Cyber Defense Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I can think of a few different web based firms that offer online security checks. I personally do trust these types of services. Of course I would only ever use well known software like Norton or MacAfee. I’ve never heard about anything going wrong with utilizing services like these and I have definitely seen things go wrong while operating on a PC or laptop without protection. 

Norton Security offers different security options that range from Plus ($19.99), Standard ($25.99), Deluxe ($29.99), and Select ($99.48). These different options which vary by price also vary by what the plan covers. Mainly, the less expensive options have less levels of protection versus the more expensive plans which get additional benefits or areas of security. Looking at the most expensive plan, the Select Plan, the coverage options seem pretty extensive, it’s a plan I would go with if I chose to use this service. There is security for 5 different devices, PC Cloud Backup, Virus Protection, Parental Controls, Private Browsing with VPN, Stolen Funds Reimbursement, etc. This plan and coverage is pretty in depth. I would say that this type of software is one that I would trust and I would recommend to people, especially with windows computers. There have been many issues over the years with flaws in windows security allowing for data breaches via way of hackers gaining access to networks and devices. I wouldn’t want to risk something like that and I feel that most people have a lot of information stored on their devices these days, probably more information than ever before as the world continues to transform to an all electric operating system. These days most people have thousands of pictures on their devices, important scanned documents, school and medical related documents and paperwork, etc. This puts us all in a very vulnerable position because if anyone were to gain access to these devices they can steal the information, they can lock it, and they can destroy it all together. 

¹ Norton. Cyber Safety. 2021. 

Felicia 

RESPONSE 2:

There have been times in the past were I had to restore to using one of these free services to scan my system. Free tools such as Avast antivirus have been a great help in detecting some of the standard malicious software; however, this protection is limited in its capacity. If you want those additional features, it will cost you. There are many free security options out on the web, but there are even more that have been found to be malicious. Some of these rogue security applications will take names similar to those of respected developers or official-sounding names such as BitDefender 2011 or Windows XP Recovery, which will be used to trick unsuspecting users into installing them on their systems (Prakash & Parameswari, 2016). Typically deployed after a user visits a questionable website which will alert the user to possible infection and offer a link to download the free security software. Once on the system, the user will be bombarded with phony alerts stating that their system has been compromised further and would require a higher level of protection at a cost to the user. Already at this point, the user has opened themselves up to the installation of all forms of nasty malware, including rootkits, trojans, and ransomware. 

I have since moved on to other antivirus options such as McAfee since the service was free through the military. However, McAfee offers a subscription-based service, with multiple tiers, with prices ranging from $19.99 to $39.99. The standard features provided with this security solution range from its standard antivirus protection, VPN licenses, encrypted storage, and password management. Some of these services are unnecessary, such as the 128-bit encryption for storage, which encrypts data on a hard drive to protect against unauthorized viewing. The encrypted storage feature can be found on any modern system. Another feature offered is the password manager, which stores all your passwords in a single repository. It also suggests sufficiently solid passwords and automatically holds them for you. Although this makes password management a breeze, a compromise in this area could reveal all your passwords to an adversary. Luckily all this information is protected with encryption, and if the anti-malware protection is being used, it should block any malware that would capture this data. 

-Joshua

Prakash, G., & Parameswari, M. (2016). On reviewing the implications of rogue antivirus. Journal of Information Ethics, 25(2), 128-139. Retrieved from https://www-proquest-com.ezproxy2.apus.edu/scholarly-journals/on-reviewing-implications-rogue-antivirus/docview/2064887596/se-2?accountid=8289

McAfee. (n.d.). McAfee Total Protection 2021: Beyond Antivirus. McAfee. 

Slave Religion 2 pages/ Asap

1. Discuss the role religion played in the lives of enslaved African American during the antebellum period. Include the origins of the religious ceremonies practiced and the focus of their teachings.

http://www.inquiriesjournal.com/articles/372/slavery-and-religion-in-the-antebellum-south

A. Slave Religion

1. By the early 1800s, many enslaved communities had embraced evangelical Christianity; they favored the emotional styles of worship permitted in Methodist and Baptist revival churches. However, most of their religious training occurred in the slave quarters. Blacks in rural areas often did not have access to churches, and slave owners did not always allow their slaves to attend church.

2. Slaves who worshipped alongside whites or received religious instruction from them did not trust Christianity; white ministers who stressed the obedience and humility expressed in scriptural passages such as “Servants be obedient to their masters” fueled black suspicion.

3. Blacks developed their own brand of Christian ideology and practice, which historians have termed the “invisible church.” Enslaved blacks gathered in secrecy and stressed biblical values like justice, freedom, love, and equality. They favored the Old Testament stories about Moses liberating the children of Israel from slavery in Egypt.

4. Slaves also gathered in their homes or in “hush harbors” in the woods to attend religious ceremonies that incorporated African religious practices officiated by slave elders; juju and voodoo rituals were an important part of some slave communities. The “ring shout” tradition, in which congregants moved counterclockwise in a circle while shuffling their feet, singing, and clapping, is evidence that West African traditions survived in America.

READ BEFORE BIDDING

1. Please define the obfuscation process in detail.

2. Using http://www.dependencywalker.com please explain the components involved within the .dll GetCurrentProcess.dll along with how the process works. Please provide a snapshot of your findings.

3. Answer the questions relating to Lab1-2:

Q: 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/ . Does it match any existing antivirus

definitions? 

Q: 2. Are there any indications that this file is packed or obfuscated? If so, what are these

indicators? If the file is packed, unpack it if possible. 

Q: 3. Do any imports hint at this program’s functionality? If so, which imports are they

and what do they tell you? 

Q: 4. What host-or network-based indicators could be used to identify this malware on infected

machines? 

________________________________________

In this assignment, you will need to setup a virtualized environment. See the following:

https://www.osboxes.org

http://www.heaventools.com/download.html

https://www.fireeye.com/mandiant.html

https://www.wireshark.org/download.html

https://regshot.en.softonic.com

Please provide a complete writeup on how this malware could be installed on your machine. NOTE: You will need to disable any anti-virus protection as this contains live malware. It will not install onto your system. 

Analyze the malware found in the file Lab03-02.dll using basic dynamic

analysis tools. 

How can you get this malware to install itself?

How would you get this malware to run after installation? 

How can you find the process under which this malware is running?

Which filters could you set in order to use procmon to glean information? 

What are the malware’s host-based indicators? 

Are there any useful network-based signatures for this malware? 

How could you prevent this type of malware from installing on your machine?

PLEASE COPY AND PASTE QUESTIONS IN DOCUMENT AND ANSER THEM ACCORDINGLY.

P 1

Review the following lecture:

  • Regulatory vs. Allocative Health Policies (at the bottom)

Uninsured Americans

Over the next few weeks, you will explore many of the critical components of the United States healthcare system and elements that can be improved with appropriate healthcare policy. One of the most important pieces of legislation impacting healthcare is the ACA, which “provides Medicaid coverage to many low-income individuals in states that expand and Marketplace subsidies for individuals below 400% of the poverty line” (Kaiser Family Foundation, 2017, para. 1). But, while the ACA has reduced the number of uninsured Americans, there are still millions without coverage. The question is why and what can be done to address the underlying issues.

Please review the following resources and using specific information from these resources, your course resources, and additional research, address the tasks posed below:

  • Kaiser Family Foundation. (2017, September 19). Key facts about the uninsured population. Retrieved from https://www.kff.org/uninsured/fact-sheet/key-facts-about-the-uninsured-population/
  • Krueger, A. B., & Kuziemko, I. (2013). The demand for health insurance among uninsured Americans: Results of a survey experiment and implications for policy. Journal of health economics, 32(5), 780–793. Retrieved from http://www.nber.org/papers/w16978.pdf

Tasks:

  • ***Summarize the population (number, demographics, etc.) of uninsured people in the U.S.
  • ***Discuss some of the reasons for and possible financial consequences of not having health insurance.
  • ***Discuss the socioeconomic consequences of having a large uninsured population in the U.S.
  • ***Describe the changes that will occur to assist the uninsured population with the Patient Protection and ACA.

Submission Details:

  • Present your response in a 3- to 5-page Microsoft Word document formatted in APA style.
  • On a separate page, cite all sources using APA format.

Reference:

  • Kaiser Family Foundation. (2017, September 19). Key facts about the uninsured population. Retrieved from https://www.kff.org/uninsured/fact-sheet/key-facts-about-the-uninsured-population/

 

Regulatory vs. Allocative Health Policies

Regardless of their form, policies may be categorized as allocative or regulatory in nature. Allocative policies typically provide net benefits to a certain distinct group of actors at the expense of others in order to meet public objectives. For example, medical education is heavily subsidized by the government in order to prevent undersupply of physicians. Regulatory policies are designed to influence action, behaviors, and decisions of actors within a sector. Regulatory health policies include market-entry restrictions, rate or price setting controls on health service providers, quality controls on the provision of health services, market-preserving controls, and social regulation. The role of the federal government of the United States in health policy making is similar to any other policy making approach. The executive branch, under the president of the United States, implements and enforces laws written by the Congress.

The Department of Health and Human Services (HHS) is one of the fifteen executive departments and is the principal agency responsible for protecting the health of Americans. Health and social science research, disease outbreak prevention, food and drug safety, and health insurance provision come under the purview of HHS agencies. State governments, within the context of their own constitution and bill of rights, are structured similar to the federal government, operating within the state boundaries. States have constitutional authority to establish laws that protect public health and welfare. Furthermore, states, as purchasers of healthcare services, act as regulators, safety net providers, educators, as well as laboratories for experimentation with new policy. In the United States, health policy making is driven by “demanders” of policies. The most effective constituency of demanders seems to be well organized interest groups that are able to exert maximum influence on health policies.

: Pharmacotherapy for Cardiovascular Disorders

 

Assignment: Pharmacotherapy for Cardiovascular Disorders

…heart disease remains the No. 1 killer in America; nearly half of all Americans have high blood pressure, high cholesterol, or smoke—some of the leading risk factors for heart disease…

—Murphy et al., 2018

Despite the high mortality rates associated with cardiovascular disorders, improved treatment options do exist that can help address those risk factors that afflict the majority of the population today.  

Photo Credit: Getty Images/Science Photo Library RF

As an advanced practice nurse, it is your responsibility to recommend appropriate treatment options for patients with cardiovascular disorders. To ensure the safety and effectiveness of drug therapy, advanced practice nurses must consider aspects that might influence pharmacokinetic and pharmacodynamic processes such as medical history, other drugs currently prescribed, and individual patient factors.

Reference: Murphy, S. L., Xu, J., Kochanek, K. D., & Arias, E. (2018). Mortality in the United States, 2017. Retrieved from https://www.cdc.gov/nchs/products/databriefs/db328.htm

To Prepare
  • Review the Resources for this module and consider the impact of potential pharmacotherapeutics for cardiovascular disorders introduced in the media piece.
  • Review the case study assigned by your Instructor for this Assignment.
  • Select one the following factors: genetics, gender, ethnicity, age, or behavior factors.
  • Reflect on how the factor you selected might influence the patient’s pharmacokinetic and pharmacodynamic processes.
  • Consider how changes in the pharmacokinetic and pharmacodynamic processes might impact the patient’s recommended drug therapy.
  • Think about how you might improve the patient’s drug therapy plan based on the pharmacokinetic and pharmacodynamic changes. Reflect on whether you would modify the current drug treatment or provide an alternative treatment option for the patient.
By Day 7 of Week 2

Write a 2- to 3-page paper that addresses the following:

  • Explain how the factor you selected might influence the pharmacokinetic and pharmacodynamic processes in the patient from the case study you were assigned.
  • Describe how changes in the processes might impact the patient’s recommended drug therapy. Be specific and provide examples.
  • Explain how you might improve the patient’s drug therapy plan and explain why you would make these recommended improvements.

Reminder: The College of Nursing requires that all papers submitted include a title page, introduction, summary, and references. The College of Nursing Writing Template with Instructions provided at the Walden Writing Center offers an example of those required elements (available at https://academicguides.waldenu.edu/writingcenter/templates/general#s-lg-box-20293632). All papers submitted must use this formatting.

NURSE-PATIENT COMMUNICATION, INTERDISCIPLINARY COMMUNICATION, AND PATIENT SAFETY

 This assessment requires you address the following topics:

  • Define the seven principles of patient- clinician communication
  • Explain how you apply three of the seven principles to your interactions with your own patients
  • Describe the three methods being used to improve interdisciplinary communication
  • Choose the one that you think applies best to your own area of practice, or the one that your area of practice currently uses, and clearly describe how you use it.
  • Explain the ethical principles that can be applied to issues in patient-clinician communication
  • Explain the importance of ethics in communication and how patient safety is influenced by good or bad team communication

Make sure you also include a clear, separate introduction and conclusion as a part of this assignment, as these are worth separate points on the grading rubric.This assessment is aligned with course objective 6 and the module objectives. 

 

References

Minimum of four (4) total references: two (2) references from required course materials and two (2) peer-reviewed references. All references must be no older than five years (unless making a specific point using a seminal piece of information)

Peer-reviewed references include references from professional data bases such as PubMed or CINHAL applicable to population and practice area, along with evidence based clinical practice guidelines. Examples of unacceptable references are Wikipedia, UpToDate, Epocrates, Medscape, WebMD, hospital organizations, insurance recommendations, & secondary clinical databases.

Style

Unless otherwise specified, all the written assignment must follow APA 7th edition formatting, citations and references.

Number of Pages/Words

Unless otherwise specified all papers should have a minimum of 600 words (approximately 2.5 pages) excluding the title and reference pages.

 

EHR

Consider your experience and learning with regard to EHRs. If you were to design a learning program for your clinical environment centered on the use of EHRs, what would it include? How would it be taught?

2.  Obtaining data in clinical practice:

Suggest a data mining project for your practice. Which information would you like to have about your practice area that could be extracted using data mining strategies? How can you make sure that you select and develop those that best fit your data?

3.  Translating data/research into practice:

Twelve-hour shifts are problematic for patient and nurse safety, yet hospitals continue to keep the 12-hour shift schedule. In 2004, the Institute of Medicine (Board on Health Care Services & Institute of Medicine, 2004) published a report that referred to studies as early as 1988 that discussed the negative effects of rotating shifts on intervention accuracy. Workers with 12-hour shifts experienced more fatigue than workers on 8-hour shifts. In another study done in Turkey by Ilhan, Durukan, Aras, Turkcuoglu, and Aygun (2006), factors relating to increased risk for injury were age of 24 years or younger, less than 4 years of nursing experience, working in surgical intensive care units, and working for more than 8 hours.

As a clinician reading these studies, what would your next step be? Is there additional data that you need? If so, how would you obtain this data? Assuming you were part of a management team of a hospital that works 12-hour shifts, what recommendations would you give to the management team and why?

THINK about and work through the questions above, and then use the textbook and online resources to compose your response to each question individually. Remember to provide citations to acknowledge the sources of the information. Make sure you give rationale (scientific evidence and/or your clinical observation) that supports your conclusion.

Art in South Africa

 Since the beginning of Apartheid in 1948, how has the historical and political context of South Africa affected the art scene there? (make sure to reference to the Attached document to get a better idea of what this assignment should be written about) 

 Intro and conclusion should not exceed more than 3 sentences each.
Intro has to be clear about specific points to follow in the paper(thesis).
All paragraph should relate to the relevant essay topic(only focus on the topic).

I want the essay in a simple English format. No need to use complicated wording ( Since English is my second language). Please focus on answering the essay question.

The essay cannot exceed two pages (double-spaced, one-inch margins, font size 10 or 12).  Please take the time to organize your thoughts in a logical manner and cite evidence to support your analysis. In order to cite specific information or use direct quotations, use parenthesis. There should be a few, i.e., five to six minimum, such citations, from different web sources, in the body of each paper. Your introduction paragraph should not be longer than three lines and must clearly answer the essay assignment question. In other words, your introduction paragraph should establish the specific thesis points that will follow in your paper (make sure that you answer the question)

  (make sure that  intro (thesis) answers the specific assignment question.  Make sure that your first (short) paragraph establishes that thesis answer. 

Analysis of Correlation Test

  1. You are in charge of conducting an analysis for your organization to discover if there is a relationship between an employee’s performance rating and the number of sick days they take each year. Your coworker has already collected the data and it is ready for you to analyze.

    Review the data your coworker collected in the Analysis of Correlation Test Data Spreadsheet.

    First, plan your analysis. Second, conduct your analysis. Third, describe your analysis.

    Create a 5- to 7-slide Microsoft PowerPoint presentation and include speaker notes.
    Note: Please use proper font size to fit your speaker notes on the face of each slide [for possible viewing/tech issues, do not place your speaker notes on the slide’s note pane, or beneath the slides]. Suggested word count is around 80 to 100 words/slide.

    State the following items/questions followed by your response to each question/item.

    Part 1: Planning:

    • What are the null and alternative hypotheses?
    • Where did you obtain your data or who obtained it for you?
    • Part 2: Analysis
    • What are the descriptive statistics for your sample? Include:
    • Sample size
    • Mean
    • Median
    • Mode
    • Standard deviation
    • Analysis Procedures: What did you do to conduct your analysis?
    • Part 3: Results and Discussion
    • What are the test statistics and results? Include
    • t statistic
    • p-value
    • What are the results? Are the results inferable to the population?
    • Do you reject or fail to reject the null hypothesis? Explain.
    • What do the results mean? What is your recommendation to the organization?
    • Submit your assignment.
       

No plagiarism 400-800 words

Business leaders are often faced with situations that require swift but responsible decisions. You’ve learned how critical thinking is more than simply evaluating the pros and cons of a situation. It is a method that engages broad thinking abilities that include brainstorming, data analysis, creativity, collaboration, and reflection. The ability to adapt to ever-changing conditions through critical thinking and decision making is key to capitalizing on market upturns and staying afloat during economic declines.

As part of this course, you will complete a series of assignments.

Prompt

For this assignment, analyze the diversification strategy of either Disney or Kimberly-Clark using the documents linked below. Explain how critical thinking applies to decision making based on your review of a real-world scenario. Specifically, you must address the following rubric criteria:

  • Application: Explain how critical thinking for decision making is applicable to the scenario. Use evidence to support your explanations.
    • What makes critical thinking crucial for decision making?
  • Analysis: Explain how information (such as facts, opinions, and published reports) is used to determine or establish the context. Use evidence to support your explanations.
    • Why do you think the company reached the decision to diversify?
    • What steps do you believe were taken? Explain your response using sources found during the research of your selected company.
  • Conclusion and related outcomes: Describe the role of logic, evidence, and arguments in the company’s decision-making process.
    • Was the decision to expand products, services, or value chain successful? Why or why not?

These resources will assist you as you complete your assignment.

Guidelines for Submission

Complete the Critical Thinking for Business Decisions worksheet in your Soomo webtext, download your completed work, and submit it in Brightspace for instructor feedback. You should write using a professional voice, and any sources should be cited according to APA style. Your assignment must be between 400 and 800 words in length.