Posts

Discuss what conflicts are at the heart of two different texts from Module 2, examining how specific literary elements are used to convey them or make them more compelling.

Discussion 2A

Topic: Discuss what conflicts are at the heart of two different texts from Module 2, examining how specific literary elements are used to convey them or make them more compelling. Remember to correctly punctuate the titles of literary works and include targeted examples for support.

Identify the individuals you hope to interview, Provide a brief description of their family, the ages of their children and they type of early childhood programs they utilize.

Interview Plan

Instructions
Identify the individuals you hope to interview, Provide a brief description of their family, the ages of their children and they type of early childhood programs they utilize. If you are interviewing teachers, include information on their educational background and their current teaching position.

What are the differences between the functions of public versus private-sector health care agencies? What are the three core functions of public health as they apply to health service delivery?

Structure and Economics in Community Health Services

Complete the following case study. Your response should be a minimum of 250 words and include two peer-reviewed nursing or medical journals from the last five years.  You may use your textbook but it should not substitute for one of your scholarly references. Include a title page, in-text citations and a reference page in APA format.  Refer to the case study grading rubric for guidance. You must answer each question included in the case study.

 Case Study:

Many factors and events have influenced the current structure, function, and financing of community health services. Understanding this background gives the community health nurse a stronger base for planning for the health of the population. A group of nurses has been asked to present a 1 hour in service to their colleagues at the local health department on the structure and economics of community health services. The presentation has to include information about a variety of topics:

  1. What are the differences between the functions of public versus private-sector health care agencies?
  2. What are the three core functions of public health as they apply to health service delivery?
  3. There are several trends and issues that have influenced community health care financing and delivery that are important in understanding health care economics and helping to improve community health. What are some of these trends and issues?
  4. In what important ways has the changing nature of health care financing adversely affected community health nursing and its practice?

Identify the scanner used to produce the report. Is the tool open source or commercial? Do you consider the tool to be industry standard? What are some advantages to using the tool? Disadvantages? What is your overall impression of the tool’s output?

Vulnerability Process and Assessment Memo

Overview

 In this section, provide a brief overview to establish the purpose of your memorandum. You should introduce the topics in Parts 1, 2, and 3, below. Remember that you are writing to your immediate boss to help her address the CEO’s concerns over recent cybersecurity attacks against the transportation sector. Additionally, your boss has provided you with the results of a recent pen testing engagement performed by a third party on behalf of Mercury USA.

 Part 1: Vulnerability Management (VM) Process Recommendation

In this section, present a recommended VM process for Mercury USA. Highlight the major VM process components as you learned in your studies. Explain how your recommendation meets the business needs of Mercury USA. Consider the transportation sector and the overall scenario in context. The text and questions below represent specifics to focus on while writing the memorandum. Do not include the specific text of the questions in your final submission.

  • What are the main elements of a VM process, tailored to Mercury USA and the transportation sector?
  • How will you plan for and define the scope of a VM process?
  • How will you identify the assets involved?
  • How will you scan and assess vulnerabilities?
  • What is/are the industry standard scanning tools? Support your findings.
  • What frequency of scanning do you recommend and why?
  • How will you report the results of scanning and recommended countermeasures?

 Part 2: Vulnerability Scanning Tool Evaluation and Recommendations
After performing an analysis of the vulnerability report provided by the third-party penetration testers, present your evaluation of the tool and your recommendations here. The text and questions below represent the specifics to focus on while writing your memorandum. Do not include the specific text of the questions in your final submission.

  • Identify the scanner used to produce the report. Is the tool open source or commercial? Do you consider the tool to be industry standard?
  • What are some advantages to using the tool? Disadvantages?
  • What is your overall impression of the tool’s output?
  • Does the tool provide enough reporting detail for you as the analyst to focus on the correct vulnerabilities? Can you appropriately discern the most critical vulnerabilities?
  • Do you think mitigations for the vulnerabilities are adequately covered in the report?
  • Do you think the reports are suitable for management? Explain why or why not.
  • Would you distribute the report automatically? Explain why or why not.
  • Would you recommend that Mercury USA use the tool? Explain why or why not.

 Part 3: Business Case Example

 In this section, provide an example of what could happen if Mercury USA does not implement your recommendations for a VM process (e.g., data exfiltration, hacker intrusions, ransomware, etc.). The text and questions below represent the specifics to focus on while writing your memorandum. Do not include the specific text of the questions in your final submission.

  • What are some of the outcomes to the business if your example occurred?
  • How does your recommended VM process address the example you used?
  • For the tool you evaluated in Part 2 above, do you think the tool will be adequate? Why or why not?

 

Closing

In this section, summarize the main points of your argument for a VM process, tool evaluation, and use the case example to support your recommendations. Keep in mind that you are addressing the CEO’s concerns over recent cybersecurity attacks against the transportation sector and how you can help increase Mercury USA’s overall security posture to protect the organization against attacks, breaches, and data loss.

What do the amino acids that react with the Bradford reagent and give a result for A280 have in common? Do you think all proteins have the same or different percentages of these reactive amino acids?  How might this affect the concentration determining assays?

Protein Quantification

Lab 3: Protein Quantification Report

Data you will need:

hen egg white lysozyme extinction coefficient: 36,000 M-1cm-1

hen egg white lysozyme molecular weight: 14,313 g/mol concentration of your lysozyme stock solution: mg/ml (get this from your TAs)

 

 

  1. Based upon the A280 value of your unknown lysozyme sample, and the Beer-Lambert law, calculate the lysozyme concentration of your unknown. Show your work below, and report the concentration in mM.
  2. Fill out this table for each of your lysozyme stock solution dilutions:
Amt stock solution Amt water Total volume Conc (mg/ml) Conc. (mM)
         
         
         
         
         
         

 

  1. Using EXCEL (or some similar program of your choice), plot A595 vs concentration (in mM) for the samples in the above table. This is your lysozyme standard curve. Print out the standard curve and attach it below. Indicate on the graph the A595 value of your unknown, and draw a horizontal line to the standard curve, then a vertical line from the curve down to the x-axis to read your unknown lysozyme concentration. Your standard curve must include x and y labels, and appropriate units! Record your unknown concentration here  (mM).
  2. You have calculated the lysozyme concentration of your unknown solution by two different UV/VIS methods. Do they agree with each other? How much are they different from each other? Which method do you think is more accurate?
  3. What do the amino acids that react with the Bradford reagent and give a result for A280 have in common? Do you think all proteins have the same or different percentages of these reactive amino acids?  How might this affect the concentration determining assays?

 

 

Explain what the metrics mean in terms of the overall health of the project. Project where the project will end in terms of budget and schedule. What potential risks and trade-offs do you see? Explain any recommendations you have for improving the project schedule, budget, or both.

Unit VI PowerPoint Presentation

Course Project Progress Monitoring:Return to MobileGo

The MobileGo project is making progress implementing the new systems. However, the software upgrades and the new
software installation are not complete. The project sponsor has requested an update on the project. Using the MobileGo
Earned Value scenario spreadsheet, complete the following tasks.

1. Complete earned value metrics for each line item of the project.

2. Use the metrics to create indexes for cost and schedule.

3. Explain what the metrics mean in terms of the overall health of the project.

4. Project where the project will end in terms of budget and schedule. What potential risks and trade-offs do you see?

5. Explain any recommendations you have for improving the project schedule, budget, or both.

Prepare a 10-slide PowerPoint presentation that you can give to the project sponsor that explains your calculations,
predictions, and recommendations. Remember that you are giving this information to the project sponsor, so consider what he or she would need to know as you draft your presentation.

Use at least one outside source to support your recommendations for improvement. Adhere to APA Style when creating
citations and references for this assignment. You must either use speaker notes or audio to fully explain your slides. Be sure to elaborate in your speaker notes or audio; do not simply repeat the text from your slides.

Submit your calculation and presentation for grading.

Analyze the malware field(s) in accordance with the instructions in the box below. Conduct a static analysis of the files. Report the procedures you used and the results. Identify potential civil or criminal problems created by the use of malware.

Malware Forensics

Begin Project 2
In the prior project, you used network forensics to write an incident report detailing how you captured, recorded, and analyzed events that occurred on a network. Based on this analysis, you determined that there has been a breach of the network.

Gathering this information is only the first step. Next, you must use the network forensic evidence you gathered to understand how the attack was conducted to better understand exactly what took place during the attack. There are several ways to identify the source of attacks. One of the challenges with network forensics is making sense of the data, which often comes from multiple sources, not to mention the fact that incidents of interest may occur at different times.

In this project, you will analyze suspicious software in a virtualized environment to determine whether the code is in fact malware.

The final report will summarize how you used your knowledge and skills in malware forensics to analyze the attack and determine what occurred and when. It will also offer recommendations on ways to improve the organization’s defense posture and response.

Step 1: Collect Evidence From the Forensic Image
As you learned in your exploration of digital forensic response and analysis, one way to analyze the data is by visual analysis, which allows assimilation of information from a variety of sources for inspection in ways that is possible only with this integration.

Often in visual analysis, computing power is used to to process raw data into graphics, which are meant to reveal patterns or relationships in the data when viewed by a human. This raw data can include logs and records that have different formats, as well as media files.

Filtering and linkage techniques, as well as the use of a timeline, can provide a more complete picture of a situation that may be difficult or impossible to conceptualize without visual analysis techniques. In determining next steps, you recall that effective analysis of data includes metrics based on pattern-matching algorithms. By comparison, other techniques like statistical analysis rely primarily on numerical measures derived from the data and incorporated into tree maps.

Graphics produced for visual analysis may rely on color, shape, size, location, and relationships to represent aspects of the underlying data. Visual analysis for data analytics should not be confused with visual analysis for artwork, which is the study of the formal elements and other aspects of a work of art.

Visual analysis is one technique used in digital forensics for analysis. For the current investigation, though, you first need to determine what you are dealing with. Is it malware?

After reviewing the network attack and the possible approach taken by the attacker, you suspect malware was used. Integrating reverse engineering techniques with malware analysis techniques can shed light on network vulnerabilities and how malware code executed. These malware analysis tools and environment are run on a live network, or, preferably, on captured network traffic, as in this particular incident.

You know from the recent meeting with your boss that Special Agent Michael Jones of the UMGC Investigation Bureau imaged the compromised host disk and made a working copy of the image files. The evidence was checked into the evidence room and all examinations were conducted on the working copy.

You will use your VM lab tools to analyze the suspect image for malware. In the VM lab, you will investigate the back door, indicators, hidden rootkit, and file systems. As you work through this analysis, keep in mind malware trends, including malware obfuscation and other techniques used to protect malware.

Step 2: Analyze Evidence Collected from Image and Write Lab Report
In the previous step, you conducted an analysis of a network attack using EnCase with the compromised host disk image. Now, you will report on the results of the lab exercise and document following the Guidelines for Digital Forensics Examiner Reports, but this time, you will apply these guidelines using the UMGC Digital Evidence Forensic Report Template. See an example of this template in use. As you progress in your career, you will probably use many different templates; this is a chance to build that skill.

Keep in mind that you will incorporate this lab report into the Final Incident Response Report for the last step.

This comprehensive report will provide Yvonne and other leaders in the organization with an understanding of how this particular attack happened and what exposures were compromised. They will need an overview of how the organization’s security team responds to security incidents. Use screenshots and other communication techniques to convey technical concepts to a less tech-oriented audience.

Step 3: Analyze Malware
Your analysis in EnCase indicates that malware was indeed used in the attack. With this in mind, the next step is to determine the source of the malware. As a digital forensics investigator, you know that email is one of the most prevalent methods for transporting malware into and throughout a network infrastructure.

Special Agent Jones thinks he has tracked the malware down to a foreign national graduate student from Florida East-Central University. SA Jones indicated that he has probable cause to believe the software was being used for illegal purposes. He provided Yvonne with two files recovered from the student’s computer for analysis, and they are relying upon our knowledge and skills to identify specifically what the software does and how it works.

Analyze the malware field(s) in accordance with the instructions in the box below. Conduct a static analysis of the files. Report the procedures you used and the results. Identify potential civil or criminal problems created by the use of malware.

You are to conduct your analysis using a virtual machine (VM) only. Do not download the file to any computer, as it may contain malware. Whenever you analyze malware, make sure the computer or VM you use is set to host-only based network after you download the file to your VM. This is good incident response and forensic practice, as you do not know what the software will do once executed.

Step 4: Evaluate Malware Analysis Results and Write Lab Report
As you did with the first lab, after you’ve conducted your analysis, write up your findings by applying Guidelines for Digital Forensics Examiner Reports to the UMGC Digital Evidence Forensic Report Template. Keep in mind that your report should include screenshots and analysis of the malware file.

Once you have completed this write-up, submit it to get feedback after reading the instructions below.

You have completed your lab investigations and collected the information you need. It is time to write the Final Incident Response Report for your organization’s leaders, network administrators, and security operations team.

Write a brief summary for both of these two articles and an explanation of the differences between the reliability of these resources. What characteristics make one more scientifically valid than the other? What criteria did you use to make your determination?

Science question

Research and evaluate two different resources on one scientific topic. Pick a topic that is related to any field of science, such as chemistry, physics, biology, or geology, and think of a question that you would like to find an answer to. For example, “Is global warming causing more earthquakes?” Or “What is the best treatment for my allergies?” Once you have selected your question, answer the following questions in an APA style essay.

To complete this Assignment:

  1. Identify the science question you would like answered and why you chose that topic.
  2. Locate two resources about the scientific topic that interests you:
    1. one from a scientifically reputable resource and
    2. another from a questionable resource.
  1. Write a brief summary for both of these two articles and an explanation of the differences between the reliability of these resources.
  2. What characteristics make one more scientifically valid than the other? What criteria did you use to make your determination? Be sure to indicate which resource is the scientifically reputable resource and which resource’s reliability is questionable

 

Discuss the identified chronic or influential medical conditions within the family, including relationship to the student. Provide a general description of the client’s significant familial chronic illnesses and potential health concerns based on the findings in the genogram.

Health History Project – Genogram analysis

First section of the paper

1. Discuss the identified chronic or influential medical conditions within the family, including relationship to the student (i.e. Mother has diabetes, Father has cancer)

2. Provide a general description of the client’s significant familial chronic illnesses and potential health concerns based on the findings in the genogram

Second section of paper

1. Identify health promotion practices based on recommendations from scholarly resources (example: CDC, NIH, KSU Library, Nursing databases)

2. Provide examples of lifestyle changes that would benefit this client’s future health

3. Mechanics of writing

a. All written assignments must be neat, legible, and adhere to the basic mechanics of writing (grammar, punctuation and spelling)

b. Formatting must adhere to APA 7th Edition Manual

c. Correctly formatted in-text citations within body of the paper

d. References from at least three – four scholarly sources on the reference page

 

What approach to formative assessment will provide the most appropriate data to drive instructional decision making? What formative assessment will best promote student metacognition and improved learning?

A Summative assessment

For this project, you will develop your school’s ideal comprehensive assessment strategy and then write a policy statement for your teachers.
Begin by exploring the topic of assessment. Focus your study on formative and summative assessment, authentic assessment, and competency-based assessment.
In your policy statement, address the key roles of formative assessment and its associated feedback to help move student learning forward. Note that formative assessment is primarily to inform teachers and students of students’ progress during instruction; it is low stakes, which typically means that it is not graded. A summative assessment is a culminating assessment at the end of the instructional cycle.

Consider these essential questions:
• What approach to formative assessment will provide the most appropriate data to drive instructional decision making?
• What formative assessment will best promote student metacognition and improved learning?
• What is the form and function of authentic assessment?
• What requirements should be included for the use of authentic assessment in classrooms?
• What is the form and function of competency-based assessment?
• How should a competency-based assessment be included in your school’s policy?
• What forms of summative assessment can provide rich data about learning while maintaining an authentic character?