Explain the attributes of the database and describe the environment in which it will operate Describe the security concepts and concerns for databases Identify at least three security assurance and security functional requirements for the database that contain information for medical personnel and emergency responders

Database Security Assessment
An RFP (request for proposal) 10 to 12 pages

Provide an Overview for Vendors

Provide vendors with an overview of your organization
Identify which departments or individuals will use the Security Concerns Common to All RDBMS, and for what purposes
Include the types of data that may be stored in the system and the importance of keeping these data secure

Provide Context for the Work

Explain the attributes of the database and describe the environment in which it will operate
Describe the security concepts and concerns for databases
Identify at least three security assurance and security functional requirements for the database that contain information for medical personnel and emergency responders

Provide Vendor Security Standards

Provide a set of internationally recognized standards that competing vendors will incorporate into the database
Address the concepts and issues with respect to disasters and disaster recovery, mission continuity, threats, and cyberattacks

Describe Defense Models

Define the use of defense models
Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles
Explain the importance of understanding these principles
Explain how enclave computing relates to defensive principles.
Define enclave computing boundary defense, include enclave firewalls to separate databases and networks.
Define the different environments you expect the databases to be working in and the security policies applicable

Explore Database Defensive Methods

Include information about threats, risks, and possible recommendation strategies to these threats.

Provide a Requirement Statement for System Structure

State requirement statements for a web interface to do the following, all in the context of the medical database
a) Allow patients and other healthcare providers to view, modify, and update the database.
b) Allow integrated access across multiple systems.
c) Prevent data exfiltration through external media.

Provide Operating System Security Components

Provide requirements for segmentation by operating system rings to ensure processes do not affect each other
Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring.
Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. Include the specifications below
Describe the expected security gain from incorporating TPM.
Provide requirement statements that adhere to the trusted computing base (TCB) standard.
Provide examples of components to consider in the TCB.
Provide requirements of how to ensure protection of these components, such as authentication procedures and malware protection.

Write Requirements for Multiple Independent Levels of Security

Write requirement statements for MILS for your database in the RFP.
Include the definitions and stipulations for cybersecurity models, including the Biba Integrity Model, Bell-LaPadula Model, and the Chinese Wall Model.
Indicate any limitations for the application of these models.
Include requirement statements for addressing insecure handling of data.

Include Access Control Concepts, and Capabilities

Include requirement statements in the RFP that the vendor must identify, the types of access control capabilities, and how they execute access control.
Provide requirement statements for the vendor regarding access control concepts, authentication, and direct object access.

Include Test Plan Requirements

Incorporate a short paragraph requiring the vendor to propose a test plan
Provide requirements for the vendor to supply an approximate timeline for the delivery of technology.
· An 
RFP, about 10 to 12 pages, in the form of a double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. There is no penalty for using additional pages. Include a minimum of six references. Include a reference list with the report.

discuss what you feel are the differences and similarities between the character Dren, in Splice, and any of the Na’vi characters (or these “digital peoples” in general) from Avatar (if need be, just Google video clips of the films to jog your memory).

For this week’s Assignment, I’d like you to discuss what you feel are the differences and similarities between the character Dren, in Splice, and any of the Na’vi characters (or these “digital peoples” in general) from Avatar (if need be, just Google video clips of the films to jog your memory).
In particular, what I’d like to read from you is not only how the two characters (or types of digital beings) are different (that’s the easy part), but how are they similar as well? What kind of generalized cultural fantasies or “subconscious” issues do we project onto these two types of digital beings? Do they perform these (subconsciously assigned) roles successfully (i.e., if they are frightening in some way, how so and what does that say about us as humans)? Why do you think most alien-like digital creatures in movies (whether from outer space, or from a genetic lab) are often monster like, and do you feel that the “sweet” and “lovable” Na’vi are a radical departure from this tradition? Also, a more difficult question: do you feel that the Na’vi are portrayed in such a way that their portrayal induces (disrespectful) “pity” in the viewer for the “Other” (Na’vi)? If so, do you think that the (subtextual) goal of the film’s narrative may have been to induce such “pity”, or is it a “natural” outcome for any film which engages difficult issues such as colonialism?

Based on the assigned readings, how do factors such as differences in power, emotions in conflict, negotiation and interpersonal communication, and/or influence and persuasion fit with the model of Dialectical Behavioral Therapy? What are the common themes or differences you see compared to the conflict resolution strategies you have learned? 2. What are the factors of BPD that would make conflict resolution difficult and how would you propose overcoming those barriers? It is important to note that I am

PSF4106Week7.docx

This week, you learned about Borderline Personality Disorder (BPD) and the unique barriers to effective conflict management and resolution in this condition. In this discussion, I want you to consider the perspective of a friend or family member of someone with BPD and how the nature of their condition may interfere with their ability to engage in conflict resolution strategies you have learned so far.
Specifically, I want you to respond to the following prompts:
1. Based on the assigned readings, how do factors such as differences in power, emotions in conflict, negotiation and interpersonal communication, and/or influence and persuasion fit with the model of Dialectical Behavioral Therapy? What are the common themes or differences you see compared to the conflict resolution strategies you have learned?
2. What are the factors of BPD that would make conflict resolution difficult and how would you propose overcoming those barriers?
It is important to note that I am

not
asking you to think like a clinician! I am asking you to use the skills and concepts you have learned and apply them to a scenario where conflict is a core aspect of the individual with BPD’s interpersonal experience. I want you to carefully consider the strategies that may be most effective and what are the biggest barriers to consider.

200 Word minimum, APA Format, In-text citations, Peer-viewed references.

Before participating in discussion for this unit, go through the Self-Assessment: Corporate Social Responsibility. Tell us about your Personal Consumer Behavior results. Describe a company you have chosen to do business with and explain how its model of corporate social responsibility led you to that decision.

 
Part I: Before participating in discussion for this unit, go through the Self-Assessment: Corporate Social Responsibility. Tell us about your Personal Consumer Behavior results. Describe a company you have chosen to do business with and explain how its model of corporate social responsibility led you to that decision.
Part II: In your own words, explain the statement “You do business ethically because it pays.” How does the statement relate to different models of corporate social responsibility? Provide an example of in which the company you described in Part I illustrates your interpretation.

The theoretical foundations of qualitative and quantitative methods are very different, but many researchers believe both methods should be used in the research study to increase validity and reliability. What advantages or disadvantages do you see in using both types of methods in a nursing study?

The theoretical foundations of qualitative and quantitative methods are very different, but many researchers believe both methods should be used in the research study to increase validity and reliability. What advantages or disadvantages do you see in using both types of methods in a nursing study? Support your answer with current evidence-based literature.  

In 1985, Steve Avery was convicted of rape and sent to prison. After he served eighteen years in prison, DNA evidence exonerated him, and police were shown to have mishandled evidence. He was released in 2003. Two years later, in 2005, two weeks before Avery was planning a $36 million lawsuit against Manitowoc County, he and his sixteen-year-old nephew Brendan Dassey were accused by local authorities of the rape and murder of Teresa Halbach convicted again in 2007, and sentenced to life in prison. This time, the police were accused of planting evidence and framing Avery, and District Attorney Ken Kratz accused of a vendetta against Avery for the lawsuit. In a well-developed essay, provide evidence to the argument that Steve Avery and Brendan Dassey are likely to be guilty of the murder of Teresa Halbach.

In 1985, Steve Avery was convicted of rape and sent to prison. After he served eighteen years in prison, DNA evidence exonerated him, and police were shown to have mishandled evidence. He was released in 2003. Two years later, in 2005, two weeks before Avery was planning a $36 million lawsuit against Manitowoc County, he and his sixteen-year-old nephew Brendan Dassey were accused by local authorities of the rape and murder of Teresa Halbach convicted again in 2007, and sentenced to life in prison. This time, the police were accused of planting evidence and framing Avery, and District Attorney Ken Kratz accused of a vendetta against Avery for the lawsuit.
In a well-developed essay, provide evidence to the argument that Steve Avery and Brendan Dassey are likely to be guilty of the murder of Teresa Halbach. Your response should be qualified, but your essay should answer why they should be convicted, based on the information from the series and your own research.
You will be graded on the quality of your writing, organization of ideas, evidence of critical thinking skills, proper APA citation, and grammar.
I will upload files that should help provide evidence to why they are guilty.

Describe three ways that classroom teachers collaborate with the school media specialist, resources teachers, and teachers from other grade levels to create content that builds upon the skills students have already acquired and prepares them to meet the academic standards and expectations for the next grade level. Include discussion about how this collaboration contributes to students’ ability to retain information and feel confident about their own learning. Provide real-world examples to illustrate your ideas. 2. Describe three ways you could incentivize students to read over the summer. Explain how the use of these motivational incentives can support students on their journey to become self-directed learners using specific examples.

  
Two paragraphs with at least 100 words per paragraph explaining the following which should include a reference for each individual paragraph.
1. Describe three ways that classroom teachers collaborate with the school media specialist, resources teachers, and teachers from other grade levels to create content that builds upon the skills students have already acquired and prepares them to meet the academic standards and expectations for the next grade level. Include discussion about how this collaboration contributes to students’ ability to retain information and feel confident about their own learning. Provide real-world examples to illustrate your ideas.
2. Describe three ways you could incentivize students to read over the summer. Explain how the use of these motivational incentives can support students on their journey to become self-directed learners using specific examples.

Write a report that will be reviewed by the CIO and System Security Authority (SSA), addressing the following: Identify gaps when security measures fail, challenges, and opportunities for improvement by conducting a thorough audit. Examine concepts of privacy and the effects the internet has on privacy. Identify the industry-specific cyber laws in relation to inquiries and incidents to obtain data and evidence.

*Please make sure to put an introduction and conclusion*
In the “Benchmark – Impact Analysis Part 1: Information Acquisition” assignment, you wrote a compliance report to the CIO from a legal standpoint. In this part of the impact analysis, you will gauge and evaluate your chosen organization’s current state of security and protection protocols and mechanisms.
Write a 1100 to 1,500-word report that will be reviewed by the CIO and System Security Authority (SSA), addressing the following:
Identify gaps when security measures fail, challenges, and opportunities for improvement by conducting a thorough audit.
Examine concepts of privacy and the effects the internet has on privacy.
Identify the industry-specific cyber laws in relation to inquiries and incidents to obtain data and evidence.
Assess the critical information infrastructure and determine the configuration of physical assets, logical controls, data storage and encryption, firewalls, servers, routers, switches, hubs, and so forth to be compliant.
Identify at least ten key auditable elements that would help determine the current state of the organization’s cybersecurity posture. Explain the relevance of each element to the security and protection protocols and mechanisms.
Indicate the legal elements and liability (costs) that the industry may encounter for noncompliance.
Note: Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.