed and the results used to enhance safety. In an effort to promote an open exchange of safety information to continuously improve aviation safety, the Federal Aviation Administration (FAA) and the aviation industry developed the Aviation Safety Information Analysis and Sharing (ASIAS)program. ASIAS has drawn together a wide variety of safety data and information sources across Government and industry, including voluntarily provided safety data. Confidentiality and non-punitive reporting are foundational values of ASIAS. Data is gathered from participants, then de-identified. This has encouraged participation in the program. Participants include Part 121 member air carriers, corporate/business operators, universities, manufacturers, and maintenance, repair, and overhaul organizations. In the example to follow aviation safety data sharing helped solve a problem; In the course of a routine inspection, Airline C discovered a cracked engine mounting bolt that could have led to an overstress of the engine mounting and an in-flight loss of the engine. A check of incident reports on a safety information sharing system in which the airline participated revealed that two other operators had experienced the same problem and had concluded that the procedure for engine removal and replacement had the potential to overstress the mounting bolt if the engine was misaligned during replacement. These airlines had devised and adopted a different procedure for engine removal and replacement that avoided the potential problem. Airline C then adopted the new procedure and notified other operators of the same equipment participating in the safety information sharing system of the potential problem. 

What are you trying to do with the capstone? Knowing the importance and benefits of sharing aviation safety data helps promote and encourage data sharing to improve safety and mitigate risks in aviation. The benefits derived from sharing safety information depend on the nature of the information that is shared. To be useful, it is necessary for an airline or participant to be able to tell whether the circumstances that generated the information being shared are relevant to its operations. If data shared is useful and relevant it can be used for proactive safety measures to prevent similar occurrences. 

Are the resources available to do a substantial literature review? Do I need special permission to use these resources? There are enough resources are available from the FAA, IATA, Flight Safety to mention but a few and I do not need special permission to use them.


Null hypothesis: Safety data sharing has not benefited aviation safety

Alternative hypothesis: Safety data sharing has benefited aviation safety


(2021). Retrieved 21 January 2021, from (2021). Retrieved 21 January 2021, from

Sharing Aviation Safety Data Is a Good Thing: NBAA – National Business Aviation Association. (2017, June 5).


How can this benefit third world countries like Uganda?

Attached is a template for the proposal for specialization outcome refer to Aviation Aerospace Operations and Aviation Aerospace Safety Systems 

Research article bonus | Nursing homework help

please read Chapter 4 & 5 of the book. 

Chapter 4: Quantitative and Qualitative and  

Chapter 5: Experimental Research Design

 Ruth M. Tappen. (2015). Nursing Research. Advanced Nursing Research: From Theory to Practice. (2nd ed.). ISBN-13: 9781284048308. ISBN-10: 1284048306. Publisher: Jones & Bartlett Learning

Please Upload a Research Article – Article Bonus

Upload a research article, please identify if the article is quantitative or qualitative (See below).

 I am requesting to locate a scholarly article based on one of the following topics:

  • Quantitative Research
  • Qualitative Research
  • Research Design
  • Literature Review

Upload the article and briefly inform the Class what the article is about. 

I’m asking for 300 words. APA 7th ed. Plagiarism free. please upload the article attached. due date: January 27, @10 :00am

Journal entry (reflection) | Management homework help


Journal Entry (week 3)


Please submit your journal entry or short essay for this week here. 

You should include your thoughts and reflections on this week’s assigned readings, lectures, additional material, personal experiences, ideas regarding your final project, and concerns.

Please do not exceed 200 words.

This assignment is graded based on effort. If sufficient effort to reflect on this week’s material is detected, you will receive full credit.

I uploaded a lecture slide I learned this week and a comment on a journal entry 2 from the professor.  

Introduction to performance management systems (one page)


As we have explored, throughout Module 1, performance management systems are critical to individual and organizational success. Consider the scenario below and respond to the three questions asked.


You are the new owner of a small business. About one week ago, you purchased this business from the previous owner who decided to retire. The previous owner was a phenomenal businesswoman; however, she did not value the importance of performance management systems. When you decided to purchase the business, you knew that you would need to make organizational changes. Based upon the information provided, answer the following questions:

  1. In your own words, explain the benefits of a performance management system in terms of employee and organizational success.
  2. Explain the implications associated with poorly implemented performance management systems.
  3. Address components that you believe your performance management system should include.

Embed course material concepts, principles, and theories (require supporting citations) in your initial response along with at least one scholarly, peer-reviewed journal article.. Use APA style guidelines. 

Be sure to support your statements with logic and argument, citing all sources referenced. Post your initial response early and check back often to continue the discussion.

You are required to reply to at least two peer discussion question post answers to this weekly discussion question. These peer replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.



Chapter 1 in Performance Management

Khan, M. (2018). Working toward Vision 2030: Key employment considerations in Saudi Arabia.

Machela, T., Kunene, L. M., ∓ Mbhele, T. P. (2019). Challenges of management performance in managing a professional team: A case of X. African Journal of Business ∓ Economic Research, 14(4), 81-103. /p>

Radu-Alexandru, S., ∓ Mihaela, H. (2019). . Studies in Business ∓ Economics, 14(1), 231-244.

Chapter 1 PowerPoint slidesPerformance Management

ADAA: The National Center for Performance Measurement (2019). Performance measurement operations.

Evidence | Criminal homework help

When preparing for a crime scene reconstruction consideration must be made concerning the types of evidence you are using to come to the conclusion that you are basing the reconstruction on. Real evidence for physical evidence is the best source of producing a reconstruction. The relevance of the physical evidence must be established. For example, it a shooting reconstruction was done based on a ricochet off a wall that struck the victim the angle of impact from the wall where the bullet initially impacted and struck the victim will allow you to determine the line where the shooter stood when he or she fired and hit the wall. The problem is if the line is unobstructed evidence must be located that helps establish where the shoot was when he or she fired.  On that line stemming from the wall a cartridge casing will be significant. Shoe impression along the line may be from the shooter or it may be anyone who happened to walk there before or after the shooting took place. So the cartridge casing is likely to be ejected from the shooters weapon and give the reconstruction team an idea of where the shooter was when he or she fired. The footwear impression may or may not be that of the shooter so it is circumstantial even though it is a physical artifact and should be collected.

Crime scene reconstruction can be done by setting the scene up with personnel playing the roles of suspect, victim, and witnesses.  It can also be done by placing crime scene dummies in locations for the same people.  The more modern method is using a LASER scanner that videos, charts, and measures the entire scene and be used to reconstruct the scene in a white room. 

Scenario: Tim and Rhonda just got engaged. They are having a small gathering to celebrate at a local restaurant called the Dew Drop Inn. Rhonda had finally gotten her divorce from James who had been very abusive both physically and emotionally. They have no children. Dinner was finishing up about 8:00 PM and the party was moving into the bar. Out of the blue, James showed up at the restaurant bar and accused Tim of being the reason that Rhonda divorced him (James).

A fist fight broke out when James tried to grab Rhonda and Tim interceded. James grabbed a beer bottle and smashed Tim in the head. Tim pulled out a compact pistol and placed it directly against James’ chest and shot James dead with a single bullet through the heart. Tim grabbed Rhonda and ran from the restaurant, where they jumped into his 2014 Red Honda Civic and drove to Rhonda’s apartment where they both lived. 

The police went to the apartment where Rhonda and Tim lived and noted the Red Honda Civic was parked in front of the apartment. A search warrant for seizing the car and searching Rhonda and Tim’s apartment was obtained. James was found to be out on parole for a burglary in which he had served two years in prison. Rhonda was home but Tim was not. Rhonda told the police that she had been receiving threatening emails form James, her ex-husband who was threatening to kill her, Tim, and then himself. She had saved the emails on her Tablet.  The search revealed a men’s white dress shirt in the hamper covered with what appeared to be high velocity blood spatter consistent with gunshot blowback.  A box of 9mm cartridges with ten rounds missing was found in the dresser of the night stand. An empty pistol box for a 9mm Glock model 26 compact pistol was found next to the ammunition.  

Research the following points, and write a 4–6-page paper fully explaining each point:

  • Define physical evidence
  • You may use a number of resources to research the methods and significance of evidence in this scenario.  Consider using articles form juried forensic publications, information from the AIU library, or textbooks from this or other classes you might have had.  Identify the evidence you found and what evidence might still be available. Include proper handling and packaging techniques for your evidence. 
  • Explain the importance of expert testimony and the report writing that would be involved. 
  • Explain the role the forensic scientist in the laboratory will have with your submitted evidence, and explain the techniques the forensic scientist will use to process your evidence.

What does grey’s anatomy think | HCA


Please watch the video clip below.

Let me know your thoughts on the cultural competency and ethics of each provider related to the religious decision impacting the patient’s physical care. PLEASE NOTE: DO NOT DEBATE THE ASPECT OF THE RELIGIOUS DECISION, simply how each doctor handled the situation.

For example:

  1. What ethical considerations are taken an your organization for cases of this nature?
  2. What measures do you have in place to prevent the “near miss”, (almost providing the blood products) both the accidental “near miss” at the beginning of the video, and the intentional “near miss” toward the end of the video.

Week 7 discussion questions | Education homework help


I need you to answer both questions- SEPERATELY 


make sure you READ the question and answer correctly! the professor is very very particular. 



Topic 7 DQ 1

Music artists utilize language that degrades or puts down various groups in our society including women. Think about a current, popular song. What do the lyrics say about relationships, gender identities, love, and intimacy? Do you agree that the use of derogatory lyrics is free speech? Does the song use qualitative, textual, or rhetorical methods to portray their thoughts of various groups in society? Be sure to support your response with scholarly sources. 


Topic 7 DQ 2

Much research suggests that young people are utilizing racially derogatory language in social media without understanding the historical use of such language. Explain whether or not you feel music and new media contribute to this trend. How would you remedy this problem? Or is it not a problem?