Describe the problem you are fixing by proposing this new cybersecurity program. This would include potential threat, financial loss, etc, that the organization faces due to lack of cybersecurity.

Week 8 Program White Paper

Describe the problem you are fixing by proposing this new cybersecurity program. This would include potential threat, financial loss, etc, that the organization faces due to lack of cybersecurity.

Write a security policy for your organization. The purpose of a security policy is to safeguard the confidentiality, integrity, and availability, of the organization’s systems and information. Be sure to include objectives, scope, specific goals, and consequences in the event of noncompliance.
Create a team.

Define roles and responsibilities of all stakeholders, including those of the CISO.

Describe the access control methods you would implement for your building and network.

Briefly explain the pros and cons of each project management quality:

Assignment: Submit one initial post addressing the topics below, and respond to two classmate’s posts.

Briefly explain the pros and cons of each project management quality:

a.Good
b.Cheap
c.Fast

Pick two qualities and explain why you can’t have the other:

a.If you want it good and cheap, you can’t have it fast.
b.If you want it good and fast, you can’t have it cheap.
c.If you want it cheap and fast, you can’t have it good.

 

Should we, as a Constitutional society, authorize the police in Texas greater freedoms in making warrantless arrests than listed in Chapter 14 Texas Code of Criminal Procedure?

Should we, as a Constitutional society, authorize the police in Texas greater freedoms in making warrantless arrests than listed in Chapter 14 Texas Code of Criminal Procedure?

Should police be required to obtain warrants for all instances instead of the authorization outlined in Chapter 14 TX CCP warrantless arrests? OR should there be fewer restrictions as outlined in Chapter 14 Code of Criminal Procedure?

 

In your opinion did Howard Marks commit a crime? If “yes” why? If “no” why?In your opinion will Howard Marks be found guilty of any crime?

CJA 431 DBW1
After watching the Minority Report video: https://youtu.be/BmSarhudhiY
Answer the following questions below:

1. In your opinion did Howard Marks commit a crime? If “yes” why? If “no” why?

2. At what point in the film could a prosecutor argue a crime was committed?

3. In your opinion will Howard Marks be found guilty of any crime?

What is negligence per se? Why might this be important for a plaintiff to establish?Negligence is made up of four basic elements. The first element, duty, includes a related concept of “standard of care”. Does that standard of care change depending on the defendant involved, and if so, how?

1. Negligence is made up of four basic elements. The first element, duty, includes a related concept of “standard of care”. Does that standard of care change depending on the defendant involved, and if so, how?

2. What is the “reasonable prudent person” standard?

3. What standard of care might a landowner owe a trespasser?

4. What is negligence per se? Why might this be important for a plaintiff to establish?

5. What is res ipsa loquitur? Why was the concept introduced to torts law?

6. Look up the case of Palsgraf v. Long Island R.R. Co., Ct. of App. of N.Y., 248 N.Y. 339, 162 N.E. 99 (N.Y. 1928). To the legal community, Palsgraf is very important and famous case. What is the primary concept that Palsgraf helped establish, and why is it important to negligence law?

7. Let us say that someone negligently causes another person to slip in a puddle of water. The person who slipped received not physical or mental injury from the fall; they simply slipped. Why might this be important for the concept of damages if the person who slipped sued the person that created the negligent risk?

8. What are the differences between a licensee and an invitee with regard to torts law?

9. What is comparative negligence? What are the different types of comparative negligence?

10. What is contributory negligence? Does the defense seem appropriate to you? Why?

 

 Why were they wrongfully convicted. Was it too late? Meaning, had they been executed already.How were they proven not guilty

There have been many news stories about innocent people being wrongfully convicted, and then exonerated by DNA testing. Locate one of these stories and then answer the following questions about the case:

Name of wrongfully convicted.

Basic information on the case. When, where, what etc.

Why were they wrongfully convicted.

How were they proven not guilty

Was it too late? Meaning, had they been executed already.

Location you found this story – website etc.

Your submission must be at least 500 words. It must be grammatically correct, and free of spelling errors.

Are your thoughts organized in a clear, coherent manner? Ensure there is a clear introductory statement, a definitive body, and a conclusion statement.

Summary of Privacy, Autonomy, and Dignity in the Prison

Organization:

Are your thoughts organized in a clear, coherent manner? Ensure there is a clear introductory statement, a definitive body, and a conclusion statement.

What other evidence (other than testimony) was significant in establishing or challenging a prima facie case of murder? Why was this significant?

Assignment 3
You may conduct your own research in answering the questions below, but also consider the following two links for support:

Aaron Hernandez

Aaron Hernandez Part 2

After reviewing the information provided, submit a paper using the format below and answering the following questions supported by specific authority from the links provided.

A. Introduction

Give a brief overview of the facts of the case, including an explanation of the specific statute(s) under which the defendant was charged and/or convicted and the ultimate outcome of the case

Give a brief explanation of the burden of proof, which is proof beyond a reasonable doubt in a criminal prosecution.

Give a brief explanation of why the Hernandez trial was so important to the prosecution of crimes in the United States.

B. Opening Statements

Which attorney was most persuasive and why?

Which attorney gave the jury more significant facts to consider and what were those facts?

C. Establishing/Challenging a Prima Facie Case for Murder

Name one key witness who helped establish a prima facie case of homicide for the prosecution or challenged a prima facie case for the defense, and explain why he or she helped or hurt the prosecution of the case.

D. Evidence

What other evidence (other than testimony) was significant in establishing or challenging a prima facie case of murder? Why was this significant?

E. Closing Arguments

Describe why one argument was more persuasive than the other.

Discuss what in particular may have persuaded the jury one way or the other based on the closing argument.

F. Outside Factors

What, if any, outside factors (media, public opinion, etc.) affected the trial and/or the outcome of the case and how did they do so? (What book?)

G. Concluding thoughts

Discuss why this case is important to the study of criminal justice and criminal prosecution, and how reading primary documentation about it has changed your own perspective on the case.

 

 

What types of Physical Access Controls does your company use?Do you think they are effective or can they use improvement?

Week 6 Discussion: Physical Access Controls

List the types of access control. (cite source)

What types of Physical Access Controls does your company use?

Do you think they are effective or can they use improvement?

How would you improve?

What is physical security as it relates to Information Security? What are the primary threats to physical security? How are they manifested in attacks against the organization?

Week 6 Questions

Assignment: Answer each of the following questions. Write one full page for each answer, and precede each answer with the question and its corresponding number.

Questions:

What is data encryption?
What is the fundamental difference between symmetric and asymmetric encryption?

What is physical security as it relates to Information Security? What are the primary threats to physical security? How are they manifested in attacks against the organization?