Sunday, December 29, 2019

Starting with Basic Essay - 1017 Words

University of Phoenix Material Student’s Name: Starting with the Basics Log on to the student website. Explore the resources available on the site and use them to answer the following questions. Academic Help 1. WHAT ARE THE SIX MATH LABS AVAILABLE FOR STUDY IN THE CENTER FOR MATHEMATICS EXCELLENCE? HINT. CLICK RUNNING START BY ALEKS AND LOOK ABOVE OTHER MATH CONTENT. a. Self Assessment b. ALEKS Math Refresher c. Pre-Algebra Review d. Algebra 1 e. Algebra 2 f. Introduction to Statistics 2. Which three reviewing services are available to students through the Center for Writing Excellence? a. WritePoint b. CWE Review c. Plagiarism Checker 3. Which formatting tool does University of Phoenix offer you to†¦show more content†¦Course # d. Email Address e. Country f. Comment Course Information 9. HOW DO YOU ACCESS THE READING ASSIGNMENTS FOR THIS COURSE FROM THE STUDENT WEBSITE? Materials 10. In which forum would you post your discussion question responses? How would you respond to a classmate’s discussion question answer? a. Main Forum b. By clicking on ‘reply’ to their thread Learning Teams 11. WHAT SIX DOCUMENTS ARE CONTAINED IN THE TOOLKIT ESSENTIALS SECTION OF THE LEARNING TEAM TOOLKIT FOUND IN THE UNIVERSITY LIBRARY? a. Learning Team Handbook b. Online Campus Learning Team Handbook c. Guide To Completing the University of Phoenix Learning Team Charter d. Learning Team Log e. Learning Team Evaluation f. Learning Team Charter †¢ †¢ 17. After reading the â€Å"Decision/Conflict Resolution† section of the Learning Team Toolkit, how would you attempt to resolve a conflict within your team when opposing viewpoints exist? Explain your answer in 50 to 100 words. After reading the â€Å"Decision/Conflict Resolution† section of the Learning Team Toolkit, I would attempt to resolve a conflict within my team when opposing viewpoints exist by effectively communicating using the 4Rs Method: reasons, reactions, results, and resolution. In order to understand what is going on, we as a group, need to focus on the reasons of the conflict. What are we arguing about? Are we focusing at what is on hand and yet being respectful towards each other? HowShow MoreRelatedstarting with the basics1043 Words   |  5 Pages Starting With the Basics Complete the worksheet, and submit to the facilitator for grading. This assignment will help you become familiar with the resources available on the University of Phoenix student website. You will also be reviewing the parts of the writing process, rules of writing, APA guidelines, plagiarism, and critical thinking. Each question is worth 1 point. To answer questions 1–18, log on to your student website, and explore the resources available. Academic Help .1 WhatRead MoreCell Phone Comparisons1272 Words   |  5 Pagesat great prices with only a few pieces of simple information such as zip code, the desired type of customized plan and how much the shopper is currently paying for wireless phone service. What Type of Wireless Plan is Preferred? There are three basic types of wireless cell phone plans available by nearly every wireless phone company. These plans are single line plans, family plans and no contract plans. Each has their own advantages and disadvantages in various scenarios, but its important forRead MorePoker Game Through These Strategies1244 Words   |  5 Pagescalled easy game, mastering is very difficult. It seems to be a greater challenge. In the poker strategy section, one will find out more resources to become winner of poker. The pokeronline has features to make one to win with poker strategy. The basic of poker game relies on four strategies and they are, †¢ Tight play †¢ Dynamic play †¢ Random play †¢ Realize errors of opponents Consider These Factors: Check whether you need to play poker to win or for fun. In order to win in poker games, you needRead MoreMy Interest in Studying Entrepreneurship835 Words   |  4 Pagespresenting new challenges for entrepreneurs (Hanna, 2012). According to Lisa Mitchell, Vice President of advancing innovation for the Ewing Marion Kauffman Foundation, global is the biggest trend. Companies are starting out global instead of the traditional way of starting local, then starting in your region, then going to your country. Also, women entering the career field of self-employment and small business ownership have also been increasing. It is believed that women have been pushed into self-employmentRead MoreReconstructing Haiti Essay1102 Words   |  5 Pagesunemployment rates. The third step involves international cooperation in the fields of agriculture, health, social development and the strengthening of institutions. This way, it will be essential to provide even the most basic resources and knowledge due to the fact that everything is starting from scratch. This final step will take decades to be accomplished and for that same reason will demand a great effort of the United Nations and other multilateral organizations. Besides those measures led by multilateralRead MoreBoehm Test of Basic Concepts–3 Preschool1289 Words   |  6 PagesThe Boehm Test of Basic Concepts–3 Preschool is a norm referenced test designed to assess young children’s understanding of basic relational concepts, such as quality, spatial, temporal, and quantity. This test examines language and cognitive development, as well as later success in school. The Boehm–3 Preschool test is meant for children ages 3 to 5 years and 11 months and is a downward extension of the Boehm Test of Basic Concepts (Graham, in Spies Plake 2005), which evaluates relational knowledgeRead MoreMaslow s Hierarchy Of Needs903 Words   |  4 PagesTheory of Human Motivation†, published in Psychological Review. Maslow’s hierarchy of needs is five levels of basic human needs or motivators. These motivators are normally displayed on as a pyramid starting with physiological at the bottom of the pyramid, and ending wit h self-actualization. There are five levels of needs, and the pyramid breaks those needs into three different categories: basic needs, psychological needs, and self-fulfillment needs (Riccoio). Not only is Maslow’s hierarchy of needsRead MoreSchool District Is Taking A New Look At The Attendance System933 Words   |  4 Pagesproviding students with the PSSA (Pennsylvania System of School Assessment) in grades 3 through 8. These standards based assessment tests include the following three areas: reading, math and writing. The students are provided a score of below basic, basic, proficient, and advanced based on how they performed on the test. The PSSA tests have been modified at the high school level several years ago. The school districts in Pennsylvania have been aligned to the Common Core Standards in English, andRead MoreThe United States Marine Corps1544 Words   |  7 Pagesbarracks to meet their permanent Drill Instructor. In week two the Drill Instructors teach the recruits how to follow the proper hygiene and protocol and how to take care of their equipment. The units learn how to move as a team while quickly completing basic tasks. In week three, the Drill Instructors teach the recruits how to properly use the bayonet to kill someone. In week four, the recruits undergo cole combat with another recruit using pugil sticks which is supposed to simulate rifle combat. TheyRead MoreThe Basic Functions Of Management1537 Words   |  7 Pagesknowing basic management function, what types of managers there are, skill-sets required to be a manager, leadership quality, and decision making. Altogether these different sections are taken in a much broader perspective diving into the four main resources of management which consists of material resource, human resource, financial resource, and informational resources. Through these different parts of the management system, each different part will be looked at in depth and detail. Starting with

Friday, December 20, 2019

Should Marijuana Be Legal - 1363 Words

Casee Nielsen Extra Credit SOC Drugs 3150 OPTIONAL EXTRA CREDIT PAPER This video I watched â€Å"Should Pot be Legal?†, brought up some really good points about the legalization of marijuana and it showed both sides of the argument. There was two people back and forth debating if marijuana should be legal or illegal. Hutchinson was against legalizing marijuana and Ethan Nadelmann was for legalizing marijuana. As it goes for me I agree with Ethan Nadelmann, I think that medical marijuana should definitely be legal and people should be regulating it. A great point was brought up that marijuana has been proven that it helps people with severe medical conditions, for example it has been a huge success for people with arthritis. I agreed with Hutchinson when he said that legalizing marijuana is going to cause more drug problems with young kids. Which I also kind of agree with but also at the same time, if kids are wanting to get a hold of some marijuana it is easier for them to access it than it is for them to access alcohol. It was said in the vide o that there are 750,000 people each year getting arrested for possession of marijuana, I agree with Ethan Nadelmann when he says that is just ridiculous. It is less expensive to legalize marijuana than it is to arrest people for having possession of it. It was said in the video that â€Å"whatever the risk there are at keeping marijuana legal, is less than continuing with the prohibition policy.† Only 90 percent of these cases the peopleShow MoreRelatedShould Marijuana Be Legal?1060 Words   |  5 PagesMedical Marijuana Marijuana is the most commonly used illicit drug in the United Sstates (Wagner).. Marijuana is commonly used becauseThis it is because marijuana is easy to get and doesn’t have the visibly dangerous effects that other drugs like cocaine and heroine have. However,But does that mean marijuana is harmless to the human body? There are some people and studies that believe it is harmlessso. Sanjay Gupta, MD, Chief Medical Correspondent for CNN, wrote the following: â€Å"Frequent marijuana useRead MoreShould Marijuana Be Legal?1609 Words   |  7 PagesMs. Fingarson English 11 March 9th, 2017 Junior Research Paper: Marijuana Should Be Legal. According to world recognized American Scientist Carl Sagan â€Å"the illegality of cannabis is outrageous, an impediment to full utilization of a drug which helps produce the serenity and insights , sensitivity and fellowship so desperately needed in this increasingly mad and dangerous world†. These are just some of the benefits of Marijuana along with many others. All you have been taught about cannabis inRead MoreShould Marijuana Be Legal?986 Words   |  4 Pages smoking pot in California, is legal. On Tuesday, November 8, 2016, California became the fifth state to legalize the recreational use of pot. By a margin of about 56% to 44%, voters passed Proposition 64. With its passing, California is now among states like Colorado, Washington, Oregon and Alaska who have also legalized marijuana. â€Å"Marijuana could become quite the cash crop† said Richard McGowan, a professor at Boston College and expert in the field of marijuana legalization. While many peopleRead MoreShould Marijuana Be Legal?864 Words   |  4 PagesCannabis, also known as marijuana among other names, is a preparation of the Cannabis plant intended for use as a psychoactive drug or medicine. Marijuana smoking remains the most prevalent form of illicit drug use in the United States and has even been legalized medicinally in twenty-four states. Four of these states, including Colorado and Washington, have legalized marijuana for recreational use. This means that it is treated like a controlled substance, like alcohol or tobacco, and anyone theRead MoreShould Marijuana Be Legal?1230 Words   |  5 PagesCannabis Can The marijuana movement is more prevalent now than ever. Just recently, two other states have joined Colorado and Washington in the legalization of the recreational use of marijuana. On the other hand, the state of Florida did not pass the bill to approve medical marijuana. Although more and more states have begun to see the benefits in legalizing marijuana, many states maintain the view that smoking marijuana is criminal despite the many advantages it poses. Marijuana offers medical andRead MoreShould Marijuana Be Legal?997 Words   |  4 Pagesof the topics; write a thesis statement and complete the introduction 1. Marijuana should be legal, because it is harmless, and it is an effective medicine for many kinds of diseases. - Marijuana should be legal due to its variety of health benefits - Marijuana is an effective medicine for many kinds of diseases - Marijuana legalization would help boost the economy Thesis Statement: Why shouldn’t marijuana be legal due to its variety of health benefits, its effectiveness for combating manyRead MoreShould Marijuana Be Legal?1630 Words   |  7 PagesMarijuana has been a hot topic of conversation over the last few years, as some states in America have legalized it medically and recreationally. By discussing the legal aspect of marijuana, the economic benefits, medical usage and how marijuana affects the family, we can see the positive and negative impact that marijuana has on sociology. Except for a few select states, marijuana usage, sale and distribution of marijuana is in some manner illegal. As a result, there is immense legal considerationsRead MoreShould Marijuana Be Legal?1610 Words   |  7 PagesSince the very first day marijuana began dominating our country over 30 years ago, federal control of the drug has been the topic of an continuing arguments. Marijuana is a crushed up blend of dried out herbs, seeds and stems of the plant cannabis. Most people inhale it in the shape of cigarettes for pleasure and relief. Should marijuana be made legal? Advocates of the drug argue that there are multiple medical advantages and that tobacco and alcohol are far more harmful for us than the drug itselfRead MoreShould Marijuana Be Legal? Essay1261 Words   |  6 PagesMarijuana is safer than tobacco and alcohol, more beneficial and healthier too. Marijuana, unlike tobacco and alcohol, never causes serious illnesses like cancers of the lungs, throat, and mouth, cirrhos is, dementia, or anything else. In actuality, medical marijuana is used to treat cancer cells. â€Å"The earliest use of cannabis as a medicine is attributed to the legendary Chinese Emperor Shen Nung, who is thought to have lived around 2700 BC.. Cannabis sativa is thought to have been grown for at leastRead MoreShould Marijuana Be Legal? Essay965 Words   |  4 PagesShould Marijuana Be Legal? In order to start a discussion about whether marijuana should be legal, we must first begin with the history of marijuana. How long has marijuana been around? The earliest recorded use of marijuana is from the island of Taiwan off the coast of mainland china over 10,000 years ago in the Stone Age (Marijuana, 2014). They wove their clothes and made their shoes from hemp. The first paper was made from a combination of crushed hemp fibers and mulberry tree bark. This

Thursday, December 12, 2019

Keeping Company Essay Example For Students

Keeping Company Essay Nora smiles at two men at the beginning of the story, and William is giving herthe evil eye. Does he really not trust her that much? When Nora goes to walkon the beach, it reminds me of when we go to Corpus Christi. I love to go andwalk on the beach. Nora talks about the child as if she is already born. Ithink that is wonderful. Dont bother with them, Nora. Theyre not ourkind When William says this, it reminds me of my best friend, and herboyfriend. Nora seems like an outgoing lady, and likes to mingle. But whenshe gets caught playing games with James, William builds a wall between the twohouses. Does William really not trust her that much? The wall isholding, he says. Can you believe it? I say, Yes, I believe it. Does William really think that the wall is going to hold the relationshipbetween Dennis and James and Nora? I love the way she finally stands up toher husband, and just walks out. William has to come and find her. He realizesthat he is in the wronging. I love the way she makes him realize that. simply walk forward in silence, which is the way it is between husbandsand wives, with married people Is this really true? This story was veryinspiring. I think that every woman that has a controlling boyfriend should readthis story. It is written very well. The way that William controls his wifereminds me of my best friend and her boyfriend. He is always controlling her. Before they started going out, we used to go out for lunch two or three times aweek. It was so nice, spending time with her outside of our hectic lives. Butafter they started going out, everything changed. It wasnt very cool either. I really wish that it hadnt changed. One day after like weeks of not talkingto my best friend, someone came over to tell me that a person had keyed her car. I couldnt believe it. That person also told me that my best friend thoughtthat I had done it. I didnt know what to say. I was to shocked to believe it. So I decided to confront her. Before her chemistry lab, I went and talked toher. She said she thought that it was I, but it left her mind after like amillisecond. But just the thought that she thought it was me, it got me upset. We talked for like 5 hours, and everything was cool. I thought that we would becool forever. And then she started hanging around with her soon-to-be boyfriend. I heard less and less from her. I wrote her, but got no responses. I justfigured that she was busy. So I decided to page her. I didnt get any answer. I didnt know what to think. I was upset. I thought that our relationship wasgoing down. Then her boyfriend and her started going out. And things wentdownhill from there. We didnt talk for weeks. When I needed help to solve aproblem in my life, she was not there for me. I started hanging out with thisguy that I met in summer school, and I never thought that him and I would becomelike brother and sister. I wish that she could have been there for me. I wantedto tell her so much about my life. But she wasnt. I paged her, called her,but I never got any answer. Then one day, I decided to write her and ask her tolunch. She responded and we got together. I asked her what was going on with herlife. She said that her life has been really hectic. I asked her why shehasnt responded to my emails or phone calls. She said that her and herboyfriend have been having problems. I told her I was sorry to hear that. Shesaid that her boyfriend had become to controlling, and the day before that, theyhad a huge fight and she started screaming at him. I didnt know what to say. .uff2af49b5b83e35e5c66170e163a0a63 , .uff2af49b5b83e35e5c66170e163a0a63 .postImageUrl , .uff2af49b5b83e35e5c66170e163a0a63 .centered-text-area { min-height: 80px; position: relative; } .uff2af49b5b83e35e5c66170e163a0a63 , .uff2af49b5b83e35e5c66170e163a0a63:hover , .uff2af49b5b83e35e5c66170e163a0a63:visited , .uff2af49b5b83e35e5c66170e163a0a63:active { border:0!important; } .uff2af49b5b83e35e5c66170e163a0a63 .clearfix:after { content: ""; display: table; clear: both; } .uff2af49b5b83e35e5c66170e163a0a63 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uff2af49b5b83e35e5c66170e163a0a63:active , .uff2af49b5b83e35e5c66170e163a0a63:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uff2af49b5b83e35e5c66170e163a0a63 .centered-text-area { width: 100%; position: relative ; } .uff2af49b5b83e35e5c66170e163a0a63 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uff2af49b5b83e35e5c66170e163a0a63 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uff2af49b5b83e35e5c66170e163a0a63 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uff2af49b5b83e35e5c66170e163a0a63:hover .ctaButton { background-color: #34495E!important; } .uff2af49b5b83e35e5c66170e163a0a63 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uff2af49b5b83e35e5c66170e163a0a63 .uff2af49b5b83e35e5c66170e163a0a63-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uff2af49b5b83e35e5c66170e163a0a63:after { content: ""; display: block; clear: both; } READ: Jackie robinson EssayShe said that she started writing I have a boyfriend who is toocontrolling on her paper. I really didnt know what to say. I mean theyhave been going out for over two years. Anyway, the whole point of this story isthat her boyfriend wants her to hang out with who he thinks is appropriate. Andthat is not right. My best friend and her boyfriend are different religions, andhe thinks that his religion is more superior, and that hers sucks. It is true. He has even said it. I wish he wasnt that controlling. I want her to get outof the relationship, but I dont think she can because she is too attached. And one day, if she isnt careful, she is going to turn out like Nora. Playingcards and chess with the next door neighbors when her husband isnt home tosee her talk to other people. That is just very sad. I really think it is. Imglad that I got to see Nora stand on her own two feet. Im glad that shewalked away and made her husband realize what was wrong with him. I hope that mybest friend does that to her boyfriend one day. I really do. No girl or womandeserves to be treated like a piece of meat. I will not take that from anyone. Idont take it from my boyfriend. We, as women, should be allowed to livehowever we want when we want. I think that women should stand up to the guythats controlling them and just say Shove it up yours and walk away. Ihope that one day those women like Nora stand up to their husbands.

Thursday, December 5, 2019

Information Security Risk Assessment †Free Samples to Students

Question: Discuss about the Information Security Risk Assessment. Answer: Introduction Information security match with the risk management process that tends to identify the assets, threat sources, vulnerabilities and the potential impacts of other possible controls. In order to standardize this, there is guidance based on industry standards on password, firewall and the encryption software with legal liabilities for the training standards. Being the Information Security Manager of ABC organization, I have been asked by CISO to review the breach incidents and analyze the trends. With this, I have to focus on the policy development and assessment of the risks, contingency planning, and operational planning in an effective manner. Being the Information Security Manager, my major focus is on reviewing the global security breach and examine the threats which can have a major impact on the organization functioning. The limitations for CISOs is the signature-based patterns where the sheer volume of new malware is created daily. The lack of scalability and non-supporting distributed environment. The major focus is on the compliance which is a static event and is intrusion centric to handle the threats and protect the data. (Soomro et al., 2016) The report will discuss the different recommendations and the management measures which are required to handle the threats. The risk-based development and security policy structure is discussed with policy development process focusing on the business and the other organizational requirements. Analysis of Information Security Incidents for 5 years There was a Petra cyber attack on the company, where the ransomware hit the servers in Australia where the people had to face issues related to the loss of data. The malicious or the criminal attacks were seen to be the primary causes for the breach. The information security breach with Krebs on Security by point-of-sale credit card used. The Dun Bradstreet incident happened in 2017, where most of the marketing database with the different corporate contacts were shared over the web (Peltier, 2016). The next security incident was Gmail users in the company were targeted with the sophisticated phishing scam which was seeking the gain in the access to the accounts through the third-party application. The emails were loosed as if they came from the trusted contact and then notified the individual that they wanted to share a Google Doc with the people. DocuSign Attack where the customers and the users were mainly targeted by the phishing attacks of malware. It includes the breach of one system where one could obtain the email address and no other personal information. The hackers then used this email address to mainly conducting the malicious email campaigns where the DocuSign branded message was then sent for the prompted recipients to click and download the Microsoft Word document (Nazareth et al., 2015). Threats which has potential threats to your organisation. Some of the major threats which seems to be an issue for the development are: There is a possibility of exploiting the known vulnerabilities, with crimes as a service with ready to use kits for ransomware. The increased sophistication will then be used for the high-value networks. The critical infrastructure is likely to populate the target for the sophisticated attacks with supply chain targeting that tends to continue as the third party works over the weak links and handling the outsourcing arrangements mainly at a higher risk. The management of the service providers will tend to continue with attractive targets which have a higher number of customers, connectivity as well as the customer access for the networks and the data (Ab Rahman Choo, 2015). IoT (Internet of Things) will tend to create risks with pressure on the consumers for the manufacturing which includes certain security controls. The explosion of threats, privacy, and the ethical concerns are the major concern for big data with stringent global regulations where the huge demands are based on the security professionals with the evolvement of certain grounded expertise. Propose and Discuss the management measures to overcome them In order to overcome the issues, the physical security (security of the physical assets and the workplace threats), operational security, communication security needs to be managed properly. According to CNSS (Committee on National Security Model), they help in maintaining the gap in coverage of Information Security Program. The use of CIA triangle focusses on maintaining the confidentiality, integrity and the availability of privacy, identification and the authentication system stability (Tsohou et al., 2015). For the confidentiality, The secured documentation and the storage of data, cryptography, education of information custodians is important. Integrity includes the stability of access or error control. The availability of the authorized users could be maintained through backups, up-gradation of the system and recovery of disaster. The privacy could be maintained through access control and policies. The authentication and identification through the use of certain cryptographic certifications. The authorisation is to handle the access, modification, or the deletion of information. There is a need for focusing on the information security strategic planning so that one can handle the mitigation, transferring, acceptance or avoidance of information which is related to the people risks, process and technologies (Safa et al., 2016). The planning will focus on the short-term focus with increased monitoring of the other external connections. The budgeting, resource allocation, and the personal details are critical to the tactical planning which includes the security strategies like monitoring the external connection, associated risks with increased connectivity and handling the security hardening process. The strategy will help in redundancy for the critical production system with improved availability of the services as well. The customer facing issues are set in accordance to the security standards in order to replace the network bridges with the switches to rebuild a better customer application which will allow the business to be relocated inside the organization with the trusted network (Fenz et al., 2014). The planning for the strategic implementation includes the tactical and the operational security plans which are based on handling the development where the Information Security Governance focus on determining the standards which measure progress towards the better achievements. It also includes the accountabilities and the methods for the proper measurement of progress with verification of risks management practices. The driving force for SDLC is depending upon the event driven programs where the employees, customers and the other stakeholders need to work on the structured review planning (Baskerville et al., 2014). Recommendations Being the Security Manager of the ABC Company, I have to also keep a check on the configuration of the firewalls and the IDPs, implementation of the security software, and the diagnosis of troubleshooting problems. This will help in coordinating the system and other network administrators to make sure that the security is controlled and implemented in an effective manner, at an entry-level position. The security policies are required to handle the seem like the Enterprise Information, Issue-Specific, and the System Specific policies. They are also important for matching with the general standards and IT security. For the security from phishing attacks, there is a need for awareness section, security controls and the incident response where the CRM implementations are done effectively through the contractual agreements and proper access control. The physical security is based on the designing, implementation and the maintenance which is important to protect the physical resources it i ncludes the hardware and the other data element support with the focus on operating and then maintaining the systems in an effective manner. Conclusion For handling the security issues in my organization, there is a need to handle the risk management programs. This can be done through proper planning, allocation of the budget and schedule, risk probability, and impact with proper tracking risks management activities. There are different processes and the procedures based on handling the sensitive transmission, processing, and storage (Shameli et al., 2016). This could be through properly identifying the threat and handling the potential to work on the information gathering techniques which include the brainstorming, Delphi Technique, Interviewing and the Root-Cause Analysis. The checklists analysis and the assumptions are made to determine the influence diagrams with better output risk register. References Ab Rahman, N.H. and Choo, K.K.R., 2015. A survey of information security incident handling in the cloud.Computers Security,49, pp.45-69. Baskerville, R., Spagnoletti, P. and Kim, J., 2014. Incident-centered information security: Managing a strategic balance between prevention and response.Information Management,51(1), pp.138-151. Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2014. Current challenges in information security risk management.Information Management Computer Security,22(5), pp.410-430. Nazareth, D.L. and Choi, J., 2015. A system dynamics model for information security management.Information Management,52(1), pp.123-134. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations.Computers Security,56, pp.70-82. Shameli-Sendi, A., Aghababaei-Barzegar, R. and Cheriet, M., 2016. Taxonomy of information security risk assessment (ISRA).Computers security,57, pp.14-30. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), pp.215-225. Tsohou, A., Karyda, M. and Kokolakis, S., 2015. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs.Computers security,52, pp.128-141.