Client uploads
Criminal Justice Trends Evaluation
Im working on a Law exercise and need support.
Write a 1,400- to 1,750-word paper in which you identify past, present, and future trends relating to high-tech crime in the relationship between the components of criminal justice system and the surrounding community. Identify and explain the following in your assessment:
- Past, present and future trends and contemporary issues in cyber-crime affecting the criminal justice system
- Changes in law enforcement with the advent of technology crimes
- Assess the importance of community outreach in the area of cybercrime enforcement
Format your paper consistent with APA guidelines.
sowk 6121 Involuntary Group Members
I need an explanation for this Social Science question to help me study.
Involuntary members have been ordered to attend a group in exchange for some reward. Many times, this is a result of judicial system intervention. Often, these members are not interested in participating and getting to know others. The clinical social worker must understand the potential issues or problems that arise within a group of involuntary members and ways to address these issues. It can be especially difficult to create a sense of empowerment when these members have been mandated to attend.
For this Discussion, pay particular attention to the Schimmel & Jacobs (2011) piece.
By Day 3
Post your description of the strategies for working with involuntary group members presented in the Schimmel & Jacobs (2011) article. Describe ways you agree and/or disagree with their strategies. How might you handle the situations presented in the article differently? Explain ways these strategies promote empowerment.
CMIT 321 6385 Ethical Hacking
I dont understand this Computer Science question and need help to study.
Penetration Test Proposal Details
For this assignment, you will play the role of a penetration tester for a fictional company, Centralia Security Lab. Your task is to develop a penetration testing proposal for your new client, Haverbrook Investment Group,
Welcome to Centralia Security Lab!
Centralia Security Lab has been hired by Haverbrook Investment Group to perform penetration testing on its systems. As a pen tester, you have been assigned to write the plan for what Centralia will do in the testing.
Your proposal should include the “rules of engagement” (agreement outlining the framework for the penetration testing) and outline how you would go through the five phases of hacking
Network Layout
Penetration testing involves a series of activities undertaken to identify and exploit security vulnerabilities. It helps to confirm the effectiveness or ineffectiveness of the security measures that have been implemented. According to EC-Council, the three phases of penetration testing include the preattack phase, attack phase, and postattack phase.
The Penetration Test Proposal consists of four related assignments that are submitted throughout the course. The submissions align with the five phases of ethical hacking.
The Penetration Test Proposal will be submitted in four one- to four-page deliverables. Then, you will submit a final deliverable with all the sections combined at the end of the course:
- Rules of Engagement
- Reconnaissance Plan and Scanning Plan
- Gaining Access Plan
- Maintaining Access Plan, Covering Your Tracks Plan, and Final Report.
Deliverable 1: Rules of Engagement
The first deliverable of the Penetration Test Proposal is the rules of engagement (ROE) document, a formal document that outlines the objectives, scope, methodology, and overall test plan agreed upon by the penetration testers and client system administrators.
Penetration testing can cause complications such as network traffic congestion, system downtime, and may cause the same vulnerabilities and compromises it was designed to prevent. Due to the potential consequences of penetration testing, it is vital to agree on a comprehensive ROE before testing.
For your one- to two-page ROE deliverable, consider the following:
- How will you identify Haverbrook Investment Group’s network characteristics, expectations, constraints, critical systems, and other relevant information?
- What are your preliminary engagement activities with regard to scheduling, scope, and key stakeholders?
- What will you use to establish a binding agreement between Centralia Security Lab and Haverbrook Investment Group?
- How will you determine the services, targets, expectations, and other logistics that will be covered during the Rules of Engagement section?
- How will you explain to Haverbrook that the tools and techniques to be used in the penetration test will not corrupt data, violate privacy, and are in compliance with industry standards and any applicable laws and regulations?
Use the Rules of Engagement Template below to record your work
Penetration Test Proposal
Deliverable 1: Rules of Engagement
Name:
Course Number and Section:
Instructor:
Date:
Rules of Engagement
Overview
Include a brief description of the penetration test project.
Scope
Discuss the scope of the penetration test (pen test).
Checklist
Provide a list of the testing requirements.
Ethical Considerations
Describe how you will apply appropriate ethical principles throughout the penetration testing process.
References
Deliverable 2: Reconnaissance Plan and Scanning Plan
Your second project deliverable will be due in Week 3. It will be two to four pages in length and will contain a Reconnaissance Plan and a Scanning Plan.
Reconnaissance Plan
In one to two pages, identify the specific passive and active methods you would use to gather key information about Haverbrook Investment Group as part of structured and ordered methodology. Provide one to two references in your plan.
As you are developing your reconnaissance plan, keep these questions in mind:
- As a malicious actor, how would you engage in a targeted attack against Haverbrook Investment Group while conducting passive reconnaissance techniques?
- What active reconnaissance techniques would you try?
- What techniques would you use for footprinting?
- How would you identify and explain the company’s presence on the internet?
- How would you find the company’s IP address range? How would you find the employees’ personally identifiable information (PII), such as email addresses and phone numbers?
- What potential impacts would your penetration testing techniques have on the confidentiality, integrity, and availability of the company’s private data as well as its networked systems?
Scanning Plan
In one to two pages, outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Groups systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrooks systems.
As you are developing your scanning plan, keep these questions in mind:
- How would you detect active systems?
- How would you determine the best attack vector you wish to exploit?
- How would you prioritize different targets of opportunity?
- What tools would you be using for scanning and enumeration of systems and vulnerabilities?
Be sure to identify any needed software and provide a description of how it will be used to gather information about the systems.To assist in completing Deliverable 2, refer to Chapters 2, 3, and 4 in the textbook.
Use the same template from delivery one to finish your deliverable
Deliverable 3: Gaining Access Plan
After collecting enough information about the target during Deliverable 2 (Reconnaissance Plan and Scanning Plan), you will describe how to use that information to gain access to Haverbrooks systems. Your one- to two-page plan on gaining access should include:
- details of the gaining access process in regards to the techniques commonly used to exploit low-privileged user accounts by cracking passwords through techniques such as brute-forcing, password guessing, and social engineering, and then escalating the account privileges to administrative levels in order to perform a protected operation.
- an implementation outline of any software that will be used in gaining access to the network(s) or system(s) You may include open source and commercial tools available to execute the actual exploit: Burp Suite, Cain and Abel, Core Impact, John the Ripper, Metasploit, and others. You can also use some programming languages, such as Javascript, Perl, Python, Ruby, or C++, if you choose to develop custom exploits.
As you are developing your Gaining Access Plan, keep these questions in mind:
- How would you escalate your privileges?
- How would you establish a command and control communication channel?
Refer to Chapter 6 in the textbook for the different techniques that can be used to gain access to the system.
Use the Gaining Access Template below to record your work
Penetration Test Proposal
Deliverable 3: Gaining Access Plan
Name:
Course Number and Section:
Instructor:
Date:
Gaining Access
Overview
Provide a summary of the Gaining Access phase.
Vulnerable Resources
Identify the resources where vulnerabilities can be located and include a brief description of those resources. Be sure to include a reference to the vulnerability, i.e., NVD.
Techniques and Software
Provide the techniques and any software, applications, or scripts that will be used in gaining access to the network(s) or system(s) along with a description of each technique. Refer to Chapter 6 in the textbook for additional information.
References
Deliverable 4: Maintaining Access Plan, Covering Your Tracks Plan, and Final Penetration Test Proposal
This deliverable includes three items:
- the last two parts of the Penetration Test Proposal (Maintaining Access and Covering Your Tracks)
- the entire final proposal with all previously submitted sections
Maintaining Access Plan
For this one- to two-page deliverable, identify the techniques you would use to maintain access to Haverbrook’s target network and/or system, as well as provide a brief summary of each technique. Include any software that is required to maintain access in the network or system(s).
As you are developing your Maintaining Access Plan, keep these questions in mind:
- Would you consider using a backdoor, a botnet, the reverse tunnel technique, polymorphic malware, or a toolkit as some examples to maintain access on the target network?
- What commercial tools would you use when pivoting to maintain and escalate control?
- How do you maintain access without causing damage to the system or network?
- How long do you stay in the system and/or network before the payload is released?
Covering Your Tracks
Some techniques attackers use to remain undetected are clearing the logs, updating firmware and using malicious programs such as backdoors or Trojans. Attackers also use tools such as Firmware Mod Kit, Firmalyzer Enterprise, and Firmware Analysis Toolkit to exploit firmware.
In one to two pages, provide a brief description of the methods, software tools, and any other means of avoiding detection and how each of these techniques would be used to hide your activities. To assist with completing Deliverable 4, refer to Chapter 6.
As you are developing your plans for maintaining access and covering your tracks, keep these questions in mind:
- What critical system files would be replaced to hide an attackers presence in the system?
- How would steganography or tunneling be used in an attackers efforts to conceal his or her presence?
Final Proposal
Add your previous submissions, make updates and corrections based on the feedback received from your instructor and add your Maintaining Access and Covering Your Tracks plan.
So, your final proposal will include the following components:
- Rules of Engagement (from Deliverable 1)
- Reconnaissance Plan (from Deliverable 2)
- Scanning Plan (from Deliverable 2)
- Gaining Access Plan (from Deliverable 3)
- Maintaining Access Plan (Deliverable 4)
- Covering Your Tracks Plan (Deliverable 4)
Use the format below to complete your final penetration test proposal
Penetration Test Proposal
Deliverable 4: Final Penetration Test Proposal
Name:
Course Number and Section:
Instructor:
Date:
Rules of Engagement
Overview
Include a brief description of the penetration test project.
Scope
Discuss the scope of the penetration test (pen test).
Checklist
Provide a list of the testing requirements.
Ethical Considerations
Describe how you will apply appropriate ethical principles throughout the penetration testing process.
Reconnaissance Plan
Overview
Provide a summary of the Reconnaissance phase.
Reconnaissance Methods
Identify specific methods and demonstrate a structured and ordered methodology while gathering key information that could be used to penetrate the network and systems of Haverbrook Investment Group. Discuss in detail both passive and active methods of reconnaissance.
Scanning Plan
Overview
Provide a summary of the Scanning phase.
Tactics, Techniques, and Procedures
Outline and discuss specific use cases to discover and enumerate information that could be used for potential exploitation. Some examples of information that you are gathering from Haverbrook Investment Groups systems are usernames, machine names, shares, and services from a system. Identify any software, applications, or scripts that will be needed and provide a description of how this software will be used to gather information about Haverbrooks systems.
Gaining Access Plan
Overview
Provide a summary of the Gaining Access phase.
Vulnerable Resources
Identify the resources where vulnerabilities can be located and include a brief description of those resources. Be sure to include a reference to the vulnerability, i.e., NVD.
Techniques and Software
Provide the techniques and any software, applications, or scriptsthat will be used in gaining access to the network(s) or system(s) along with a description of each technique. Refer to Chapter 6 in the textbook for additional information.
Maintaining Access Plan
Overview
Provide a summary of the Maintaining Access phase.
Techniques and Software
Identify the techniques used to maintain network and/or system access. Provide a brief summary of each technique. Include any software, applications, or scripts that may be needed to maintain access in the network or system(s). Refer to Chapter 6 in the textbook for additional information.
Covering Your Tracks Plan
Overview
Provide a summary of the Cover Your Tracks phase.
Techniques and Software
Identify the methods, software, applications, scripts and any other means of covering your tracks. Provide a brief description of how each of these will be used to hide from the system administrator. Refer to Chapter 6 in the textbook for additional information.
References
Business Communi
I dont know how to handle this Business question and need guidance.
1. The top three things youd like to learn about Business Communication?
2. Locate a current event about a company or product. Tell the class what the story was about. Who was the audience? What was the tone & style of article? Was the information delivered appropriately? How did the company handle the information? What suggestions do have for handling the information more effectively? only answer the questions.
3. Supposed you are a project manager using a waterfall development-based methodology on a large and complex project. Your manager has just read an article that advocates replacing this methodology with prototyping and comes to you requesting that you switch.
- What would you say to your manager?
Justify the reasoning behind your response utilizing at least one external resource.
Supplementary Article: The Pros and Cons of Rapid Prototyping (Links to an external site.) discusses rapid prototyping.
I want this answer right away. (3)
4.Review the Stanford Guidelines for Web Credibility (Links to an external site.) and visit the Stanford Web Credibility Research website (Links to an external site.)for more information. Then select one of the topics provided below that interests you. Find four different websites that provide information on that topic. Evaluate the credibility of the information presented on each website. Write a brief analysis of each website (approximately 100 words per website) explaining what makes the information credible or not credible. Include a hyperlink of each website with your analysis.
Here are the topics to choose from:
- Mobile phones and cancer
- Diets and dietary supplements
- Gun violence in United States
- Climate change
- Smoking & secondhand smoke
- Vaping
- Air and water pollution
- Organic food and farming
5. Assume that you have been assigned the task of creating an object-oriented system that could be used to support students in finding an appropriate apartment to live in next semester. Using what you have learned about the basic characteristics of object-oriented systems:
- Define the different types of objects (i.e., classes) you would want to include in your system.
- Define the attributes you would want to include in their definition.
- Arrange them into an inheritance hierarchy.
Diagramming Resources
- Microsoft Visio
- Microsoft PowerPoint
- Edraw (Links to an external site.)
- Smartdraw (Links to an external site.)
- Draw.io (Links to an external site.)
Textbook
- Chapter 1, Introduction to Systems Analysis and Design” (Use figures 1-9, 1-10 and 1-11 as examples – pgs. 20-22.)
http://gen.lib.rus.ec/ You will find the book there.
Alan Dennis, Barbara Haley Wixom, David Tegarden – Systems Analysis and Design_ An Object-Oriented Approach with UML-Wiley (2015)
Homework H1: Practice Problems in C
Im studying for my Computer Science class and dont understand how to answer this. Can you help me study?
Problem 1.
Write a C program to print the contents of a text file line-by-line but backwards so that the last line is printed first. The filename should be specified as a command-line argument.
Problem 2.
Write a C program to convert a decimal number to binary in 32 bits. All 32 bits should be printed even if fewer bits are required to represent the number. The number should be specified as a command-line argument.
Problem 3. Write a C program to find out how many bits a variable of type long int is. Your program should not call any system functions (not even sizeof) and it should not include any .h files. (In other words, write your own code).
prepare a statement of cash flows
Im studying for my Accounting class and dont understand how to answer this. Can you help me study?
Option #1: Operating Activities Analysis Exercises and Problems
Using the financial data below, prepare a statement of cash flows for the year ended December 31, 2014 for Summer Peebles, Inc. using the indirect method.
Sales |
$1,000.00 |
Cost of Goods Sold |
-$650.00 |
Depreciation Expense |
-$100.00 |
Sales and General Expense |
-$100.00 |
Interest Expense |
-$50.00 |
Income Tax Expense |
-$40.00 |
Net Income |
$60.00 |
Assets |
2013 |
2014 |
Cash |
$50.00 |
$60.00 |
Accounts Receivable, Net |
$500.00 |
$520.00 |
Inventory |
$750.00 |
$770.00 |
Current Assets |
$1,300.00 |
$1,350.00 |
Fixed Assets, Net |
$500.00 |
$550.00 |
Total Assets |
$1,800.00 |
$1,900.00 |
Liabilities and Equity |
||
Notes Payable to Banks |
$100.00 |
$75.00 |
Accounts Payable |
$590.00 |
$615.00 |
Interest Payable |
$10.00 |
$20.00 |
Current Liabilities |
$700.00 |
$710.00 |
Long-Term Debt |
$300.00 |
$350.00 |
Deferred Income Tax |
$300.00 |
$310.00 |
Capital Stock |
$400.00 |
$400.00 |
Your submission should:
- Include the Excel spreadsheet with computations.
Assignment 2: Tasty Snack Foods: Analysis of a Market Opportunity?
Im studying for my Marketing class and need an explanation.
Tasty Snack Foods, a small, start-up gourmet food business, has a new line of gourmet potato chips. The company has been testing the chips in California, and they are selling well. They are now planning to expand the market to another state or region and have hired XYZ Corporation to do some up-front research resulting in a presentation that outlines some options for the companys involvement in this new market. You have been given this assignment by Michael Johnson, Director of Marketing for XYZ Corporation. He has asked you to put together a report that focuses on a specific state or region and explores the viability of a market opportunity for Tasty Snack Foods to sell its gourmet potato chips.
To prepare for this Assignment:
- Review this weeks Learning Resources.
- Refer to the Academic Writing Expectations for 2000/3000-Level Courses as you compose your Assignment.
By Day 7
Submit your report. Use the template provided to create your report, making sure to incorporate a minimum of four scholarly sources, properly formatted, as references.
Part 1: Situational Analysis
In this part of the report, you will perform a situational analysis relevant to the particular state or region you selected. Be sure to include the following:
- A brief introduction in which you identify the components of a situational analysis (75150 words, or 12 paragraphs)
- An appraisal of the organizations environment, including a description of how each of the five Cs pertain to the selected region or state (150300 words, or 24 paragraphs)
- Specifically, provide a detailed description for each C regarding the challenges that Tasty Snack Foods is facing for that component.
- An analysis of how each of the Cs affects decision making for the company (150225 words, or 23 paragraphs)
Part 2: SWOT Analysis
For the second part of the report, you will perform a SWOT analysis on the Tasty Snack Foods gourmet potato chips expansion project. This should include the following:
- An analysis of the organizations internal and external environmental factors (150300 words, or 24 paragraphs)
- Strengths
- Weaknesses
- Opportunities
- Threats
- A breakdown of the potential traditional and digital marketing strategies based on the SWOT findings (75150 words, or 12 paragraphs)
- What suggestions related to the expansion do you have for Tasty Snack Foods based on this analysis?
Cultural Considerations in Mental Health Nursing
Im studying for my Nursing class and need an explanation.
TOPIC: Cultural Considerations in Mental Health Nursing
Submit an evidence-based practice paper about cultural competency in mental health nursing. An evidence-based practice paper allows you to explore best practice and help improve client outcomes on a psychiatric unit. Your paper should describe how you, as a nurse, will include – or have included – cultural awareness in a client diagnosed with a mental illness. The person you describe could be someone in your clinical setting, someone you have worked with in the past, or a theoretical client.
Remember that culture can also include gender equality, sexual orientation, and other cultures besides race and religion – including cultures unique to one particular family. Your paper should be at least 3 pages (double-spaced, not including the title or reference pages) in APA Format and include:
- Assessment: Discuss what you would assess in regard to a client’s culture. For example, are there specific dietary requirements? Are schedule changes necessary to avoid conflicts with religious practices? Who is the spokesperson for the family? What would you assess?
- Diagnosis: List any mental health nursing diagnoses this person has or may be at risk for. Include at least one cultural diagnosis.
- Planning: What planning needs to be done to ensure the cultural and emotional safety of the client?
- Implementation: What are interventions that would ensure the safety of your client in regard to culture? Include at least two interventions. For example, if your client has religious beliefs that affect the ability to take medications, what interventions would you create to ensure the client’s safety? What can you do to make sure the client’s cultural needs are met?
- Evaluation: How will you evaluate whether your implementation was effective? Make sure the parameters are objective and measurable.
- In your summary, discuss whether any completed interventions were successful. What could be done differently in the future? If the interventions have not yet been carried out, you might discuss some institutional changes that could be made to ensure cultural safety for all clients in that setting.
Your paper should utilize proper APA guidelines and include at least three scholarly sources to support your paper. A scholarly source is a source that has been peer reviewed and has appropriate authors that are credentialed.
Discuss the difference between single and double precision, advantages and disadvantages of using sampling
I dont understand this Computer Science question and need help to study.
1. Discuss the difference between the precision of a measurement and the terms single and double precision, as they are used in computer science, typically to represent floating-point numbers that require 32 and 64 bits, respectively.
(200 words)
2. Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed. Would simple random sampling (without replacement) be a good approach to sampling? Why or why not?
(200 words)
SOWK 6090 The Complexity of Eating Disorder Recovery in the Digital Age
Help me study for my Psychology class. Im stuck and dont understand.
Through this weeks Learning Resources, you become aware not only of the prevalence of factors involved in the treatment of eating disorders, but also the societal, medical, and cultural influences that help individuals develop and sustain the unhealthy behaviors related to an eating disorder. These behaviors have drastic impacts on health. In clinical practice, social workers need to know about the resources available to clients living with an eating disorder and be comfortable developing interdisciplinary, individualized treatment plans for recovery that incorporate medical and other specialists.
For this Discussion, you focus on guiding clients through treatment and recovery.
To prepare:
- Review the Learning Resources on experiences of living with an eating disorder, as well as social and cultural influences on the disorder.
- Read the case provided by your instructor for this weeks Discussion.
By Day 3
Post a 300- to 500-word response in which you address the following:
- Provide the full DSM-5 diagnosis for the client. Remember, a full diagnosis should include the name of the disorder, ICD-10-CM code, specifiers, severity, and the Z codes (other conditions that may be a focus of clinical attention). Keep in mind a diagnosis covers the most recent 12 months.
- Explain the diagnosis by matching the symptoms identified in the case to the specific criteria for the diagnosis.
- Explain why it is important to use an interprofessional approach in treatment. Identity specific professionals you would recommend for the team, and describe how you might best utilize or focus their services.
- Explain how you would use the clients family to support recovery. Include specific behavioral examples.
- Select and explain an evidence-based, focused treatment approach that you might use in your part of the overall treatment plan.
- Explain how culture and diversity influence these disorders. Consider how gender, age, socioeconomic status, sexual orientation, and/or ethnicity/race affect the experience of living with an eating disorder.
I need tutor to have access to DSM5 and be familiar with diagnosis and ICD-10 CM code, specifiers, severity and z codes. The case study is attached that needs to be looked at – its called The case of Diamond and the discussion piece is on this.
Use Promo Code: FIRST15