In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. Why are metrics required? Briefly provide your explanation.

APA format and references are important, 500 words,

Describe a real, current conflict between two countries. Use, as a source, at least one news article published sometime after August 1, 2019. Your summary should be well-written (with correct grammar and punctuation). The article you use should be from a mainstream news source (New York Times, Washington Post, CNN, BBC, Wall Street Journal, Al Jazeera, and so on). Note that the assignment is to describe a conflict, not to summarize an article. If you are using a source that does not help you fully describe the conflict, then find a different source.

Your description must include the following:

  • What countries are involved in the conflict?
  • What is the object of contention? How do their goals differ?
  • Are either (or both) of the countries using threats to try to get what they want? Are they using violence?

This assignment wants you to tie the Biggie Smalls case into your explanation of the trial parts. My subheadings for this would be:

A description of the trial process

Examples of opening and closing statements

The types of questions asked on direct examination

Highlight important points for cross-examination

4 types of evidence (Grading Rubric)

Then I would fill in my answers directly below the subheading. I would do a sentence or two for the first 4 and focus my efforts on the 4 types of evidence. This is where almost all of the grading points come from. 43 out of the 50 points for this assignment come from the following 2 Grading Rubric requirements:

Student work describes the material for four types of evidence, provides examples, and discusses the relationship of search and seizure; and

Student work discusses the material for four types of evidence demonstrating critical thinking skills, provides examples, and discusses the relationship to search and seizure.

Note that this assignment does not ask for any references or in-text citations. Obviously, you will be using the text and/or the readings based on the links in the assignments, and APA (and the Grading Rubric) both require a reference page, so you will need to have at least 1 credible reference, but you do not need to discuss credibility.

Please write the summary of research article on the essay template. Let me know if you have any questions.

Discussion Questions: For this week’s discussion, first select one of the six challenges found on page 28 of DHS’ 2014 Quadrennial Homeland Security Review. Regarding your selected risk: What consequences are faced at the national level if this threat is not adequately addressed, in both a general sense, as well as related to our nation’s critical infrastructure? In addition, do you believe this risk is being adequately addressed at present? Why or why not?

Instructions: Fully utilize the materials that have been provided to you in order to support your response. Your initial post should be at least 350 words. Please respond to at least two other students. Responses should be a minimum of 150 words and include direct questions. You may challenge, support or supplement another student’s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.

Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. While proper APA is not required, attribution to sources that informed your posting should be included. Refer to the grading rubric for additional details concerning grading criteria.

Please keep the students responses from sounding harsh. Keep it classy my friend!

Student Reponse #1 Widen

For this week’s discussion, first select one of the six challenges found on page 28 of DHS’ 2014 Quadrennial Homeland Security Review. Regarding your selected risk: What consequences are faced at the national level if this threat is not adequately addressed, in both a general sense, as well as related to our nation’s critical infrastructure? In addition, do you believe this risk is being adequately addressed at present? Why or why not?

The strategic threat that I chose this week was cyber threats. Cyber attacks are primarily concerning because of the mental and physical damage they create. A cyber attack is not one that simply occurs and then dissipates in a short timeframe. There is a long-lasting effect of fear in individuals directly influenced by the issue. The act feels extremely invasive by the intruders and is quite concerning. Additionally, the recovery of national critical infrastructure can take weeks, months, and even years to clean up and replace after cyber attacks.

The energy sector is exceptionally vulnerable to a terrorist attack because of the sheer mass of hackers attempting to break-in. At the present time, not U.S. electrical utility is known to have issues with cyberattacks in the past. However, there are roughly a million attempted hacks every day on the energy sector. The hacking attempts range from a run-of-the-mill to sophisticated hackers trying to access controls in the sector (Sobczak, 2019).

The reality of the situation is particularly frightening because if American’s loose power and energy in their everyday lives it could cause mass chaos. Once phones and laptops lose battery, communication will fall and the country or affected cities can potentially start on a downward spiral of the disorder. All criminal behavior would rise at night and Americans would be at serious risk. Furthermore, all other national critical infrastructure would shut down because it runs off of the energy sector. The depth of the energy sector is incredible and without the nation or cities affected would surely lack stability.

There is encouraging news though when cyberattacks are on the rise, defensive operations are as well. There are new tools that are increasing the availability to monitor networks in real-time as well as discover them. Power companies were some of the first organizations to respond to the ongoing cyber threat as early as 2007. The energy sector is not playing a new game and with the help of a new strategy and increased cyber protection, there is hope in securing the energy sector. (Greenwood, 2019).

Works Cited

Greenwood, M. (2019). Engineering. Retrieved from Electric Power Sector Is Vulnerable to Cyber Attacks: Report : https://www.engineering.com/AdvancedManufacturing/…

Sobczak, B. (2019). E&E News. Retrieved from Experts assess damage after first cyberattack on U.S. grid: https://www.eenews.net/stories/1060281821

Student Response #2 Sommer

Hello class!

I chose the basic cyber threat to discuss its risk related to consequences affecting a general homeland attack as well as an attack on our critical infrastructure. The class I finished up prior to this one was Cyber Warfare…WOW! I took it to get myself a bit savvier on anything cyber because I knew nothing. I was floored at all the vulnerabilities out there in cyberspace and I knew how much the world depended on cyber but I had no idea how easily penetrable it was. If cyber security were not taken seriously and adequately secured, the impact would be devastating. Considering the fact that everything in life has become dependent on computers and the critical infrastructure assets tie into each other in one way or another; a cyber-attack on any one of them could potential damage or destroy multiple layers of critical infrastructure. Generally speaking, hackers have the ability to overwhelm systems leading them to crash, demonstrating the ability to control and do more damage if they wanted; groups called hacktivists have abilities to protest through cyber and flash images or propaganda across computer screens. Cyber terrorists are founded from foreign governments or state-sponsored to infiltrate software and firewalls seeking intelligence or military information. Lastly, something I never even thought about was the fact that parts and equipment can be manufactured with malicious software so if the US purchases a foreign part for a confidentially designed aircraft, they could potentially give the foreign government control over the aircraft or even have foreign controlled kill-switches implanted on weaponry and radar. SCARY!

I do believe the cyber risk is being properly addressed because evolved risks are being identified and procedures are being updated. One example is in Sept 2018; President Trump signed the National Security Presidential Memorandum 13 that replaced Obama’s Presidential Policy Directive 20, rerouting the approval authority for offensive and defensive cyber operations to the DoD instead of the National Security Council, this took a lot of slow, coordinating time out of the mix and sped things up. Additionally, in the same month, the Trump Administration published the first National Cyber Strategy in 15 years. This strategy remains open-source and it prioritizes the four pillars of protection and the means by which to get there.

REFERENCES:

HLSS303 I001 Sum 19: Lessons. “WEEK 4: Critical Infrastructure (National Level).” American Public University System. 2019.

White House (2018). “National Cyber Strategy.”

  • Consider a clinical problem that is both significant and reasonable to translate to a well-structured answerable EBP question. Using supporting professional literature, provide a 1-2 paragraph narrative on the background and significance of the clinical problem. Follow this with a PICO and a research question, utilizing the PICO development tool in the appendix of the Johns Hopkins pdf.
  • What search terms are you using to explore your topic? What databases?
  • Remember if you find a promising study intervention you can consider replicating it.

THE ATTACHMENT ABOVE NEEDS TO BE USED WITH THIS ASSIGNMENT POSTED BELOW

Select one of the solutions you proposed in the Change Management worksheet.

Write a memo 700-word summary memo explaining why your solution will be effective in resolving the change/conflict, how you propose to implement the solution, and your role as a leader to manage conflict and create an effective work environment.

Include the following in your summary:

Summarize the problem and the solution you propose to implement.
Analyze why you think the solution will be effective.
Analyze what needs to be considered when implementing the proposed solution.
Analyze the leadership style that best fits in this situation.
Analyze the leader’s role in managing the conflict.
What is your role as a leader and how would you manage this conflict?
Explain the leader’s role in creating an effective work group when implementing the proposed solution.

Include a references page with your summary.

I will post the case LUCAS V EARL and the instruction for the brief.

Read the case carefully and do a brief exactly like the instruction requirement.

Cite APA 6th edition.

2 pages, single space.

Access and read the “Professional Engineer’s Code of Ethics,” (http://www.nspe.org/resources/ethics/code-ethics).

Then write a 500 word (one page) essay on either of the two cases below:

A) Search the internet for the “ASME vs. Hydrolevel Corp. Conflict of interest Case” and write a 500 word (one page) essay on the case, from your perspective as a future Mechanical Engineer; OR

B) Read the article “Engineering Disasters and Learning from Failure” (http://www.matscieng.sunysb.edu/disaster/) and write a 500 word (one page) essay on the case, from your perspective as a future Mechanical Engineer.