Archive for November 25th, 2019

Cybersecurity Strategy, Law, And Policy Team Assignment

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the five sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. 

As a group, use the Week 7 and 8 Assignment Template to write your paper, which should cover the following topics:

 

Part 1: National Security Strategy and Cybersecurity

  • After reading the National Security Strategy (2017), comment on the following.
    • Should the United States create a separate cybersecurity strategy to be published alongside the National Security Strategy (NSS), or do you feel the NSS is sufficient? Why or why not?
    • Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity?

Part 2: Public/Private Partnerships

  • After reading the Cybersecurity Act of 2015, address the private/public partnership with the DHS National Cybersecurity and Communications Integration Center (NCCIC), arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information.
    • What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?
    • On the flip side, what should private organizations share with the NCCIC? As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers’ private data?
    • The government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity?

Requirement:

 1)No directly quoted material may be used in this project paper. 

2) Need to be APA for in-text citation and reference page

3) Use visuals where appropriate. 

Do you feel there are enough significant differences between the two systems to justify having a separate juvenile system?

  1. Select five (5) of the processes identified in the Learning Activity and clearly compare and contrast their treatments in the juvenile and adult courts. (At least one full paragraph per comparison).
  2. Do you feel there are enough significant differences between the two systems to justify having a separate juvenile system? Justify your rationale. 
 
 
 

Discuss the four ethical dilemmas defense attorneys face.

Discuss the four ethical dilemmas defense attorneys face. How should each be handled in your opinion? 200 Words APA Format

2. What constitutes effective counsel? What are examples of ineffective counsel? 200 Words APA format

3. In Chapter 5 of your textbook, you read about the murders of Nicole Brown Simpson and Ronald Goldman. A substantial amount of physical evidence appeared to associate O. J. Simpson with these murders. Imagine that you were one of the investigating officers on that case. What would you have done differently while collecting evidence during the investigation? Why? Do you think the outcome might have been different had you collected evidence in the way you suggest? Why, or why not?

Your journal entry must be at least 200 words in length. No references or citations are necessary.

4. In Chapter 5 of your textbook, you read about the murders of Nicole Brown Simpson and Ronald Goldman. A substantial amount of physical evidence appeared to associate O. J. Simpson with these murders. Imagine that you were one of the investigating officers on that case. What would you have done differently while collecting evidence during the investigation? Why? Do you think the outcome might have been different had you collected evidence in the way you suggest? Why, or why not?

Your journal entry must be at least 200 words in length. No references or citations are necessary.

 
 
 

Describe common tactics, techniques, and procedures to include threat actor types.

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

This is a team assignment, and the team members that were selected by the instructor in the previous assignment will work together. It is up to the team members to decide who is responsible for contributing to the sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections.

Note that you are required to complete a peer review for yourself and for each member of the team. The peer review template is provided in the Activities folder.  

Your team’s report should use the Week 5 and 6 Assignment Template to cover the following five areas:

Part 1: Threat Landscape Analysis

  • Provide a detailed analysis of the threat landscape in 2018.
  • What has changed since 2017?
  • Describe common tactics, techniques, and procedures to include threat actor types.
  • What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

 

Requirement:

  •  No directly quoted material may be used in this project paper. 
  • Need APA format for in-text citation and reference page.

HEALTH CARE POLITICS AND POLICY

Welcome to your final writing assignment. For your last writing you will be looking at the issue of money in political campaigns and elections. As each of you knows, PACs are political action committees. They function as a conduit to influence politicians and voters. The amount of money that PACs have been able to accumulate and spend as influence has varied over time. There was a McCain Feingold act which limited PACs and that was modified by the Citizens United case.

 

  

Our concern as a society is to make sure that healthcare is available to people but the method of distribution varies in the minds of many people and other interests. The medical professionals, the insurance industry, “big Pharma” and patients all have overlapping interests and conflicts of interest. 

 

 Your task is to write a memo of a length of 5 pages, laying out the challenges of PACs, the problems which they present, the current status of the law and your suggestions on what, if any, limitations you would recommend. I have posted some resources but you may use any others which you feel are appropriate. 

 

Paper must be written in APA format with a minimum of 3 references. 

 
 
 

Compare and contrast the similarities and differences of logical positivism, postpositivism, and constructivist paradigms and explain reasons you agree with or do not agree with each one.

“Alternate Views of Evaluation” Please respond to the following:

  • Compare and contrast the similarities and differences of logical positivism, postpositivism, and constructivist paradigms and explain reasons you agree with or do not agree with each one.
  • Stufflebeam, a leader in the evaluation field, categorized evaluation into three groups: (a) Question and/or Methods, (b) Improvement/Accountability, and (c) Social Agenda/Advocacy approaches. Discuss the primary approach your evaluation project follows and explain ways or reasons for using this approach

CSCI 415 Ethics, Law and Cybersecurity

Final Quiz

NAME:___________________________                            DATE: ____________

Final Quiz (5% of semester grade)

Instructions:  There are three (3) topic areas listed below that are designed to measure your knowledge level specific to your understanding and ability to analyze the professional, ethical, legal, security and social issues in the global field of computing.  You must respond to all three questions by providing appropriate responses in essay form.  The references for this assignment must be newer (less than 2 years old) than for the other assignments.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 2 years oldrelevant to each of the topics is a fundamental component of your quiz as well. You must have at least one reference for each topic and you cannot use the same reference to satisfy this requirement.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  References with no date (n.d.) are not acceptable.  Each question requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question.  Be sure to include your name on the quiz.  Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date.   Do well.

  1. (a) Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time.  (b) What steps are being taken to minimize or thwart these threats?  (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens?  (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society?  Please elaborate (beyond a yes or no answer)

2.  (a) Describe at least 3 of the most significant ethical/social issues for individuals and at least 3 of the most significant ethical/social issues for businesses/organizations in the field of Computer Science.  (b) Which, if any, of these issues overlap both individuals and businesses/organizations?  (c) For each issue that you identified that is causing a major ethical/social problem for society, suggest a solution for this problem.  Be as concise as possible in your answer and do not address the issue of security threats in this question.  Please elaborate (beyond a yes or no answer)

3.  The field of computer science has changed during your lifetime and will continue to change in the future.  When the Computer Science department at this University was created in 1974 students were using keypunch cards to run programs on the main frame.  There was no PC, no cell phone, no phone aps, no internet, no Facebook, no Twitter, no Google, no Microsoft, etc.  The field of computer science has changed dramatically from then till now.  Over your entire life the changes could be as dramatic as it has been since the CS Department was created.  (a) How important is it to you to keep up to date with the coming changes in hardware, software and ethical issues?  (b) What specific steps will you in engage in to make sure that you are up to date as a computer professional?  Please elaborate (beyond a yes or no answer)

Grading Rubric for Quizzes

Grading criterion                                                                              Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_fq)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

 NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

 
 
 

Research a unique news story or article related to Information Security/Information Technology.

Person Mapping

 

Question A –  Acknowledge at least two types of accounts that should not be mapped to a person; explain your reasoning. 

 

Question B –  Research a unique news story or article related to Information Security/Information Technology. Please also provide a link to the original article. Source is your choice; however please fully cite your source. 

 

Should be 250 -350 words.

Reflective Entrepreneur Essay

As a reflective entrepreneur gaining from past nonsuccesses, address the following: If you could redo/relive any of experiences, what would it be? Why?  

  • In the last two paragraphs, discuss a) how these insights will serve you in your current/future occupational choice and b) how you would incorporate sustainability and ethics to bring about a positive change in the practice of entrepreneurship – be very specific and detailed in your summative conclusion.  Use separate subheadings for this.
 
 
 

PSY 104 Child And Adolescent Development

Child and Adolescent   Safety Statistics [WLOs: 1, 2, 3] [CLOs: 2, 6]

 

Prior to completing this discussion, please read Chapters 5 and 6 in your textbook. You may be interested in viewing the interactive infographic within Chapter 6 to learn more about specific safety statistics.

Safety is an important issue to consider when explaining the physical development in children and adolescence. For this discussion, you will address the following:

  • Provide examples of new safety guidelines that did not      exist either when you were growing up, or when your parents were growing      up.
  • Then, review What Is CRAAP? A Guide to      Evaluating Web Sources (Links to an external site.) and      search the internet for credible sources, using Ashford University      Library’s video Scholarly and Popular Resources (Links      to an external site.) for guidelines. Find and report on three      statistics specifically related to child and adolescent safety from this      current decade (2010 to present). Provide one statistic for each of the      three stages: infancy or toddlerhood, childhood, and adolescence. Address      the social system (family, school, and the community) that is affected by      this statistic if applicable. 
    • In other words, you will have one unique statistic for       each of the three stages. Be sure to reference the site where the       statistic was located.

See the example below:

  

One statistic found on the Centers   for Disease Control and Prevention web page, under the Child Passenger   Safety: Get the Facts, Risk Reduction for Every Age tab, states that, “Car   seat use reduces the risk for death to infants (aged <1 year) by 71%; and   to toddlers (aged 1–4 years) by 54% in passenger vehicles” (2017, para. 3).

Reference:

Centers for Disease Control and   Prevention. (2017). Child passenger safety: Get the   facts (Links to an external site.). Retrieved from   http://www.cdc.gov/MotorVehicleSafety/Child_Passenger_Safety/CPS-Factsheet.html

error: Content is protected !!