Get help from the best in academic writing.

BMC 8 AU Adult Day Health Center Community Educational Project Discussion

BMC 8 AU Adult Day Health Center Community Educational Project Discussion.

PART I
Discussion Question:
What community health nursing intervention strategies will best be suited to address your selected health concern? How you will integrate these methods into your project?
Your initial posting should be 400 words in length and utilize at least one scholarly source other than the textbook.
PART II
Plan Community Educational Project Goals, Interventions and Outcomes
Assignment:
1.Practice Hours: each module has a minimum required practice hours related to your work on the main education project. Practice hours relate to time spent on project work (Discussion Board work does not apply). Document your hours for Module 4 in Project Concert. Access Project Concert. You should have an estimated 10-15 hours for this module. Minimum required hours must be entered into Project Concert for Module 4. Some states/entities require hour logs for certification or employment. It is the student’s professional responsibility to ensure all hours are entered correctly in order to meet these requirements. Please see the Project Concert directions document in the Learning Materials on how to enter hours.
2.Submit an essay of the developed action plan for a community educational project. The project plan should include 2 (two) goals and objectives based on your topic from Healthy People 2020, an implementation plan for implementing these activities, a budget (if necessary, not required), a justification for the project, a description of where and when the plan will be implemented, and a description of the teaching materials which will be utilized during the execution of the project. Then recommend nursing actions/interventions to improve the health concern and achieve your stated goals and objectives. Discuss potential public and private partnerships that could be formed to implement your recommendations and create a timeline (i.e. 3 month, 6 month) for potential expected outcomes.

BMC 8 AU Adult Day Health Center Community Educational Project Discussion

Network Securities Management Term Paper

Nowadays there has been a great advancement in information technology. This has resulted in many people incorporating information technology in their businesses and organizations. The advancement of information technology has enabled the learning institutions, hospitals, businesses as well as government agencies to employ information technology in their day-to-day activities. This has resulted to increased performance in these institutions. Information Technology has boosted the expansion of many businesses by enabling them to expand their operations across borders by adapting e-business. The adaption of e-business has helped businesses to augment their market niche as well as improve their communications within the companies as well as with other stakeholders such as their suppliers and shareholders. A computer network is a system that comprise of interconnected computers that communicate with each other. For instance, computers may be connected through the physical hardwires such as the use of wires and networking cards or wirelessly. The networking of computers allows the computers within the network to communicate with each other, share files as well as share some other resources such as the printer. The networking process enables computers to be linked with the internet which increases the usability of a computer network (EcommercePrgrgram.com, 2007). Network Security entails the requirements that are required in an organization to assist in protecting the computer systems, network as well as the resources that are accessible through the network. Network security involves preventing unauthorized access, malicious damages of files, monitoring continuous and consistency of traffic flow as well as effectiveness of the computer network. Network security is a common concern for every company that has a computer network. It is very important for a system administrator to ensure that he/she puts effective security measures to ensure that the network is secure from unauthorized access. Get your 100% original paper on any topic done in as little as 3 hours Learn More A compromised network security gives hackers or competitive rivals an opportunity to enter into the network and damage sensitive files as well as interfere with the system and completely crush it down. The loss of important data as well as alteration of some sensitive data can result to very serious repercussions to the company affected. The term information security is taken to refer to security of computer system from within an organization, while network security refers to security of the network from outside intruders. The security of any network starts from authentication of a user who logs into the network. Authentication of such type is referred as one factor authentication, while a two factor authentication occurs when one uses an Automated Machine or a mobile phone. Three factor authentications happen in biometrics, where body parts such as the eye retina or finger prints are used to verify the user. The authentication procedure is followed by firewalls that leverage the programs or services that will be accessed by authorized users. Firewalls are effective in preventing unauthorized access of sensitive information, but they fail to prevent entry of worms into the network which are transmitted across network. To overcome the entry of viruses as well as worms inside the network, the system network administrator should make sure that he/she installs appropriate firewall as well as IPS settings. The evolvement of information technology has resulted to advancement of the network security systems. The introduction of e-businesses has resulted to the need to modify the computer security systems from keeping the unwanted users away, but enabling the targeted people to access the network. The cotemporary network should allow customers, remote employees as well as other relevant stakeholders to access the network. Thus the use of firewall and antivirus is not sufficient to guarantee the required security. The security system employed should ensure that it is able to keep the information of the clients private and secure. Through this process the customers will be able to trust the organization network since it cannot expose their information to unwanted people (Curtin, 1997). We will write a custom Term Paper on Network Securities Management specifically for you! Get your first paper with 15% OFF Learn More There are various techniques that hackers employ to access computer networks illegally. One of the processes they use is an attack of the Internet Protocol. Basically, an IP does not do any authentication of any form. This means that the computer network allows transmission of a packet within the network without finding out whether the address that it assumes to originate from is part of the network. Therefore to control transmission of unwanted packets, the system administrator ensures that the network is able to offer authentication at the application layer. Some of the strategies that hackers employ to access computer networks illegally are IP session hijacking. This process involves instances where unauthorized user takes over a user’s session. For instance, if a user is using an email, the intruder attacks the session and impersonates to be the real user. To control IP snooping, system administrators should make sure that they install their network system with encryption programs. Subsequently, the computer users should therefore make sure that they encrypt their packets before transmission. Use of encryption mechanism has been noted to be a very effective strategy of overcoming IP snooping. The encryption of packets makes sure that even if the hacker takes over a user’s session, he/she is not in a position to decrypt the transmitted packets in order to understand the kind of information being relayed since they do not have the required cryptographic key. The system manager should advise the management accordingly on the right software and hardware to include in their systems in order to enhance the security of their computer networks. The computer system manager who works on a company that uses mostly telnet should advice the company management to use encrypted versions of telnet, instead of standard telnet that are highly prone to IP snooping. Denial of service attack is a network attack whereby a network attacker sends a lot of request to a host computer which it cannot be able to manage. Most ‘DoS attacks like the Ping of Death’ and ‘Teardrop’ attacks take the advantage of the limitation of the TCP or IP protocols. For example ,it is noted that for all DoS attacks, there are some software that have been designed to prevent these attacks, therefore system administrators should ensure that their computer networks are installed with appropriate software in order to control network attacks through denial of services. A network attacker executes a denial of service attack by sending a lot of request to a system than it can handle. Not sure if you can write a paper on Network Securities Management by yourself? We can help you for only $16.05 $11/page Learn More The attacker uses some tools to make it easier to run a program that request the host to send numerous messages. Through this process the attacker makes a connection by faking the packets header information that contains the information of where the packet is originating from and then drops the connecting (Raggo, 2003).). Unauthorized Access is another form of network insecurity. Unauthorized access means an authorized user accessing some resources that ought not to come across. In a computer network, different workstations are given diverse rights on accessing various resources within the network. This limitation is employed for security issues. For instance, in a situation where a host is a web server, it is programmed in a manner to give anyone with the rights to access the requested web pages. Nevertheless, that host should not offer command shell access before verifying that the request is originating from the right location such as from a local administrator. For example, the system administrator should not allow un-trusted person to execute any command from the server. There exist two categories of this situation. They include the normal access user and administrator access. A normal user is given the right to execute a number of things over the network system. A normal user should be in a position to mail files as well as read those files that are shared over the network. Similarly, the user is given the mandate to mail such files to other people. These rights are only limited to those authorized network users. Unauthorized users are not in a position to execute the aforementioned activities since they have not been given the access rights. Conversely, normal users are not given the permission to make configuration changes to a host. Configuration alterations may involve changing the IP address as well as installing a start-up script that makes a system to shut down every time it boots up. It is only the system administrator that is given the right to execute the configuration changes such as changing the IP addresses or putting start-up scrip. For the normal user to access such privileges, he/she will seek permissions from the system administrator (Curtin, 1997). The connection of an organization to the internet allows the movement of traffic in two ways. This jeopardizes the security of an organization since some proprieties information is freely accessible within a corporate intranet. To overcome this system administrators are using firewalls to create a separation between a company’s intranet and the internet. A firewall is some components that are used to act as a barrier between two networks. There exist three kinds of firewalls namely; the Application Gateways which comprises of bastions hosts that run some software that behave like proxy server. Application Gateways operates at the application layer of the ISO/OSI Reference Model. It requires for the clients behind the firewall to be proxitized in order to employ Internet services. The use of Application Gateway is not considered as the most preferred option since it is a very slow process. It is slow because it requires a number of subsequent processes to be initiated in order to have a request serviced. The other type of firewall that can be used to separate the company’s intranet with the internet is Packet Filtering. In this method, routers are fitted with Access Control Lists. Thus, through this process, routers are only allowed to transmit only specific packets that they receive. The use of ACLs helps a company to leverage the information that they avail to the public and the information it considers private. This firewall takes place at the transport layer or the session layer. Packet filtering firewalls are faster than Application gateways firewalls. Conversely, Packet filtering is not considered as a very effective security strategy since the TCP/IP that are associated with Packet Filtering do not have the ability to verify that the source address is really what it assumes to be. In order to enhance the security of computer network while using packet filtering firewalls, the system administrator should use two packets of filtering in order to guarantee whether the packet originates from the internet or intranet. The most effective and efficient firewall is the Hybrid System. This firewall combines the concepts of both the application gateway and packet filtering mechanism in order to boost the performance of firewalls. The system requires authentication and approval at the application layer. After the authentication and approval the packet is passed on to the session layer where the packet filtering ensures that it is only those packets that should be accessed by the public are passing on. The coming of e-business has resulted to greater insecurity issues. Many businesses as well as people have lost a lot of their money due to existence of ineffective security measures within their network. Companies that sell their products online should make sure that they have secured their systems accordingly in order to avoid exposing the credit codes of their customers to hackers. Expose of the credit numbers of their clients can result to hackers using these credit cards to make unwarranted purchases. The Sony Entertainment American is an example of a recent victim of hacking that resulted to expose of credit cards of many of their customers (Curtin, 1997). In order to have very effective and efficient security systems, the system administrator should ensure that he/she updates the network accordingly. The security infrastructure should be able to provide authentication for the users that access the network. Being able to identify the users that visit the network is very paramount in establishing a successful network security. The network should be able to authenticate its customers accurately and efficiently in order to create satisfying experiences with its customers and partners. After the authentication, the system should authorize the users appropriately. The system should give various accesses to diverse users depending on their level of authorization. The system should in addition offer the protection of assets. The network asset entails the information that is transmitted or stored in the network. The computer network should make sure that it keeps information that is stored or transmitted in the network safe and confidential. Similarly, the network should be installed with programs that help in accountability processes. These programs should help the system administrator to know who are logged in, and what they are doing. The system administrator should advise the management accordingly in order to ensure that they adapt appropriate security policies that will enhance the security of the system. Appropriate administration procedures will greatly boost the security of a network. The security measures adapted should offer assurance that they are effective in meeting their objective. One sure method to verify their effectiveness is by the proactive detection of viruses as well as intrusions. Reference List Curtin, M. (1997).Introduction to Network Security. Web. EcommercePrgrgram.com. E-business – Privacy and Security. Web. Raggo, M. (2003). Hacking and Network Defense. Web.

answer clearly and in detail

essay order answer clearly and in detail.

I’m working on a writing Research Paper and need support to help me understand better.

My idea is “The primary goal of the HEDP program that I’m creating is to enhance education and health promotion strategies aimed at enhancing the awareness of diabetes prevention strategies in Hispanic communities within us. HEDP and health promotion strategies aim to enhance diabetes awareness in Hispanic communities due to the high prevalence of the disease in the communities.” …. Create a lesson plan by filling the attached template and follow instructions as attached … you can use the program plan as a reference
answer clearly and in detail

PU Crime & Deviance Theoretical Analysis on Respectability on Trial Essay

PU Crime & Deviance Theoretical Analysis on Respectability on Trial Essay.

IntroductionThe purpose of the Analytical Paper is to synthesize the theories, concepts, and ideas presented in the course and apply this synthesized knowledge to conduct a theoretical analysis of the sociological research presented in Respectability on Trial by Brian Donovan. This paper is intended and designed to meet each of the five Core Learning Outcomes (CLOs) for the course.Work on this paper spans Units 1-7. In Units 1-6, students must complete reading one chapter (of six total chapters) of the text Respectability on Trial and submit your 200-word (maximum) response to the Weekly Reflection Activity question for the unit. The final drafts of the Analytical Paper are due by Sunday at 11:59 PM, at the conclusion of Unit 7. The total points possible for the paper are 140 (or 28% of the 100% points possible in the course).DirectionsYour paper will be a theoretical analysis of the textbook Respectability on Trial (Donovan 2016) applying three of the different perspectives you studied throughout the term (for example, strain theory, constructionist perspectives, theory of differential-association, labeling theory, etc.).The Analytical Paper references can be only from the two books used for the course (Adler and Adler 2016, and Donovan 2016) and the course materials in each unit (for instance, the assigned websites, videos, and podcasts). Your paper should include only major components of the theoretical perspectives and the limitations of each of the perspectives. In other words, you are to summarize, synthesize, and evaluate the strengths and weaknesses of each perspective in terms of how they explain the social, cultural, racial, gendered, sexual, and religious issues raised by Donovan’s research in Respectability on Trial.The paper needs to be written in APA format. The typed paper needs to be 8-10 double-spaced pages in length. The title page and references sections of the paper are not included in the total page count. A minimum of nine citations from the Adler and Adler textbook is required, three for each theoretical perspective that you choose.Components of the paper include:IntroductionTheories/Perspectives (with your parenthetical citations).ConclusionReferences (should consist only of references from the textbooks, videos, and podcasts in the course).See GRADING RUBRIC for specific details on component criteria and expectations.Spelling and formatting expectations for the paper include:Correct spelling, proper formatting, and appropriate grammar are required. Students should write the paper in an academic voice (for example, using the language, terminology, and key concepts covered in the course).Late papers will be deducted 15 points per day for each day after the submission deadline.Submit papers the file name in the following format: First initial, last name, term, and year (for example, naderi.SU19).Due DateSunday, 11:59 pm, CT of Unit 7
PU Crime & Deviance Theoretical Analysis on Respectability on Trial Essay

Gender Differences: American and Chinese Culture

Gender Differences: American and Chinese Culture. In the 21st century, a number of significant sociopolitical and technological changes have been witnessed, which have made the world a global village which is getting smaller by the day. The technological feasibility that has enabled the mass media to bring events and news across the world to schools, businesses and homes almost as soon as they occur has narrowed down the distance barriers between people, cultures and societies, such that the world is fast becoming one giant melting pot of cultural, ethnic, religious, linguistic and racial diversities. However, these changes have also resulted in the increase in international tensions between countries world wide, due to the increased interaction. The most significant of these tensions have been witnessed in the past between the United States and Northern Ireland, Eastern Europe and most recently, the Middle East. Thus in light of these developments, the need to develop competent and effective intercultural communication cannot be overemphasized. It is indeed a fact that such conflicts are usually of political origin, but are primarily caused by religious and ethnic differences that form barriers to effective communication. The term ‘intercultural communication’ is sometimes used interchangeably with ‘cross-cultural communication’; and it is simply the engagement of concerted efforts at understanding how people who hail form different cultures perceive, act and communicate in their native environment. Intercultural communication plays important roles in fostering understanding in the case of communication between countries in the global platform. (Griffin, 2000). The focus of this paper will therefore be to demonstrate an example of poor intercultural communication between North Americans and Asians and how it affects the effectiveness of communication between the two cultures. Which are long term such as prospecting for oil or minerals; “The Process Culture”, which is seen in organizations that have little or lack of feedback altogether and the members of the organization maintain a strict focus on the procedures of executing and achieving targets, and is most evident in bureaucracies, with the main advantage of achieving consistency in results which is necessary in sectors like the public service and this fact effectively serves to undermine the massive red tape and overly cautious nature of these cultures. (DealGender Differences: American and Chinese Culture