HOT! Keygen Crack License For Acs 5 2
Click Here ::: https://geags.com/2t2JDj
Software installation media should be stored in a centralized location with proper documentation of the number of licenses and number of installations. These media should be protected from harsh environmental conditions, such as excessive heat, moisture, and electrical and magnetic fields (EMF).
All software media should be backed up regularly to ensure that no data are lost. Periodic backups stored in a secure off-site location will make it possible to recover quickly from a catastrophe on site. The agency should take into account regional peculiarities when storing backups off site. For example, in areas prone to earthquakes, media should not be stored in high-rise buildings; in areas prone to flooding, media should be stored in a facility away from the flood plain. Some recommendations for software security are as follows: store software media in a locked cabinet within a proper environment; retain off-site storage for backups of installation media; test the process for restoring software; retain off-site storage of licensing and application documentation; maintain and back up licensing management and related documentation; allow access to applications through the use of network security settings to only those groups/users that require access; implement a software-auditing package to ensure license compliance and to ensure that no unauthorized software has been installed on the agency's system; standardize applications across the agency; use virus-scanning software with frequent definition updates (network-attached appliances are available for e-mail virus scanning); and use spamming prevention or filtering software to prevent unauthorized entry of email (e.g., do not allow web-based e-mail programs, such as Hotmail?). Unauthorized e-mail entry is a serious vulnerability that can lead to the entry of viruses into the network through a "back door." Securing the Network The same security procedures in place for server hardware apply to equipment that supports the network, including switches, hubs, routers, firewalls, access points, cabling, etc. Network equipment should be installed in an environment with proper ventilation and power requirements and should be protected from unauthorized access. The agency should place the equipment in dedicated building spaces. Access should be limited to staff that have a key, combination lock, key card, or other security device. Some basic precautions for securing network equipment are as follows: limit access to network equipment to authorized individuals; do not allow users to install unauthorized network equipment; use secure, encrypted passwords for "root" access (access to the "root" enables users to control entire systems or servers); and ensure proper cabling and cable protection by running cabling under a false floor, avoiding running cable over fluorescent lighting fixtures, and staying within cable/fiber length requirements. A fundamental action the agency can take toward maintaining a secure and reliable network is to hire a qualified individual to serve as the network administrator. Network administration is not a task for the average high school teacher/technology coordinator. Many agencies, however, cannot afford to hire an experienced network administrator for each school and often do rely on faculty for this position. If a teacher/coordinator is to be responsible for a school network, the agency must recognize training and professional development as priorities. Agency network policies and procedures should be clearly defined. These policies should be made readily available to anyone responsible for maintaining the network. Listed below are some items to consider for agencies managing their own networks. The responsibilities of a network administrator are, for the most part, very technical in nature. This reinforces the point that training is critical for anyone with the responsibility of running a network. Agencies should assign one individual to be responsible for network administration (and one individual as his/her backup); limit access to network equipment console screens by login credentials (either on the piece of network equipment or using an authentication server); limit access to Telnet sessions on network equipment through access lists and/or authorized workstations where only authorized users have access; limit protocols running on the network equipment; configure login banners to warn intruders of possible prosecution; use firewalls to prevent unauthorized access between external and internal systems; use unroutable IP addressing schemes within the internal network [Class A - 10.0.0.0-10.255.255.255 (10/8 prefix), Class B - 172.16.0.0-172.31.255.255 (172.16/12 prefix), Class C - 192.168.0.0-192.168.255.255 (192.168/16 prefix)]; utilize intrusion detection systems (IDS); inspect, analyze, and maintain router audit logs; provide ingress and egress access control list (ACL) filtering to prevent IP spoofing; and eliminate unauthorized network resource use by monitoring network traffic and bandwidth usage and protocols to ensure adequate bandwidth for applications; removing the ability to download unauthorized files; restricting remote access to network resources to authorized individuals with types of remote access including dial-up connections, virtual private networks (VPN), and Point-to-Point Protocol (PPP); implementing a multiple-authentication policy for authorized users or integrating into an authentication server; eliminating any "back-door" types of equipment (e.g., user modems installed on desktops); maintaining proper encryption of remote connections to ensure confidentiality; and using VPN technology with proper encryption to gain connectivity through the public networks such as the Internet. Wireless Networks Wireless communication is a rapidly evolving technology that is becoming increasingly prevalent in everyday life. The built-in security for wireless computer networks, however, is relatively weak. Technology coordinators need to pay particular attention to secure these networks properly, and the network administrator must keep up to date on emerging methods for securing wireless networks. Some security measures to consider when planning a wireless network are as follows: shut off Service Set Identifier (SSID) broadcasting and use an SSID that does not identify the agency by name; select a hardware vendor and software revision that has fixed the problem of randomization of initialization vectors (IVs); utilize applications like AirSnort or BSD-AirTools, which will be less likely to crack the agency's Wired Equivalent Privacy (WEP) keys; use 128-bit WEP and change WEP keys regularly. Select a vendor that provides a tool to rotate the agency's WEP keys; disallow access to resources at the first router hop other than the agency's VPN server, which ensures that the only host available to the wireless segment is the VPN server until a tunnel is established; place wireless access points on a dedicated virtual local area network (VLAN). Do not mix wired and wireless clients on the same LAN segment; implement a policy that limits the amount of connectivity a wireless client has to the agency's network. Assess whether students/faculty/staff need more access than TCP/80, TCP/443, etc.; utilize personal firewalls on the agency's workstations; and disable automatic IP address assignment (DCHP). If hackers are able to guess or crack the agency's WEP keys, they will not be able to access the remainder of the internal network because VPN and VLAN architecture with access lists will allow only authorized VPN clients to be routed to the network from a wireless VLAN segment. Hackers will be able to attack clients on the same subnet, however, and if one VPN connection is left up, it could be abused to access the rest of the internal network. back to top
Agencies located in areas where there might be earthquakes, hurricanes, or other natural disasters will understand the need for developing a backup procedure that uses removable media that can be transported off site. All agencies are vulnerable to some type of disaster. The solution is to have a backup plan and an off-site storage facility. Any of the following media are appropriate to use for archiving data: removable storage, magnetic tapes, CD or DVD devices, or network-attached storage. Some backed-up data should be available at all times. For example, while it may be critical to have payroll system backups available on hand, the same degree of urgency may not apply to student portfolio information. Creating a clustered server (i.e., a group of servers clustered together and used to back up the data in various ways) environment increases the likelihood that necessary data will be available when they are needed. The following architecture options are available for clustered environments: Load-balancing environments are clusters of servers arranged to share the load of user requests. Hot standby environments require an identical server attached directly to the primary network server (for monitoring) to immediately take over filling user requests in the event of a primary server failure. Cold-standby environments also consist of a secondary server to which data are frequently updated. In this case, the secondary server must be manually put into operation upon a failure of the primary server. One advantage of this option is that it removes the need to maintain identical servers with interlocking hardware. Documentation Documentation of data file structure, metadata, and system architecture design criteria is essential in any data security plan. In the event of a nonrecoverable failure, the need to recreate an identical architecture is much easier with proper documentation. In the world of technology, with staff moving from job to job, having proper documentation will help new employees. They will be able to provide appropriate maintenance much more quickly if they can refer to written documentation. Often documentation is provided when a network is first installed. It is up to the agency to allocate time so the technology personnel can update the documentation. Otherwise, the old documentation may be of little value. Documentation = Protection Out-of-date documentation = Very little protection Data Integrity Data integrity is vital for any organization. Having poor data is worse than having no data. Maintaining proper data constraints, validation rules, and application controls, such as those identified below, can help to ensure that data correctly input into the system remain intact: No person, other than the database administrator (DBA), should have direct access to data for input or change. Other staff should use applications or programs designed for data input and update. These programs usually have "edits" and other programmed devices to ensure that data are entered correctly. When data are input or changed directly in the database, this protection does not exist. Data applications must contain validation rules, format masks, and data-checking algorithms to ensure data integrity prior to committing to the database. Online applications must contain the same rules as data applications. Database servers should reside on a secure segment of the network (i.e., behind or inside the firewall). Applications should be constructed to a three-tier environment (i.e., database server, application server, and client). Security should be set so that the user logs into the application server ( not the database), with the application server having credentials to go to the database. Proper database design and implementation are essential for maintaining data integrity. Considerations should include archive log rollback segments and rollback log files. Back to top Database Security Database security employs similar security measures as those for operating systems. Database security, like OS security, utilizes logons and passwords to authenticate users. Users are assigned to certain types of groups, which in a database environment are called roles. Systems administrators, backup operators, and standard users are examples of roles that can be integrated into the OS, so that, for example, OS administrators are automatically assigned to the systems administrator role of the database system. Database security can be maintained discretely or can be integrated with OS security. The advantage to integration is that the user requires only one logon for both systems. Security measures implemented at the database system level are only truly effective if used in conjunction with proper security mechanisms implemented at the front-end application, such as dynamic web pages. Additionally, database design must include some security auditing measures, such as those that track when and by whom a particular data element was entered or updated. As described in the above section on OS security, database security should grant user access to data resources, as grouped by role and profile, based on the respective functions. This profile grouping process is preferable to a method that merely grants access to individual users. As with OS security, the default database access security setting should be to deny access. Transmission of data should be secured using protocol applications such as secure sockets layer (SSL) or secure shell (SSH), as described in the "Data Exchanges" section below. Virus Protection Staff training regarding virus protection is critical. Software programs are sets of instructions written in various programming languages. These instructions are compiled or translated into binary numbers that enable a computer's central processing unit to interpret and implement actions. Computer viruses are specific types of programs designed to cause damage to a computer system's data. Virus programs work in different ways and enter the computer via different methods. For example, a virus can be sent as an e-mail attachment, a macro (or mini-program) within a document, an executable program on a floppy disk, or by other means. Virus protection software is an important component of a security system. Virus protection software is a necessary system component that minimizes the possibility of data corruption due to a malicious virus by detecting and removing virus programs. Virus protection software can be purchased for individual computers, but it is most cost effective in large organizations to purchase a multi-user site license (an enterprise license) for the software. Once installed, virus protection software must be updated frequently. People are creating new, and more destructive, viruses all the time. It is vitally important to download and install the latest updates as soon as they are available to ensure adequate protection of computer data. The Family Education Rights and Privacy Act (FERPA) provides guidelines for the protection of student privacy. Data Exchanges With Agencies Inside and Outside the K-12 Community Education agencies have always exchanged data. Schools routinely send student transcripts to each other, and districts send transcripts to colleges and universities. The agency sending data must ensure that any transfer of student information meets the federal, state, and local regulations enacted to protect the privacy of students. 2b1af7f3a8
https://sway.office.com/PL5CDIFFcwJyrfVj
https://sway.office.com/5fNehNYU90HIzp8s
https://sway.office.com/5h65tMqFIBQOSTeD
https://sway.office.com/3gU1dXPPPzP5uqBK
https://sway.office.com/2apMcC7cJtMZQDkd
https://sway.office.com/bGkshFV83rSc3x5S
https://sway.office.com/rn9la4AkdrkZ3A9r
https://sway.office.com/JVXBs8yFEneRNe4Y
https://sway.office.com/nG5xTbBIErTPrJC3
https://sway.office.com/cKi4F3ED5GdaSHgB
https://sway.office.com/WJsLJWeFAJS8W3bV
https://sway.office.com/cX0A6Cpt6MOZbZFZ
https://sway.office.com/tyoaJArvm4ps6xv7
https://sway.office.com/lZ18xgjCPyMnH08V
https://sway.office.com/qAW3HU8CXUHUbt3J
https://sway.office.com/CSrqBnkvEhqXo3W3
https://sway.office.com/rF5Tee8g3BPZtjf8
https://sway.office.com/y64YHyX1JDXZhjb9
https://sway.office.com/Z0r5R2G5hu8q6Iwo
https://sway.office.com/auLujDjvyRAGbbAW
https://sway.office.com/PudTE5MjNWmpClCF
https://sway.office.com/vfnHTwhK1QbRmqRX
https://sway.office.com/AORa4URTl8ULaoC8
https://sway.office.com/JPcXWFFRDEa36chU
https://sway.office.com/VuWPeRiGE4LZig8V
https://sway.office.com/HFfsdAjkbSNkAnEH
https://sway.office.com/spBouvDfAOT46Uuw
https://sway.office.com/xcqNkjop6JobZQbE
https://sway.office.com/y22F1bernFZDycaK
https://sway.office.com/hI4zHj3M4N3m2lOP
https://sway.office.com/ucVP6CWao9IaSaCr
https://sway.office.com/UqndIMRNlC7yKl0U
https://sway.office.com/uV2kNJAdk99PM9NH
https://sway.office.com/P1FDixKDRf4Umxba
https://sway.office.com/5rVhRMcunFWqTfEb
https://sway.office.com/jhFb21JIWYfQDfuF
https://sway.office.com/rzflb54bzAkcuhp2
https://sway.office.com/8i0h6ySbdHScTE05
https://sway.office.com/x9DHW5IiIm9Z8elb
https://sway.office.com/o2fmCuEuhkwc7VtM
https://sway.office.com/sPe6SkjPJ2H8fnaM
https://sway.office.com/bF3AfuCnfCxyh6qC
https://sway.office.com/MggOQAdSLDbgEAxI
https://sway.office.com/3zA88O0L8colbNQx
https://sway.office.com/lsUkpTF9HWnIETz1
https://sway.office.com/RMT6piYACFge7BJD
https://sway.office.com/rEXJAYOPvg9gZXBy
https://sway.office.com/gx4h3TMHewFRj84X
https://sway.office.com/exe74naexiroWyVy
https://sway.office.com/Cm1nowCvSmN1NvOu
https://sway.office.com/5NEBknlGE74vzbU6
https://sway.office.com/dcpyPHixpHNO2rvB
https://sway.office.com/7IVWHphIgOfbBVYF
https://sway.office.com/BmB27DCLYqUFG6jJ
https://sway.office.com/WoKcxJIpcswgeCP8
https://sway.office.com/2gvignRRDOtmLDwr
https://sway.office.com/XrjQ52zAgYT3jUpX
https://sway.office.com/zu6RfvvAiGqeGDtX
https://sway.office.com/DLCPmupNFL2ZBPvl
https://sway.office.com/n1h5Z4LeCtV8fYtx
https://sway.office.com/ievP2NiyEPA1L7in
https://sway.office.com/hHeYPMH5Tm3vI9dY
https://sway.office.com/6iKcSth8bvmCopGS
https://sway.office.com/BG1XLJw0SuOfunrl
https://sway.office.com/Tpbb2GofN2R8gPg9
https://sway.office.com/mdsVE39diZVL1UGs
https://sway.office.com/I1Xe1dZ1ckkXjkLv
https://sway.office.com/lHRysOFpdEXEf44z
https://sway.office.com/fg5yMwkIGbhKQU3n
https://sway.office.com/z0f9K5Bttkne88jJ
https://sway.office.com/0WuByh7fUGYLuX9L
https://sway.office.com/QoAJ1uiKQLHjpb7f
https://sway.office.com/FCL4AdG1PGnaZFQ8
https://sway.office.com/vHrAkGnOXN4h3u6n
https://sway.office.com/FUNlftmqCpkXOi59
https://sway.office.com/lGj7lt8JZr4fpq6C
https://sway.office.com/krZqNhMWCUsomKfh
https://sway.office.com/cv0yp55j0UWZOhAB
https://sway.office.com/QGsHVILsf9gBUMDs
https://sway.office.com/y0U1OIl4Y8CRFs4B
https://sway.office.com/Zh7EgwALwLD6Hmvk
https://sway.office.com/03nCRQO1PViovuYi
https://sway.office.com/jMlkzanLrSGysVVX
https://sway.office.com/Q2QXg8Jv5SXadoIm
https://sway.office.com/BcuYYd0rBHpH22AN
https://sway.office.com/6SzE7fDa9DJEDfAb
https://sway.office.com/53QIOZIc8KCw0XQ0
https://sway.office.com/srl3aDiqnRCAeH5v
https://sway.office.com/JD8teEGeBbDf7B3f
https://sway.office.com/GkmHjDAhDTgkWqx8
https://sway.office.com/1nksl4ZMajq4e6lH
https://sway.office.com/MngmgbWQsBOJO7s8
https://sway.office.com/Pm2KFELdpUAA8cO0
https://sway.office.com/q6ZvJCOUlYGv0zqq
https://sway.office.com/FEV13vmCssRlFMt4
https://sway.office.com/w6n5L2kLFjnEuSkh
https://sway.office.com/QFuENfnvFkM2Feqz
https://sway.office.com/9c5YMqwPzgQufGzq
https://sway.office.com/Gzme7AW54x36lPnx
https://sway.office.com/c26GouGzKvwKh2ES
https://sway.office.com/OSJUJlKtGm1XjpCt
https://sway.office.com/c4zo9IByEZIRXBoD
https://sway.office.com/1fUnrSr4kbq3bO2I
https://sway.office.com/vkmXPG0WQNPH415N
https://sway.office.com/HQEEByD43gh3azPY
https://sway.office.com/cLU55gWZ7PucNzoK
https://sway.office.com/1sg2YVwWRP084sG0
https://sway.office.com/ssVvY1nIkQVtxizv
https://sway.office.com/uMYaiRHFVuKJVXCh
https://sway.office.com/JNfMNND7aNsqSVYm
https://sway.office.com/GjN0s3QzyL8FMDLC
https://sway.office.com/AuteFDpEfOYtB5Nx
https://sway.office.com/vfNTKiwkBO94lamL
https://sway.office.com/Rv2B7n42uKQ1t81S
https://sway.office.com/BU0KYz7x9j6IwdOC
https://sway.office.com/UcVRNRgbCUsEetIW
https://sway.office.com/IR2ElOJzSdIcbNJe
https://sway.office.com/CzXl7zexth4JnSHM
https://sway.office.com/eqPQ4Jbg81LadkAN
https://sway.office.com/442qprrXWwP0C3HS
https://sway.office.com/g5h0csg4Y9zF83Al
https://sway.office.com/T2mr4O9U5CQL2xuT
https://sway.office.com/RUlyNDhQQGveG1bA
https://sway.office.com/3NbL4roW4F8G9Jbm
https://sway.office.com/WvmmoVyEAXWJsv2F
https://sway.office.com/6CuXkXcaUoBZalqu
https://sway.office.com/HXfG1ocHtn62d7kc
https://sway.office.com/9Ae9aeaWoox1HADl
https://sway.office.com/RVNXAY4B3kOWUzr7
https://sway.office.com/y4FHpUtGmm09ygjh
https://sway.office.com/oZ8pgNp3xSK6z45p
https://sway.office.com/d4aNa8z3BZ6i7GuS
https://sway.office.com/dIUeFEiUxKydOn1S
https://sway.office.com/QzS07VwVJ0t2tJKU
https://sway.office.com/bBlC8NO48DZMMHGe
https://sway.office.com/G3dpdBsd8vbUGOcc
https://sway.office.com/iqki0DdmNza6vSjP
https://sway.office.com/qkT6x9JeRpNcZF8F
https://sway.office.com/mRBvGAAP1offLiCr
https://sway.office.com/CJmIGIDVJgIHXzBC
https://sway.office.com/FmeZjGtfM445m7af
https://sway.office.com/27AmmhOmpMVzQBoJ
https://sway.office.com/8w4VZaJY6qoqdpiv
https://sway.office.com/poFROruJ5vgLFsON
https://sway.office.com/kr2kFDuo5zXm2dyO
https://sway.office.com/jAPIuhdhDzaAFGjd
https://sway.office.com/WVYPdg5beB9yIXj0
https://sway.office.com/PpYPZoww1EoKVpTQ
https://sway.office.com/NH69QyVLmL5eqojV
https://sway.office.com/EMldpZFhXH6J9myf
https://sway.office.com/QzlgiaL5V1s2PgBW
https://sway.office.com/Rb1vdJIofx0cASXX
https://sway.office.com/3J3tVtNsVlwg5yD1
https://sway.office.com/3Ugqyavf4ly1OIAk
https://sway.office.com/x3mxs0fdvXC4orlP
https://sway.office.com/rifC9EzEF8eezIMZ
https://sway.office.com/gxoQAztPwZpdaGt8
https://sway.office.com/ZIuoJr2tKfPXRWbM
https://sway.office.com/9uvZKLHgtQzpQdSK
https://sway.office.com/a0iqgRjcBEt16HaA
https://sway.office.com/g4qssxe9qFleOiX1
https://sway.office.com/0jK99HkHY1KKUq4m
https://sway.office.com/CAnvystkEnqiX21v
https://sway.office.com/VuwLndXdIG04yDtH
https://sway.office.com/71cd6yhFR2pykCOk
https://sway.office.com/LxBoClQFaYxzg58N
https://sway.office.com/TFUlexITxdrzQigs
https://sway.office.com/6IzSS5tUsGlJJyyr
https://sway.office.com/46v3Rh7CIzwJkDnQ
https://sway.office.com/xfmAoDWC0fDPKHkj
https://sway.office.com/PuCyw6BKGQDBF0lO
https://sway.office.com/QKda4Fd5J9EUoBCC
https://sway.office.com/79qH7OkdAy1EdJqH
https://sway.office.com/m4T3HbFq8ilC3w1z
https://sway.office.com/JSiVr3s964T6JBBh
https://sway.office.com/KwNezoNK6rGwyNJV
https://sway.office.com/tBSV9rc8UU7CrNkK
https://sway.office.com/q4ax9PGB2sOgtd3I
https://sway.office.com/Qh8cbYzinYoEq3Mh
https://sway.office.com/4e6UUM4tuQdgoNy9
https://sway.office.com/3upKmhaVM4WXWuXo
https://sway.office.com/9FG40rZHOv4PctcA
https://sway.office.com/gOxmtdHhGK973iFA
https://sway.office.com/qGKIZKbfwUrODBNJ
https://sway.office.com/lzBAutXW9LeKqv5l
https://sway.office.com/1cDdMpduHHEGzr5f
https://sway.office.com/l9vlbgHPvVNDmRYA
https://sway.office.com/hkMHfWANx1mGgGMZ
https://sway.office.com/tmR3UWewHuIu5acO
https://sway.office.com/gYNDDF1aDewfTFAJ
https://sway.office.com/sBsFX8wMzMj8VDI2
https://sway.office.com/VKA51IspxV2u1DWS
https://sway.office.com/RlZO8Ffg6BR9CroB
https://sway.office.com/PjHJLKJPmzM3YKMc
https://sway.office.com/3MMY7nRy6ifbAosc
https://sway.office.com/tPkKjoUU1O7mNEQw
https://sway.office.com/YASzMQgUrfxUGClA
https://sway.office.com/CgSOzezG2LKE0Ptd
https://sway.office.com/vGOYMGxvZuoiiJT2
https://sway.office.com/DJTMJp9xSmRFqZWE
https://sway.office.com/qt7zKfwCULcYrrHt
https://sway.office.com/gJm7XGRNY1imW8HX
https://sway.office.com/NxscXJEZGZHUdMvr
https://sway.office.com/tb4U4nItUphNsVVG
https://sway.office.com/GJqg9YIbDa8qCdNH
https://sway.office.com/qoFF7a3D2XQAmLww
https://sway.office.com/tuM0Zc06JI5AMQ8H
https://sway.office.com/IOAWFcRDN8IZEGDC
https://sway.office.com/oehiIn9mHugM5T0e
https://sway.office.com/G4YFyCZZG1ttSmy7
https://sway.office.com/UjiZJx7MVtDPb3I1
https://sway.office.com/k9W6JbPU2pt2pixM
https://sway.office.com/aPXjU9G2hydWGm7N
https://sway.office.com/ivV70G1lp7w5FiMJ
https://sway.office.com/BPmuU1xlrbb5lzvR
https://sway.office.com/otC5gJcrYLFju6tc
https://sway.office.com/OWNl9oMCDfL5XKQY
https://sway.office.com/AaT5EdnFiKgOueHe
https://sway.office.com/VSArn9Qik6Otz4PZ
https://sway.office.com/LE73Gc3sx8BOXPpF
https://sway.office.com/A8iCIbtP7G7oHhCr
https://sway.office.com/EmDyFOIKeWbAdbkS
https://sway.office.com/Qg1yerMOR1yETtMp
https://sway.office.com/DAtQwKzcAzBvA66v
https://sway.office.com/kvJxCzDEhGiFztFY
https://sway.office.com/I1rdWe2ZHFukOkvb
https://sway.office.com/AANcXpD8CXrvClHE
https://sway.office.com/bEylfkXCAhWg3S63
https://sway.office.com/fA0wHDgXWoGHPIBp
https://sway.office.com/rAle6U4QenCqIQe9
https://sway.office.com/RnpWQWHTLAV1bREy
https://sway.office.com/uBsfhtprcDNnsCDH
https://sway.office.com/KQ7V1DaAxpqzuR1Q
https://sway.office.com/DG0nc5fD3zb4IhFE
https://sway.office.com/OFMqzB9CAP1waHpt
https://sway.office.com/BD55Ev3vfK3I0hKm
https://sway.office.com/7ljDM3NxAg065EBi
https://sway.office.com/Wq82ETzr83hCDZYB
https://sway.office.com/ptNmwqwqp7bkuHmp
https://sway.office.com/hlb6lQcYLut2AJKm
https://sway.office.com/XfV8ieFKWigHETGH
https://sway.office.com/51DEOwp6WJWZ3WSG
https://sway.office.com/eJNbvEobEY1sqgYX
https://sway.office.com/CYewhT7WNBZqHA6m
https://sway.office.com/NM7rZiEW5rwbAwee
https://sway.office.com/bGvKsBdf2yEXTrlX
https://sway.office.com/BR6meaAXOfAM6bbl
https://sway.office.com/KnXfA2OLAVDMbWtN
https://sway.office.com/MW4V5b9oiOVjrGHU
https://sway.office.com/Q9qzUCfLP1Y58HxN
https://sway.office.com/LgjAFdzoC7F9apKV
https://sway.office.com/6M01mkGznQh352jL
https://sway.office.com/sUF7NwCg7nis3qGu
https://sway.office.com/ODjhQDJkPUAVqOOA
https://sway.office.com/UeOq41jCDLiVw6Pd
https://sway.office.com/9754MHtCOEVJKM27
https://sway.office.com/SSNEUNHhFmEeDBVo
https://sway.office.com/tmNgo4FDmkGFIduF
https://sway.office.com/KzIgITKtG4YvoaUa
https://sway.office.com/VZUDSQXCAFLew5LB
https://sway.office.com/pIiD75j8uEBWLbHL
https://sway.office.com/mfDq63gqxmwBaB2D
https://sway.office.com/3yLA1zzpVPtRrKLi
https://sway.office.com/1XHyaio60PcDlk96
https://sway.office.com/AoRSbMGhC6Cl3qKj
https://sway.office.com/oAFt9deHIszZlFKX
https://sway.office.com/oRAdunX24CHoTPhQ
https://sway.office.com/vMogHGqHDEXa1Ixh
https://sway.office.com/mHyD8oJZ6DRiT16c
https://sway.office.com/kqi7UFU8qcp95J1Q
https://sway.office.com/gNPKpC61Ri2I7AOX
https://sway.office.com/2oeeqg6lkN9mcnoW
https://sway.office.com/fPsvD9CHOCPVCmFD
https://sway.office.com/UMxX5wkmBtbTaqUv
https://sway.office.com/zGcmdtcrBJBc9E7x
https://sway.office.com/6Wdr1nnhVUOjYCwT
https://sway.office.com/iF3KAxFq8zkkPm4C
https://sway.office.com/mEtj0gQK0m6q2spX
https://sway.office.com/wgHnqjOoAhbv952Q
https://sway.office.com/3r1iG8YB21a4lPPy