HEAD

BODY

The post HEAD appeared first on homeworkhandlers.com.

W10A2Answers 2Bids 48Other questions 10

Assignment 2: Professional Development PlanDue Week 10 and worth 150 pointsWrite a seven to eight (7-8) page, three-part Professional Growth Plan in which you focus upon the following areas of personal and professional growth: · Part 1: Content Knowledge and Resources· Part 2: Competencies· Part 3: Reflective Activities  For Part 1, use the Internet to research professional organizations, grant opportunities, and / or virtual learning communities pertinent to both the theme of your portfolio, and your current or prospective work environment.For Part 3, use your textbook or the Internet to research information on teaching and learning through reflective practice.Part 1: Content Knowledge and Resources1. Select at least two (2) of the professional organizations, grant opportunities, and / or virtual learning communities that you have researched, and analyze the manner in which you would utilize the organizations you selected to support your continued professional development.  2. Predict at least three (3) issues that you believe will be of particular significance within the next decade, or choose three (3) remaining questions that you ponder which relate to both the theme of your portfolio and your current or prospective work environment. 3. Select one (1) of the issues or questions you identified in relation to your theme and work environment, and construct an annotated bibliography of at least five (5) print and non-print resources to consult in the future. Part 2: Competencies4. Specify the development of your information literacy / research skills throughout your coursework. Provide one to three (1-3) papers / artifacts / examples from previous coursework in order to demonstrate your change(s) and acquired knowledge within this area. Note: If you do not have papers / artifacts / examples, attach the description(s) of your chosen previous assignment(s).5. Develop a plan for continued information literacy development as part of your personal and professional growth plan. Your plan must include, at a minimum:a. Three to five (3-5) information literacy goalsb. Potential means (e.g., organizations and resources that you may utilize) to achieve the information literacy goals  c. Relevant strategies for applying the literacy skills in educational / work environment6. Specify the development of your writing skills throughout your coursework. Provide one to three (1-3) papers / artifacts / examples from previous coursework to demonstrate your change(s) and learning in this area. Identify plans for continued writing development as part of your personal and professional growth plan. Note: If you do not have papers / artifacts / examples, attach the description(s) of your chosen previous assignment(s).7. Create an action plan geared toward both building upon your personal and professional strength(s), which you identified previously in Journal Entry #6, and toward improving your weaknesses related to your portfolio theme. Your plan must include, at a minimum:a. Three to five (3-5) goalsb. Three to five (3-5) key steps that you plan to take for further evaluation and continuous improvementc. Potential means (e.g., organizations and resources that you may utilize) to achieve these goals d. Relevant strategies for applying the plan in educational / work environmentPart 3: Reflective Activities8. Ascertain whether or not you met the reflection goal that you established in Week 3 of this course. Analyze the significant way(s) and extent to which the process of reflection caused you to become a more reflective practitioner. 9. Propose two to three (2-3) measures that you would use in order to strengthen your reflective process. Provide a rationale to support your response.10. Propose two to three (2-3) ways that you would apply continued reflective activities within your current or prospective work environment. Provide at least one (1) example of such application to support your response.11. Upload Assignment 2 to your Optimal Resume portfolio. Copy and paste your portfolio’s URL into the comment box of Assignment 2 to submit the assignment to Blackboard.Your assignment must follow these formatting requirements:· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:· Apply theoretical and practical knowledge gained in prior program courses to explore a new topic or synthesize understanding in the concentration area and the overall Master of Education program.· Develop a working portfolio that focuses on a specific theme or project tied to the Master of Education program goals and the learner’s area of concentration.· Create materials that demonstrate the analysis, synthesis, and intersection of course work in the Master of Education program.· Use technology and information resources to research information about education.· Write clearly and concisely about education using proper writing mechanics.Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.  Points: 150Assignment 2: Professional Development Plan CriteriaUnacceptableBelow 70% FFair70-79% CProficient80-89% BExemplary90-100% A Part 1: Content   Knowledge and Resources 1. Select at least two   (2) of the professional organizations, grant opportunities, and / or virtual   learning communities that you have researched, and analyze the manner in   which you would utilize the organizations you selected to support your   continued professional development.   Weight: 4%Did not submit or   incompletely selected at least two (2) of the professional organizations,   grant opportunities, and / or virtual learning communities that you have   researched; did not submit or incompletely analyzed the manner in which you   would utilize the organizations you selected to support your continued   professional development.Partially selected at   least two (2) of the professional organizations, grant opportunities, and /   or virtual learning communities that you have researched; partially analyzed   the manner in which you would utilize the organizations you selected to   support your continued professional development.Satisfactorilyselected   at least two (2) of the professional organizations, grant opportunities, and   / or virtual learning communities that you have researched;   satisfactorilyanalyzed the manner in which you would utilize the   organizations you selected to support your continued professional   development.Thoroughly selected at   least two (2) of the professional organizations, grant opportunities, and /   or virtual learning communities that you have researched; thoroughly analyzed   the manner in which you would utilize the organizations you selected to   support your continued professional development. 2. Predict at least   three (3) issues that you believe will be of particular significance within   the next decade, or choose three (3) remaining questions that you ponder   which relate to both the theme of your portfolio and your current or   prospective work environment.Weight: 5%Did not submit or   incompletely predicted at least three (3) issues that you believe will be of   particular significance within the next decade; or did not submit or   incompletely chose three (3) remaining questions that you ponder which relate   to both the theme of your portfolio and your current or prospective work   environment.Partiallypredicted at   least three (3) issues that you believe will be of particular significance   within the next decade; or partially chose three (3) remaining questions that   you ponder which relate to both the theme of your portfolio and your current   or prospective work environment.Satisfactorily   predicted at least three (3) issues that you believe will be of particular   significance within the next decade; or satisfactorily chose three (3)   remaining questions that you ponder which relate to both the theme of your   portfolio and your current or prospective work environment.Thoroughly predicted   at least three (3) issues that you believe will be of particular significance   within the next decade; or thoroughly chose three (3) remaining questions   that you ponder which relate to both the theme of your portfolio and your   current or prospective work environment. 3. Select one (1) of   the issues or questions you identified in relation to your theme and work   environment, and construct an annotated bibliography of at least five (5)   print and non-print resources to consult in the future.   Weight: 10%Did not submit or   incompletely selected one (1) of the issues or questions you identified in   relation to your theme and work environment; did not submit or incompletely   constructed an annotated bibliography of at least five (5) print and   non-print resources to consult in the future.Partiallyselected one   (1) of the issues or questions you identified in relation to your theme and   work environment; partially constructed an annotated bibliography of at least   five (5) print and non-print resources to consult in the future.Satisfactorilyselected   one (1) of the issues or questions you identified in relation to your theme   and work environment; satisfactorilyconstructed an annotated bibliography of   at least five (5) print and non-print resources to consult in the future.Thoroughlyselected one   (1) of the issues or questions you identified in relation to your theme and   work environment; thoroughlyconstructed an annotated bibliography of at least   five (5) print and non-print resources to consult in the future. Part 2: Competencies 4. Specify the   development of your information literacy / research skills throughout your   coursework. Provide one to three (1-3) papers / artifacts / examples from   previous coursework in order to demonstrate your change(s) and acquired   knowledge within this area. Note: If you do not have papers   / artifacts / examples, attach the description(s) of your chosen previous   assignment(s).   Weight: 10%Did not submit or   incompletely specified the development of your information literacy /   research skills throughout your coursework. Did not submit or incompletely   provided one to three (1-3) papers / artifacts / examples from or, if you   have none of these, description(s) of previous coursework in order to   demonstrate your change(s) and acquired knowledge within this area.Partiallyspecified the   development of your information literacy / research skills throughout your   coursework. Partially provided one to three (1-3) papers / artifacts /   examples from or, if you have none of these, description(s) of previous   coursework in order to demonstrate your change(s) and acquired knowledge   within this area.Satisfactorilyspecified   the development of your information literacy / research skills throughout   your coursework. Satisfactorily provided one to three (1-3) papers /   artifacts / examples from or, if you have none of these, description(s) of   previous coursework in order to demonstrate your change(s) and acquired   knowledge within this area.Thoroughly specified   the development of your information literacy / research skills throughout   your coursework. Thoroughly provided one to three (1-3) papers / artifacts /   examples from or, if you have none of these, description(s) of previous   coursework in order to demonstrate your change(s) and acquired knowledge   within this area. 5a. Develop a plan for   continued information literacy development as part of your personal and   professional growth plan that includes three to five (3-5) information   literacy goals.Weight: 3%Did not submit or   incompletely developed a plan for continued information literacy development   as part of your personal and professional growth plan that includes three to   five (3-5) information literacy goals.Partially developed a   plan for continued information literacy development as part of your personal   and professional growth plan that includes three to five (3-5) information   literacy goals.Satisfactorily   developed a plan for continued information literacy development as part of   your personal and professional growth plan that includes three to five (3-5)   information literacy goals.Thoroughlydeveloped a   plan for continued information literacy development as part of your personal   and professional growth plan that includes three to five (3-5) information   literacy goals. 5b. Develop a plan for   continued information literacy development as part of your personal and   professional growth plan that includes potential means (e.g., organizations   and resources that you may utilize) to achieve the information literacy goals.Weight: 3%Did not submit or   incompletely developed a plan for continued information literacy development   as part of your personal and professional growth plan that includes potential   means (e.g., organizations and resources that you may utilize) to achieve the   information literacy goals.Partially developed a   plan for continued information literacy development as part of your personal   and professional growth plan that includes potential means (e.g.,   organizations and resources that you may utilize) to achieve the information   literacy goals.Satisfactorily   developed a plan for continued information literacy development as part of   your personal and professional growth plan that includes potential means   (e.g., organizations and resources that you may utilize) to achieve the   information literacy goals.Thoroughly developed a   plan for continued information literacy development as part of your personal   and professional growth plan that includes potential means (e.g.,   organizations and resources that you may utilize) to achieve the information   literacy goals. 5c. Develop a plan for   continued information literacy development as part of your personal and   professional growth plan that includes relevant strategies for applying the   literacy skills in educational / work environment.Weight: 3%Did not submit or incompletely   developed a plan for continued information literacy development as part of   your personal and professional growth plan that includes relevant strategies   for applying the literacy skills in educational / work environment.Partially developed a   plan for continued information literacy development as part of your personal   and professional growth plan that includes relevant strategies for applying   the literacy skills in educational / work environment.Satisfactorily   developed a plan for continued information literacy development as part of   your personal and professional growth plan that includes relevant strategies   for applying the literacy skills in educational / work environment.Thoroughly developed a   plan for continued information literacy development as part of your personal   and professional growth plan that includes relevant strategies for applying   the literacy skills in educational / work environment. 6. Specify the   development of your writing skills throughout your coursework. Provide one to   three (1-3) papers / artifacts / examples from previous coursework to   demonstrate your change(s) and learning in this area. Identify plans for   continued writing development as part of your personal and professional   growth plan. Note: If you do not have papers / artifacts /   examples, attach the description(s) of your chosen previous assignment(s).Weight: 10%Did not submit or   incompletely specified the development of your writing skills throughout your   coursework. Did not submit or incompletely provided one to three (1-3) papers   / artifacts / examples from or, if you have none of these, description(s) of   previous coursework to demonstrate your change(s) and learning in this area.   Did not submit or incompletely identified plans for continued writing   development as part of your personal and professional growth plan.Partially specified   the development of your writing skills throughout your coursework. Partially   provided one to three (1-3) papers / artifacts / examples from or, if you   have none of these, description(s) of previous coursework to demonstrate your   change(s) and learning in this area. Partially identified plans for continued   writing development as part of your personal and professional growth plan.Satisfactorily   specified the development of your writing skills throughout your coursework.   Satisfactorily provided one to three (1-3) papers / artifacts / examples from   or, if you have none of these, description(s) of previous coursework to   demonstrate your change(s) and learning in this area. Satisfactorily   identified plans for continued writing development as part of your personal   and professional growth plan.Thoroughlyspecified   the development of your writing skills throughout your coursework.   Thoroughlyprovided one to three (1-3) papers / artifacts / examples from or,   if you have none of these, description(s) of previous coursework to   demonstrate your change(s) and learning in this area. Thoroughly identified   plans for continued writing development as part of your personal and   professional growth plan. 7a. Create an action   plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Include three to   five (3-5) goals.   Weight: 3%Did not submit or   incompletely created an action plan geared toward both building upon your   personal and professional strength(s), which you identified previously in   Journal Entry #7, and toward improving your weaknesses related to your portfolio   theme. Did not submit or incompletely included three to five (3-5) goals.Partially created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Partially included   three to five (3-5) goals.Satisfactorily created   an action plan geared toward both building upon your personal and   professional strength(s), which you identified previously in Journal Entry   #7, and toward improving your weaknesses related to your portfolio theme.   Satisfactorily included three to five (3-5) goals.Thoroughlycreated an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Thoroughly   included three to five (3-5) goals. 7b. Create an action   plan geared toward both building upon your personal and professional strength(s),   which you identified previously in Journal Entry #7, and toward improving   your weaknesses related to your portfolio theme. Include three to five (3-5)   key steps that you plan to take for further evaluation and continuous   improvement.   Weight: 3%Did not submit or   incompletely created an action plan geared toward both building upon your   personal and professional strength(s), which you identified previously in   Journal Entry #7, and toward improving your weaknesses related to your   portfolio theme. Did not submit or incompletely included three to five (3-5)   key steps that you plan to take for further evaluation and continuous   improvement.Partiallycreated an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Partially included   three to five (3-5) key steps that you plan to take for further evaluation   and continuous improvement.Satisfactorily created   an action plan geared toward both building upon your personal and   professional strength(s), which you identified previously in Journal Entry   #7, and toward improving your weaknesses related to your portfolio theme.   Satisfactorily included three to five (3-5) key steps that you plan to take   for further evaluation and continuous improvement.Thoroughly created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Thoroughly   included three to five (3-5) key steps that you plan to take for further   evaluation and continuous improvement. 7c. Create an action   plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Include potential   means (e.g., organizations and resources that you may utilize) to achieve   these goals.   Weight: 3%Did not submit or   incompletely created an action plan geared toward both building upon your   personal and professional strength(s), which you identified previously in   Journal Entry #7, and toward improving your weaknesses related to your   portfolio theme. Did not submit or incompletely included potential means   (e.g., organizations and resources that you may utilize) to achieve these   goals.Partially created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Partially included   potential means (e.g., organizations and resources that you may utilize) to   achieve these goals.Satisfactorilycreated   an action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Satisfactorily   included potential means (e.g., organizations and resources that you may   utilize) to achieve these goals.Thoroughly created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Thoroughly included   potential means (e.g., organizations and resources that you may utilize) to   achieve these goals. 7d. Create created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Include relevant   strategies for applying the plan in educational / work environment.   Weight: 3%Did not submit or   incompletely created an action plan geared toward both building upon your   personal and professional strength(s), which you identified previously in   Journal Entry #7, and toward improving your weaknesses related to your   portfolio theme. Did not submit or incompletely included relevant strategies   for applying the plan in educational / work environment.Partially created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Partially included   relevant strategies for applying the plan in educational / work environment.Satisfactorilycreated   an action plan geared toward both building upon your personal and   professional strength(s), which you identified previously in Journal Entry   #7, and toward improving your weaknesses related to your portfolio theme.   Satisfactorily included relevant strategies for applying the plan in   educational / work environment.Thoroughly created an   action plan geared toward both building upon your personal and professional   strength(s), which you identified previously in Journal Entry #7, and toward   improving your weaknesses related to your portfolio theme. Thoroughly   included relevant strategies for applying the plan in educational / work environment. Part 3: Reflective   Activities 8. Ascertain whether   or not you met the reflection goal that you established in Week 3 of this   course. Analyze the significant way(s) and extent to which the process of   reflection caused you to become a more reflective practitioner.   Weight: 10%Did not submit or   incompletely ascertained whether or not you met the reflection goal that you   established in Week 3 of this course. Did not submit or incompletely analyzed   the significant way(s) and extent to which the process of reflection caused   you to become a more reflective practitioner.Partially ascertained   whether or not you met the reflection goal that you established in Week 3 of   this course. Partially analyzed the significant way(s) and extent to which   the process of reflection caused you to become a more reflective   practitioner.Satisfactorily   ascertained whether or not you met the reflection goal that you established   in Week 3 of this course. Satisfactorily analyzed the significant way(s) and   extent to which the process of reflection caused you to become a more   reflective practitioner.Thoroughly ascertained   whether or not you met the reflection goal that you established in Week 3 of   this course. Thoroughly analyzed the significant way(s) and extent to which   the process of reflection caused you to become a more reflective practitioner. 9. Propose two to   three (2-3) measures that you would use in order to strengthen your   reflective process. Provide a rationale to support your response.   Weight: 5%Did not submit or   incompletely proposed two to three (2-3) measures that you would use in order   to strengthen your reflective process. Did not submit or incompletely   provided a rationale to support your response.Partially proposed two   to three (2-3) measures that you would use in order to strengthen your   reflective process. Partially provided a rationale to support your response.Satisfactorilyproposed   two to three (2-3) measures that you would use in order to strengthen your   reflective process. Satisfactorily provided a rationale to support your   response.Thoroughly proposed   two to three (2-3) measures that you would use in order to strengthen your   reflective process. Thoroughly provided a rationale to support your response. 10. Propose two to   three (2-3) ways that you would apply continued reflective activities within   your current or prospective work environment.  Provide at least   one (1) example of such application to support your response.   Weight: 5%Did not submit or   incompletely proposed two to three (2-3) ways that you would apply continued   reflective activities within your current or prospective work environment.   Did not submit or incompletely provided at least one (1) example of such   application to support your response.Partially proposed two   to three (2-3) ways that you would apply continued reflective activities   within your current or prospective work environment.  Partially   provided at least one (1) example of such application to support your   response.Satisfactorily   proposed two to three (2-3) ways that you would apply continued reflective   activities within your current or prospective work   environment.  Satisfactorily provided at least one (1) example of   such application to support your response.Thoroughly proposed   two to three (2-3) ways that you would apply continued reflective activities   within your current or prospective work environment.  Thoroughly   provided at least one (1) example of such application to support your   response. 11. Upload Assignment   2 to your Optimal Resume portfolio.   Weight: 5%Did not submit or   incompletelyuploaded Assignment 2 to your Optimal Resume portfolio.Partially uploaded   Assignment 2 to your Optimal Resume portfolio.Satisfactorily   uploaded Assignment 2 to your Optimal Resume portfolio.Thoroughly uploaded   Assignment 2 to your Optimal Resume portfolio. 12. Writing Mechanics, Grammar, and FormattingWeight: 5%Serious and persistent   errors in grammar, spelling, punctuation, or formatting.Partially free of   errors in grammar, spelling, punctuation, or formatting.Mostly free of errors   in grammar, spelling, punctuation, or formatting.Error free or almost   error free grammar, spelling, punctuation, or formatting. 13. Appropriate use of  APA style for citationsWeight: 5%Lack of in-text   citations and / or lack of reference section.In-text citations and   references are provided, but they are only partially formatted correctly in   APA style.Most in-text citations   and references are provided, and they are generally formatted correctly in   APA style.In-text citations and   references are error free or almost error free and consistently formatted   correctly in APA style. 14. Clarity and Coherence of WritingWeight: 5%Information is   confusing to the reader and fails to include reasons and evidence that   logically support ideas.Information is   partially clear with minimal reasons and evidence that logically support   ideas.Information is mostly   clear and generally supported with reasons and evidence that logically   support ideas. Information is   provided in a clear, coherent, and consistent manner with reasons and   evidence that logically support ideas.

The post W10A2Answers 2Bids 48Other questions 10 appeared first on homeworkhandlers.com.

Final Project Milestone One: Draft of Report Answers 1Bids 24Other questions 10

Final Project Milestone One: Draft of Report To complete this assignment, review the prompt and grading rubric in the Milestone One Guidelines and Rubric document. When you have finished your work, submit the assignment here for grading and instructor feedback.                              ISE 640 Final Project Forensic NotesUse the information in this document to help you complete your final project. Drew Patrick, a director-level employee, is stealing intellectual property from a manufacturing company. The company is heavily involved in high-end development of widgets. Drew has access to corporate secrets and files. He is planning on leaving the company, taking the intellectual property with him, and going to work for a competitor. There is suspicion of him doing this, so human resources (HR) notified the information technology (IT) department to monitor Drew’s past history. An internal investigation is launched due to Drew’s abnormal behavior. The IT department confirms that they have found large files and emails. Forensics identified unauthorized access, transmission, and storage of intellectual property by Drew. Evidence found will be used to support legal civil and criminal proceedings. Scenario ACME Construction Company designs, manufactures, and sells large construction vehicles that can cost upwards of a million dollars. They spent hundreds of thousands of hours redesigning their premier excavator. Every piece that goes into the excavator is individually designed to maximize the longevity of the equipment. Known for attention to detail, high-quality work, and industry innovation, this painstaking work is what sets ACME Construction company apart and is attributed for the excellent reputation they enjoy. This, in turn, allows them to charge a premium on their exceptionally well-built products. Drew Patrick is a senior manager directly involved with the overall development of ACME’s excavators. His role provides him with access to design documentation, schematics, support documents, and any other technical references maintained in the company’s research and development (R&D) database. The R&D database is maintained by ACME’s information technology (IT) department, which is supported by a security operations center (SOC). The SOC uses Snort as a core component of their security information and event management (SIEM) system to keep tabs on network traffic, authentication requests, file access, and log file analysis. The SIEM alerted SOC personnel of potential peer-to-peer (P2P) traffic originating from the internet protocol (IP) address associated with Drew’s computer. However, analysis of Active Directory logs indicated that Drew was not logged into his account at the time the files were transferred via the P2P application. ACME enforces two-factor authentication and does not allow for computer sharing. The SOC personnel began an incident report based on the identification of P2P traffic, which violates company policy. As per company policy, the SOC personnel gave human resources (HR) and the legal team the incident report. The legal team asked for further investigation. Upon further inspection of the P2P activity, several file transfers were discovered. The files transferred match the names of files in the R&D database containing intellectual property developed by Drew’s development team. Additionally, the files were transferred to IP addresses that are not owned or controlled by ACME Corporation. Analysis of the server access logs indicated that Drew had been logging into the R&D database for several weeks prior to the external file transfers taking place. Network logs from the Intrusion Prevention Systems (IPSs) indicated that the files of interest had been transferred to Drew’s desktop computer prior to the external transfer. ACME has a strict policy against maintaining intellectual property anywhere other than the designated servers. File access logs on the R&D servers confirmed that the account belonging to Drew had copied the files in question. At this point, fearing a loss of intellectual property, in addition to numerous policy violations, ACME called in the digital forensic team to take over the investigation. The forensics team proceeded to capture the log files from relevant computer systems and created a forensically sound copy of the hard disk drive on Drew’s computer. The log files investigated included the corporate mail, domain name server (DNS), and dynamic host configuration protocol (DHCP) servers, as well as physical access logs. Additionally, packet capture logs from the firewalls and intrusion detection system (IDS) were gathered and analyzed. This detailed investigation revealed that file transfers of intellectual property were indeed done from Drew’s computer, however, Drew’s account was not logged in at the time of the transfer. The only account active on the suspect computer was an anonymous account that had been created on 9/17/2016 at 9:57 p.m. The following notes were provided by the Forensic Team: Forensic Team Investigation Notes Notes from the investigative team about the forensic findings of the hard drive image obtained from Drew Patrick’s hard drive:  Chain of custody document was begun with the sizing of the Western Digital Hard Drive 500 GB with serial number NB497356F from Drew Patrick’s computer.  Hard drive was duplicated using forensic toolkit (FTK) software to preserve the original hard drive image. A hash was created for the original and the copied image to prove both images were the same.  The operating system of the image was Windows-based. The operating system used a new technology file system (NTFS) file structure.  The hard drive was analyzed using Autopsy and Windows Forensic Toolchest. The sort and index functions were used to isolate the files needed for further analysis. These files include types SQL, Excel, email, chat, and HTML. Slack space was also analyzed. Files and Findings EMAIL (Microsoft Outlook): Numerous emails were found that contained references to proprietary information. Some emails were to non-ACME Corporation email accounts, and they promised information pertaining to equipment design. Follow-up emails were found that asked for assurance of a promised managerial position. CHAT (AOL Instant Messenger): Several chat conversations were recovered containing information about possession of proprietary documents. SQL (Microsoft Database): SQL database files revealed proprietary information and connection logs to a remote SQL server. Two additional SQL database files were encrypted and were not successfully unencrypted. EXCEL (Microsoft Excel): Numerous Excel files were located on the hard drive. These files contained parts list and parts specifications concerning proprietary construction equipment. These files had csv and xls extensions. HTML: Recovered internet web browser cache revealed that the dark web was searched for proprietary information brokers. An email address was created to correspond in the dark web for buyer transactions called [email protected] Internet cache also revealed that YouTube was searched for the subjects “selling intellectual property” and “selling on the dark web.” Recovered internet browser history revealed pictures and illustrations on encrypting SQL database files. Internet browser history also revealed searches concerning how to exploit the vulnerabilities of an SQL database. SLACK SPACE (hidden data and temporary files): Hidden information in the slack space was revealed to contain temporary internet files on searches for “advertising stolen data” and “hacking sql servers.” These files, once revealed, were in plain text and read using Notepad.                  ISE 640 Milestone One Guidelines and Rubric  Overview: The milestone assignments in this course directly support you in the completion of your final project, a forensic investigative report. Consider the feedback you have received in class discussions, along with notes you have made in your non-graded investigative journal, to complete this milestone assignment.  This is Milestone One, a draft of Final Project One: Report. The final product will be submitted in Module Nine.  Please note that your non-graded investigative journal will be submitted with this milestone to ensure completion. Make sure that you are adding to your investigative journal as you complete each module.  Prompt: For the summative assessment, you will be taking on the role of a cybersecurity practitioner. You will need to act as a domain expert communicating to a non-expert stakeholder. For this milestone, you will be providing a summary of the scenario from the forensic notes document. You will also be explaining the relevant procedures needed to maintain evidentiary integrity: legal concerns, processes and procedures, and chain of custody. Lastly, you will be explaining details of the investigation, such as resources needed, methods, and findings. Ensure you review the full scenario in the main project document as well as the forensic notes document before drafting your report.  Specifically, the following critical elements must be addressed:  I. Executive Summary: Set the stage for your report, providing a brief overview of the situation and the stakeholders who are involved.  II. Legal Concerns: Describe the problem(s) and objectives you are working with the company’s attorneys to solve.  III. Relevant Procedures: In this section, you will outline the steps that (hypothetically) you will have to take prior to or as you investigate in order to maintain evidentiary integrity. Use your experiences from other situations you are engaging in within the lab environment to inform your responses.   A. Processes and Procedures: Describe processes or procedures necessary for handling a criminal situation by an internal employee.   B. Chain of Custody: Explain how to maintain the chain of custody as you investigate the various aspects of the incident. Support your response with specific examples.  IV. Details of Investigation: Based on your experiences in the labs, there will be specific resources, methods, and tools necessary to support the investigation in the scenario.     A. Resources Needs: Explain what resources (team knowledge, skills, and abilities) are necessary for gathering the evidence for this forensic investigation. Provide examples based on your experiences from the labs.    B. Methods: Describe the specific forensic method or approach you used to effectively leverage your available resources.    C. Findings: Describe the specific findings and the forensic tactics and technologies you employed to reach them.  V. Investigative Journal Notes: Submit your investigative journal that outlines most of the basics from each of the modules upon which you based your notes.                                          Rubric  Guidelines for Submission: Your assignment should adhere to the following formatting requirements: Write 4 to 5 double-spaced pages using 12-point Times New Roman font and one-inch margins. You should use current APA style guidelines for your citations and reference list. Be sure to attach both Milestone One and investigative journal files.

The post Final Project Milestone One: Draft of Report Answers 1Bids 24Other questions 10 appeared first on homeworkhandlers.com.

500- to 750-word paperAnswers 1Bids 49Other questions 10

focused on how social control theories may explain behavior—deviant or criminal—and the different ways in which they are characterized or manifested by examining the origins of social control theories on behavior. write a paper that provides the opportunity for you to demonstrate your understanding of these concepts and how they are related. a 500- to 750-word paper in which you address the following :Describe social control theory and include the following as part of your description: 2 or 3 examples of social control 2 or 3 systems of social control2 or 3 agents of social controlChoose two pairs of social control and compare the forms of social control within each pair:Direct vs. indirectPositive vs. negativeConscious vs. unconsciousFormal vs. informalReal vs. artificial  How social media is changing the way people commit crimes and police fight them.Until the early years of the 21st century, crimes tended to be committed away from the eyes of the majority of society, with traditional media broadcasting information about them often on their own terms. Ray Surette writes that the advent of social media in the past decade has led to a new type of ‘performance’ crimes, where people create accounts of their law-breaking through text, images and video, which are then digitally distributed to the public on a large scale. He comments that social media has also opened up new ways of combating crime for the police, who can take advantage of the self-surveillance of those who publicize their crimes on social media. In 2013, a 16 year old boy in Ottawa, Canada was arrested for making bomb threats to schools across North America. While sadly this type of crime is now not particularly unusual, what is different is the way in which he was caught; his extensive bragging about his anonymous phone calls on Twitter eventually brought the police to his door. Until now, those who commit crimes have preferred to try and hide their actions and identities. However in the 21st century social media world, these surreptitious crimes now compete with performance crimes like these.The core elements of contemporary performance crimes are that they are created for distribution via social media and involve both willing and unwilling performers. Performance crime can be of two types.  The first is a sort of ‘informed consent’ performance where the actors are aware of the production (sometimes recording or filming it themselves) and at least tacitly support its subsequent distribution — in this sense a crime performer is ‘behaving for the camera’ similar to an actor in a play. The second involves an uninformed, unwitting performance produced without performer knowledge or acquiescence — here a person is being recorded in a production similar to a nature documentary.  Social media have caused performances of both types to explode.These performances are no longer rare events place and time bound to physical stages and scheduled broadcasts; they are now ephemeral renditions constantly created and digitally distributed. This change came about with the transition from legacy to new media in the 1990s, which in turn has brought about changes in society and created new stressors on criminal justice systems.  The content and portrayals of crime and justice in new and legacy media look similar and the transition from one to the other has been largely seamless. The result has been a muted recognition of the substantial impact of the shift on crime and justice and the subsequent emergence of performance crime.Social Media Users as Content Producers and DistributorsWith the rise of social media a significant change has been that content consumers can also be producers of self-generated content and can be content distributors.  In the 21st century people place themselves open to the voyeuristic gaze of others in uncountable small-scale private performances that are socially mediated for public consumption on an often large scale. The isolated acts of ‘reading the newspaper or turning on the television’ have been replaced by the collective experience of posting, tweeting and ‘going viral’.   The result has been the shifting of audiences from passive to active participants and to performance emerging as a common characteristic of media content.Due to these trends, a large amount of seemingly disparate crime and justice activities by offenders and law enforcement and judicial personnel can be understood through the conceptual lens of a performance.  In this new social media reality the public not only follows crime and justice, but participates and adds their own performances, the most noticeable being performance crimes. Performance CrimeThe growth of performance crime is additionally tied to the celebrity culture that emerged in the 20th century when celebrities became a focus of public interest and becoming a celebrity a career goal.   Feeding off of this celebrity culture, social media has resulted in offenders posting pre-crime confessions, videos of themselves committing offences, and post-crime footage holding evidence and bragging about their criminal acts. In the process, these enthusiastic crime performers often generate evidence used for their conviction.  Social media-based performance crime waves include activities such as ghost riding, and the knockout game.  The social media dynamic that drives offenders to post their crime performances has also influenced the treatment of crime victims, so that ‘performance victimization’ is also a new reality and adds a public humiliation element to criminal victimization in a perverse ‘shaming-the-victim’ process.   The regular online posting of terrorism videos and the numerous terrorist group internet sites further exemplify how social media is used to produce online performance terrorism specifically tailored to multiple audiences.  The over-sharing that lies at the core of self-incriminating performances is an extension of the significance that social media have come to play culturally.   It is better to get your performance out there and be known than to be unknown in a celebrity culture, even if criminality is required.Performance Crime-fightingThe main impact of social media performances on law enforcement has been to enhance and extend surveillance.  Social media provide access to the personal diaries, photo albums, and home movies of millions of people, most of it freely provided so that the 21st century is an era of unprecedented self-surveillance.  The historical prerequisite that a person must be under suspicion to be brought under surveillance has faded, and broadly targeted, automatic, continuous surveillance is the norm. The popularity of self-surveillance makes hidden and pervasive surveillance more acceptable due to the fact that when voluntary performances are ubiquitous, surveillance is not perceived as intrusive and being in a camera’s view is no longer unusual.  Public space surveillance as non-consensual passive consent performances is exemplified by law enforcement-operated surveillance camera systems and the rise of car, body, and community surveillance camera systems.  From these systems images are regularly culled for evidence as well as news content.The lure of self-surveillance and self-promotion is such that a number of fugitives have provided enough information on social media for law enforcement to determine their identities and locations.  Unsolicited voluntary performances from offenders have also resulted in a number of posted confessions.  In these performances, offenders post scenes that clearly reflect and sometimes openly boast of their guilt.  Lastly law enforcement agencies have developed social media-based counter-performances, a common one being to pose as pedophiles to attract and capture sex offenders.   In these performances police falsely perform to lure individuals who then unknowingly perform as predators in surreptitiously recorded performance crimes.What drives crime and justice performances?In criminal justice systems, information traditionally has been textual, linear, impersonal, and paper based and flowed in one direction across loosely coupled criminal justice agencies. Social media content, in contrast, is multi-medium, digital, holistic, emotional, and image dominated.   As social media have broadened access to and altered the nature of crime and justice information, crime and justice performances have become more fluid, multi-directional products whose owners are not readily apparent.  Thus, information flows naturally in all directions through social media while in criminal justice it traditionally flowed in one downstream direction.  Substantial impacts on criminal justice systems from the emergence of free-wielding social media linked crime and justice performances were unavoidable.It is therefore not surprising that social media created both issues and opportunities for criminal justice.  Social media performances will alter the way crime is committed by offenders, cases are processed by criminal justice agencies, and justice is experienced by citizens. The most noticeable effect is through ‘performance crime’ committed to gain attention, but other less visible effects on criminal justice such as on juror behavior will be equally significant. The growth of performance crime and justice is producing a unique set of phenomena that criminal justice systems worldwide will have to manage.This article is based on the paper, “Performance Crime and Justice” in Current Issues in Criminal Justice. Please read our comments policy before commenting. Note:  This article gives the views of the author, and not the position of USAPP – American Politics and Policy, nor the London School of Economics.Shortened URL for this post: http://bit.ly/1KcPPCthttp://blogs.lse.ac.uk/usappblog/2016/01/28/how-social-media-is-changing-the-way-people-commit-crimes-and-police-fight-them/Inderbitzin, M., Bates, K. A., & Gainey, R. R. (2017). Deviance and social control: A sociological perspective (2nd ed.). Thousand Oaks, CA: Sage Publications.

The post 500- to 750-word paperAnswers 1Bids 49Other questions 10 appeared first on homeworkhandlers.com.