In this assessment, you will identify a security threat to a wireless network. You then identify which points of the network might be vulnerable and recommend policies, defenses, and practices to ensure network security.

Overview

In this assessment, you will identify a security threat to a wireless network. You then identify which points of the network might be vulnerable and recommend policies, defenses, and practices to ensure network security.

Preparation

Study the Network Diagram [PDF] and use it as a basis to complete this assessment.

Use the Assessment 2 Template [DOCX] to complete the assessment.

Instructions

Consider one of the computer or network threats that you have explored or are familiar with, and address the following in a Word document with respect to the network depicted in the diagram:

Briefly describe the threat, including its medium, delivery mechanism, type, typical targets, et cetera.

Describe where and how it is likely to breach the identified network. Consider importing the network diagram into Visio (or other appropriate tool) and marking the incursion points that you describe. You will need to do this to achieve the distinguished level for its associated criterion. Paste the updated diagram into your assessment document.

Describe a typical defense against this type of attack.

Conduct Internet research and identify an effective policy designed to prevent this type of attack. Make sure to properly cite your sources.

Briefly describe two practices that would effectively enforce or support that policy.

Additional Requirements

Composition: Make sure you work is organized and free from spelling and grammatical errors.

Font: Times New Roman, 12 point, double spaced.

Format and Style: Citations should use current APA style and formatting.

Length: Approximately three pages not including the diagram.

Competencies Measured

By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

Competency 1: Describe IT structure within a business environment.

Describe where and how a network is likely to be breached.

Competency 2: Apply basic IT principles.

Describe a typical defense against a specified type of attack.

Competency 3: Explain IT governance principles, standards, and practices.

Describe why a policy is an effective deterrent for preventing a specified network attack.

Competency 4: Apply critical thinking to solve problems.

Describe practices that would effectively enforce a security policy.

Competency 5: Apply information literacy skills.

Describe the characteristics of a specified network security threat.

Competency 6: Communicate effectively and professionally.

Provide a logical argument in support of conclusions or recommendations.

· Describe the spirit world and the relationship that different Native American groups have with gods, deities, or spirits.

1. Read Chps 2, 3 of your text. Then choose one of these points to examine, based on the text:

· Describe the spirit world and the relationship that different Native American groups have with gods, deities, or spirits.

· Explain the Native American connection to nature.

· Discuss Native American religious practices and the purpose of ritual in day-to-day life and practice.

· Describe death and life after death in Native American religious practice.

· Discuss Native American religions and religious practice in today’s world

· Identify the religions originating in Africa.

· Name the non-native African religions.

· Talk about African religions today.

___________________________________________

Respond to one of the points listed above in a 350 wd (min) response. To support your response you are required to provide at least one supporting reference with proper citation. More than one supporting reference will help your marking. Your response will be reviewed by Unicheck, the plagiarism tool synced to Canvas. Unicheck will submit a similarity report a few minutes after you post your assignment. If the similarity index is above 30%, please redo and resubmit your assignment after you cite the sources properly to avoid plagiarism. Please review the PowerPoint slides explaining how to avoid plagiarism and post your assignment accordingly. Even a single plagiarized statement will not be tolerated. APA writing format is recommended.

2. Video Week 2: Native American

The Sacred and Native American Religions

Case Study

Discussion Prompt

Mr. Smith is a 64 year old African American male. He was diagnosed with hypertension and hyperlipidemia 5 years ago and has not taken meds regularly for the last year. He states he has been experiencing chest pain when working around the house and sometimes while on his evening walk. He also complains that his feet are swelling in the evening. His vitals today: P-105, B/P-165/100, R-20. Wt-260 Ht-59  Labs: TC- 240, LDL- 145, HDL- 30, Trig-250. Sulfa allergy. You are assigned as his new PCP.

What medication recommendations will you make? Include the drug class, generic and trade name and starting dose range. Provide rationale for your choices.
Discuss any potential side effects and drug interactions for this patient.
What non-pharmacological interventions would you suggest?
What patient education would you provide?

Citations: At least two high-level scholarly references in APA from within the last 5 years

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.

Requirements:

1. The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction

ii. Literature review

iii. Program and technology recommendations

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 10 to a maximum of 15 pages in length (double-spaced), excluding the title page and references.

Milestones:

Week 3 – A one-page paper describing the industry chosen and potential resources to be used. See the individual assignment for more details.

Week 5 – Develop a full annotated outline of the paper including sections in which each resource will be used.

Week 7– Completed final research paper