Lesson 5-1: Corrections in America

Lesson 5:  Corrections in America

Discussion Question 1 (50 Points)

Describe probation, parole, and community corrections; summarize two (2) advantages and one (1) disadvantage for each of these types of sentencing.  Then state your opinion on one (1) of these types of sentencing, arguing whether it works as it should, and how you would improve upon the type of sentencing.  (50 points)  (A 2-page response is required.)

Packet Capture Analysis

  

You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any.

For this assignment, analyze the packet captures provided by Wireshark by doing the following:  

Go to the site, and download the following:

wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic  

wpa-eap-tls.pcap.gz WiFi 802.11 WPA-EAP/Rekey sample   

nb6-hotspot.pcap Someone connecting to SFR’s wireless community network 

ciscowl.pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0 

wap_google.pcap contains two WSP request-response dialogs

Note: Only download these sample captures. Other captures may set off your computer’s system defenses.

Use Wireshark to view and analyze the sample captures.

Create a 1-page table that ranks the packet captures from the highest to lowest threat. In your table provide the following for each packet capture:

Description of the traffic

Description of the risks, if any, the traffic poses to the wireless network

Countermeasures to take to secure network from any threat

Write a 1/2- to 1-page memo to management as a network security specialist explaining the following:

How you can distinguish hostile packet data from normal packet data

How you can recognize any attack signatures in the packets you analyze

Provide a rationale for ranking the packets as you did

Discussion: Analyzing Visual Communication

 

After reading Chapter 5: Basic Document Design (pp. 107-131) in MacRae’s Business and Professional Writing: A Basic Guide and watching Nancy Duarte’s “5 Rules for Creating Effective Presentations,” visit .  Slideshare is the world’s largest professional content sharing  community and contains presentations on a wide variety of topics. Browse  Slideshare and identify one deck of “effective” slides applying the  design rules in Chapter 5 and in Duarte’s video. Identify one deck of  “ineffective” slides based on the same design criteria.

On the Module 5 Discussion Forum, complete the following:

  1. Post a link to the “effective” Slideshare presentation.
  2. Below this link, explain how the effective presentation embodies  Duarte’s 5 rules. Explain why the effective presentation applies  MacRae’s concepts in Chapter 5: Basic Document Design.
  3. Post a link to the “ineffective” Slideshare presentation.
  4. Below this link, explain how the ineffective presentation defies  Duarte’s 5 rules. Explain how the ineffective presentation ignores or  misuses MacRae’s concepts in Chapter 5: Basic Document Design.

Importance Of WPA2

  

Respond to the following in a minimum of 175 words: 

As a security expert, you have directed a networking team to change all wireless access points from using WEP encryption to WPA2. The CIO has contacted you asking for an explanation for this requirement.

Discuss why WPA2 encryption is important for maintaining network security and provide a rationale for changing the encryption in this specific case.