Assignment for Course: Business 221 – Business Statistics I Submitted to: Dr.

Assignment for Course:

Business 221 – Business Statistics I

Submitted to:

Dr. Mark DAntonio

Submitted by:

(Name of Group – name of each member Below)

Date of Submission

MM/DD/YY

Title of Assignment

Case Study (updated 4 May 2011)

Instructions: Read the questions very carefully because the requirements for each are specific. Each group should turn in one copy of this WORD document (email to me) with the names of the participating group members typed on the bottom of this cover page. Answer all questions fully in this document only. That is, I want to see the question below followed by your answer so I do not have to guess what you are answering. This project is worth 200 points.

CERTIFICATION OF AUTHORSHIP: I certify that the members of the group named above equally contributed to the assignment that is attached. Any assistance received in its preparation is fully acknowledged and disclosed in the paper. Any sources from which the group used data, ideas or words, either quoted directly or paraphrased is also disclosed. Please print and sign below.

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Student’s Signature: ______________________________________

Aegis Home Inspections Inc.

Dr. Mark DAntonio of Northern Virginia Community College provided this case and associated data. The company and data were totally fabricated. Any resemblance to any organization is coincidental. Please use Microsoft Excel to do this assignment.

Background

Aegis Inc. is a home inspection firm based in the Northern Virginia area. The President of the company, Ms. Rose Wilson, is concerned about the morale of the sales team. Ms. Wilson had contracted a local firm to survey the employees of Aegis Inc. and the results were delivered to her in an EXCEL spreadsheet. She has tasked her Vice President of Human Resources, Mark Wolfe, to analyse the results of the survey and to report the results to her. Ms. Wilson told Mark that she was concerned about the attitudes of the sales force. In addition to the questions that were asked some additional data were recorded: the most recent base annual salary, commission and total pay, the years of seniority, the sales region of the individual, the gender (0=male, 1=female) and the number of contracts written in the pay period.

The survey instructions indicated that the first 5 questions were measured using a 5-point scale using the following key: 1 = strongly disagree, 2 = disagree, 3 = neither agree nor disagree, 4 = agree, 5 = strongly agree. The questions were as follows:

Q1: Aegis Inc. has a good mentoring program

Q2: Aegis Inc. is committed to delivering good value to customers

Q3: Aegis Inc. has very traditional and conservative values

Q4: Aegis Inc. company practices favor men

Q5: Aegis Inc. has a lot of internal power politics.

The final question used a 1-10 scale:

Q6: On a numeric scale, where 0 means totally autocratic and 10 means totally democratic, how would you rate the management style at Aegis Inc.?

There are only 2 divisional managers for Aegis Inc. The geographic regions of the sales team are as follows:

Region Number

Divisional

Manager

Area

Size of Sales Force

1

A

South East

60

2

A

North East

93

3

A

Midwest

59

4

B

South West

49

5

B

Mountain States

80

6

B

West Coast

67

Total

408

Region 4 was only established eight months ago. Prior to that time, the branches were part of Regions 1, 5 and 6.

INSTRUCTIONS

As a group: Answer the following questions involving Descriptive Statistics

Draw (create) a random sample of 50 from the full database then answer the following questions. You will ultimately use the sample of 50 from the full population of 408 to compare and contrast the sample and the population in the questions below. Typically you would not have the data for the entire population (such as in an election). So the point of this project is to use various statistical methods to examine how well your sample matches the population. It is obvious that the charts, figures etc. for the population should be the same for each group (or individual) that does this project. However, I would not expect to see the same results for any two groups (or individuals) samples since they are created using the Random number generator (RNG) mentioned below. This is a detailed and important project in this course, start early and take the time to do a good job. This assignment is worth twice what any one exam is worth.

Draw a random sample of 50 from the full population provided by using the Random number generator (RNG) in Excel as a random sampling method (see my example of the RNG under Course documents). After creating the sample of fifty paste it here under this question.

Describe how the random sample was taken. Discuss. This is the place that you discuss how you did number 1 above. Be detailed. Refer to the instructions for the RNG that are provided in the Excel document.

Determine the mean, mode, median, variance, standard deviation, high value, low value and range for years of seniority, base salary, commission and total salary for your SAMPLE. Save yourself some work here by using the Excel Descriptive statistics function.

Determine the mean, mode, median, variance, standard deviation, high value, low value and range for years of seniority, base salary, commission and total salary for the POPULATION. Save yourself some work here by using the Excel Descriptive statistics function.

Briefly explain the differences between the population and your sample. Discuss. I am looking for a paragraph or so here of prose. I would expect more than a few sentences.

Briefly explain the similarities between the population and your sample. Discuss. I am looking for a paragraph or so here of analysis. I would expect more than a few sentences.

Is there a difference between your sample and the population in how the sales force is distributed within the regions? (Is the number of sales people in each of your sample regions proportionally the same as in the total population?) The best way to answer this is to set up a table of the regions in the population and the sample. The table would show how many people are associated with each region. Does the sample mimic the population? Discuss. Again, I am looking for analysis here so I would expect more than a few sentences.

Answer the following questions involving Inferential Statistics

Is there a relationship between years of seniority and base pay for the sample? The population? (Hint: Use a Scatter chart- the scatter chart is required and should be displayed for this question.) If you determine if there is a relationship comment if the relationship is linear, curvilinear or something else. Does it change as the values change? Discuss fully.

Is there a relationship between years of seniority and commission pay for the sample? The population? (Hint: Use a Scatter chart- the scatter chart is required and should be displayed for this question.) If you determine if there is a relationship comment if the relationship is linear, curvilinear or something else. Does it change as the values change? Discuss fully.

Is there a relationship between years of seniority and total pay for the sample? The population? (Hint: Use a Scatter chart- the scatter chart is required and should be displayed for this question.) If you determine if there is a relationship comment if the relationship is linear, curvilinear or something else. Does it change as the values change? Discuss fully.

Is there a large or small difference in your answers for the sample and the population for questions 8, 9 and 10? (Hint: Compare the Scatter charts- the scatter charts in the prior questions can be referred to or you can copy them here.) Discuss fully.

3

BUS 221 Case Study

Math 1 Practice Final Exam 1. Find the following (a) (b) (c)

Math 1 Practice Final Exam

1. Find the following

(a) (b) (c)

(d) (e) (f)

(g) (h) (i)

(j) (k) (l)

(m) (n) (o)

(p) (q) (r)

2. Determine if Rolle’s Thm can be applied; if it can find the value(s) of c for which the given functions satisfy Rolle’s Thereom.

3. Determine if the Mean Value Thm can be applied; if it can find the value(s) of c for which the given functions satisfy the MVT.

4.

5.

6.

7.

8.

9.

10.

11. Find

(a) (b)

12.

13.

14. Find the following

15.

16.

17.

18.

is continuous where?

19. Find the derivatives

20.

2 Kontoured by Khyia Z’Khyia Lucas Into to Business College of Southern

2

Kontoured by Khyia

Z’Khyia Lucas

Into to Business

College of Southern Maryland

12/26/2024

Kontoured by Khyia

Name of Business
The name of my business is Kontoured by Khyia.

Online or Brick-and-Mortar
Kontoured by Khyia will be a brick-and-mortar business, providing in-person services to clients in a professional spa and medical facility.

New or Existing Idea
This is an existing business idea that I plan to enhance by expanding its services to include a broader range of offerings.

Business Idea

A good business concept is crucial as it forms the basis of a successful company. Khyia will show an esthetician’s med spa that provides medicinal and aesthetic treatments. In addition to standard beauty treatments like waxing, facials, and chemical peels, the firm will provide cutting-edge medical procedures like lip fillers, intravenous hydration infusions, and post-operative care, including lymphatic drainage massages, to help patients recuperate from surgery. We will also be providing weight loss injections and a dietician to help you achieve the body and health of your dreams . Customers looking for expert, high-end wellness treatments and cosmetic upgrades will get what they want at this medical spa. Kontoured by Khyia, it will meet a need in the market by providing a one-stop shop for health and beauty and integrating modern medical treatments with traditional aesthetic services.

Stakeholders

The owner, employees (including certified aestheticians and Nurses), vendors (who provide the salon with cosmetics and health aids), and customers (who pay for the services) are all considered stakeholders in Kontoured by Khyia. The community at large, which stands to gain from job opportunities and better services, as well as regulatory bodies that monitor the medical and beauty sectors, are other potential stakeholders. Local healthcare providers may also recommend patients for post-operative treatment.

Additional Details

Client satisfaction, professionalism, and safety will be the company’s top objectives. Thus, only trained medical staff will perform any procedures that may be required. In addition, the spa will work hard to create a relaxing and welcoming environment so that clients feel valued and cared for. Kontoured by Khyia provides an extensive menu of treatments with the goal of becoming a household brand in the health and beauty industry.

Reference

Lumen Learning. (2024). Introduction to Business (Lumen One). Lumen Learning.

Blue Mountain Coffee Katelyn Blose Check to make sure you explain .

Blue Mountain Coffee

Katelyn Blose

 

Check to make sure you explain . . .

Page

Reference

1

Title page

2

Checklist

3

Summary Sheet

4

What is the purpose of your report?

 

Final-1.

 

5

Give details about your company (location, products, current sales, current locations, etc.)

 

Final-1.

 

6

What is your role in the company?

 

Final-1

7

What do you intend to achieve for your company in the (a) short-term (next few months) (b) long-term (next 5 years)?

 

Final-1, Final-2, Final-5

 

8

Which markets will you grow in? What entry modes will you use?

 

Final-5

 

9

How will you fund your company’s growth?

 

Final-2, Final-5

 

10

What is your company’s core competence? Which 1 or 2 functions/activities are central to the core competence? How will foreign expansion contribute to your firm’s core competence?

 

Final-3, Final-5

 

11

Which international business strategy best reflects your company’s internationalization plan?

 

Final-3

 

12

How will you minimize (1) transportation, (2) tariff, and (3) exchange rate costs that come with international expansion (cite at least 1 reference for each cost to substantiate your argument)

 

Final-3

 

13

How will you manage growth in terms of horizontal/vertical structure, integrating mechanisms, and controls?

 

Final-4

 

*

Make sure to thank reviewers who helped you during discussions in the footnote/s.

 

Final-1.doc

Overview

My name is Katelyn Blose. I have been promoted to the position of International Operations Manager of Blue Mountain Coffee This is a response to our rapid growth in the Blue Mountain Coffee industry where we specialize in coffee. Our annual sales are currently $50 million. While our company is based in Montana, I am responsible for expanding our reach to Italy. I am evaluating whether to do it through exports or foreign direct investment (FDI). Exports can be through the local buying agents of two major international distributors: Royal Mile Coffee and Nature’s Flavors. FDI will require opening a branch office in either the capital city, i.e., Rome or in the commercial center, Venice. My choice will depend on which of the two channels can give me an average sale of $10 million per year within the next 5 years. If annual sales do not change over the years, foreign sales will be 5% of our total sales.

In the next few weeks, I will propose a plan on how the international operations will be managed and the products will be positioned in Europe. I hope you will find the discussion worthy of your attention and I look forward to your feedback on how to make the plan, and my position, more successful.

Growth Plan

Our growth plan is to expand the products we already produce into Italy. We believe our brand and flavors of coffee will sell rapidly and become a very popular product in Italy. Our product sales have been doing great inside the United States, so we believe expanding into Italy and, eventually other countries will only make our company better. As we expand into new countries, we will strive to make flavors that the locals will love. To be able to expand our business into new countries we will need money. We will be using a commercial loan to support our growth. This loan will help us with marketing, research, and distribution of our product inside Italy. We will be using Chase bank as it a top bank both within the states and internationally. They also have good interest rates for the loans we will need.

Core Competence

Blue Mountain Coffee’s core competence is represented by our unwavering focus on quality of our coffee beans and great flavors, as well continuous product advancement. We thrive ourselves on our fresh beans and processing as well as the many different flavors of coffee blends, we offer. We use only high quality and fresh products and that’s what makes our coffee stand out from other brands. Our production is responsible for our core competence. We focus on how we grow the beans and fly using fresh beans. We also only use fresh flavorings no extracts to bring those amazing flavors and aromas to the coffees that everyone loves to enjoy in the morning. 

Blue Mountain Coffee matches all 4 VRIN. Our company’s core competence is valuable because our business is so successful from our high standard of our fresh coffee beans as well as the many natural flavors we offer. It is rare because not all coffee companies care about the freshness and quality of their coffee. Some only care about the cheapest way they can make and produce it to get it on the shelves and make a profit. We take our time growing our own seeds and processing them ourselves as well as only using natural flavors. It is very hard for competitors to imitate what we do. We use only our locally grown seeds, and we process them ourselves as well as local natural flavors are added to the coffee. Not many other companies can copy our work to get the exact delicious flavors we offer. The resources and ingredients we use cannot be easily switched out for cheaper or different ones.

Blue Mountain Coffee’s core competence is distributed across several functions. We will offer a variety of flavors especially in different countries that will cater to that region and what they like. Different flavors will be available in different countries unless we feel that some flavors will sell well in a few of the different countries we are expanding into.

International Business Strategy

Our International business Strategy is global standardization. All our offices operate the same and report back to our main office in Montana. Our company thrives on the freshness and quality of our product, and we expect that to remain the same no matter what country we are selling in. We also will use a lot of the same packaging, and branding across countries. We will add specific flavors that we believe will sell great depending on each culture and country we expand into.

Blue Mountain Coffee will be using a centralization. This will allow better structure in the company and better control. It will help keep all our products consistent no matter where they are made or sold. To horizontally structure out company we plan to use a global matrix strategy. This will allow all our departments to collaborate and communicate on marketing, expansion etc. plans more efficiently even in different countries and time zones. 

Blue Mountain Coffee will use project teams. Project teams will allow us to launch new flavors and ideas that will be popular in Italy. The project teams will help us navigate the culture differences in the new markets we choose to expand into so that we not only can thrive there but also offer flavors that will be desired.

Personal Controls:

Personal: We will have an employee who is constantly checking in on our team in Italy to make sure the team is successful as well as selling products locals in Italy will want to enjoy as well as our original flavors.

Bureaucratic: We will have a small team keeping records on how the team overseas is following our procedures. They will also oversee financial reporting, marketing strategies, and employee conduct. They will engage in regular performance reports from subsidiaries to headquarters detailing key activities, allowing for close monitoring of our teams in other countries.

Output: A team will oversee making sure we reach our performance targets and goals such as revenue growth as well as meeting out sales goals, customer satisfaction and making sure the quality of our products remains the same.

Organizational Culture: Our team in Italy will be monitoring the sales and growth of our company and reporting everything back to our teams in Montana.

The best way for our company to transport our products into Italy from the states is through the very many ports in Italy.

Long-Term International Expansion/Growth Strategy

Three years from now Blue Mountain Coffee plans to expand to Germany and Brazil. 

Blue Mountain Coffee will be expanding into Germany in the following years. Germany is a developed country with a good economy that will allow out company to thrive.  Coffee is a central part of German culture and is a big part of their everyday life and we believe that our fresh coffee and many flavors will be great for the locals. For our entry we intend to enter via direct exporting. This allows us to move our products into Germany faster with the most profit.

Blue Mountain Coffee will also be expanding into Brazil in the following years as the merging country. We believe that adding our unique flavors will be a great addition to the coffee market already in Brazil. We will enter with a strategic alliance with a local coffee business. Brazil already has a goof coffee market, and we believe that offering our flavors and even creating new ones that we believe will add to the market will thrive there. 

We believe out of the two markets that we plan to expand to that Brazil is the best one for a strategic alliance. Brazil already has great coffee market so it would be most beneficial for both us and them to offer or unique flavors to their business to sell.  We chose to expand using a commercial loan with Chase bank. We believe this is still a good choice for our business as Chase does a lot with international businesses. 

Our original core competence was focus. Our focus is on growing and making freshly grown and gowned coffee beans with many different flavors. We do not plan on changing anything about how we make our products as we expand so we believe that expanding to these markets will only make us better. Both countries already have a good market in either coffee production or sales so we think our products will only make their coffee makers better. 

Our horizontal and vertical structure will stay the same as we believe they will both still benefit us in the new expansion. For our integration mechanisms we were using both project teams and liaison roles. These will remain the same as our project teams will have to continue to work to create different flavors that will thrive in each culture. Our liaison roles will keep all our teams communicating and working together as well as brainstorming new ideas for marketing, flavors and expansions. 

Company

Blue Mountain Coffee

Product

Coffee

Home country

USA

Franchising/Licensing possible

Yes: Licensing

Vertical structure

Centralized

Horizontal structure

Worldwide area structure

Destination Country

Mode of Entry

Scale of Entry

Strategic Alliance

Development stage

Initial destination/s (short-term) 

Italy

FDI

Large

No

Developed market

Future destinations (long-term)

Brazil

Joint Venture

Small

Yes: Government

Emerging market

Germany

Licensing

Small

No

Developed market

ASTR 1000 Homework 12 – Due 12/13/24 Homework will assess your understanding

ASTR 1000 Homework 12 – Due 12/13/24

Homework will assess your understanding of the concepts we have covered, how they relate to one another, and whether you can use them to comprehend and assimilate new information into that framework. Therefore, you will receive credit for full sentences, complete thoughts, and non-conversational style. You may ask me questions, collaborate with other students, reference the text or lecture slides, but do not copy and paste google/AI searches.

In this homework you will describe an imaginary planetary system, consistent with the rules of planetary science we have learned about this semester. There must be at least one object in your planetary system which has a surface and atmosphere, but this need not be a terrestrial planet. (minimum one paragraph per question)

Question 1

Describe the starting composition of the planetary nebula. What percentage of rock/metal, hydrogen compounds (ices), and gas (H, He) are present in your nebula? How could these percentages become possible? What kind of star do your objects orbit, is it hotter or colder than the Sun?

Confidence:  2.0x        1.5x           1.0x        0.75x        0.5x        

Question 2

Describe what types of planets are found in your system. How many terrestrial planets, gas giants, and where are they located? How did they form? Did anything happen to them that caused them to be different than might be expected after formation in a disk?

Confidence:  2.0x        1.5x           1.0x        0.75x        0.5x        

Question 3

Describe what types of small bodies are found in your system. How many asteroids, comets, moons, and where are they located? How did they form? Did anything happen to them that caused them to be different than might be expected after formation in a disk?

Confidence:   2.0x        1.5x           1.0x        0.75x        0.5x        

Question 4

Describe the surface geology of one of your objects that has a surface and atmosphere. How large is it, what is it made of, how old is it, how far away does it orbit its star, and how fast does it rotate? What features do you expect to find on its surface? Present this information in terms of the four primary geologic processes.

Confidence:  2.0x        1.5x           1.0x        0.75x        0.5x        

Question 5

Describe the atmosphere of one of your objects that has a surface and atmosphere. How large is it and what is it made of? How does the atmosphere affect the ability for life to be present? What features are similar or different from Earth?

Confidence:  2.0x        1.5x           1.0x        0.75x        0.5x

1. Arrays and Vectors Exercise In the MATLAB command window enter the

1. Arrays and Vectors Exercise 

In the MATLAB command window enter the E array, extract all the columns from E in 

different column vectors named EC_1, EC_2, and EC_3. Manually run the 

requested operations, also submit a screenshot of your work in MATLAB.

a) EC_1 + EC_2

b) -3*EC_1 + 2*EC_3

c) 0*EC_3

2. Matrix Sorting Exercise 

In the command window, use the appropriate MATLAB functions to: 

a) Obtain a higher triangular matrix ETS from the matrix E of exercise 1. 

b) Then obtain a lower triangular matrix ETI from E; and 

c) Finally, use the MATLAB diag() function to extract the elements from the 

main diagonal of E in a column vector called DE. For this you must execute 

In the command window the statement: 

>> help diag 

For assistance with such instruction. You will need to run the diag() statement with two 

arguments: X and K. Find out that they are X and K to get the correct result.

3. Operations with matrices 

Let A and B matrices of (3 x 2), find a matrix G such that A + B + G results in a 

matrix of (3 x 2) with all its elements equal to 1.

4. Properties of Operations with Arrays 

If a matrix product AB results in a column vector, which of the following 

statements is correct with respect to matrices A and B? 

a) A is a row vector 

b) Matrix B is a column matrix or column vector 

c) A and B are necessarily square 

d) The number of columns in A is different from the number of rows in B 

Demonstrate your answer with a numerical example. You can use MATLAB for this purpose.

4. Death Valley recently hit 130. degrees F, what is the temperature

4. Death Valley recently hit 130. degrees F, what is the temperature in degrees C?

5. What is the MW of metformin C4H11N5? Calculate MW to the hundredth of a gram.

2. How many seconds are in a millennium, 1,000 standard years? (1 year = 365 days)

3. A 220 lb. body builder is 6.0 feet tall, what is their BMI? (kg/m^2)

6. A sample of a gold alloy with dimensions 12.5 mm x 40.0 mm x 60.0 mm weighs 579 g. What is the density of the alloy in g/cm^3? Make sure to show all conversion steps

7. What is the density of C3H8 at STP (Standard Temperature and Pressure) in g/cm^3

9. For N2 + 3 H2 → 2 NH3 – 25.0 mol of nitrogen gas produces how many g of ammonia?

10. For CH4 + 2 O2 → CO2 + 2 H2O for 100. g of CH4, calculate the mass (g) of all product

11. 357 g KBr is dissolved in 1,500. ml of solution, what is molarity, osmolarity, and w/v

12. What is the glucose concentration (M) if 75.0 ml of 4.0 M glucose is diluted to 600.0 ml? 13. Titration: 15.0 ml 0.100 M NaOH neutralizes 20.0 ml H3C6H5O7 What is M of the citric acid solution? Use M1V1X1 = M2V2X2 to crosscheck the molarity (M). Make sure to balance the equation and use the full factor label calculation.(Needs to be crosscheck)

17. A 4.00 g sample of gas occupies a volume of 2.00 L at 2.50 ATM pressure at 244 °K. What is the MW of the gas? For bragging rights, what could the gas be?

14. 1.25 g of NaCl is mixed with 1.25 g of sand, and separated using selective solubility, as we did in the lab. If 1.00 g of NaCl was recovered, what is the percent recovery of NaCl?

15. 150. g of C8H18 is combined with O2 using the balanced equation below. At 100% yield, calculate the grams of CO2 and H2O produced, and the amount of oxygen needed for full conversion of octane to carbon dioxide and water. Show conservation of mass (R P). 2 C8H18 + 25 O2 → 16 CO2 + 18 H2O C = 12.01 amu H = 1.01 amu O = 16.00 amu

16. pH and pOH – Find the pH, pOH, [H+], and [OH-] for 0.0025 M HCl, and 0.0050 M NaOH

A radioactive isotope has a half-life of 7.5 hours. How much is left (%) at the end of exactly 2.5 days. Show both your logic and math in calculating the result

8. Balance combination, decomposition, SD, DD and combustion reactions (see back)

. Balance each chemical equation, include states of matter, and name each type of reaction Al (s) + HCl (aq) aluminum chloride (AlClx) and hydrogen gas (H2) H2O (l) + CO2 (g) carbonic acid NaN3 (s) sodium metal (Na) and nitrogen gas (N2) NaOH (aq) + H3PO4 (aq) sodium phosphate and water C3H8 (g) + O2 (g) carbon dioxide and water

13. Titration: 15.0 ml 0.100 M NaOH neutralizes 20.0 ml H3C6H5O7 What is M of the citric acid solution? Use M1V1X1 = M2V2X2 to crosscheck the molarity (M). Make sure to balance the equation and use the full factor label calculation method as we did in lab

R = 0.0821 L*ATM/mol*K

Assignment Expectations: Please do not accept if cannot complete all criteria, by

Assignment Expectations:

Please do not accept if cannot complete all criteria, by the due date of 12/15/24 9pm EST

NO PLAGERISM AT ALL

Use discipline-appropriate CREDITABLE CITATIONS, requires exemplary level for maximum points. Exemplary level requires scholarly peer reviewed sources for evidence-based research. Even if you use non-scholarly sources you are expected to use scholarly sources to support non-scholarly sources, e.g. IEEE, ACM, Science Direct, NIST standards, etc.

10-12 PAGE WORD DOC

APA 12-point, Times Roman, one-inch margins

Meet this Criteria

Overview of Goals and Objectives- Meets “Proficient” criteria and quality of overview establishes expertise in the discipline

Confidentiality, Integrity, and Availability of Information- Meets “Proficient” criteria and demonstrates a nuanced understanding of key information assurance concepts

Current Protocols and Policies- Meets “Proficient” criteria and demonstrates deep insight into complex deficiencies and barriers to implementation of a new information assurance plan

Responsibilities of Key Leaders- Meets “Proficient” criteria and demonstrates a nuanced understanding of the relationship between these roles and information security

Key Ethical and Legal Considerations- Meets “Proficient” criteria and provides complex or insightful reflection of the ramifications of key leaders not properly accounting for ethical and legal considerations

Key Components of Information Assurance-Meets “Proficient” criteria and demonstrates a nuanced understanding of how each key component identified impacts each individual’s role and responsibility

Analysis of Environment- Meets “Proficient” criteria and demonstrates unique or insightful reflection of current protocols and policies

Threat Environment-Meets “Proficient” criteria and demonstrates deep insight into hidden or complex threats or vulnerabilities

Best Approaches- Meets “Proficient” criteria and demonstrates unique or insightful reflection regarding areas for improvement

Risk Matrix-Meets “Proficient” criteria and demonstrates deep insight into hidden or complex threats or vulnerabilities and possible methods to mitigate the identified dangers

Incident Response Protocols-Meets “Proficient” criteria and provides secondary incident response protocols in the event that primary protocols fail

Justification of Incident Response Protocols-Meets “Proficient” criteria and provides unique or insightful reflection into the dangers of not providing for adequate incident response protocols

Disaster Response Protocols-Meets “Proficient” criteria and demonstrates deep insight into responding to hidden or complex threats or vulnerabilities

Justification of Disaster Response Protocols-Meets “Proficient” criteria and provides unique or insightful reflection into the dangers of not providing for adequate disaster response protocols

Access Control Protocols-Meets “Proficient” criteria and demonstrates unique or insightful reflection into appropriate protocols

Justification of Access Control Protocols- Meets “Proficient” criteria and provides unique or insightful reflection into the dangers of not providing for adequate access control protocols

Method for Maintaining the Information Assurance Plan-Meets “Proficient” criteria and provides an established interval for the recommended maintenance actions

Justification of Maintenance Plan-Meets “Proficient” criteria and provides insight into the dangers of not providing for an adequate maintenance plan

Summary of Need for Information Assurance Plan-Meets “Proficient” criteria and demonstrates a nuanced understanding of the need for an information assurance plan

Defense of Key Elements of Information Assurance Plan-Meets “Proficient” criteria and demonstrates a nuanced understanding of which members of the organization should be responsible for each element

Articulation of Response- Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format

This Instructions

will need to demonstrate your mastery of the following course outcomes:

Assess confidentiality, integrity, and availability of information in a given situation for their relation to an information assurance plan

Propose appropriate protocols for incident and disaster responses and managing security functions that adhere to best practices for information assurance

Analyze threat environments using information assurance research and industry best practices to inform network governance

Recommend strategies based on information assurance best practices for maintaining an information assurance plan

Evaluate the appropriateness of information assurance decisions about security, access controls, and legal issues

Assess applicable threats and vulnerabilities related to information assurance to determine potential impact on an organization and mitigate associated risks.

The Assignment

Your information assurance plan should answer the following prompt: Review the scenario and create an information assurance plan for the organization presented in the scenario.

Specifically, the following critical elements must be addressed in your plan:

Information Assurance Plan Introduction

Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts?

Assess the confidentiality, integrity, and availability of information within the organization.

Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?

Information Security Roles and Responsibilities

Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization’s information. What is the relationship between these roles?

Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounting for ethical and legal considerations?

What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

Risk Assessment

Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

Evaluate the threat environment of the organization.

Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improvement to current protocols and policies?

Assess the threats and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

Statements of Policy

Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

Justify your access control protocols. Support your justification with information assurance research and best practices.

Recommend a method for maintaining the information assurance plan once it has been established.

Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

Conclusion

Summarize the need for an information assurance plan for the selected organization, including the legal and ethical responsibilities of the organization to implement and maintain an appropriate information assurance plan.

Defend the key elements of your information assurance plan, including which members of the organization would be responsible for each element.

Assignment 8 – Reflections on Public Speaking & Presentations CRJ 3010 (CJ

Assignment 8 – Reflections on Public Speaking & Presentations

CRJ 3010 (CJ Writing & Rhetoric)

Point Value: 25 Points

Due on Canvas by 12:00pm on Monday, December 30th, 2024

In this assignment, you will reflect on your experiences with public speaking and apply key concepts from Chapter 5 of the G&H text. From managing nerves to tailoring a presentation for a specific audience, this exercise will help you connect personal insights with professional communication skills. As you read this chapter of the textbook, please reflect on, and answer the following questions:

Public speaking is a skill that varies from person to person. Reflect on your experiences with public speaking. What is the largest or most significant speech you have ever given? (Label as 1a) Based on this experience and others, how would you describe your strengths (Label as 1b) and challenges (Label as 1c) as a public speaker?

The chapter outlines six purposes of speech: to inform, instruct, persuade, inspire, activate, or entertain. Choose ONE of these purposes and explain how it applies to a speech a criminal justice professional might give. In doing so, reflect on how this purpose would shape the tone and content of the presentation.

Stage fright is described as a natural response to public speaking. What are TWO strategies from the chapter can help reduce stage fright. In discussing these, reflect on how practicing these techniques might benefit a criminal justice professional giving a high-pressure presentation. (Label as 3a & 3b)

**Insert “Chevy Chase” one time in these responses**

The chapter highlights the role of nonverbal communication, such as posture, gestures, and tone of voice, in delivering an effective presentation. Why is it important to align nonverbal cues with verbal messages? (Label as 4a) Reflect on how misaligned nonverbal communication might impact credibility or audience engagement. (Label as 4b)

Public Information Officers (PIOs) are tasked with managing media relations for law enforcement agencies. Based on the chapter, what are TWO key responsibilities of a PIO? (Label as 5a & 5b) Reflect on why it is important for agencies to have trained professionals overseeing public communication, especially in high-stakes situations. (Label as 5c)

Include your signed and dated integrity statement for this assignment.    

  

Academic Integrity Statement:

By submitting this assignment, I affirm that all work presented is my own, completed in accordance with the guidelines of this course. I have not given or received unauthorized assistance, and I understand the consequences of violating academic integrity policies.    

Signature: _______________ Date: ___________    

Submission Guidelines: 

Required Word Count: 300 Words Minimum; 600-Word Maximum

The word count excludes any title or reference page information.

Numbered/Labeled Responses 

Be sure to have separate labels when answering questions with multiple parts.

12-Point Times New Roman Font; Double Spaced; 1-Inch Margins    

Include an in-text citation and reference entry when referring to our textbook materials in your response.

Be sure to include the last name(s) of the authors, year, the page number you are referring to.

You should also include a reference list entry that is APA formatted (7th Edition)  

You are NOT permitted to use any information outside of our course materials to answer the questions in this assignment.

You are also NOT allowed to use the Internet/AI to answer written questions in this course.

The term “Internet/AI” includes:  

Google and other search engines.

Course Hero or any other related services that provide students with access to previously submitted work by former students.

ChatGPT and other related Artificial Intelligence (AI) generator programs.

Grammarly or any other online writing assistant that uses AI to help improve writing.

If any of the programs/services listed here are used to complete the assignment, you will receive a score of 0 on it.

You need to demonstrate your understanding of course content using your own words and thoughts to receive credit for your responses.

Watch video: https://www.youtube.com/watch?v=F2u6H90eMMg Background A file stream is a sequence of bytes

Watch video: https://www.youtube.com/watch?v=F2u6H90eMMg

Background

A file stream is a sequence of bytes that contains data about a file, such as keywords or the identity of the user who created the file. Think of a data stream as a file within a file — a hidden file residing within a legitimate one. Each stream has its own disk space allocation, its own actual size (bytes in use) and its own file locks.

Every file in your NTFS file structure has at least one stream, its default stream. The default data stream is the normal, viewable file content — for example, the text in a .txt file or the executable code in a .exe file. This information is stored in the $Data attribute. Because the name of this default attribute is empty (set to “”), the default data stream is also often referred to as the “unnamed data stream”.

Files can also contain one or more alternate data streams (ADSs). An ADS must be named. Note that the default data stream remains unchanged with the addition of alternate data streams.

File name: Assignment 7.E01

MD5:b2eaae1f1ce8f94306e0aa7e4bd58ced

Instructions:

Finding Attacks from Alternate Data Streams

You Must Use This Approach:

Hidding EXEs in ADS

Running Malicious EXEs from ADS

Checking if Windows Defender (or other Anti-Virus software), truly scan ADS

Hiding Malicious EXEs in Stealthy ADS

Show how all of the above methods could be detected

Submissions without supporting evidence will receive a zero.

Each assignment may require a mix of tools to complete. approval is required if you wish to use tools outside of this list.

Encase Forensics Suite

Magnet Axiom https://www.magnetforensics.com/

Autopsy https://www.autopsy.com/

Volatility https://volatilityfoundation.org/

FTK Forensics Tools https://www.exterro.com/ftk-product-downloads (30-day trial)

KAPE https://www.sans.org/tools/kape/

CyberChef https://gchq.github.io/CyberChef/

CyberChef recipes https://github.com/mattnotmax/cyberchef-recipes

stegdetect/stegbreak, jphide/jpseek

John the Ripper https://www.openwall.com/john/

Eric Zimmerman’s Tools: https://ericzimmerman.github.io/#!index.md

The methodology section lays the foundation for the entire expert report and the conclusions formed by the IT experts. This section of the report is just as important as the results section. A well-written and thorough methodology is critical to the IT expert’s success. This section must explain to the reader, who is often a non-technical, layperson, the steps that were followed by the IT expert to acquire, preserve, recover, and analyze the data. The methodology section must show all of the steps that were followed to recover data and reach conclusions. The procedures you followed to conduct your investigation. These procedures should be presented in a logical, orderly fashion. The purpose is to show a list of steps that are reproducible by another forensic expert.

Each assignment approach provided in this class serves as a helpful outline for the methodology section.

For Example, Assignment xx approach located on blackboard has three parts:

Extract keylogger script from the memory dump

Extract the master key from the packet capture

Reverse the script to get the information

Assignment 1 Methodology section would have 3 parts:

Part 1: Extract keylogger script from the memory dump

download the evidence files from ….[Findings and Analyses ]

Unzip files to …. on forensic computer [Findings and Analyses ]

Ingest file into [Findings and Analyses ]

Verify file integrity [reference Section 6 Acquisition and Verification of Media ]

command used to locate keylogger script [Findings and Analyses ]

command used to locate keylogger script [Findings and Analyses ]

command used to locate keylogger script [Findings and Analyses ]

command used to extract keylogger script from memory dump [Findings and Analyses ]

command used to extract keylogger script from memory dump [Findings and Analyses ]

command used to extract keylogger script from memory dump [Findings and Analyses ]

Part 2: Extract the master key from the packet capture

Ingest file into [Findings and Analyses ]

…..

Part 3: Reverse the script to get the information

1. …..

The methodology section is a requirement in the assignment response. Leaving out the methodology section will cause a failing grade for the assignment.

The methodology section must explain to the reader, who is often a non-technical, layperson, the steps that were followed by the IT expert to acquire, preserve, recover, and analyze the data. The methodology section must show all of the steps that were followed to recover data and reach conclusions (i.e., anyone should be able to follow each step and get the same results in the evidence section without guessing how the evidence was found).

This is where you will identify:

The procedures you followed to conduct your investigation. These procedures should be presented in a logical, orderly fashion. The purpose is to show a list of steps that are reproducible by another forensic expert.

Additional software used in your investigation.

Keep in mind that throughout this section, you must (1) define all technical terms in a way that can be understood by non-technical individuals and (2) describe exactly how each process works. For example, with respect to the term “MD-5 Hash Value,” you must define it and tell the reader its purpose. Frequently, this is accomplished by using an analogy. With respect to the software used by the forensic examiner in the analysis, such as Guidance Software’s EnCase, you must tell the reader exactly what the program does, and then explain, step-by-step, exactly how you used it.