Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Blog

August 12, 2025
August 12, 2025

Truth and Morality

Based on the Topic 6 Resources, develop detailed, thoughtful, and thorough answers to the questions in this document. When completing this document, respond directly after each question within the specified number of words.

1. What would be the implications of truth being relative and subjective in your area of study/future career? Why might absolute and objective truth be required in your area of study/future career? Include a citation from Chapter 7 of The Beginning of Wisdom textbook in your answer and include its reference in the References section at the end of this document.

Your answer in 100-200 words:

<Answer>

2. Review the Ten Commandments in Exodus 20:1-17 and type your responses directly below each of the following prompts.

a. Briefly list the Ten Commandments in your own words (do not copy them word-for-word from the Bible).

Your answer in 75-100 words:

<Answer>

Truth and Morality

Truth and Morality

b. Which three commandments are enforced by our legal system?

Your answer in 30-50 words:

<Answer>

c. Explain how the first four commandments might impact someone’s life.

Your answer in 125-150 words:

<Answer>

d. Explain how the tenth commandment might impact someone’s life.

Your answer in 75-100 words:

<Answer>

e. What was Jesus’s response to the question, “What is the greatest commandment?” (Matthew 22:34-40). Why do you think he gave that answer?

Your answer in 75-100 words:

<Answer>

3. C. S. Lewis (1952) writes, “If you look for truth, you may find comfort in the end; if you look for comfort, you will not get either comfort or truth – only soft soap and wishful thinking to begin with and, in the end, despair” (p. 32). Christianity believes that reason is a God-given faculty to evaluate what is true.

How do faith and reason properly work together? Cite Chapter 7 of The Beginning of Wisdom textbook in your answer.

Your answer in 75-100 words:

<Answer>

Reference:

Truth and Morality

  • What would happen if truth were relative in your career and why might absolute truth be necessary?,

  • What are the Ten Commandments in your own words?,

  • Which three commandments are enforced by today’s legal system?,

  • How might the first four commandments affect someone’s life?,

  • How do faith and reason work together?

August 12, 2025
August 12, 2025

Extracorporeal Membrane Oxygenation

My Therapeutic Modality/ Healthcare technology: Extracorporeal membrane oxygenation (ecmo) Follow these guidelines when completing this assignment.

1) Choose a therapeutic modality or healthcare technology. ( Extracorporeal membrane oxygenation (ecmo)

2) Examples of a therapeutic modality include Extracorporeal Membrane Oxygenation, Automatic rotating pronation beds, right and/or left ventricular assist devices, nontraditional ventilator modes.

3) Examples of healthcare technology can include regional O2 saturation monitoring (NIRS). 4) Refer to your faculty member if your selection requires prior approval. 5) For writing assistance, visit the Writing Center. 6) Include the following sections (detailed criteria listed below and in the Grading Rubric):

a. Introduction – 5 points/5% • The chosen therapeutic modality or healthcare technology meets one of the following

criteria: Extracorporeal Membrane Oxygenation

Extracorporeal Membrane Oxygenation

o Has been introduced recently at the bedside for care of the complex adult patient.

o Is a non-traditional modality for very ill patients in special circumstances. o Is being used in a new way to treat a patient with complex needs. o Requires specific training above and beyond general entry-level nursing

education. • Introduce the therapeutic modality or healthcare technology. • Name the therapeutic modality or healthcare technology. • A brief fictional case is used to illustrate the therapeutic modality or healthcare

technology. b. Explanation and Background– 15 points/15%

• Include a clear description of the therapeutic modality or healthcare technology. • Discuss how the therapeutic modality or healthcare technology works. • Describe the patient population it is used for. • Include medication, safety, and cost considerations as applicable.

c. Risks and Benefits– 15 points/15% • Describe how the therapeutic modality or healthcare technology can benefit the patient. • Discuss ways to promote positive outcomes. • Explain the complications that may arise. • Discuss considerations for preventing complications.

d. Interdisciplinary team’s Roles and Responsibilities– 20 points/20% • Identify all interdisciplinary team members caring for the patient, such as

respiratory therapy, assistive personnel, providers, case managers, clinical nurse specialists, and researchers.

• Describe the roles and responsibilities of each member of the healthcare team that is involved in the use of the therapeutic modality or healthcare technology.

• Discuss the roles and responsibilities of the nurse as a member of the interdisciplinary team caring for the patient.

• Discuss one challenge in working with an interdisciplinary team. e. Nursing Scope of Practice – 15 points/15%

• Discuss the knowledge needed for the Registered Nurse to provide care for the patient using the therapeutic modality or healthcare technology.

• Describe skills needed for the Registered Nurse to provide care for the patient using

Extracorporeal Membrane Oxygenation

 

therapeutic modality or healthcare technology. • Discuss attitudes needed for the Registered Nurse to provide care for the

patient using therapeutic modality or healthcare technology.

f. Patient Education – 20 points/20% • Describe the information to be taught to the patient and/or family. • Discuss how information will be taught. • Discuss potential cultural considerations to teaching • Explain how the effectiveness of the teaching will be evaluated.

g. Conclusion – 5 points/5% • Provide a summary of the paper. • No new information is introduced. • Include additional resources for further learning.

h. APA Style and Organization – 5 points/5% • References are submitted with paper. • Uses current APA format and is free of errors. • Grammar and mechanics are free of errors. • Completed 4–5 page paper (not including the title page or reference page) • At least three (3), nursing, scholarly, peer reviewed, primary sources from the last 5

years, excluding the textbook, are provided.

  • What is ECMO how does it work and who is it used for?,

  • What are the risks benefits and ways to promote positive outcomes with ECMO?,

  • What are the roles of the interdisciplinary team in ECMO care, and what is the nurse’s role?,

  • What knowledge skills and attitudes does a nurse need to care for a patient on ECMO?,

  • What patient/family education is needed and how should it be delivered?

August 12, 2025
August 12, 2025

Person and Power of the Spirit

In the Bible, sometimes the Holy Spirit seems to be described as a “thing” or an “it.” For example, John the Baptist says that the Messiah would baptize people “with the Holy Spirit” (see Matt 3:11, Mark 1:8, Luke 3:16, John 1:33). How can you be “baptized by” or “filled with” a person? How do we make sense of instances where the Spirit appears to be described as “a power” or “a thing,” and other places where the Holy Spirit is described as a person? As always, support your claims from the required readings and the Bible.

Person and Power of the Spirit

  1. How can someone be “baptized by” or “filled with” a person?,

  2. Why does the Bible sometimes describe the Holy Spirit as a “thing” or “power”?,

  3. Why does the Bible at other times describe the Spirit as a person?,

  4. How can these two descriptions be reconciled?,

  5. What biblical and scholarly evidence supports this understanding?

Person and Power of the SpiritComprehensive General Answer

1. Being “Baptized by” or “Filled with” a Person
The language of being “baptized by” or “filled with” the Holy Spirit (Matt 3:11; Acts 2:4) uses metaphors of immersion and saturation to describe the believer’s complete experience of the Spirit’s presence. While the Spirit is a divine person, Scripture often portrays His work in terms of His empowering influence—much like being surrounded or permeated by God’s presence. The “filling” language emphasizes transformation and enablement, not a physical container being filled.

2. The Spirit Described as Power
In passages like Acts 1:8 (“you will receive power when the Holy Spirit has come upon you”), the Spirit is associated with enabling believers to fulfill God’s mission. This does not reduce the Spirit to a mere impersonal force but highlights one aspect of His work—granting strength, gifts, and boldness.

3. The Spirit Described as a Person
Elsewhere, the Spirit speaks (Acts 13:2), teaches (John 14:26), grieves (Eph 4:30), and intercedes (Rom 8:26)—traits of personality and will. The Greek term paraklētos (John 14:16) presents the Spirit as an advocate and helper, underscoring personal relationship rather than impersonal energy.

4. Reconciling the Two Descriptions
The dual imagery reflects the Spirit’s complexity: He is both fully personal (co-equal with the Father and Son in the Trinity) and the means through which God’s power operates in the world. When Scripture uses impersonal metaphors like “pouring” or “filling,” it points to His empowering presence. When it uses personal pronouns and relational verbs, it affirms His identity as God’s Spirit who knows, wills, and loves. Both perspectives are complementary—just as water imagery for baptism communicates total immersion without implying that the Spirit is literally a liquid.

5. Biblical and Scholarly Support
Biblical theology affirms that metaphorical language about God and His Spirit is common in Scripture. As Fee (1994) notes in God’s Empowering Presence, the Spirit’s activity often requires sensory or material imagery to communicate divine action. Likewise, Grudem (2020) in Systematic Theology explains that personal pronouns and attributes reveal the Spirit’s full personhood, while metaphors of power emphasize His work. The interplay of both perspectives helps believers understand that the Spirit is not either a person or a power, but the divine Person who empowers.

Person and Power of the Spirit


Example APA References
Fee, G. D. (1994). God’s empowering presence: The Holy Spirit in the letters of Paul. Baker Academic.
Grudem, W. (2020). Systematic theology (2nd ed.). Zondervan Academic.
The Holy Bible, New International Version. (2011). Zondervan.

August 12, 2025
August 12, 2025

Tornado Emergency Family Plan

Week 8 Assignment: Family Disaster Plan – Tornado Scenario • For this paper you must cite and reference at least two (2) scholarly resources. The paper should be 2–3 pages and

written using the current 7th ed. APA student format (must have a title page and reference page). List word count as the last line of your ReflecFon/Conclusion. (word count # ).

See Rubric for additional details. Your paper should address the following:

Title Page

Introduction – Family Disaster Plan Scenario

A. You must include research on the dangers and explain the recommended safety measures in a tornado emergency.

Tornado Emergency Family Plan

How would you prepare for the following situa=on? (Scenario) At this moment, you are sitting at home working on your WCU class. Suddenly, the National Weather Bureau sends an alert across your cell phone—a tornado is headed your way. You have 15 minutes before touchdown in your neighborhood.

Tornado Emergency Family Plan

A. What is your plan? This is a ‘shelter in place’ scenario, you cannot outrun the tornado. Identify a safe place in

your home (residence) to take shelter. B. Provide realistic examples and explain how you would apply the safety and survival measures you learned in

your research of a tornado emergency to your specific living arrangements. Example: “I will turn off my utilities before I shelter in place to mitigate damage to my residence.” Example: “I will take by “go-bags” with me to my shelter in place.

How prepared are you in the event of a disaster? A. Describe your level of disaster preparedness using specific examples and references to:

1. Potential disasters in your area. 2. Your 72 hour “go-bag” assignment. 3. Family Disaster Plan Checklist.

Example: “I am more prepared for a water-related disaster than a fire-related disaster even though I live in a highly secluded, forested area. I have a boat as transportation in the event of flooding, but I do not have rain barrels or fire barrier supplies on hand.” Example: “There were many missing items on my preparedness checklist. I realized that I do not own a flashlight. If I had to use my phone as a light it would drain the battery very quickly.

Reflec=on/Conclusion A. Reflect on how prepared you were before this class and compare it with how prepared you are now.

• Have you acquired any new emergency items? • Do you plan to take any additional training or certification courses? • Have you shared your knowledge with friends and family?

B. How does what you have learned in this course impact you as a future nurse?

Reference Page A. Cite and reference at least two (2) scholarly resources using 7th ed APA format.

• Need help with APA Style? Visit the Student Resources page.Tornado Emergency Family Plan

  1. What are the dangers and recommended safety measures in a tornado emergency?,

  2. What is your personal shelter-in-place plan in the given tornado scenario?,

  3. How would you apply tornado safety measures to your specific home setup?,

  4. How prepared are you for disasters based on potential risks, your 72-hour go-bag, and your family disaster checklist?,

  5. How has your preparedness changed after this class and how does it impact you as a future nurse?


Comprehensive General Answer

August 12, 2025
August 12, 2025

Building Supply Chain Resilience

How have your perspectives changed as we complete this course? We have read about lessons learned in managing supply risk and we have content that considers the future direction in SCRM. What steps do you think companies should be taking to become more resilient while also being profitable and competitive in the marketplace?

  1. How have your perspectives changed through the course?,

  2. What lessons have you learned about managing supply risk?,

  3. What does the content say about the future direction of Supply Chain Risk Management (SCRM)?,

  4. What steps should companies take to be more resilient?,

  5. How can companies balance resilience with profitability and competitiveness?

Building Supply Chain Resilience

Building Supply Chain ResilienceComprehensive General Answer

1. Changing Perspectives
At the start of the course, my view of supply chains was primarily operational—focused on efficiency, cost control, and timely delivery. Now, I recognize that supply chains are complex, dynamic systems where risk management is as important as optimization. Resilience is no longer optional; it is a competitive advantage. The course has highlighted that disruptions—whether due to geopolitical tensions, climate events, or pandemics—are not “if” scenarios but “when” scenarios.

2. Lessons in Managing Supply Risk
Key lessons include the importance of diversification (avoiding single-source dependency), visibility (real-time tracking of goods and suppliers), and strong supplier relationships. Risk assessment tools such as scenario planning and risk heat maps can help companies anticipate vulnerabilities. Collaboration across the supply network is as crucial as internal efficiency improvements.

3. Future Direction of SCRM
The future of SCRM is increasingly data-driven, leveraging artificial intelligence, predictive analytics, and blockchain for transparency. Sustainability will also be central—future supply chains must manage not only operational risk but also reputational and environmental risks. Integration of ESG (Environmental, Social, and Governance) metrics into supply chain decisions will likely become a norm.

4. Steps to Build Resilience
Companies should:

  • Diversify sourcing and manufacturing locations to reduce regional dependency.

  • Invest in digital tools for end-to-end visibility and predictive risk modeling.

  • Develop contingency plans with alternative suppliers and logistics providers.

  • Strengthen supplier partnerships to encourage collaboration in crisis scenarios.

  • Train employees on crisis management and adaptive problem-solving.

5. Balancing Resilience, Profitability, and Competitiveness
Resilience doesn’t have to mean higher costs if implemented strategically. Lean principles can coexist with redundancy by focusing on “strategic slack”—having just enough backup capacity without overstocking. Companies can also turn resilience into a market differentiator by promoting reliability as part of their brand promise, attracting customers who value stability.

Building Supply Chain Resilience

August 12, 2025
August 12, 2025

Social Science Discipline Reflection

Reflect: Reflect upon the themes that the disciplines covered this week explore and the methods that they use to explore these topics. How do these different approaches and themes help contribute to the larger understanding of society, culture, and human behavior? Based upon your understandings of these disciplines, how might their approach to topics be helpful to other disciplines within the social sciences? Other academic disciplines outside of the social sciences? To the general public?In addition, think about the strategies used by practitioners of these disciplines to avoid bias. Do these differ from the social science disciplines that you read about last week? If so, how? Can these approaches be adapted for use outside of the social sciences?Write: In an initial post of at least 250 words

Social Science Discipline Reflection

  • Select one of the three disciplines examined this week, and discuss why you selected the discipline you did and how this discipline is distinct from other disciplines in the social sciences (Think about methods topics explored, etc.).
  • Social Science Discipline Reflection
  • Examine the topic discussed by the source linked above for your discipline.
    • Describe how your selected topic is related to the concepts of the individual, society, and culture.
    • Note the main points of the article, its conclusion, and assess how the questions asked by the social scientist in question are related to their discipline’s practice.
    • Discuss the methodology used within the article and relate the authors’ approach to specific examples in the text.
  • Assess any potential connections between the discipline you examined this week and the disciplines explored in week 3 with regard to the source you examined.
  • Postulate potential applications for your selected discipline and its approaches to everyday life.

Please use in-text APA citations within your post, as well as full APA references at the end of your post. If you need APA assistance, review the APA StyleLinks to an external site. resources.

Social Science Discipline Reflection

  • Why did you select the discipline you did  and how is it distinct from other social sciences?,

  • How is your selected topic related to the concepts of the individual, society  and culture?,

  • What are the main points of the article, and how are the questions asked related to the discipline’s practice?,

  • What methodology was used in the article, and how does it connect to specific examples in the text?,

  • What potential applications does your selected discipline have in everyday life?

August 11, 2025
August 11, 2025

Cybersecurity Strategy for PBI-FS

Your Task:

You have been assigned to support the Padgett-Beale Merger & Acquisition (M&A) team working under the direct supervision of Padgett-Beale’s Chief Information Security Officer (CISO). The M&A team is in the planning stages for how it will integrate a new acquisition, Island Banking Services, into the company as its financial services arm (PBI-FS). Initially, PBI-FS will function as a wholly owned subsidiary which means that it must have its own separate cybersecurity program.

Your first major task (Project #1) will be to help develop a Cybersecurity Strategy & Plan of Action for PBI-FS. Island Banking Services never had a formal cybersecurity program so you’re starting from scratch. You will need to research best practices as well as relying heavily upon what you learned in your undergraduate studies in Cybersecurity Management and Policy. The CISO has provided detailed instructions for this task. (These appear after the Background section below.)

Background

Cybersecurity Strategy for PBI-FS

After five years of operation, Island Banking Services — a non-U.S. firm — was forced into bankruptcy after criminal money laundering charges were filed against the company and its officers. Padgett-Beale, Inc. purchased the digital assets and records of this financial services firm from the bankruptcy courts. The purchased assets include licenses for office productivity software, financial transactions processing software, database software, and operating systems for workstations and servers. Additional assets included in the sale include the hardware, software, and licensing required to operate the company’s internal computer networks.

Figure 1. Island Banking Services IT Infrastructure Purchased by Padgett-Beale, Inc.

Padgett-Beale’s legal counsel successfully negotiated with the bankruptcy court and the criminal courts for the return of copies of the company’s records so that it could restart Island Banking Service’s operations. The courts agreed to do so after Padgett-Beale committed in writing to reopening the customer service call center (but not the branch offices) on the island. Reopening the call center will provide continued employment for 10 island residents including 2 call center supervisors. Padgett-Beale intends to relocate the call center to a company owned property approximately 10 miles away from the current location and adjacent to a newly opened Padgett-Beale resort.

Padgett-Beale’s Risk Manager has recommended that the Merger & Acquisition plan be amended such that Island Banking Services would be operated as a wholly owned subsidiary for a period of 5 years rather than being immediately and fully integrated as an operating element of Padgett-Beale. The company’s attorneys agreed that this would be the best approach given the potential for additional legal troubles related to the actions of the previous owners and employees. The Board of Directors has signed off on this amendment to the M&A plan and stipulated that the new subsidiary will be named PBI Financial Services (PBI-FS). The company officers and senior managers for PBI-FS will be named at a later date. For now, the leader of the M&A Team will serve as the Chief Operating Officer. Padgett-Beale’s Chief Information Security Officer will be loaned to PBI-FS while a search is conducted for a dedicated CISO for the subsidiary.

Cybersecurity Strategy for PBI-FS

CISO’s Detailed Instructions to You

The CISO has given you and your team mates a set of instructions (below) which you should follow as you complete this task.

Task #1: Read and Analyze the Background Materials

If you have not already done so, read the Background information in this file. Next, review the Padgett-Beale M&A Profile 2020 which was posted to the LEO classroom. You should also review all materials from the classroom for Weeks 1 – 4 as these provide needed information about the Financial Services industry and the legal and regulatory requirements which apply to this industry.

Task #2: Perform a Gap Analysis & Construct a Risk Register

Using the information available to you, determine the most likely information technology/security gaps which existed at Island Banking Services prior to its being acquired by PBI. Next, determine which of these, if not addressed, will likely exist in the newly formed subsidiary PBI-FS. Document your analysis and evaluation in a Gap Analysis.

Your Gap Analysis should address operating issues relating to confidentiality, integrity, and availability (CIA) of information, information systems, and information infrastructures owned or used by PBI-FS. Your analysis should also consider and use the People, Process, and Technology framework.

Step 1: Identify 10 or more significant cybersecurity issues/challenges/risks which the background information and M&A profile indicate currently exist at PBI-FS / Island Banking Services. You are allowed to “read between the lines” but must be able to map your analysis and findings to specific statements from these documents. These items will become your “Gaps” for the Gap Analysis. Use one or more cybersecurity frameworks or standards (e.g. NIST CSF; People, Processes, and Technologies; Confidentiality, integrity, availability) to organize your analysis.

Note: there was significant criminal behavior found at Island Banking Services. Your analysis must address internal weaknesses which allowed this to occur without being discovered by the employees who were not involved in the crimes.

Step 2: Using your Gap Analysis (step 1) create a Risk Register (see Table 1 at the end of this file) in which you list 10 or more specific and separate risks. For each risk, assign a category (confidentiality, integrity, availability, people, process, technology) and a severity (impact level using a 1 – 5 scale with 5 being the highest potential impact).

Step 3: Review the laws and regulatory guidance which apply to the Financial Services industry and companies like Island Banking Services. For each entry in your risk register, identify and record the laws, regulations, or standards which provide guidance as to how the identified risks must be addressed or mitigated. Record this in your risk register.

Step 4: Review laws and regulations which apply to all companies, i.e. Sarbanes Oxley, IRS regulations for Business Records, SEC regulations and reporting requirements, etc. Review your Risk Register and either map these requirements to existing entries in your risk register or insert new entries for significant legal or regulatory requirements which you were not able to map to your previously identified risks. (Include risk related to non-compliance.)

Step 5: Review section 1.2 Risk Management and the Cybersecurity Framework in the NIST Cybersecurity Framework v1.1 (https://‌nvlpubs.nist.gov/‌nistpubs/‌CSWP/‌NIST. ‌CSWP. ‌04162018.pdf)

Using this information, determine the best strategy for addressing (“treating”) each of your identified risks. Remember the four types of risk mitigation strategies (accept, avoid, control, transfer).

Consider the business impact for each of your mitigation strategies (e.g. if you applied an “avoid” strategy across the board, the company would not be able to operate in the financial services industry because it would need to shut down all operations).

Record your risk mitigation strategy for each risk in your risk register. For each of your “control” entries, include the corresponding control category and subcategory (if applicable) from the NIST Cybersecurity Framework (see Tables 1 and 2 in version 1.1). Examples: ID.AM Asset Management or PR.AC Identity Management and Access Control. Remember to cite your sources.

Step 6: Develop a Cybersecurity Strategy that presents five or more specific actions (strategies) that the company should take to implement your recommended risk mitigations. Include information from your gap analysis, legal and regulatory analysis, risk analysis and proposed risk mitigations. Under each strategy include information about how the strategy will affect or leverage people, policies, processes, and technologies (hardware, software, infrastructure). Include examples and other pertinent information about Island Banking Services and Padgett-Beale. You should have at least one technology related strategy which includes an updated Network Diagram. This diagram must show the to-be state of the IT infrastructure including recommended mitigating or “control” technologies, e.g. intrusion detection, firewalls, DMZ’s, etc. (start with the diagram provided in this assignment file).

Note: Your strategy will be presented to the Board of Directors by the executive who is leading the Merger & Acquisition Team so make sure that you write in appropriate language and include sufficient detail to explain your recommended strategy.

Step 7: Develop and document a proposed plan of action and implementation timeline that addresses each element of the cybersecurity strategy that you identified previously (in step 6). Provide time, effort, and cost estimates for implementing your recommended actions (include appropriate explanations of your reasoning). Include the resources (people, money, etc.) necessary for completing each task in the timeline.

Step 8: Develop a set of 5 or more high-level summary of recommendations regarding the next steps to take in mitigating the risks that you identified in steps 1-7. These recommendations should logically flow from your analysis and be supported by your Cybersecurity Strategy and Plan of Action.

Putting It All Together

1. Format your work for Steps 1-7 as a Cybersecurity Strategy and Plan of Action. The six major elements listed below should appear in this order in a single file. Your MS Word format document file must include:

· Introduction (what is in this document and to what organization does it apply)

· Gap Analysis (Step 1)

· Legal & Regulatory Requirements Analysis (Steps 3, 4)

· Risk Analysis & Risk Register (Steps 2, 3, 4, 5)

· Cybersecurity Strategy (Step 6)

· Plan of Action and Implementation Timeline (Step 7)

The Cybersecurity Strategy and Plan of Action is a comprehensive MS Word document that includes a separate title page followed by the six major elements (see list under step 7) and ending with a reference list. Your document must include a reference list and appropriate citations throughout. You will need 10 – 12 pages to fully document your strategy and plan. Use section headings and sub headings to organize your work. You may use internal title pages (section titles) to make it clear where each of the major elements begins and ends. Title pages and reference pages are not included in the recommended length.

2. Format your recommendations from Step 8 as a Cover Letter / Recommendations Memo to accompany your Security Strategy document.

The Recommendation Memo is a 2 page, professionally formatted memorandum addressed to the Merger & Acquisition Team. This cover letter / memo should summarize why this package is being forwarded to the M&A team for “review and action.” The memo should introduce and provide a brief summary of the purpose and contents of the Cybersecurity Strategy and Plan of Action (name and describe each of the major sections). Use a professional format for your memo (consider using one of the MS Word templates). The memo does not include citations or references but, you may need to name laws or regulations.

Notes on Constructing Your Network Diagram (for step 6):

Your diagram must be based upon the provided network diagram with additions or deletions that are clearly your own work. You may use MS Word’s drawing tools, Power Point, or other drawing program. When you have completed your diagram, you may find it helpful to take a screen snapshot and then pasted that into your deliverable file(s).

You may use commercial or “free” clip-art to represent individual end point devices or network appliances such as routers, firewalls, IDPS, etc.) Clip art does not need to be cited provided that it is clip art (not screen captures from another author’s work).

Additional Information

Cybersecurity Strategy for PBI-FS

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx.

5. All submission files must begin with a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file.

6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, etc.).

  1. What are the most likely cybersecurity gaps at Island Banking Services prior to acquisition?,

  2. How should these gaps be documented and categorized in a risk register?,

  3. What legal and regulatory requirements apply to PBI-FS in the financial services industry?,

  4. What specific cybersecurity strategies should be implemented to mitigate identified risks?,

  5. What is the recommended plan of action and implementation timeline for these strategies?

August 11, 2025
August 11, 2025

NIMS Impact on Disaster Response

Response to natural and man-made disasters have changed quite significantly since the implementation of the National Incident Management System (NIMS). Provide an example of a recent natural disaster or terrorist attack that has occurred in your region in the last 10 years. In what ways do you think the implementation of NIMS shaped the responding organization’s response? What component of NIMS do you believe was the most helpful in the response to the incident you identified? Explain your rationale.

NIMS Impact on Disaster Response

If you do not currently live in the United States, you may choose an incident in an area you have a connection to or one on which you are most informed.

NIMS Impact on Disaster Response

TEXTBOOK

Oliver, W. M., Marion, N. E., & Hill, J. B. (2021). Introduction to homeland security: Policy, organization, and administration (2nd ed.). Jones & Bartlett Learning. https://online.vitalsource.com/#/books/9781284205213

  1. What is an example of a recent natural disaster or terrorist attack in your region within the last 10 years?,

  2. How did the implementation of NIMS shape the responding organization’s response?,

  3. Which component of NIMS was the most helpful during the incident?,

  4. Why was this NIMS component particularly effective?,

  5. How does the identified incident illustrate improvements in disaster response?


Comprehensive General Response:

A notable example of a recent disaster in the United States is Hurricane Harvey (2017), which devastated parts of Texas, causing catastrophic flooding and displacing hundreds of thousands of residents. The response to Harvey highlighted the significant influence of the National Incident Management System (NIMS) in coordinating large-scale, multi-jurisdictional operations.

The implementation of NIMS shaped the response by establishing a common framework for communication, decision-making, and resource allocation among federal agencies (FEMA, Coast Guard), state emergency management teams, local first responders, and non-governmental organizations such as the Red Cross. Through the Incident Command System (ICS) structure mandated under NIMS, responders could operate under a unified command, which reduced redundancy and improved efficiency in rescue and relief operations.

The most helpful NIMS component during Hurricane Harvey was Unified Command under ICS. This ensured that leaders from different agencies could make coordinated decisions, share intelligence, and prioritize actions based on a collective operational picture rather than working in silos. This coordination was especially important in managing evacuations, deploying search-and-rescue teams, and organizing shelter and medical services for displaced individuals.

Unified Command was effective because it streamlined communication, eliminated conflicting orders, and ensured that critical resources—like boats, helicopters, and medical supplies—were sent where they were needed most. In previous large-scale disasters before NIMS was fully implemented, response efforts often suffered from confusion, duplicated efforts, and competition for resources. In Harvey’s case, the use of NIMS principles allowed a more strategic and collaborative response, ultimately saving more lives and reducing suffering.

Overall, the Hurricane Harvey example illustrates that post-NIMS disaster management is far more structured, cooperative, and adaptable. By using shared terminology, joint planning processes, and flexible organizational structures, agencies can respond to both natural and man-made disasters with greater precision and speed than in the pre-NIMS era. NIMS Impact on Disaster Response

August 11, 2025
August 11, 2025

Student Records DB

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records.

You met with various university subject matter experts and have determined the following after performing various business analysis processes:

  • Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the art faculty, computer technology faculty, language faculty, and science faculty. Each faculty member has an assigned dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
  • Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
  • There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs, such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering, to name a few.
  • The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
  • The university identifies each student by their name, date of birth, social, and professional study program.

Student Records DB

Instructions

Using these findings, write a 3–4 page paper in which you:

  • Student Records DB

  • Analyze the university’s requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
    • Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
    • Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course, or students can only be enrolled in one program.
  • Create the primary key and foreign keys using a UML class diagram for each table.
  • Suggest at least four types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university.
  • Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
    • Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors.
    • Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based, pricing model, open source, et cetera.
  • Go to the Strayer Library to locate at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
  • The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in any chart or drawing tool with which you are familiar. The completed diagrams or charts must be imported into the Word document before the paper is submitted.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Propose a database design.
  • Student Records DB

  • How should the university organize required data elements for centralized student records (ERM proposal)?,

  • What assumptions/limitations apply to relationships in the model?,

  • What are the primary keys and foreign keys (UML-style) for each main table?,

  • What BI reports would be useful for course management enrollment and historical tracking?,

  • Which vendors could the university outsource to (3 vendors), and how do they compare?