Network and Operating System Investigation. The work is to be 4 pages with three to five sources, with in-text citations and a reference page.

I will pay for the following article Network and Operating System Investigation. The work is to be 4 pages with three to five sources, with in-text citations and a reference page. The Internet banking facilities consist of funds transfer, online shopping, credit card transactions, prepaid vouchers of different mobile phone companies and much more. Moreover, an Internet service provider (ISP) provides internet services to corporate organizations, home users, and small business. If the security of an ISP is compromised, then the hacker may be able to access all the systems that are ultimately the clients of the company. Likewise, ISP also provides site-to-site VPN connectivity from where all the classified data is encrypted from one end to the other. Furthermore, government based organizations also provide information services on the Internet along with defense agencies that are controlled and monitored by the military, once hacked, the impacts can be devastating if the hackers become vulnerable. This can also result in disrupting relations between the two countries. Similarly, a multi-national organization wants to be top of the competition by endearing the competitive advantage, in order to make its presence stronger, several online features made available, providing more opportunities for hackers and cybercriminals. Why IDS As per network dictionary, IDS is defined as “Intrusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse”. IDS are of many types and organizations choose the best possible type that suits their prioritized mission-critical systems. The types include network-based IDS, host-based IDS, and software-based IDS. These types are further categorized into signature-based IDS which is also referred to as misuse detection, and Anomaly Detection. The functionality of ‘signature-based IDS’ is dependent on known signatures. The word ‘known’ is important because threats that are detecting so far are categorized as known threats and are called signatures. Signature-based IDS only detect threats similar to the defined available signatures and do not comply with any new threat. Whereas, Anomaly-based IDS detect unknown activities within the network and detect them as threats and vulnerabilities. Defining Computing Forensics Discussing computer forensics in the context of law enforcement agencies or incorporate security, it will lead to a conclusion of a subject that covers the utilization of computers to catalog physical evidence that is analyzed in other forensics techniques including biometric identification, analyzing DNA and dental evidence. Current technological trends have revolutionized the methods of storing data along with different advanced access mechanisms. These systems facilitate law enforcement agencies by providing instant access to these characteristics. Although, computer forensics also facilitates the investigation of crimes within themselves in order to gather evidence associated with criminal activities that breach the violation of an organizations policy. The data can be extracted from storage devices including hard drives, flash drives, and memory cards etc. (Computer Forensics – a Critical Need in Computer. (n.d.)) Digital Forensics for a Database In order to conduct data forensics, some of the particular methods are mentioned below: Data dictionary extraction is achievable in flat files and ‘redo’ log files.

Write 3 pages thesis on the topic should states intervene in internal affairs of other countries.

Write 3 pages thesis on the topic should states intervene in internal affairs of other countries. SHOULD S INTERVENE IN INTERNAL AFFAIRS OF OTHER S By Location Introduction Forceful Humanitarian Intervention which involves the use of military force in a bid to prevent the contravention of the fundamental human rights of citizens in another state has become one of the leading debates in the application of ethical principles in the international affairs. The protection of human rights of civilians are a motivation driven by ethical objectives. However, intervening into the affairs of another state contravenes the sovereignty law that governs the right to sovereignty of each state. This is in conformation to the international law provided in the United Nations charter and customary international law. Therefore, the protection of human rights and the sovereignty of states have completely different basis. According to law, therefore, humanitarian intervention is only legal when and if authorized by the UN Security Council.

 

write an article on Clean Water Act by EPA. It needs to be at least 1000 words.

Hello, I am looking for someone to write an article on Clean Water Act by EPA. It needs to be at least 1000 words. In United States, nearly all manufacturing companies discharge their wastewater or storm water. Such emissions and discharges are extensively regulated by EPA in collaboration with federal and state authorities through programs of standards and permits under the Clean Water Act (CWA) (Garrett, 2003, p.1). Federal Water Pollution Control Act or Clean Water Act is the primary law that regulates pollution aspects of nation’s surface waters. First enacted in 1948, it was modified by 1972 amendments. The 1972 legislation specified programs for water quality improvement. Since its enactment, the law is continuously modified and implemented by industries and municipalities. Congress made amendments in 1977, brushed up some parts in 1981, and expanded the law with further amendments in 1987 (Copeland, 2010, p.1).This paper briefly explores the Clean Water Act initiated by EPA. Background During late 1950s and 1960s, water pollution control programs were based on four laws that modified the 1948 statute. Primarily, these laws addressed federal assistance to municipal dischargers and federal enforcement programs. Within this time period, federal role and jurisdiction was expanded to navigable interstate and intrastate waters. In 1965, water quality standards were incorporated in the law, requiring states to establish interstate water standards which would be utilized to assess pollution levels and control requirements. By the late 1960s, it was a common perception that not only enforcement procedures were time-consuming but water quality standard approach was also defective. Moreover, there were increasing concerns over the slow progress of pollution cleanup and lacking implementation of increasingly developed technologies. Such perceptions and increasing public interest in environmental protection led to the 1972 amendments. The 1972 statute established new laws rather than building on basic elements of prior laws. The statute established optimistic and promising goals: all municipal and industrial wastewater treatment before the discharge into waterways, better and restructured enforcement, and enhanced federal assistance for municipal treatment plant construction. It also extended the federal role and ensured that individual states fulfill their responsibility for day-to-day implementation of the law (Copeland, 2010, p.2). Prime Objectives The 1972 legislation announced that its prime objective is to restore and sustain the chemical, physical, and biological reliability of the nation’s waters. Some other major objectives included zero emission of pollutants by 1985 and, where possible, maintenance of water quality as fishable and swimmable by mid-1983. Despite the fact that these dates have passed, the goals and efforts to achieve them remain (Copeland, 2010, p.2). Overview of the Law Clean Water Act (CWA) forms the basic structure for the regulation of pollutants discharge into waters of the United States and for maintenance of surface waters quality standards. The basic CWA was implemented in 1948 and called Federal Water Pollution Control Act, but it was widely acknowledged and expanded in 1972. EPA has implemented pollution control programs under Clean Water Act such as establishing water standards for industries and quality standard for all contaminants in surface waters. The CWA has established that any kind of pollutant discharge from a certain source into passable waters is illegal, unless the discharger has a permit.

write an article on Technologies and Warfare. It needs to be at least 2500 words.

Hello, I am looking for someone to write an article on Technologies and Warfare. It needs to be at least 2500 words. It is important to note that the art of war has a long history dating back to the days when people fought wars on foot. Here soldiers would organized themselves in block formation and would fight each other by either using slashing or stabbing weapons. The introduction of chariots brought a new technique that advanced this art and became the first locomotive in the battle field. In fact, many people consider chariots as an ancient tank. The first chariots were used in Mesopotamia at around 3000B.C. These chariots were very heavy and slow a factor that made them inefficient and could only be driven by oxen’s. Following its impracticability in wars, kings would always ride the solid wooden carts until they get to the battle field and the get out and fight on foot. Things changed to the better by around 1800 B.C as the chariots were modified shedding some weight and adding spoked wheels. This advancement allowed an archer and driver to ride together behind the chariot that was drawn by horses (Boot, 2006). These chariots became fast war machines that caused much problem to foot soldiers. Such is the case that Charioteers blaze past infantries, running right over the soldiers or riddling them with arrows. “Chariots were the super weapons of their age,” says military historian Dr. Alex Roland. “They trumped everything else and became the decider of warfare.” The use of Chariots spread all the way from Egypt and West Asia and to china India and Europe. Nations with lots of money developed thousands of chariots that dominated warfare in the Middle East between 1800 and 1200 B.C. the following work serves to detail the various economic benefits derived from technological advancement that have seen new type of weaponry introduced. In addition, the work will discuss various technologies that have impacted the wars both positively and negatively. ECONOMIC PURPOSE FOR DESIGNING NEW TECHNOLOGIES FOR MODERN DAY CONFLICTS During these early periods, wars were costly with regard to lives lost and infrastructures destroyed a factor that necessitated the advent of new technologies that will realize the following economic benefits. i. Decreased Collateral Damage In the early days warring period resulted in great destructions with regard to buildings and other important establishments. Such is the case that regions would be attacked indiscriminately leading to huge losses, affecting unwarranted persons (Civilians). This changed greatly with the advent of sophisticated targeting systems and stealth technologies, a statement that is supported by the study undertaken by the Air Force military college Air University. Here, the collateral damages decreased considerably as new technologies allowed military personnel’s to strategically target important infrastructures and military emplacement(Binnendijk, 2002).Today, this is done with great precision and helps reduce the chances of bombing civilian’s structures by mistake. ii. Lower Civilian Casualties Another important undoing of the early techniques of war was the great number of civilian casualties. With the new technological advancement fewer civilians find themselves victims of military fires owing to the accuracy taken when targeting fortifications and buildings.