by Brian Leakey | Jun 23, 2023 | Security
Imagine you are a community health nurse assigned to care for a person who was recently diagnosed with type 2 diabetes. JK is a 66-year-old Black woman with hypertension and asthma. JK lives in a food desert and does not drive. JK’s family visits her weekly/on...
by Brian Leakey | Jun 21, 2023 | Security
a. Describe and justify which one of these threats, opportunities, or challenges you believe is the most significant to the Commander, US Indo-Pacific Command, based on C206RB the Commander’s 2022 Posture Statement. b. Explain how the Commander, US Indo-Pacific...
by acdsholarSAw3B06o6UN | Jun 15, 2023 | Security
You have recently graduated from UTSC and you wish to increase your chances of being employed in a big organization that values good opinions, research, facts, current topics and good writing. Your career advisor suggests that you write a 400-word Op-ed for a...
by Brian Leakey | Jun 6, 2023 | Security
When a company is looking for potential vendors/suppliers for a project, what would be the impact if the company asked vendors submitting proposals to provide information about their cybersecurity framework profile? How would that affect the supplier-customer...
by Brian Leakey | May 28, 2023 | Security
Discuss the following questions: “You arrive at work on Monday morning to discover that your computer is not working properly. It stops responding and restarts every few minutes. Unexpectedly, you see unusual error messages popping up and hear some strange sounds from...
by Brian Leakey | May 25, 2023 | Security
You remembered some ugly facts about cybersecurity last week. Now, let’s start reviewing fundamental security practices for ourselves. Watch the following talk:• Security Awareness for YouLinks to an external site. by Jason Callahan Post a 3- to 4-paragraph (375 to...