Enable contrast version

Tutor profile: Raymond W.

Inactive
Raymond W.
Undergraduate and Graduate Professor - Emergency Management, Cybersecurity, & Logistics Management
Tutor Satisfaction Guarantee

Questions

Subject: Risk Management and Insurance

TutorMe
Question:

Regarding a community's exposure to weather related risks, what steps can be used to assess the resilience of the community?

Inactive
Raymond W.
Answer:

The community can employ a 3-step methodology developed by FEMA to assess risks [risk is defined as follows: Risk = (p)threat + (p)vulnerability + (p)consequences or (p)impacts where (p) is the probability based on likelihood and significance] Step 1: Identify, define, and prioritize risks of greatest importance to the whole of community Step 2: Provide contextual meaning for each risk identified and prioritized in step 1 (contextual meaning offers quantitative measures for each risk such as time or the concept of time, location, weather conditions, and expert opinions provided by reputable sources. Step 3: Identify target capabilities for risks identified, based upon materiel and non-materiel solutions found in the FEMA Target Capabilities List, Authorized Equipment List, and Community Resilience documentation.

Subject: Information Technology

TutorMe
Question:

What are a few of the basic differences between perimeter and zero trust security architectures?

Inactive
Raymond W.
Answer:

Perimeter security employs a "caste & moat" enclave around computing devices and networks, restricts access by establishing passwords, and limits available internet ports for incoming/outgoing data. Zero Trust security architectures employ traditional perimeter security features and add additional steps to strengthen the computing environment by: increased segmentation of the network, multi-factor authentication, extending the principle of least privilege to an existing firewall, firewalls become contextually aware of suspicious traffic, and enhanced gathering/analysis of security logged events.

Subject: US History

TutorMe
Question:

What nefarious, blood thirsty group exercised the "pre-cursor" to the form of government currently used today in the United States?

Inactive
Raymond W.
Answer:

Pirates! During the "Golden age" of Piracy, the brethren of the coast exercised a rudimentary form of democracy where the captain, first mate, purser, and surgeon of a private crew were voted into office by each member of the crew. The positions held were only encumbered until the crew decided amongst themselves that a "change in leadership" was needed. Men and women of all ethnic origins, races, and social standing were welcomed and treated equally among pirate crews. This arrangement was one of the earliest forms of "democratic rule" and pre-dated the fight for independence, which happened a little over 130 years later.

Contact tutor

Send a message explaining your
needs and Raymond will reply soon.
Contact Raymond

Request lesson

Ready now? Request a lesson.
Start Lesson

FAQs

What is a lesson?
A lesson is virtual lesson space on our platform where you and a tutor can communicate. You'll have the option to communicate using video/audio as well as text chat. You can also upload documents, edit papers in real time and use our cutting-edge virtual whiteboard.
How do I begin a lesson?
If the tutor is currently online, you can click the "Start Lesson" button above. If they are offline, you can always send them a message to schedule a lesson.
Who are TutorMe tutors?
Many of our tutors are current college students or recent graduates of top-tier universities like MIT, Harvard and USC. TutorMe has thousands of top-quality tutors available to work with you.
BEST IN CLASS SINCE 2015
TutorMe homepage
Made in California by Zovio
© 2013 - 2021 TutorMe, LLC
High Contrast Mode
On
Off