cyber spy hunter

In this engaging YouTube video, Eric Winsborrowgives a compelling TedX talk that describes the evolution of malware and provides an excellent description of the most well known Cyber attack on Industrial control systems–Stuxnet. Watch this video to gain an appreciation for the implications of cyber security and also a peek into what we might do to defend our industries from cyber attacks in the future.

Please address these points in your discussion submission:

  • How might really critical computers be protected from infection via USB stick like what happened in operation Olympics?
  • Could Iran have protected its centrifuges with devices not related to IT security?
  • What crircal systems do you worry about the most from the aspect of Advanced Persistent Threats and why?

World View Chart Writing Assignment

Choose ONE (1) category (origin of all things, nature of god, view of
human nature, view of good and evil, etc.) from the chart to focus on
for this assignment. Consider how the selected category relates to all
of the religions covered and to your own social or work experiences.

Write a two to three (2-3) page paper in which you:

  1. Select ONE (1) category from the completed World View Chart. Provide
    a rationale for choosing this category. What is compelling about this
    category? Why is it important in the study of religion?
  2. Describe the selected content and explain the significance of
    the selected category across all of the religions studied. Show in what
    ways the category is significant for each religion.
  3. Give an example of how you have noticed this category in your
    life, town or country. What impact does this category have in the
    everyday lives of people who practice religion in your area? (You do not
    have to give examples of all the religions in your area, just one you
    have noticed besides any you practice). For example, in Cincinnati, Ohio
    we have Hindu, Greek Orthodox, Catholic festivals in the summer. So if
    my category were “Festivals and Celebrations” I could use those events
    as my example.
  4. Use at least three (3) quality resources as references for the
    assignment and document your sources using APA Style for in-text
    citations and references. Note: Wikipedia and similar Websites do not
    qualify as quality resources.
  5. Write clearly and coherently using correct grammar, punctuation, spelling, and mechanics.

Your assignment must:

  • Be typed, double spaced, using Times New Roman font (size 12), with
    one-inch margins on all sides; citations and references must follow APA
    or school-specific format. Check with your professor for any additional
    instructions.
  • Include a cover page containing the title of the assignment,
    the student’s name, the professor’s name, the course title, and the
    date. The cover page and the reference page are not included in the
    required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze what is meant by religion.
  • Analyze the similarities and differences in the primary beliefs
    held by major religious traditions and the cultures in which these
    religions evolved.
  • Describe the varieties of religious experience and practice in a wide range of cultures.
  • Recognize how daily life within various religions and current affairs are influenced by religion.
  • Develop written pieces that demonstrate an analysis of a topic relevant to the course.
  • Use technology and information resources to research issues in religion.
  • Write clearly and concisely about world religions using proper writing mechanics.

Discussion Replies , writing homework help

Must be 150 words each. These are discussion replies, either answer the question being asked or ass some more information. Do not critique the other individuals writing, just add some information or thoughts on the topic.

1) Chapter 8 Using Virtualization in Windows 12 Server

Class,

A huge portion of this chapter deals with virtualization in Windows server 2012 and it important that everyone has a solid understanding of this technology and what it does because as the technology has progressed it has moved more into a virtualized environment. The days of having data centers the size of a Walmart are over and consolidation seems to be the norm now a days. What is virtualization? What are the pros of using virtualization on a Windows Server?

2) Chapter 8 Hyper V

Class,

There has been a lot of pros that have been attributed to Hyper-V technology. Does anyone see any cons that would not want to use Hper-V? In what scenario would Hyper-V not work for your enviornment?

3) Chapter 8 Snapshots

Class,

Here’s a real world scenario. Have you built a server or installed on Operating system? It take you a few hours to install the O/S, install the proper drivers for the hardware and get all of the update installed on your machine. And for some unknown reason your server or computer just bombs and your lose everything and have to completely start over because you didn’t backup your O/S. Well hopefully talking about his subject will help with that. What is a Snapshot as it related to virtualization? What’s the benefit of a Snapshot? For those who have used a VM or worked in a VM environment this should be a familiar concept.

4) Chapter 8 Chapter Review

So the general idea im getting from chapter 8 is the overall benefit and use of Hyper-V. It discusses some important details about virtual networks and virtual hard disk. At the begining i did notice it mentions taking you thru the steps for two install types one is a full installation and the other is server core. A important note or detail i did pick up on is that you need to ensure that your server meets not only the hardware requirements but also the software requirements as well. The server core installation creates a operating system without a GUI shell according the the book. But something i liked about the server core installation was how it reduces the attack surface since few applications are running. This increases system availability and thereby reduces downtime.

5) Chapter 9 Subnetting

I also find revisiting the concepts of subnetting to be extremely helpful as I am quite a newbee to all of these ideas and to understand networking, subnetting is absolutely essential! I especially found the way in which they described subnetting in the reading to helpful for me because I work in a hotel. Subnetting a hotel with over 1000 rooms could be something like using the number 101(1=floor 1 and 01 =room 1) the first room on the second floor would be 201 and so on. Someone looking for room 321 would go to the 3rd floor room 21. In computer terms to find a host in a network the router would route the packet to the correct network portion of the address and than the correct host ID.

6) Chapter 10 DHCP

Class,

I’d like to expand the conversation about DHCP. When talking about DHCP, we throw around terms like static IP, dynamic and scope and really don’t fully understand what they really mean. I’d like for us to dissect the whole process and really see the importance of DHCP for us to get our information. How would you define a DHCP? What exactly does it do? What does a DHCP server do? What’s a static IP address and why is it important?

7) Supporting Activity DNS

For me to troubleshoot the problems, I’ll first reboot the server, most times the problem solves itself if nothing else works. The only issue that I can think that may happen with the DDNS is if the port isn’t functioning correctly, an example is that the DDNS is not launching error. Once the user enables the port and it is working properly, then a restart or firmware update should take place to fix the error. A problem that may occur to some users is the DDoS attack; this is due to DNS services outages and temporary disconnects the network. The DNS cache settings can negatively impact the users if DNS cache poisoning takes place, unauthorized domain names or IP addresses get inserted into the DNS cache. According to Mitchell (2017), DNS cache poisoning happens when computer viruses or other attacks added invalid DNS entries into the cache, users will then transfer to a different destination instead of the one he/she was trying to access.

8) Supporting Activity DHCP

Class,

I’d like to expand the conversation about DHCP. When talking about DHCP, we throw around terms like static IP, dynamic and scope and really don’t fully understand what they really mean. I’d like for us to dissect the whole process and really see the importance of DHCP for us to get our information. How would you define a DHCP? What exactly does it do? What does a DHCP server do? What’s a static IP address and why is it important?

A total of 700 words essay answering the following questions would be superb.

The questions come from Chapter 3 and 4 of textbook Scheb, John,

Criminal Law and Procedure, 8th edition, ISBN 9781285070117, Cengage

Publisher, if that helps.

  • How have recent decisions of
    the Supreme Court interpreting the Commerce Clause of Art. I, Sec. 8
    affected congressional authority to define criminal conduct?
  • What type of political speech, if any, may be prohibited under Brandenburg v. Ohio?Provide an example of such speech.
  • Why does Justice Douglas, dissenting in Miller v. California, state that “obscenity cases have no business being in the courts”?
  • The
    Second Amendment to the U.S. Constitution stipulates: “A well regulated
    Militia, being necessary to the security of a free State, the right of
    the people to keep and bear Arms, shall not be infringed.” Explain the
    reasoning of the Supreme Court in DC v. Heller (2008), in
    striking down a District of Columbia ordinance that effectively created a
    complete ban on handguns within the District.
  • On what
    constitutional grounds would a person likely challenge a local ordinance
    that provided “no one shall appear on the public streets unless he or
    she is clothed in ordinary street attire”?
  • What effect did the right of privacy announced in Griswold v. Connecticut (1965) have on the Supreme Court’s reasoning in its subsequent decision in Roe v. Wade (1973) invalidating state laws prohibiting abortions?
  • Why is the due process clause of the 14th Amendment important with regard to substantive criminal law?
  • Under what circumstances can criminal statutes be challenged as violations of the Equal Protection Clause of the 14th Amendment?
  • What
    test would a court apply in reviewing a statute that made it a crime
    for a person to practice medicine without a license?Why would it apply
    this particular test?
  • Under what circumstances might a person’s failure to act constitute a criminal act?
  • Distinguish between the concepts of motive and intent in the criminal law.
  • What is the difference between general and specific intent?

Making a Difference for vulnerable population

For this final forum, describe a multidisciplinary approach for a vulnerable population that we have not covered in class.

Imagine you are a policymaker for your city or town. Based on what you
know, and what you have learned in this course, what would you modify or
improve to make a positive change in the life of a vulnerable group we
have not covered in class? Would you consult the vulnerable group when
developing programs or policies? Why or why not? Which policy would you
create to improve health care services accessibility, cost, and quality
related to your selected group?

Your initial contribution should be 250 to 300 words in length. Your
research and claims must be supported by a minimum of two scholarly
sources beyond your course text.  Use proper APA formatting for  in-text
citations and references

Help with project paper

Research Report #1: Data Breach Incident Analysis and Report

Scenario

Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors found that the majority of PBI’s operating units did not have specific plans in place to address data breaches and, in general, the company was deemed “not ready” to effectively prevent and/or respond to a major data breach. The insurance company has indicated that it will not renew PBI’s cyber insurance policy if PBI does not address this deficiency by putting an effective data breach response policy and plan in place.PBI’s executive leadership team has established an internal task force to address these problems and close the gaps because they know that the company cannot afford to have its cyber insurance policy cancelled.

Unfortunately, due to the sensitivity of the issues, no management interns will be allowed to shadow the task force members as they work on this high priority initiative. The Chief of Staff (CoS), however, is not one to let a good learning opportunity go to waste … especially for the management interns. Your assignment from the CoS is to review a set of news articles, legal opinions, and court documents for multiple data breaches that affected a competitor, Wyndham Worldwide. After you have done so, the CoS has asked that you write a research report that can be shared with middle managers and senior staff to help them understand the problems and issues arising from the insurance company’s findings and the court case against Wyndham Worldwide.

Research

Note: If Lexology.COM asks you to “register” for access, switch to another browser or clear your cookies / cache for that website.

Write

Write a three to five page report using your research. At a minimum, your report must include the following:

1.An introduction or overview of the problem (cyber insurance company’s audit findings regarding the company’s lack of readiness to respond to data breaches). This introduction should be suitable for an executive audience and should explain what cyber insurance is and why the company needs it.

2.An analysis section in which you discuss the following:

  • A review of best practices which includes 5 or more specific recommendations that should be implemented as part of Padgett-Beale’s updated data breach response policy and plans. Your review should identify and discuss at least one best practice for each of the following areas:people, processes, policies and technologies. (This means that one of the four areas will have two recommendations for a total of 5.)
  • A closing section (summary) in which you summarize the issues and your recommendations for policies, processes, and/or technologies that Padgett-Beale, Inc. should implement.

Submit For Grading

Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)

Additional Information

  • To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own.
  • Your research report should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources.

3.Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use.

4.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

5.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Marketing Plan

Business name De’Lite (Dee-Light) Goods an upscale boutique bakery serving petites goods such as, pastries, macrons cookies, cake pops, pies, premium coffee and cappuccino, and other products. Prime locations: Small attractive store located in middle to upper class surberban and urban suburbia neighborhoods. Target market: Bakery will serve and caters to all customers who willing to pay for quality and premium goods compare to lesser offerings from surrounding standards coffee and bakery shops. To give an idea think more in line with Starbucks but focuse more in bake goods, and the use of organic and kosher ingredients. Demographic: This bakery will focus on family, trendy young people and the health conscious crowed, who don’t mind a paying little more but still affordable in par with target area.

Assignment 1: Part A: Your Marketing Plan

At the end of this course, you will have created a marketing plan for a hypothetical product-based company. Each assignment focuses on a different section of the overall marketing plan. For Assignment 1, you will compile information on the company’s background information, an environmental analysis, your company’s short and long-term goals, and a SWOT analysis.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Write a five to six (5) page paper in which you:

  1. Write an introduction to your company. Describe your company, its location, and the product it makes or the service it provides.
  2. Develop an environmental analysis that includes competitive, economic, political, legal, technological, and sociocultural forces.
  3. Determine the primary and secondary target markets for your company. Next, analyze the primary and secondary target markets that you identified for your company. Be sure to cover the 4Ps, 5Cs and STP.
  4. Decide the main goals that you would like to achieve within the next year (short term) and the mains goals that you would like to achieve within the next five (5) years (long term). Determine the most appropriate ways to measure both short- and long-term goals. Note: Consider the following metrics: tracking downloads of Website content, Website visitors, increases in market share, customer value, new product adoption rates, retention, rate of growth compared to competition and the market, margin, and customer engagement.
  5. Develop both a SWOT analysis and needs analysis for your product. Each analysis should examine four (4) strengths, weaknesses, opportunities, and threats for your company.
  6. Use at least four (4) academic resources as quantitative marketing research to determine the feasibility of your product / service. These resources should be industry specific and relate to your chosen product / service. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze the marketing framework including the concepts of the 5Cs, STP, and 4Ps.
  • Develop strategies to assess performance and achieve marketing goals.
  • Examine the marketing science of customer behavior and products in the marketing exchange process and create dynamic strategies for competing.
  • Evaluate target customer segments and positioning products within these segments.
  • Use technology and information resources to research issues in marketing management.
  • Write clearly and concisely about marketing management using proper writing mechanics.

need synopsis for my thesis

2 pages long on 

topic 

 capital punishment

This is an example of the outline and how it needs to be. 
Sex Offenders Get Released Everyday, Keep your Family Safe

I.Introduction

A. Strong Opening: Hundreds of sex offenders get released from prison
every day. Sex offenders pose a threat within communities and create
fear in the citizens. It is the state, local, and tribal law
enforcement agencies job to keep communities safe from repeat and
predatory sexual offenders.

B. Thesis Statement: When a sex offender is released back in to the
community it can be quite overwhelming for the neighborhood. Not only
can it be overwhelming, but it is also frightening. Law enforcement
agencies are in a unique position to address and alleviate such
community concerns. Understanding that sex offenders are not a
homogeneous population is critical to any enforcement or prevention
strategy and will enhance an agency’s ability to target their
resources toward those offenders presenting the greatest risk to the
community.

II.Body Paragraph and Topic Sentence #1: Sex offenders get released in
to the communities on a daily basis. When sex offenders get out of
prison it cause panic in the communities. Some people are afraid to
let their children out to play. Parents become very over protective of
their children and constantly worry that the sex offender in thier
area will make their child their next victim. With all of the panic
children may also experience distress.

A. Supporting evidence: By the parents being so over protective,
scared, and concerened when a sex offender moves in to their
community, it provides both personal and altruistic fear of
victimization. Altruistic fear is the emotional reaction to the
percieved danger that a household member would be a crime victim.

III.Body Paragraph and Topic Sentence #2: Sex offenders with a
previous sex offense conviction have a 37% re-offense rate. That is
just out of the victims that report the sexual abuse.

A. Supporting Evidence: Of released sex offenders who allegedly
committed another sex crime, 40% perpertrated the new offense withon a
year of release of prison.

IV.Body Paragraph and Topic Sentence #3: Law enforcement agencies do
take measures to create saftey in the community when a sex offender is
released from prison, yet how effective are these measures when it
comes to a sex offender re-offending? Law enforcement agencies send
out notification cards, have tracking moniters, and making sex
offenders register at their local sherrifs office. Law enfrcement
agencies are also supposed to do address verification.

A. Supporting Evidence: The process of address verification varies
from state to state. I live in Ohio and 90%of the time officers do not
ever go to the house to verify that is where the offender really
lives. My roommates mom is a registered sex offender and she is never
at her registered address. Most of the time she is at her daughter in
laws house where there are young children. How would the police know
though if they never go to verify that she resides at the address that
she registered with the sherriffs office? There are flaws and when
there are flaws there are sex offenders re-offending.

V.Body Paragraph and Topic Sentence #4: What we can do to protect
ourselfs, our children, and our people in our community from becoming
a victim.

A. Educate yourself and your family in safety concerns. This is a time
to reinforce family safety planning and specific concerns about
strangers and this offender.

VI.Body Paragraph and Topic Sentence #5: Things you can tell your
children to protect them from becoming the sex offenders next victim
are as follows:

Don’t accept a ride from anyone you do not know. Have a code word your
children will remember. Teach them what to do if someone who does not
know the code word tries to give them a ride. Don’t allow your
children to go into the home or yard of the offender, or any stranger.
Make sure your child knows who to tell if a stranger offers them toys,
money or gifts. Teach your children to play with others and in groups
when they can. Teach your children should call 911 if you aren’t home
and they are approached by a stranger.

A. Supporting Evidence: The more your child and family members know
about safety as well as the offender the safer they are.

VII.Conclusion: Sex offenders get released every day and it is your
job to protect, educate3, and make a safety plan with you family in
order to keep them from becoming a victim. With out knowledge,
stupidity rules. With out saftey plans offenders have a greater chance
at making you their next victim. Pull together as a community and keep
everyone in your community safe.

Crisis Leadership or Risk Management Report

Crisis Leadership or Risk Management Report

Organizations are susceptible to an array of crises. There are different types of threats with no “one way” to manage them. This reality presents multiple business challenges to those in leadership positions. Each manager is responsible for managing risks within their own sphere of operations and area of responsibility. To this end, one must understand that crisis leadership is a process. For this assignment, you are required to identify a business crisis issue that interests you and develop a report.

Directions:

Address the following in your report:

  • Identify and describe a business crisis situation and the main leaders involved. It could be one that you have experienced or have read about. Be sure to include a discussion of ethical implications.
  • Assess the strengths, weaknesses, opportunities, threats, and industry trends (SWOTT) the company faced while its leaders were managing the crisis.
  • Assume you are a leader; recommend ways you could ensure that you have a clear view of risks across the organization in regard to the given scenario.
  • Identify a risk management process you would employ to mitigate risks in regard to the given scenario along with a rationale (utilize contemporary and classical leadership theories in support).
  • Recommend what you would do to ensure the risk management process is working the way you expect in regard to the scenario.
  • Describe ways to identify and manage uncertainties in a complex corporate environment (utilize contemporary and classical leadership theories to support your argument).

Utilize at least three scholarly sources (in addition to your textbook) to complete your research, referencing the sources within the text and at the end in a reference list.

Write a 6–8-page report in Word format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M3_A2.doc.

Make sure you write in a clear, concise, and organized manner; demonstrate ethical scholarship through accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Written assignment case study

Hello, please see the attached written assignment. please read it all
the way through and please ensure that this paper is written accordingly
to the rubric and the assignment guidelines. please ensure all the
paper as well as citations are in APA format. Please ensure that you use
the correct number of in-text citation, references, pages, and all
other directions that are listed in the assignment. The case study is attached. Please make this paper a maximum of 5 pages of text.5 pages not including title, table of contents, and reference. If this does not
follow the assignment guidelines as well as rubric, i will withdraw.