Free Essay

Analyzing Written Eassays

In:

Submitted By yolandafoster
Words 348
Pages 2
Analyzing Written Essays
Yolanda Foster

This exercise was very enlightening, most of the results do coincide with how I view and handle situations. Whether they are situations at home work or in class. I try and please everyone knowing that it may or may not happen. But I feel that I have to at least attempt it. Which ties into my core value result that is balancing between others and myself. Most of time I am the one that people will vent to whether it’s family, friends or co-workers, because I will listen and not judge them on what they have to say. Which is also listed in my core value result, that I am ‘’tempered by rationality, using reason to find the rules of life.’’ The Blind Spot was one the results that I have mixed emotions about; there are parts I agree and parts I disagree. My expectations of people are pretty clear and cut, I expect that you do your job to the best of your ability. I am someone who will not ask you to do something that I myself would not do. The blind Spot stated that I ‘’forget that individuals are fallible regardless of their role.’’ I know individuals are fallible just not on a constant basis. After this exercise it has brought forth some things for me to think about, especially a statement that was listed in My Risks, ‘’This can make you susceptible to insincere flattery and immune to constructive critiques preventing you from doing your job effectively.’’ Maybe I need to sit back and evaluate the things that people are coming to me to vent about. Especially with my co-workers, maybe I need to stop and think, ‘’What are they really saying? Could this be about me?’’ All in all after participating in this exercise it has revealed my strengths and weaknesses that I was unaware of. One of the strengths is having the ability to put myself in someone else’s shoes and rely upon previous life experiences to understand what they may be going through.

Similar Documents

Premium Essay

Security

...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 93588 - Pages: 375

Premium Essay

The Handbook

...National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made...

Words: 93564 - Pages: 375