Two ways to improve change management

Change management is the process of transitioning people, places, things, processes, inputs, outputs or an assortment of other variables that impact the business to a new and desired end state.  The change management process follows the process of creating a change, requesting change, approval of the change, communication of the change, implementation of the change and sustainment of the change.


The categories of performance measurement

Performance measurement provides the ability for individuals or groups holding the responsibility to leading projects or managing teams to understand how the efforts are working in regard to key metrics and milestones.  The ability to understand the performance of actions, teams, business units or other entities delivering upon requirements is critical in providing the information needed to make informed business decisions.  There are basically two different types of performance measurements.  There are result orientated performance metrics and input focused metrics.  The result or output performance based measurement focuses on the outcome of the specific activity or accumulation of multiple efforts.  Outcomes of these efforts include financial performance, increased market share, launch of a new product, acceptance of an idea or product or developing a competitive advantage.  Activities for the result orientated performance measurements include calculating profit margins, unit productivity, sales or cost reductions.  These are key metrics that are measured after activities are accomplished and measure the results.


Assignment 1 Positioning Statement and Motto

Use the provided information, as well as your own research, to assess one (1) of the stated brands (Tesla, Smoothie King, Suave, or Nintendo) by completing the questions below with an ORIGINAL response to each. At the end of the worksheet, be sure to develop a new ORIGINAL positioning statement and motto for the brand you selected. Submit the completed template in the Week 4 assignment submission link.

Target Customers/Users 

Who are the target customers for the company/brand? Make sure you tell why you selected each item that you did. (NOTE: DO NOT say “ANY, ALL, EVERYONE” you cannot target everyone, you must be specific)

IT Management

Network Assignment

 Would you recommend using a firewall? Explain.

Firewall is considered as a baseline control for securing the network environment of any enterprise. In general, routers are equipped with built-in firewall, such as Network Address Translation (NAT) or other software based packet filtration. However, a separate hardware based firewall is recommended for small medium enterprise or a global enterprise. Hackers are now using advanced methodologies for penetrating within the network. One of the examples are Advanced Persistent Threats (APT) that uses advanced encryption algorithms and phishing techniques. Once a network is compromised, confidential information such as trade secrets may be leaked and reputation or an organization will be at stake, for instance, banks may lose their clientele or may even become bankrupt if personal information is leaked such as credit card numbers.

Would you recommend using antivirus filtering? Explain.

Antivirus is also considered as a baseline security control that is considered mandatory for a computer network to be protected.  The primary purpose of Antivirus is to detect and clean viruses from the system. Antivirus filtration is configured for detecting viruses attached to an E-mail, once the recipient open the attachment within the E-mail, virus files are executed.

 Would you recommend an intrusion detection system? Explain.

Previously, firewall and antiviruses were adequate for securing a corporate network from threats and viruses from the World Wide Web. Today, security threats are continuously increasing, as hackers are using advance techniques capable of exploiting even the smallest of vulnerabilities. Intrusion detection systems are now mandatory, as they provide alert messages prior to an attack. These alerts inform the concerned personnel to isolate the infected machines from the network or initiate an action plan to combat against the threat.

When an IDS generates alerts, it can send them to a console in the security center, to a mobile phone, or via e-mail. Discuss the pros and cons of each.

The first major benefit for transmitting these messages is the information about the security breach that is about to happen. Likewise, receiving this information early provides time to the concerned personnel to initiate an action plan, as per the scenario. Moreover, a reliable information channel is preferred, for instance, SMS on cell phone is more relevant, as it is quickly accessible. If these messages are transmitted via email and the employee is not available in office, the information will not be effective. Furthermore, if these messages are accessed via unknown personnel, they can be misused. Hence, the messages generated by IDS must be secure and must be transmitted via reliable and secure medium.

Examine the integrated log file shown in Figure 9-15 of the text.

 Identify the stages in this apparent attack, b). For each stage, describe what the attacker seems to be doing.

There are total 3 stages in this attack. The first stage incorporates a password attempt for accessing E-mails. The second stage incorporates a successful login to the SMTP server. The third stage incorporates retrieving emails from the SMTP server to the attacker’s location. The attacker has tried more than one password attempts to login the SMTP server. After gaining access to SMTP server by using the ID: Lee, the hacker deactivated host log entries. Moreover, data is also transferred from TCP.

Decide whether the actions in this stage work at human speed or at a higher speed, indicating an automated attack.

By reviewing the time sequence, it is obvious that it was a dictionary attack on the User Id: LEE. The logs are clearly demonstrating the evidence, as first login attempt was at: 08:45:07:49, the second login attempt was at: 08:45:50:18.

Decide whether the evidence in each stage is suggestive of an attack or conclusive evidence.

Logs in the figure shows that the attacker used a dictionary attack that randomly checked the password, or maybe there is a possibility of guessing the password of the user. Moreover, host logs were also disabled so that there will be no evidence of an unknown host present on the network.

Overall, do you have conclusive evidence of an attack?

There were two wrong attempts on Login ID: Lee. Moreover, host logs were also disabled, as these logs provide information of the hosts present on the network. Furthermore, data was transferred via SMTP as well as TCP.

Do you have conclusive evidence of who committed the attack? As a suspicious IP address that guessed the password or used a random dictionary attack with 40 seconds time interval. After disabling the host logs, data was transferred via SMTP and TCP.

A firm is trying to decide whether to place its backup center in the same city or in a distant city. List the pros and cons of each choice.

The disaster recovery site must not be available in the same geographical region. One advantage is that for testing the disaster recovery site, resources are easy to manage, as the site is located within the same region. However, if a disaster hits one region, for instance, if earthquake occurs, the primary location as well as the disaster recovery site may be damaged. Whereas, if the disaster recovery site is located in geographically different location, risk is minimum.

To get out of taking exams, students occasionally phone in bomb threats just before the exam. Create a plan to deal with such attacks. This should take one single-spaced page. It should be written by you (a policy advisor) for your dean to approve and post in your college.

For dealing with this scenario, federal police helpline or bomb disposal helpline should be informed immediately. The government officials can investigate the originality of the caller and the bomb evidence can be investigated separately by the bomb disposal squad.  Moreover, for minimizing the delay of the exam timings, a separate facility needs to be arranges in a safe secondary location that must not be too far away. The secondary location must be within a reach of every student.  However, the exams must be delayed for some time in order to investigate the primary facility by bomb disposal squad. If the bomb disposal squad gives 2 hours or above for investigation, the secondary location plan will be executed, all students and their guardians must be informed about the slight change in exam timings along with the secondary location address. If the bomb disposal squad declares no bomb or bomb has been diffused, students of the second shift will conduct the exam on the primary location.

After you restore files following an incident, users complain that some of their data files are missing. What might have happened?

The plan has not addressed the recovery time objective adequately. Secondly, there is a possibility that the backup schedule is at 5:00 PM and the incident takes place on 4:30 PM, eventually the data will be available till yesterday 5:00 PM.


Op-Ed on Poverty is a Social determinant for Dental Health

One of the critical social determinants of health in Canada is poverty.  The free universal health care of Canada should include dentist visits in the cover. To be sure, the government is doing a good thing by providing free medical care for primary health care services. However, they should also put into consideration gum diseases, because not only do they cause teeth ailments, but also other chronic illnesses. There are numerous reasons why most people in Canada do not visit the dentist. However, cost is the leading factor. Markedly, the people most vulnerable to dental disease, pain, and decay do not have access to the much-needed health care service.


The Greatest Contribution to Criminology by Sir Alec Jeffreys

Biotechnology plays a vital role in society by improving the quality of life. There have been numerous inventions that have made a positive contribution to the field of medicine, agriculture, food processing, general industrial use, and even in criminology. One such intriguing contribution is “DNA profiling” and “genetic fingerprinting.” This was discovered by Sir Alec John Jeffreys in September 1984. Arguably, this is one of the greatest inventions of the 20th Century. Thus, Sir Alec John Jeffreys is my nominee for the Carleton Prize for Biotechnology. My choice is based on the fact that his invention revolutionized how criminal investigations are carried out worldwide. Crime investigators rely on “DNA profiling” and genetic fingerprinting to solve crime cases. These two inventions enable police officers to link suspects to various crimes and identify victims using forensic science.

American History


Separation of Church and State is an important constitutional principle which intends to create a space between the government and also religious affiliations of the people. This is to support a secular state wherein there is no recognized religion for a particular country, and there is no connection between the church and the state. In the United States, the said principle is imposed under the Establishment Clause of the First Amendment of the constitution[1]. Moreover, in recent years, the court has different interpretations of the laws which resulted in various rulings in related cases. This paper will discuss the religious background and belief of the United States and different principles which shaped such opinions in the end.


Ethical Issues in Social Media

Social media has become heavily used by the youth, adults, and businesses alike. Thus, it has become a prominent marketing tool for businesses all over the globe to expand their customer base. However, with this expansion a plethora of issues have arisen in terms of how businesses can maintain professionalism on social media and how owners can maintain an appropriate brand image for their company when using social media. Many companies, such as ZPalette which produces cosmetic eyeshadow holders, have made mistakes regarding their brand image on social media and how to maintain professional behavior. Social media has caused many ethical and unprofessional issues to arise; therefore, business owners need to understand the ramifications of their actions on their consumers and themselves.


Information about Kaiser Permanente for the past eight years

Keiser Permanent encompasses the Keiser Foundation Health Plan, Permanente Medical Group in eight regions and Keiser Foundation Hospitals. Keiser Permanente is the biggest health care provision non-profit organization in the United States. Over the years, the organization has undergone subsequent successful developments in its formation due to the constant changes in the competitive healthcare marketplace. Based on this, the healthcare marketplace in the United States has necessitated a close partnership that links healthcare administrators as well as physicians through the support of physician culture.

Fig: Image showing the three entities of Kaiser Permanente Program

The support of has mainly been embarked by the principles of accountability, quality healthcare delivery and efficiency.  An overreaching approach to realizing excellence in the delivery of healthcare predominantly focuses on the realization of high-impact healthcare conditions. It offers goal-oriented tools of analysis for population information. It enhances a proactive identification of patients who require health interventions and upholds support for a systematic process of improving and fostering partnership linking the healthcare professionals and patients as an approach of improving the overall quality of healthcare delivery. Keiser Permanente health partnership has been a central player in all these efforts which entails a complete structure which integrates digital health data record to facilitate delivery of quality care to patients by health professionals.


The Growth of Soccer (PowerPoint Presentation)

The Growth of Soccer final


Fairness Criteria

Appointment issues arise every time a set of similar indivisibles objects ought to be distributed among a certain group of claimants in line with the proportion of their claims. Legislative seat distribution mainly motivates the discussion on fairness criteria in Young’s chapter 3. Young highlights several fairness criteria within the chapter to address the various apportionment problems.

Hamilton and Jefferson’s methods are among the fairness criteria that Young highlights in the chapter. The main idea of fairness in the two methods is that each state should receive its exact portion of seat referred to as quota. A quota of a state represents the fraction that the population of the state represents the entire population, multiplied by the total seat number. In this particular method, the Hamilton method conditions that each state should first be given the integer parts of its quota. In case any seats remain, each should be allocated to the states that have the highest fractional remainders. Jefferson, a cabinet rival to Hamilton, proposed a very different approach to solve apportionment problems.