Post 1

Role of end-users in incident reporting :

Role of end-users in incident handling is very crucial as end-users are the person or employees who actually use the application or the products developed by the organization. End users are the persons who deal with the developed system on a daily basis to complete their work. End users can look for any uncommon activity or any irregular activities in the systems they are using. They are the most valuable people in early detection of any incident and its reporting to the higher officials. They are first persons who can actually feel of any system irregularities and can see that while it is happening or recently the incident happened. They should be able to check the system proper functionalities and use the software called intrusion detection to look for any malware virus in the application. If they notice any virus activity in the application used by them they should immediately report this to the next level of the officers for the appropriate actions. It is also their responsibility to report any unusual activity immediately without delay to the higher officials for the immediate actions to secure the application used by the organization (Finch, 2019).

Should end-users be encouraged to report suspicious occurrences? If so, why; if not, why not.

End-users must be encouraged for an immediate report of any unusual and suspicious incident occurrences to the higher officials or directly to the incident management team. End users should be encouraged as they are the first persons who can see and observe any irregularity or any suspicious activity in the systems. Each and every organization now days have an incident management team who takes care of any unusual activities to the organization’s network and computers or the software. Incident response teams play a very important role in handling an incident and working t resolve the issue. So each end-user should be provided a compulsory training on a regular basis on the usage of the Intrusion detection software by themselves and the procedure of reporting any suspicious activities directly to the incident response team.

Typical factors that influence end-users to report an incident :

There are some factors or reasons which influences the end-users decision to report an incident or not. Two main factors are end-users personal interest and responsibility feeling and the organization’s strict policies to rewards the users who report any important incident. For example, if the end-user reports an incident to the incident response team and incident response team did not take the case seriously and ignores the issue raised by the end-user. This kind of occurrence will make the end-users demotivated and not interested in following up on the issue raised by them. If on the other hand if an end-user reports an incident and the incident response team start working on it and keep a follow up with the end-user by asking the additional details of the incident and the solution for the issue. Other case is when an end-user when reporting an incident gets some kind of reward or additional benefits they fell interested and more vigilant about any suspicious activities on the system (Katerina, 2014) – Aruna Yadav


Post 2

Incident Reporting is very important because it need to come across to people because sometime it is hard to manage and hard to report incident for higher level of people. End users are most vital part of the reported incident. They are witnesses to the incident being reported. he other factor is that the clients must be advised before itself to report if any suspicious occurrences happen, to comprehend it instead of disregard it. The end-clients who express the occasions to the higher authorities must give precise data. Else, it might influence the end-clients harshly. On the off chance that the proper data isn’t given to the association by the end-clients, at that point there will be a ton of dangers to be looked by, end-clients themselves.

However the users should understand that the emergency team will have limited bandwidth and the time they are investigating the false positive report they are not working on a real emergency. End users are also hesitant to report any incident which may victimize their peers, they believe it could cause a more hostile workplace in case their peer finds out. If the users who reported the false positive suspicious activity receive any negative feedback because of their reporting they will be discouraged to report such activity in the future. Anonymously reported incidents are hard to follow up and track down in case there is additional information required to resolve the incident. It is a decent practice to prepare the end clients on occurrence announcing as the vast majority of the end clients don’t think about the hazard the board, which can make a postponement in episode revealing. Circumstance can be controlled when reacting to the episode as quickly as time permits is significant.

The study of horticultural factors influencing incident reporting stated that nurses and physicians have noted that there are so many variations of self-reporting and peer-reporting that it becomes incredibly hard for to observe patterns and trends. Occurrence supervisory group ought to have a profoundly talented and proficient part to deal with all sort of episodes and the group should gather all the data from the finishes clients when after the episode happened can maintain a strategic distance from any disarray in the association. It is imperative to make appropriate strides and pursue very much spread out techniques. There is a great deal of significant worth in end-client episode reports and substances ought to guarantee that most extreme potential is accomplished out of it.

Examining it bit by bit for example readiness, distinguishing proof, regulation, annihilation, recuperation and future strides to persevere through that it doesn’t occur again goes far to proficiently settling occurrences simultaneously acquiring the most extreme yield from clients. There are a few factors by which the end-clients will report the episodes which happen in the association inside or remotely. The end-clients ought to advise the occasions to advance the way of life of the association – Manush Desai

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

TruCar.in: Finding a Position in an Emerging Online Market

no plagarism also give citationa and references.

  • What is the impact of Porter’s Five Forces model on the online car portal industry?
  • What is the consumer decision-making process for purchasing a car, and what is the role of online car websites in this process?
  • What bases for segmentation could be useful for TruCar to identify key market segments? What are the possible key target segments for TruCar?
  • What are the possible marketing strategies that TruCar can adopt to cement its position in the online car portal industry?
Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Prepare a cohesive response in which you:

  • Describe a scenario when you have worked with individuals who have different cultural backgrounds, especially with regard to professional experience or agendas.
  • Select another country or region and compare how these norms might be different.
  • Identify steps that you could take to ensure that there is common ground when working with others from different backgrounds.
  • Evaluate how effective you think your approach would be.
  • What lessons do you take away from this experience that you think will better inform your approach as a manager who is in a similar situation?
  • How would you think your approach changes when you work virtually?

References

Hofstede, G. (n.d.-a). Country comparison. Geert Hofstede. Retrieved July 11, 2017, from https://geert-hofstede.com/countries.html

Jyoti, J. (2017). Factors affecting cultural intelligence and its impact on job performance: Role of cross-cultural adjustment, experience, and perceived social support. Personnel Review, 46(4).

Lee, Y-t., & Liao, Y. (2015). Cultural competence: Why it matters and how you can acquire it: Multicultural managers. Harvard Business Review.

TEDx Talks (2014, October 21). Cross cultural communication | Pellegrino Riccardi | TEDxBergen [Video file]. Retrieved from https://www.youtube.com/watch?v=YMyofREc5Jk

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Assignment Instructions

This assignment is the culmination of your crafting of a research paper on a homeland security issue. In Week Four you presented the first three sections of your paper. This week you add the final sections and present the full paper. Be sure to make any changes to your literature based on instructor feedback.

The three main sections you should add to the paper for this submission are the Methodology and Research Strategy, Analysis and Findings, section and the Conclusions/Recommendations section.

Methodology and Research Strategy: This section provides the reader with a description of how you carried out your qualitative research project, and the variables you identified and analyzed. It describes any special considerations and defines any limitations and terms specific to this project, if necessary. This section can be brief or more complicated, depending on the project, written in 1-2 pages.

Analysis and Findings: are not the same as conclusions. In the analysis component of this section you identify how you analyzed the data. The second part is the finding you got from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. That interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. While there may be some facts that are such that they will stand and translate to your paper, the intent is to create new knowledge, so you will normally analyze the data to create your own findings of what facts that data represents. This section should be at least 2-5 pages.

Conclusions and Recommendations: is the section where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what that researcher sees as the meaning of that data, their conclusions. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole.

Remember, your paper should seek to answer a question that helps to solve the research puzzle you identified.

Technical Requirements: Length: 3-8 additional pages (in addition to your literature review) double spaced, 1″ margins, 12 pitch type in Times New Roman font left justified format.

Citations/References: You must use APA style for this assignment.

Submission: All work is to be submitted as an attachment to the assignment link by 11:55 pm on the due date. All work should be prepared in Microsoft Word format and submitted as an attachment.

Grading: All submissions will be graded using the attached rubric.

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

write a minimum of 250 words with 2 scholarly sources////NO PLARARISM

Briefly explain the “employment at will doctrine”. What are the exceptions to this doctrine? Give me your personal opinion of this doctrine.

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

On which of the five areas of STEAMM do you want to focus?

Engineering, specifically mechanical engineering

 What is the geographic context of community you are addressing?

USA

What is the historic context of the community you plan to research?

how getting in the engineering field has been hard since 1970 till present day.

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

In week 2 you created an Enterprise Security Policy.

1. How will you implement and enforce your plan.

2. Describe at least 4 steps you will use.

Student one:

The first step to implementing a security policy is to ensure that the upper management buy off on the plan. To do this, the policy must be effectively pitched to the upper management. A good way to sell upper management on the security policy is to show them how to policy will make their company more productive and therefore, save money or make more money. Ideally a good policy will help a company do both.

After having upper management buy off on the security policy, the next step is to let everyone in the company know that there are going to be changes. The best way to introduce a new security policy is to hold training in an open forum, so that the employees can interact and ask any questions to any issues or misunderstandings they may have. Instead of just handing the employees a copy of the new policy and leaving it for them to mull over and try to figure out, they will be able to get the “what the policy means for them.” During the training session, any issue will be clarified. This is also a good way to find out if there may be issues with the policy before it is actually put into place. After training the employees will be given the date that the new policy takes into effect. It could be that day or a few weeks later; it would depend on how many training sessions take place and how much leeway the company wants to give for getting used to the policy.

To enforce the security policy, employees will be instructed in what will happen for various infractions. Minor infractions will incur a first time warning. Many companies tend to use a three strike policy, unless a major infraction occurs. A major infraction would typically be something that any person should know is absolutely wrong to do and immediately affects the company in a negative manner. A minor infraction may be something like using a computer to look at a social media site. A major infraction might be a user downloading files without knowing the source.

Another way to enforce the policy is with controls. To ensure compliance with the new policy, control will be put into place. An example of a control that would be used is to ensure that passwords have to meet the minimum requirements.In week 2 you created an Enterprise Security Policy.

-Vijay

Student two:

1. How will you implement and enforce your plan?

In order to effectively enforce the security plan, the focus would be on overall awareness, training, and responsibility to the user(s). Just having a plan in place simply isn’t enough, there is a key piece to the puzzle in order for the plan to hold any value and be carried out…people. The entire staff must be made aware of and trained properly to mitigate potential threats or policy/plan violations (InfoSec, 2017). If such a thing occurs, the result(s) could be a huge [negative] impact, mishandled information, sensitive data loss etc.

2. Describe at least 4 steps you will use.

To accomplish the enforcement of the plan, not only is training awareness important there are other ways to achieve a successful plan. The first step I would incorporate ties in with awareness training, making sure through seminars and distributing information and documenting employee compliance for record. This way each staff member could be held accountable. This training would also be a reoccurring process over time to ensure repetition and freshness. Another step more towards enforcement would be regular monitoring and quality checks to ensure policy and protocol are being followed.

The last two steps, are something I am quite familiar with from my military experience. The first being, ensuring to explain the ‘Why?’ in the process. In doing so, you allow further welcome employee buy-in to the security plan, in turn making it easier for them to follow through with the protocol. Finally, walking hand in hand with the buy in from the staff, training and awareness, and accountability, another key tip is to encourage feedback (Walshe, 2017). By encouraging feedback from the staff, it further solidifies the buy-in which in turn can lead to open discussions and innovation to the policy itself.

Josh

Constitution Day Founding Father fact: Daniel Carroll; Maryland- his family had many historically colonial member lineage, including a cousin named ‘Charles Carroll’ who hold a distinction as being one of five men to sign both the Declaration of Independence and the U.S. Constitution. Their family motto is “Strong in Faith and War”. Lastly, something I found interesting Daniel Carroll was one founding father who motioned that “by the people” should replace the words “by the legislature” in the Constitution we know today.

Reference

InfoSec (2017). Best Practices for Implementing an IT/Cybersecurity Policy. InfoSec Institute Online. Retrieved from: https://resources.infosecinstitute.com/best-practices-implementing-itcybersecurity-policy/

Walshe, K. (2017). Tips to help enforce your corporate security policy. Trilogy Technologies Online. Retrieved from: https://trilogytechnologies.com/corporate-security-policy/

-Joshua

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Please use simple grammar as my first language is not English

Freire, P. (2007) Pedagogy of the Oppressed. (M. B. Ramos Trans.). New York, NY: The Continuum International Publishing Group, Inc. (Original work published 1968)

What is the banking concept of education?

How does the banking system of education reflect or support oppression in the “real world”?

What is the problem-posing method of education?

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Need to rephrase with APA style paper. This paper need to be with in 2-3 days max . let me know if more info needed

Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

CRITICAL WRITING

From the real national/international market, select any publicly listed company (listed in the Stock market). Critically analyze the chosen company based on the following questions.

1. Conduct a SWOT analysis for your chosen company based on your research.

2. Examine the 4 P’s of your chosen company based on the information given.

3. Use the porter’s five forces model to critically analyze the competitive structure of the organization.

NB

  • You are supposed to choose a publicly listed company from the Stock Market.
  • You should use references (company website, financial databases, etc…)
  • While referencing, use APA reference style.
  • All students are encouraged to use their own words.
  • If Plagiarism is more than 25%, student will get zero marks.
  • Submit your assignment at the BB grade center on or before the END OF WEEK-7TH
  • Looking for a solution written from scratch with No plagiarism and No AI?

    WHY CHOOSE US?

    We deliver quality original papers

    Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

    Free revisions

    We offer our clients multiple free revisions just to ensure you get what you want.

    Discounted prices

    All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

    100% originality

    We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

    On-time delivery

    We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay