Cyber-crimes paper Writing Assignment Help. Cyber-crimes paper Writing Assignment Help.
(/0x4*br />
I want you to write me at least 15-pages paper about Cyber-crimes
Please review the attached files before placing any bids to make sure that you are fully aware/able to complete the assignment very-well.
- Assignment requirements:Please make sure that you follow ALL requirements of the assignment as provided, otherwise, I’ll have to withdraw if not satisfactory level of work is completed
- Reference example: examples of the way you should write the reference, and please make sure that you CITE all sources used in accordance with the assignment requirement and make sure also that the paper has sufficient academic sources
- My own 10-pages draft: please review my draft of the paper. It needs a lot of revising in terms of grammar/spilling mistakes, however if you prefer to start your own without using my draft feel free to do so, as long as the final paper meets the requirements and follow the attached outline.
- Example for the paper: please make sure that the submitted paper is following the same format as the sample provided
- The way it will be graded: please make sure that the paper meets all the assignment requirements
- Cyber-crime outline: please follow the provided outline in your paper
All work should be YOURS, if you use any sources CITE them appropriately. If the assignment is not quality-work or has any plagiarism issues, I’ll immediately withdraw.
Cyber-crimes paper Writing Assignment Help[supanova_question]
Introduction to Financial Management Business Finance Assignment Help
Complete the following problems and answer the following questions, as applicable:
- Question 1:
- Proficient-level: Define the terms finance and financial management, and identify the major sub-areas of finance.
- Distinguished-level: Describe the nature of risk.
- Question 2:
- Proficient-level: “What are the three basic forms of business ownership? What are the advantages and disadvantages to each?” (Cornett, Adair, & Nofsinger, 2016, p. 21).
- Distinguished-level: Discuss the advantages and disadvantages of each of the three basic forms of business ownership to access capital.
- Question 3:
- Proficient-level: Define the terms agency relationship and agency problem, and list the three approaches to minimize the conflict of interest resulting from the agency problem.
- Distinguished-level: Describe the role of corporate governance.
- Question 4:
- Proficient-level: “Why is ethical behavior so important in the field of finance?” (Cornett, Adair, & Nofsinger, 2016, p. 21).
- Distinguished-level: Provide examples of financial scandals.
- Question 5:
- Proficient-level: “Does the goal of shareholder wealth maximization conflict with behaving ethically? Explain” (Cornett, Adair, & Nofsinger, 2016, p. 21).
- Distinguished-level: Explain the meaning of Adam Smith’s term, invisible hand.
Write your responses in a Microsoft Word document and submit it as an attachment in the assignment area. Prior to submitting your assignment, review the Introduction to Financial Management Scoring Guide to ensure you have met all of the requirements and as a self-assessment of your work.
[supanova_question]
short paper Computer Science Assignment Help
Week 4 Short Paper
WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies associated with the protocol. Include the bandwidth limitations of each technology and protocol.
Support your information and make sure all information sources are appropriately cited.
The paper must use APA 6th ed., 7th printing formatting and contain a title page, 3 to 5 pages of content, and a minimum of three peer-reviewed references.
Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment submission link above.
Assignment Information Resource(s):
- Network Protocols Handbook – Javvin Technologies, Inc. Network Protocols Handbook
Watch VideoWAN Protocols and Connection Technologies – Cisco IOS
NOTE;NO PLAGIARISM AND i need apa format with references
[supanova_question]
collaboration Science Assignment Help
The following scenario describes conditions in Central City in the
days immediately following a major weather event impacting the county’s
western edge. Using the four emergency management disciples
(preparedness, response, recovery and mitigations), the Incident Command
System (ICS) and the National Incident Management System (NIMS)
readings found in textbook and supplementary materials, provide written
response to scenario discussion points. The group assignment is due week 6. Start to discuss the project in you assigned groups this week.
Scenario
Central
City is part of Columbia County. The Roaring River is located in
Columbia County and runs through downtown Central City. On March 8,
after several days of unusually heavy rain and melting mountain snow,
the Roaring River overflowed, flooding Central City’s downtown business
area and the state’s utility complex. The entire downtown area is
underwater and without basic utilities (electric and water). Business in
the area has come to a standstill with many small store owners fearing
the worst once night sets in. Also affected by the power outage is a
nearby senior assisted living facility with more than 500 elderly
residents unable to leave and in need of medical care. A low-income
community located along the river’s edge has been isolated from the rest
of the city due to the rising floodwaters. Storm and sewer drains are
beginning to back up and garbage can be seen floating in the streets.
Due
to the lack of transportation, many city residents were unable to leave
the area when initial flood warnings were posted and are now stranded.
There have been numerous requests for medical attention in the area, and
several fires can be seen burning in the distance. Because the river
twists and turns throughout Columbia County, other cities within the
county are experiencing similar flooding conditions. The rain is
expected to continue for the next 12-24 hrs, followed by a drying out
and turning windy and cold.
- Who are the 1st responders? What are their responsibilities?
- What will be their biggest challenge?
- What will is an immediate concern and what can wait?
- What additional types of assistance (other than initial 1st responders) would be helpful here? How would they be used?
- Does
the fact that other Columbia County cities are also flooded and
experiencing similar problems affect Columbia County’s capabilities to
respond? What problems do you foresee? What are some solutions? - How would you classify this incident? Is it a high likelihood-low impact or a low likelihood-high impact? Explain?
- Using the ICS, decide what type of command structure will be employed. Who will be part of your command structure?
- What two circumstances may turn this event from an emergency to a disaster and what are your options once that happens?
- What type of assistance can you expect from state? Describe the process for requesting state / federal assistance.
- Once
the floodwaters recede and the conditions return to normal, city
council members will be looking for suggestions to avoid this type of
disaster in the future. What mitigation recommendations can you make?
Paper Submission Requirements:
- Your response should be 4-6 pages in length (double spaced).
- Paper must include a “reference page” not included in the 5-8-page minimum.
- Use APA format.
- Power Point Presentation (10-12 slides) should summarizes paper findings and highlight key points. You can search the web for photos to include in your presentation (no videos).
Resources for Assessment:
- Textbook Reading: Introduction to Homeland Security, chapter 9
- NIMS Documen
[supanova_question]
The Pillowman Writing Assignment Help
or this assignment, students will compose a 2-3 page reflection on Lone Brick Theatre’s production of The Pillowman discussing how the production transformed the play itself. Students should respond to the following:
- How did the staging of the production (including the proximity of audience to the performance) impact your engagement with and perception of the play?
- Did the portrayal of specific characters alter the way you understood the character and/or the play? Do you sympathize or not sympathize more with a given character having seen this production? If so, why?
- Was there any aspect of the play that was unexpected or surprising in spite having read the play?
[supanova_question]
[supanova_question]
gen499 week 4 discussion 1 RESPONSe j.t. Writing Assignment Help
When responding to your classmates, please provide feedback on their examples of good and poor critical thinking skills. Discuss additional ways one can think more critically. Each participation post should be a minimum of 75 words.
- Explain at least five elements of critical thinking that you found in the reading material.
Some elements of critical thinking are; looking for facts without prejudice, willingness to ask the right questions, understanding that emotions, intuition, and reasoning are valuable tools, ability to evaluate arguments no matter who presents them, it is a skill that is learned and can always be improved, and it is a skill that is aimed at better reasoning. (Plencner, 2014)
- Search the Internet, media, or the Ashford University Library, and find an example in which good critical thinking skills are being demonstrated by the author or speaker. Summarize the content and explain why you think it demonstrates good critical thinking skills.
This is article is titled, Why America’s Obsession with STEM education is dangerous. This article is speaking caution against all STEM education programs for our educational system. While there is a need for more STEM graduates and career growth is expected to rise drastically, we should not remove the other programs and classes from the curriculum. This is a good article showing good critical thinking skills. The author recognizes the needs of the nation but also looks at the other side of the equation and looks at other avenues as an option. The overall take away is that there is a need for all types of education and careers and as there are so many jobs that cross from one discipline to another. (Zakaria, 2015)
- Search the Internet, media, or the Ashford University Library and find an example in which the author or speaker lacks good critical thinking skills. Summarize the content and explain why you think it demonstrates the absence of good, critical thinking skills.
The article Brave Enough to be Angry is lacking in good critical thinking skills. This article is about how women are being forced to pander to the male dominated society and that it is typically not ok for women to show any anger without being subjected to a host of bad publicity and ridicule. This is an article based mostly on emotions and very little fact or data. This author uses inflammatory and negative language and tries to establish an overall ‘girl power’ mentality with the article. There is no objectivity, other point of view listed, and the author is not thinking critically. (West, 2017)
References:
Plencner, A. (2014). CRITICAL THINKING AND THE CHALLENGES OF INTERNET. Communication Today, 5(2), 4-18. Retrieved from http://www.communicationtoday.sk/critical-thinking…
West, L. (2017, November 8). Brave Enough to Be Angry. The New York Times. Retrieved from https://www.nytimes.com/2017/11/08/opinion/anger-w…
Zakaria, F. (2015). Why America’s obsession with STEM education is dangerous. Retrieved from https://www.washingtonpost.com/opinions/why-stem-w…
gen499 week 4 discussion 1 RESPONSe j.t. Writing Assignment Help[supanova_question]
See the description as it is deatiled Mathematics Assignment Help
Unit 1 Discussion
Contains unread posts
Sets and Subsets- (My name is Christina Lynn Sentelle)
The ability to classify items into sets is important in many contexts. For example, the registrar of a university puts students into classes. Each class can be considered a set. It can also be considered a subset of the entire student population. The admissions officer puts students into majors. Again, each major can be considered a subset of the entire student population. At graduation, students need to be put into groups with similar GPAs for honors, groups with similar degrees, or groups from different schools within the university. On this Unit’s Discussion Board, you will investigate sets, subsets, and proper subsets making at least three posts as described below.
Post 1
- Using your first, middle, and last name, create a universal set and write it in roster notation. If you do not have a middle name, use your first and last name only. My name is Christina Lynn Sentelle)
- List all the subsets of your universal set.
- How many subsets did you list? How do you know how many subsets a set will have?
- List all the proper subsets of your universal set. Are all subsets of a set also proper subsets of a set? Why or why not?
Review an example of a response for this Discussion.
Post 2
- Choose one of your classmates’ posts and using the letters of either their first, middle or last name, create a set and write it in roster notation.
- Determine the number of distinct subsets of the set. (Second student name is Brooklyn Crew)
- Determine the number of distinct proper subsets of the set.
Review an example of a response for this Discussion
Post 3
- Watch the video, “How to Learn Math: Four Key Messages” found here: https://www.youcubed.org/resources/four-boosting-messages-jo-students/. Share something from the video that you think is helpful. How do you think it can help you in this class?
[supanova_question]
Threat Analysis and Expolitation Computer Science Assignment Help
US critical infrastructure-power—water, oil and natural gas, military systems, financial systems—have become the target of cyber and physical attacks as more critical infrastructure systems are integrated with the Internet and other digital controls systems. The lesson learned in defending and mitigating cyberattacks is that no entity can prevent or resolve cyberattacks on its own. Collaboration and information sharing is key for success and survival.
This is a group exercise, representing collaboration across all sectors, to support and defend US critical infrastructure. In the working world, a team like this would include some agencies, some industrial partners, and some private sector corporations. Each organization has different strengths and skills, different access to information, and different authorities to report to. When the sectors work together and leverage resources and skills, the result is that everyone benefits from the defense and protection of US IT infrastructure. In your teams, you can model the same collaboration, leveraging each other’s expertise, sharing each other’s knowledge, teaching each other, and providing contributions specific to your role in the scenario.
Financial Services Representative: special task in Step 3
Law Enforcement Representative: special task in Step 4
Intelligence Agency Representative: special task in Step 5
Homeland Security Representative: special task in Step 6
There are seven steps that will help you create your final deliverables. The deliverables for this project are as follows:
Security Assessment Report (SAR): This report should be a 14-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
After Action Report (AAR): This report should be a 10-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
This is a 5-8 slide PowerPoint presentation for executives along with a narrated or In-Class Presentation summarizing your SAR and AAR report.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
4.3: Contribute to team projects, assignments, or organizational goals as an engaged member of a team.
10.6: Possess knowledge of proper and effective communication in case of an incident or crisis.
Your team is assembled and you have a plan. It’s time to get to work. You have a suite of tools at your disposal from your work in Project 1, Project 2, and Project 3, which can be used together to create a full common operating picture of the cyber threats and vulnerabilities that are facing the US critical infrastructure. Begin by selecting the following links to brush up on your knowledge:
To be completed by all team members: Leverage the network security skills of using port scans, network scanning tools, and analyzing Wireshark files, to assess any suspicious network activity and network vulnerabilities.
Step 3: The Financial Sector
To be completed by the Financial Services Representative: Provide a description of the impact the threat would have on the financial services sector. These impact statements can include the loss of control of the systems, the loss of data integrity or confidentiality, exfiltration of data, or something else. Also provide impact assessments as a result of this security incident to the financial services sector.
To be completed by all team members: Provide submissions from the Information Sharing Analysis Councils related to the financial sector. You can also propose fictitious submissions. Also, review the resources for Industrial Control Systems, and advise the importance of them to the financial services sector. Explain the risks associated with the Industrial Controls Systems.
Step 4: Law Enforcement
To be completed by the Law Enforcement Representative: Provide a description of the impact the threat would have on the law enforcement sector. These impact statements can include the loss of control of systems, the loss of data integrity or confidentiality, exfiltration of data, or something else. Also provide impact assessments as a result of this security incident to the law enforcement sector.
Step 5: The Intelligence Community
To be completed by all team members: Provide an overview of the life cycle of a cyber threat. Explain the different threat vectors that cyber actors use, and provide a possible list of nation-state actors that have targeted the US financial services industry before.
Review this threat response and recovery resource and use what you learned from the resource to provide or propose an analytical method in which you are able to detect the threat, identify the threat, and perform threat response and recovery. Identify the stage of the cyber threat life cycle where you would observe different threat behaviors. Include ways to defend against the threat, and protect against the threat. Provide this information in the SAR and AAR.
To be completed by the Intelligence Community Representative: Provide intelligence on the nation-state actor, their cyber tools, techniques, and procedures. Leverage available threat reporting such as from FireEye, Mandiant, and other companies and government entities that provide intelligence reports. Also include the social engineering methods used by the nation-state actor and their reasons for attacking US critical infrastructure. Include this information in the SAR and AAR.
Step 6: Homeland Security
To be completed by the Homeland Security Representative: Use the US-CERT and other similar resources to discuss the vulnerabilities and exploits that might have been used by the attackers.
Explore the resources for risk mitigation and provide the risk, response, and risk mitigation steps that should be taken if an entity suffers the same type of attack.
To be completed by all team members: Provide a risk-threat matrix and provide a current state snapshot of the risk profile of the financial services sector. These reports will be part of an overall risk assessment, which will be included in the SAR and AAR.
Review and refer to this risk assessment resource to aid you in developing this section of the report.
Step 7: The SAR and AAR
All team members: After you compile your research, and your own critical assessments and analysis, determine which information is appropriate for a Security Assessment Report (SAR) that will be submitted to the White House, and an After Action Report (AAR) that will be submitted to the rest of the analyst community.
- Prepare your SAR for the White House Cyber National Security Staff, describing the threat, the motivations of the threat actor, the vulnerabilities that are possible for the threat actor to exploit, current and expected impact on US financial services critical infrastructure, the path forward to eliminate or reduce the risks, and the actions taken to defend and prevent against this threat in the future.
- Prepare the AAR. This knowledge management report will be provided to the cyber threat analyst community, which includes the intelligence community, the law enforcement community, the defense and civilian community, the private sector, and academia. The purpose of the AAR is to share the systems life cycle methodology, rationale, and critical thinking used to resolve this cyber incident.
The deliverables for this project are as follows:
- Security Assessment Report (SAR): This report should be a 14-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
- After Action Report (AAR): This report should be a 10-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
- A 5-8 slide PowerPoint presentation for executives along with narration or In-Class presentation by each team member summarizing a portion of your SAR and AAR report.
[supanova_question]
Capstone Project Computer Science Assignment Help
The Capstone Project will require you to submit a research paper and present to the class your findings.
The Capstone Project requires you to take a deep dive into a security incident such as Target, OPM, or Equifax’s cyber breach.
Students will review the incident from the lens of a CISO before, during, and after the breach to determine the impact of the event. Each breach will require an analysis of the security models, methodologies, policies, standards, procedures, and technologies in place before and after the incident. The organization should be critiqued for their management of the incident including the disclosure of the breach, follow-up with affected stakeholders, and both the short and long-term impacts of the breach from a company, industry, and national perspective. When possible, students should identify the attackers and the attack vectors used to compromise the system(s). Furthermore, students should provide guidance and strategies for companies to prevent and mitigate similar attacks.
The grading rubric and additional details are attached.
[supanova_question]
week 4 journal gen499 Writing Assignment Help
Rough Draft Review Process Evaluation
Purpose: The primary goal of this weekly assignment is to enable you to understand the revision process and revise your paper with the help of a writing specialist.
Prepare: After you have completed a rough draft of your paper (at least five pages), submit that draft to the Ashford Writing Center. To do this, click on the Writing Center & Library link located in the left course navigation and from there, you will click on the tab marked Paper Review. To submit your paper, follow the instructions provided. Your paper will be returned within 24 hours, so give yourself enough time to complete and submit it prior to the due date. See image below that illustrates how you can access Paper Review through the Ashford Writing Center.
Reflect: Carefully review the revision letter and the margin comments that you see on your returned paper. Consider each of the suggestions provided to help you to revise your paper.
Write: In your written response of at least 400 words, complete the following:
- Identify the top three issues your writing specialist focused on in your rough draft (e.g., paragraph structure, proper use of quotations, and thesis statement).
- Were any of those issues surprising?
- Describe what you learned from some of the feedback your writing specialist provided as explanations.
- Was this feedback helpful?
- Evaluate the usefulness of the paper review tool.
- Did your understanding of academic writing improve?
- Will you use the Ashford Writing Center to review your work in the future? Why or why not?
[supanova_question]
https://anyessayhelp.com/ resource to aid you in developing this section of the report.
Step 7: The SAR and AAR
All team members: After you compile your research, and your own critical assessments and analysis, determine which information is appropriate for a Security Assessment Report (SAR) that will be submitted to the White House, and an After Action Report (AAR) that will be submitted to the rest of the analyst community.
- Prepare your SAR for the White House Cyber National Security Staff, describing the threat, the motivations of the threat actor, the vulnerabilities that are possible for the threat actor to exploit, current and expected impact on US financial services critical infrastructure, the path forward to eliminate or reduce the risks, and the actions taken to defend and prevent against this threat in the future.
- Prepare the AAR. This knowledge management report will be provided to the cyber threat analyst community, which includes the intelligence community, the law enforcement community, the defense and civilian community, the private sector, and academia. The purpose of the AAR is to share the systems life cycle methodology, rationale, and critical thinking used to resolve this cyber incident.
The deliverables for this project are as follows:
- Security Assessment Report (SAR): This report should be a 14-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
- After Action Report (AAR): This report should be a 10-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
- A 5-8 slide PowerPoint presentation for executives along with narration or In-Class presentation by each team member summarizing a portion of your SAR and AAR report.