Review and reflect

Review this week’s course materials and learning activities, and reflect on your learning so far this week.

Respond to one or more of the following prompts in one to two paragraphs:

  1. Choose a topic from this week’s course materials, and summarize what you learned about the topic. Provide citation and reference to the material(s) you discuss. Describe what you found interesting regarding this topic, and why.
  2. Discuss a key knowledge, skill, or ability you gained from your learning this week. Describe how you will apply that learning in your daily life, including your work life.
  3. Describe 2 to 3 ideas, topics, or concepts from this week’s course materials for which you would like to learn more, and why. Describe what may be unclear to you, and what you would like to learn.

Students need to contribute two substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.

Aligned with discussion (3)

  • 2.12.1 Summarize when a business should use metrics to measure strategic initiatives to achieve success.Goal Set & CategoryCMGT_556Course Objective

2.22.2 Plan an IT metrics effectiveness and efficiency strategy for an organization.

Goal Set & CategoryCMGT_556Course Objective

2.32.3 Discuss the impact the evolution of data, information, business intelligence, and knowledge has on organizations.

Goal Set & CategoryCMGT_556Course Objective


Business process is a set of activities and or tasks when completed will be in a position to realize the goals of the organization. For business process to remain valid there is the need for involvement of the multiple defined input but a single output. The three most important types of business processes include management processes, operational processes and at the same time, supporting operations. All the operations are capitalized mutually to realize the goals of the organization. In its definition, it begins with mission objectives and is concluded with the achievement of the specific objectives. Therefore, in simpler words, the business process is the set of activities needed to accomplish a common goal in an organization.


“Metrics are measurements that evaluate results to determine whether a project is meeting its goals. Two core metrics are critical success factors and key performance indicators. Critical success factors (CSFs) are the crucial steps companies perform to achieve their goals and objectives and implement their strategies (see Figure 4.2). Key performance indicators (KPIs) are the quantifiable metrics a company uses to evaluate progress toward critical success factors. KPIs are far more specific than CSFs.” (Baltzan, 2018, ).

Before reading these chapter, I didn’t realize all the ways we have at our disposal to evaluate different operating procedures. Some of these methods are pretty simply practices to improve effectiveness. Being able to go through a simple method of running through each step and seeing if you need it or can improve it, helps to shave down a ton of unneeded or ineffective actions.


´Baltzan, P. (2018). Business Driven Technology (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

How prevalent are female gangs in the United States

CJ 303 Week 4 ASSIGNMENT Female Gangs

Write a 500-750 word paper in APA style which explores the following questions:

·         How prevalent are female gangs in the United States?

·         Do female gangs commit the same type of offenses as male gangs?

·         What are characteristics of female gang members?

In your paper, include a title sheet and 2-3 cited references to support your ideas. Only one reference may be found on the internet. The other references must be found in the Grantham University online library.

Only the body of the paper will count toward the word requirement and the references must be cited, both in the body of your essay and in a references page.

Posted in Law

What is the role of prosecutors

CJ 303 Week 5 DISCUSSION Juvenile Prosecutors

What is the role of prosecutors and defense attorney’s in juvenile matters?

·         Should the prosecutor’s role be changed? Why or why not?

Provide thorough, well-developed descriptions to demonstrate your understanding of these topics. In your initial post, you should refer to both the assigned course readings for the week as well as at least one source you located elsewhere that either helps define or explain the concepts being discussed in this forum.

                    should be a minimum of 150 words. If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling.

Posted in Law

moving the PoS application

You are hired as a consultant for a small size distributor of kitchen appliances. The company, ACME Kitchens, sells products on the Internet and at its retail store. The primary software used by the company is a proprietary point-of-sale (PoS) application running on a locally installed SQL server. The company maintains its own website hosted at a national hosting company.

ACME Kitchens is considering moving the PoS application and all the related customer and products data to a public cloud using PaaS cloud deployment model. You are hired to advise ACME Kitchens on what metrics should be included in the SLA agreement with the PaaS cloud service provider or a cloud broker.

For this discussion post complete the following:

  • Research at least 4 items which should be included in the agreement.
  • Describe each item and explain why it should be included in the SLA
  • Provide the specific performance or service metrics ACME Kitchens should include in the SLA. For example, if you are describing the up-time metric then provide a specific actual measurable criteria, for example, 98% uptime.
  • 150 word minimum

security breaches


Reply to 2 threads. Each reply must be at  least 100 words. Must use complete paragraphs, proper APA  formatting, and cite information that is not his/her own.

Reply #1

Due to hackers being  more prominent than ever and security breaches happening at an extremely  high rate, companies must take extra precaution to keep sensitive data  and systems safe and secure. On way to help do this is an  application-based security scanner. An application-based security  scanner is a scanner that automatically scans applications to look for  vulnerabilities within the application. Although security scanners are a  good source of security, “no scanner can find all vulnerabilities”  (Johnson, 2015, p.432). A scanner can also produce a list of  priority-based vulnerabilities that should be patched right away along  with steps to do this. Some scanners even have the capability to have an  automated patching process.

Grabber is a web  application security scanner that can detect many different security  vulnerabilities in web applications. It is a small application mostly  used for personal use, but it is portable. Since it is small it does  take more time to run vulnerability scans on larger applications. It was  developed in Python and there is an executable version available. You  can also modify the program to suite your needs for the program. It  automatically performs scans and detects security vulnerabilities such  as SQL injection, Ajax testing, cross site scripting, JavaScript source  code analyzer and file inclusion. Grabber will check backup files for  security issues. Proverbs 2:11 tells states, “Discretion will protect  you, and understanding will guard you” (NIV). We can use this in our  daily lives as well as in IT Security. We must understand the threats  out there, how to prevent them and what programs work best to help us  achieve this. The more we understand vulnerabilities, the better we can  be at protecting systems and sensitive information.

Johnson, R. (2015). Security policies and implementation issues. (2nd ed.). Burlington, MA: Jones

            & Bartlett Publishers002E. ISBN: 9781284055993.

Reply #2 

An application based security scanner is essential for any  computer. With security scanners it helps to prevent most importantly  viruses. Security scanners also help to sweep a computer and identify  any threats to software or even any corrupt files that may be causing  harm to the computer. One particular security scanner is called Vega.  According to the website this security scanner is  GUI based and is written into java. Some of the features that are  included are Automated crawler and vulnerbility server. It also includes  content analysis, intercepting proxy’s.

 This security scanner can help mitigate many different risks or  threats. Some of these threats include Trojan viruses, malware, and  security breaches. Some security breaches could include leaking of  personal information on a computer. In the Bible it talks about finding  security in the Lord and in Psalms 122:7 it says ”peace be within your  walls and security within your towers.” (Psalms 122) This type of  security scanner should help anyone feel comfortable about their  security with their computer. But with anything computers one of the  best ways to mitigate threats is to use good judgement. 

Top  5 Web Application Security Scanners of 2018. (2018, October 18).  Retrieved from

Preventing Double-Billing Errors

Preventing Double-Billing Errors

Padding a bill or double-billing a client for the same charges are serious errors, which may result in disciplinary action and penalties. Research your state’s bar rules of professional responsibility regarding billing and locate a case from your state that discusses attorney discipline or sanctions for billing errors.

After sharing your findings with the class, identify the procedures a law office should take to prevent double-billing errors, including at least one (1) source outside of class materials. Be sure to properly cite your sources and to summarize the case in your own words.

Posted in Law

Wireless Network Design:

Wireless Network Design:  For this assignment, you will create a wireless network design strategy. The wireless network strategy is the overall umbrella encompassing wireless access controllers (WACs) and wireless access points (APs).The wireless service provider can play a role by connecting these, thereby providing connectivity to the entire network. Use the suggested resources, 

Your completed assignment should include the following:  Update your network diagram so that it includes a wireless infrastructure.

Provide an analysis of the wireless technology presented in your diagram (explain hardware placement, hardware device choices, topology choice, and overall wireless infrastructure decisions).

Identify the IP address strategy and calculate the associated subnets. Be sure to explain your IP addressing strategy as well.Identify and describe at least 3 wireless standards that play a role within your network.  Make sure that your paper is professionally written

Describe the history and status of the issue and provide an overview of the problem(s) that need to be addressed.

Using your thesis statement and research, present the problem that needs to be addressed with your proposed solution. Note: Your solution, advantages, and challenges, will be in Parts 2 and 3.

Write a three to four (3-4) page paper in which you:

Provide an appropriate title and an interesting opening paragraph to appeal to your stated audience (appeal with logic, ethics, or emotion).
Include a defensible, relevant thesis statement in the first paragraph. (Revised from Assignment 2)
Describe the history and status of the issue and provide an overview of the problem(s) that need to be addressed. This should be one or two (1-2) paragraphs.
Explain the first problem (economic, social, political, environmental, complexity, inequity, ethical/moral, etc.) and provide support for your claims. This should be one or two (1-2) paragraphs.
Explain the second problem (economic, social, political, environmental, complexity, inequity, ethical/moral, etc.). and provide support for your claims. This should be one or two (1-2) paragraphs.
Explain the third problem (economic, social, political, environmental, complexity, inequity, ethical/moral, etc.) and provide support for your claims. This should be one or two (1-2) paragraphs.
Provide a concluding paragraph that summarizes the stated problems and promises a solution.
Develop a coherently structured paper with an introduction, body, and conclusion.
Use effective transitional words, phrases, and sentences throughout the paper.
Support claims with at least three (3) quality, relevant references. Use credible, academic sources available through Strayer University’s Resource Center. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting guidelines:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Note: Submit your assignment to the designated plagiarism program so that you can make revisions before submitting your paper to your professor.

The specific course learning outcomes associated with this assignment are:

Recognize the elements and correct use of a thesis statement.
Recognize the use of summary, paraphrasing, and quotation to communicate the main points of a text.
Analyze the rhetorical strategies of ethos, pathos, logos in writing samples and for incorporation into essays or presentations.
Prepare a research project that supports an argument with structure and format appropriate to the genre.
Recognize how to organize ideas with transitional words, phrases, and sentences.
Incorporate relevant, properly documented sources to substantiate ideas.
Write clearly and concisely about selected topics using proper writing mechanics.
Use technology and information resources to research selected issues for this course.

actual attack

Case Assignment 1The following scenario is based on an actual attack deconstructed at a seminar. The names and locations have been removed to preserve the privacy of the organization in question.
No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.
Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.
Attack Analysis:
After collecting evidence and analyzing the attack, the third party was able to recreate the attack.
No-Internal-Controls, LLC has a number of PCs configured for employee training
These training computers use generic logins such as “training1”, “training2”, etc. with passwords of “training1”, “training2”, etc.
The generic logins were not subject to lock out due to incorrect logins
One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees
Due to high employee turnover and lack of documentation, none all of the IT staff were aware of the legacy remote access 
The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections
The internal network utilized a flat architecture
An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers
The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access
The attacker installed tools on the compromised host to scan the network and identify network shares
The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files
Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost
You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

  • Suggest one or more policies that would help mitigate against attacks similar to this attack
  • Suggest one or more controls to support each policy
  • Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.
  • Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget
  • Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.  
  • Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy
  • Be sure to follow APA formatting and provide references to support your key points in the case.  Use the book and library resources to find references.  Remember references add credibility to writing as well as providing proper credit to your sources. 
  • Note:  Your assignment will be checked for plagiarism using SafeAssign.  Be sure to properly cite any material from other sources.