Synthesize a review of the most salient literature related to the proposed research need/topic.
Write a 4,000-word paper that includes the following sections:
1) Substantive and compelling articulation of the current HRD theory/practice problem, related need for further research, and related Christian worldview implications/drivers.
2) Literature Review: Synthesize a review of the most salient literature related to the proposed research need/topic.
3) Proposed Research Methodology: Delineate a methodologically and theoretically sound approach for investigating the proposed research need/topic.
4) Envisioned HRD Theory/Practice Contribution: Provide a compelling, yet appropriately realistic, articulation of the envisioned impact that the proposed research project output will have on the evolving state of HRD theory/practice.
5) Envisioned Impact on God’s World: Provide a compelling, yet appropriately realistic, articulation of the envisioned redemptive impact that the proposed research project output will have on the unfolding nature of God’s world.
Describe the culture of your organizational behavior issues and what challenges are present.
You are to write a six to eight (6–8) page paper that answers the following: During the 1970s, the U.S. Air Force Program for Integrated Computer-Aided Manufacturing (ICAM) sought to increase manufacturing productivity through systematic application of computer technology. As companies, systems products and markets become even more complex we will need even more complex modeling to guide and help us make decisions.
- Describe the culture of your organizational behavior issues and what challenges are present.
- Discuss the systems that are the most appropriate to introduce into your organization.
- Analyze a few of the systems that can have the greatest impact on your organization.
The format of the report is to be as follows:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
take an in-depth look at the YARA framework in order to understand how to create a quality signature that can be used to detect malicious files
take an in-depth look at the YARA framework in order to understand how to create a quality signature that can be used to detect malicious files associated with an alleged Iranian threat group known as “Leafminer.”
More information on YARA can be found via the following webpage: https://blog.malwarebytes.com/security-world/technology/2017/09/explained-yara-rules/
Requirements:
1) In 1-2 paragraphs, please describe what the YARA framework is and why it has been widely adopted by cyber threat intelligence analysts in order to identify malware associated with bad actors. 150 words
2) In 1-2 paragraphs, please provide a brief overview of the Leafminer threat group based upon information contained in the following article: https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east 150 words
3) Using VirusTotal, please search for the following file hash: 1232366c104bdb6e42b04adb7eff4e08
- Please analyze this sample (using both VT and the metadata in the attached text file) and write a YARA signature that contains unique strings that is likely to produce true positive results for threat hunting activities
- Here’s an example of a rule template you can use when writing your rule:
- rule Leafminer { strings: $s1 = “Sorgu.exe” wide ascii $s2 = “https://iqhost.us:3389/” wide ascii condition: any of them }
You are encouraged to perform additional open source research on the topics of YARA and Leafminer as necessary to support your submission. Please provide a list of all external sources (URLs are sufficient) on the last page of your report.
There is no shortage of comparisons between the United States and other countries healthcare systems.
There is no shortage of comparisons between the United States and other countries healthcare systems. Other nations have developed approaches to healthcare by developing policies that are fundamentally different to the United States, but there are times when there are similarities.
For this module’s discussion, please choose a country other than the United States to discuss.
For the initial post:
·Include at least three of the following information categories that can influence healthcare policy:
-The country’s Gross Domestic Product (GDP);
-The percentage of the GDP spent on healthcare;
-Ratio of physicians to general population;
-Ratio of available hospital beds to the general population; and,
-The final legislative approval required for a policy to be passed.
·Why are these three (3) categories important to the discussion, in your view?
·What do these statistics likely tell us about the country, in terms of healthcare initiatives, problems, and proposed policies?
·Do you see this country’s healthcare approach and policies applicable to the US? Why or why not? Please discuss and support your position using scholarly resources.
How can you support your project plan with credible, current, reliable, accurate, and relevant information?
write one or two sentences per bullet point (there are additional questions and points to help you flesh our your ideas):
- Topic: Abuse of police power
- Choose a topic that is realistic and one that you want to learn more about.
- The topic might be a career field you want to go into or something else that deeply interests you.
- Scope and value:
- What is the scope of the topic and your research?
- What value does it bring to your life? To your professional life?
- Communication medium:
- How are you going to communicate your project?
- How will you make your presentation different and unique?
- Critical thinking questions:
- Pose different questions that will help you with your research and investigate your topic in more depth.
- Post critical questions that will push you to improve.
- Subtopics (optional).
- Brainstorming (optional).
Part II:
Part II is a reflective paragraph that represents your critical thinking process when thinking about possible sources and your research. You are NOT looking for specific sources now. Consider the best possible sources as presented in the week 2 Lesson. What type of sources will work best for your research? How can you support your project plan with credible, current, reliable, accurate, and relevant information?
Use a SMART to show how it could help them decide on where to locate their temporary headquarters during the Games.
A multinational clothing company is considering sponsoring a national sports team in the forthcoming World Cup in Qatar.
INSTRUCTIONS
Use a SMART to show how it could help them decide on where to locate their temporary headquarters during the Games.
Use a Decision Matrix so show how it could help them choose which national team to sponsor
Use a Decision Tree to show how it could improve on the Decision Matrix in helping them choose a national team to sponsor
Use a Sensitivity Analysis to show how it could help analyse the risk of the choice made by the Decision Tree.
Along with each of the frameworks with the appropriate calculations, provide a question by question explanation of the steps taken and the conclusion reached
System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.
System architecture is the descriptive representation of the system’s component functions and the communication flows between those components. This definition immediately raises some important questions:
- What are “components”?
- Which functions are relevant?
- What is a communication flow?
Answer the questions with an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 500 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required. A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.
Review The Power of Good Design
Review The Power of Good Design and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem. Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location.
Ensure there is data visualization in the homework and note how it relates to the three principles selected.
research and write a one-page report detailing a new technology that Walmart has recently implemented or is pioneering.
The Walmart sidebar introduced you to how information systems was used to make them the world’s leading retailer. Walmart has continued to innovate and is still looked to as a leader in the use of technology. Do some original research and write a one-page report detailing a new technology that Walmart has recently implemented or is pioneering.
Investigate findings on malware
Scenario
Your manager is particularly concerned about the malware you recently discovered on campus systems due to a large number of recent attacks. S/he has asked you to research the malware and/or Trojans found, their placement, and the data included with them, with the goal of understanding their capabilities and the risk they present.
Required Resources
- Access to the Internet
- Text sheet: Malware Infection Details (ts_malwaredetails)
- Text sheet: AVG Whole Computer Scan Results (ts_avgscan)
Tasks
Refer to the data generated by an AVG computer scan in the text sheet. Using what you have learned in class, research the items detected during the computer scan and write a report for Aim Higher College management. Include a non-technical overview of the problems identified by the scan for management review with recommendations on actions to be taken by the information technology (IT) staff, information security analysts, and end users. Explain the role of management, and what communications, technologies, and processes should be created, used, or reviewed.
Based on the AVG scan data, explain the likely target or intent of each type of detected malware, including its capabilities and uses, in your analysis. You will explain these in the context of the environment and the threat it poses. Finally, you will suggest detection methods and means of protection against the malware. Your report must have the following essential elements:
- Best security practices
- Awareness training
- Technical, administrative, and physical security controls
- Format: Microsoft Word (or compatible)
- Font: Arial, 10-point
- Line Spacing: Double
- Length: 1 to 2 pages