What would you do in this scenario? Take on the burden of keeping Freeman alive for a year as the ultimate Good Samaritan? If so, why?

Think about the following scenario and reply to the questions below. In replying, do your best to be as honest as possible when stating your reasons.

Imagine one day you hear a knock on your door. You open the door and there stands Morgan Freeman with two doctors. Freeman appears very ill and the doctors explain why they are there: as it turns out, Freeman lives down the street from you (who knew!) and has a rare life-threating illness. He needs an immediate plasma transfusion and will need the same donor to donate their plasma to him for the next year in order to stay alive and eventually recover. The doctors tell you that plasma transfusions can be extremely painful and will leave the plasma donor bed ridden for several days after each plasma donation. After asking you a few simple questions, the doctors determine that you are an exact match and are ready to perform the first of many transfusions right then and there. If you decline, Freeman will die within an hour.

 

What would you do in this scenario? Take on the burden of keeping Freeman alive for a year as the ultimate Good Samaritan? If so, why? Or decline and not take on the burden? If so, why? If you decline to help Freeman, do you think you would be killing him or merely letting him die?

Create a pamphlet using any type of publisher software you choose to educate clients on a current patient safety issue.

 

Create a pamphlet using any type of publisher software you choose to educate clients on a current patient safety issue. Make brochure!! With pictures

For example:

 

If you have a question about a specific topic, check with your instructor. It is recommended that you save your pamphlet as a PDF for submission.

 

Your pamphlet must include the following items

Describe how this technology can allow for collaboration with the various stakeholders impacted by the JPB Train Derailment Scenario.

Instructions:

 

• Familiarize yourself with the JPB Train Derailment Scenario.

 

• Analyze the provided Incident Radio Communications Plan ICS-205.

 

• Research and report on currently available Interoperable Communications

 

technology.

 

o Explain how this technology can be applied to

 

optimize communications forthe JPS Train Derailment

 

scenario.

 

o Describe how this technology can allow for

 

collaboration with the various stakeholders

 

impacted by the JPB Train Derailment Scenario.

 

Requirements:

 

•1.5 to 3 pages in length.

 

• APA formatting and citations shall be used.

 

• At least two primary source references will be used.

 

No plagiarism

Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities.

 

 

Part 1: Current Security Threats 

 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

 

Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.

 

Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
 Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
 Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
 Security organizations, such as Secunia (http://secunia.com/)

 

Your supervisor has also asked you to consider the following questions as you shortlist the threats:
 What threats are new this year, and which have become more prevalent?
 Why are these threats more common and why are they important?
 What threats remain constant from year to year? Why?
 What threats do you believe will become more critical in the next 12 months? Why?
 What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?

 

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

 

Part 2: Identify Vulnerabilities in IT Security  

 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

 

Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

 

Required Resources
 Access to the Internet
 Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)

 

Tasks

 

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
 What are the first five open ports as identified by the Zenmap scan?
 Include the port number
 Include the service name
 Include a brief description of how each is used

 

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
 Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
 Include the name and a brief description of each vulnerability.

 

3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

 

4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

discuss specific interventions and techniques that you would use with this family and mention the duration of therapy and prognosis. What would be your role as a therapist?

Complete a case study of a family that you are familiar with (not your own family). It would be best to conceptualize using at least 3 of the various theories we have covered in class.   In addition, you should discuss specific interventions and techniques that you would use with this family and mention the duration of therapy and prognosis. What would be your role as a therapist? The case study should be at least 3 pages in length in content (plus a cover page and reference page). In addition to the 3-page paper, you must attach the family’s Genogram and Minuchin’s structural mapping of the family. See this site for examples Genogram Timeline Snapshots – Genogram Analytics  Be sure to look at the symbols tab on both maps

So, the minimum number of pages with cover page, content, references, and maps is 7 pages.

 

With the presence of eSports rising in popularity, what steps do you think would need to be taken in order for them to be considered a proper sport by the vast majority of people?

Based on what you’ve learned in this module, answer the questions below in a two-page, double-space written paper, and explain your answers:

 

With the presence of eSports rising in popularity, what steps do you think would need to be taken in order for them to be considered a proper sport by the vast majority of people? What would help them gain acceptance at events such as the Olympics? Also, what can be done to tackle the lack of professionalism that is present in eSports today?

 

Review the rubric below to see how you will be graded.

 

What are the steps you would take to advocate for your patient while she is still in the acute care setting?

 

You have a patient who only has Medicare Part A and B. She has limited income most of which is used to pay for Medicare Part B. She is in dire need of placement into a nursing home as she can no longer care for herself at home. You gleaned from your reading that long-term care needed by low-income elderly people is paid by Medicaid, and you feel your patient meets the criteria. What are the steps you would take to advocate for your patient while she is still in the acute care setting? Who are some of the other health care professionals you would collaborate with to ensure your patient receives the additional healthcare coverage she needs? Analyze the role Medicaid plays in supporting long-term care for the elderly and disabled.

Initial: 400 words. Make up 2 replies to 2 students 200 words each.

Analyze the roles and responsibilities of financial managers in confirming compliance with federal and shareholder requirements 

 

This Project for Final Project Part I Rubric Only. The work must meet the rubric requirements.

Final Project Part I Part I

 

Overview

 

Business professionals typically need to demonstrate a core set of financial knowledge to earn the job and to succeed on a job.

 

For this part of the assessment, you will be given a scenario in which you are asked to illustrate your financial management knowledge. This part of the final project addresses the following course outcomes:

 

 Analyze the roles and responsibilities of financial managers in confirming compliance with federal and shareholder requirements

 

 Differentiate between various financial markets and institutions by comparing and contrasting options when selecting appropriate private and corporate investments

 

Part I

 

Prompt You have completed an internship in the finance division of a fast-growing information technology corporation.

 

Your boss, the financial manager, is considering hiring you for a full-time job. He first wants to evaluate your financial knowledge and has provided you with a short examination. When composing your answers to this employment examination, ensure that they are cohesive and read like a short essay.

 

Your submission must address the following critical elements:

 

I. Analyze Roles and Responsibilities for Compliance

 

A. Examine the types of decisions financial managers make. How are these decisions related to the primary objective of financial managers?

 

B. Analyze the various ethical issues a financial manager could potentially face and how these could be handled.

 

C. Compare and contrast the different federal safeguards that are in place to reduce financial reporting abuse. Why are these considered appropriate safeguards?

 

II. Investment Options

 

A. If a private company is “going public,” what does this mean, and how would the company do this? What are the advantages of doing this? Do you see any disadvantages? If so, what are they?

 

B. How do the largest U.S. stock markets differ? Out of those choices, which would be the smartest private investment option, in your opinion? Why?

 

C. Compare and contrast the various investment products that are available and the types of institutions that sell them.

 Explain how this company communicates their diversity practices through media outlets, outreach efforts, and philanthropic activities. 

 

For this final assignment, investigate a company that is known for incorporating diversity from a global perspective.

Examine how this diversity is reflected in the structure of the company, employment practices, inclusiveness, and mission statement.

 

Explain how this company communicates their diversity practices through media outlets, outreach efforts, and philanthropic activities.

 

Using scholarly sources (at least 5), the course textbooks, and web and media sources, use between 3000-3500 words detailing how this company makes diversity a reality instead of an ideal.

 

****Grading Rubric attached to measure the level of the writing requirements****

 

 

 

 

 

Harvey, C. P., & Allard, M. J. (2015). Understanding and managing diversity: Readings, cases an d exercises. (6th ed.). Upper Saddle River, NJ: Prentice Hall.

 

Jones, J. M., Dovidio, J. F., & Vietze, D. L. (2014). The psychology of diversity: Beyond prejudice and racism. John Wiley & Sons.

 

French, Erica L. Sheridan, Alison (2009). Equal employment opportunity and diversity management: can either live up to the promise of achieving gender equity? Retrieved from http://eprints.qut.edu.au/27008/

 

Hovland, K. (2014). What can global learners do? Diversity and Democracy, 17(2).

 

Parker, E., & Parscarella, E. (2013). Effects of diversity experiences on socially responsible leadership over four years of college. Journal of Diversity in Higher Education, 6(4), 219-230.

 

Patrick, A., & Kumar, V. (2012). Managing workplace diversity issues and challenges. Sage Open. doi:10.1177/2158244012444615

 

University of California, San Francisco (n.d.). Chapter 12: Managing Diversity in the Workplace. Retrieved from http://ucsfhr.ucsf.edu/index.php/pubs/hrguidearticle/chapter-12-managing-diversity-in-the-workplace/

 

U.S. Department of Labor. Good for Business: Making full use of the nation’s human capital. An environmental scan. 1995. https://ecommons.cornell.edu/bitstream/handle/1813/79348/GlassCeilingFactFindingEnvironmentalScan.pdf?sequence=1&isAllowed=y (Links to an external site.)