Exercise 1

Jack Winters owns a small business, offering construction services for Disney. To save money on his bids, he subcontracts all of the painting out to another company called Painters Inc. While balancing QuickBooks from the actual job invoices and receipts, Jack notices a discrepancy. Painters Inc. was issued a check for $14,125, but the job invoice shows that the job was finished for $12,125. Jack contacts Painters Inc, who provides proof that they received payment for $12,125. Besides Jack, only one person had access to the accounting software. You have been called to investigate. 

Write a one-page report detailing the steps Jack needs to take to gather all of the appropriate evidence and protect his company.

Nmap Report

3. Review the Lab 5 Nmap Scan Report that accompanies this lab.

4. Using the Lab 5 Nmap Scan Report, answer the following questions:

What are the date and timestamp of the Nmap host scan?

What is the total number of loaded scripts for scanning?

A synchronize packet (SYN) stealth scan discovers all open ports on the targeted host.

How many ports are open on the targeted host for the SYN stealth scan at 13:36?

Identify hosts, operating systems, services, applications, and open ports on devices from the Zenmap GUI (Nmap) scan report.

5. Review the Lab 5 Nessus Vulnerability Scan Report that accompanies this lab.

6. Using the Lab 5 Nessus Vulnerability Scan Report, answer the following questions:

How many hosts were scanned?

What were the start and end times for each of the scans?

How many total vulnerabilities were discovered for each host?

How many of the vulnerabilities were critical, major, and minor software vulnerabilities?

7. On your local computer, open a new Internet browser window.

8. In the address box of your Internet browser, type the URL http://cve.mitre.org and press

Enter to open the Web site.

9. On the Web site, toward the top left of the screen, click the CVE List link.

10. Review the CVE List Main Page.

11. Define CVE.

12. On the right, under Items of Interest, click the Terminology link.

13. Review the definitions for vulnerability and exposure.

14. Define the terms vulnerability and exposure.

15. At the top right of the Web site, click the Search link.

  

16. In the Search box, type the words Microsoft XP 2003 Service Pack 1 and click the Search button.

17. Describe some of the results you discover.

18. After viewing the results, conduct another search and this time, type the words Cisco ASA

5505 Security + and click the Search button.

19. Describe some of the search results.

Capstone Project: Preliminary Literature Review And Action Item Checklist

Part Two- Due 1/8/2020 Please refer back to the capstone project paper for topic as this will be reflected back. This is a continuation. This assignment comprises two sections: a preliminary literature review and an action item checklist.  Preliminary Literature Review:

  1. Contains a minimum of 10 scholarly, peer-reviewed research articles.
  2. Each article needs to be thoroughly summarized. The summary must describe the relevance of the article, and how the research findings support the action you are proposing in your capstone project.
  3. Each article summary needs to include a research design and methods section.
  4. The capstone project requires a comprehensive literature review that includes a minimum of 25 articles; 10 article summaries will be written in HCA-620 and can be applied in HCA-699.

Action Item Checklist:The Action Item Checklist should include specific future steps required to complete your capstone project as well as expected completion dates.Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.This assignment uses a grading rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.You are required to submit this assignment to LopesWrite. Please refer to the directions in the Student Success Center.

Module 1

CASE 7-2: United States of America v. Park (p. 166 in the text)

Do you think that Parks should have been charged with a criminal offense when he was not directly running the warehouse where the contaminated food was stored? Should he be convicted when he did not intend to hurt anyone? Discuss why or why not. What precedent does the court rely on in this case?

For one of your posts, do a little exploring online and discuss another white-collar crime story in the news. Include one source, properly cited in APA format