ok

ok

Need this back by Monday afternoon

Need this back by monday 6 pm

Economic Discussion wuestion need them back by 6 pm saturday 

3 Point 1 times 10 to the second exsponet 

  1. Go to an Internet job search Web site such as .www.careers.com or www.helpwanted.com.  Using the Web site's search feature, find jobs related to your present or future career.   Then find job descriptions that specify communication skills you will need.  Write a paragraph summarizing what you found.  The minimum word requirement is 75 words.  Label your document M6 Communication Skills.

two problems 

 

In Chapter 4 of Leading for a Lifetime, Bennis describes “crucibles.” What relationship do these “defining crucibles” have to leadership? To date, what is your most significant “defining moment” and how has it contributed to your leadership personality?

 

1) Imagine you're a senior executive for a large company. You've just been put in charge of your companies Information Security (IS) Program and told that your mandate is to prevent cybercrime through developing sound policy. Your primary challenges are twofold: 1) You are a transnational company and employees travel all over the globe; and 2) Your company has no active audit program in place to quantify vulnerabilities and potential losses from attacks to information systems. Attack them one at a time...

 

Realizing that when employees travel they are exposed to risk and possible cyberattack... You need to put information security protocols in place for individuals traveling abroad; specifically what other steps will you put in place to ensure that information (and equipment) will be secure? Will your plan vary depending on the countries your employees visit or is it one security plan works for all countries visited? Why? What steps must employees take before leaving and how will you measure that those steps have been taken?

 

Your other immediate challenge is to discuss with management the challenges associated with quantifying vulnerabilities and potential losses from attacks to your company's computer systems. What's involved in doing that and what are some of the biggest challenges involved in accomplishing that kind of assessment?