Cyber Security

You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion:

What time did the attack happen?
How did the hacker get into the network?
What computers were compromised?
What computers were accessed?
What data was extracted from the network?
What type of attack was conducted?
How long did the attacker have access to the network?
Is there any persistence on the network for future attacks?

You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.

Cyber Security

You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion:

What time did the attack happen?
How did the hacker get into the network?
What computers were compromised?
What computers were accessed?
What data was extracted from the network?
What type of attack was conducted?
How long did the attacker have access to the network?
Is there any persistence on the network for future attacks?

You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.

Cyber Security

You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion:

What time did the attack happen?
How did the hacker get into the network?
What computers were compromised?
What computers were accessed?
What data was extracted from the network?
What type of attack was conducted?
How long did the attacker have access to the network?
Is there any persistence on the network for future attacks?

You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.

Defending The Homeland From Foreign And Domestic Threats

You are an interface coordinator for the Directorate of National Intelligence. You have been asked to brief a half dozen freshman senators that will soon be members of the National Security Committee. You are required to explain the functions of the Department of Homeland Security and Federal Bureau of Investigation in relationship to their responsibilities for intelligence and interdiction of terrorism from state-sponsored terror and terror organizations with foreign ties.

There are a number of law-enforcement-related resources that are not found in academic journals that may be utilized as references in this assignment. It is critical that when you make a statement of fact in your presentation that you cite the reference you obtained the information from in the text of the paper, and that the reference is included in your reference page.

Assignment Guidelines

Address the following in 3–5 pages:
What is the overall function and mission responsibility of the Department of Homeland Security? Explain.
What is the function of the Terrorist Threat Integration Center? Explain.
What are the capabilities and importance of the DHS Counterterrorism Center? Explain in detail.
What is the operational role of the FBI’s Counterterrorism Division? Explain.
What methods are used to ensure that state and local law enforcement agencies develop homeland defense and security strategies? Explain (hint: federal grants).
What methods exist for state and local law homeland defense and security strategic planning activities? Explain.
How are these methods effective? Explain.
How can these planning methods be improved? Explain.

Nuclear weapons

Nuclear weapons have been have been hugely influential in shaping international relations since 1945 even though they have not been used since the bombings of Hiroshima and Nagasaki that ended Word War II. Why does Bracken believe the place of nuclear weapons in international affairs is shifting in the what he calls “the second nuclear age” and what lessons can be drawn from “the first nuclear age” that remain relevant in this changing landscape?

Prototyping plan

our team is now ready to prototype the Section 508-validated application being developed for U.S. Department of Homeland Security field officers to check potential immigrants for connections to criminal or terrorist behavior. Remember, this application must meet these requirements:

Conform with Section-508 accessibility guidelines.
Allow wireless real-time bidirectional data transfer and database queries with secure servers.
Have a secure login and, after two minutes of non-use, have autolocking that reactivates a secure login.
Account for the fact that officers work on any day and at any time in offices, from vehicles, and on foot along the U.S. border and in cities across the country.
Instructions
Create a 3–5 page prototyping plan for the application you are developing. Include these components in your plan:

Craft an executive summary that states the purpose of the report and a conclusion that ties everything together.
Describe the following and explain the rationale for your decisions, supported by research:
Interface choices such as menu-driven, GUI, or object-oriented.
Methods for input/output.
Supported devices.
Explain the following in detail and justify why you made these choices, supported by research:
How the application will process user mistakes and errors.
How you will implement application security.
List the following tools, and explain why you chose these tools, supported by research.
Two specific software tools used to determine programming bugs.
Three automated tools will be used to validate accessibility.
Explain two of the UX prototyping techniques you will use, and justify your choices, supported by research.
Create two drawings using Visio or a similar tool:
The first drawing should depict the user display (what users will see).
The second drawing should depict the system processing flow—that is, how information flows through the application in both directions. Essentially, depict the steps the application will follow, from receiving data to the outcome of why people are using the app in the first place.
Both drawings must align with the specifications and functions of the app.
Incorporate a minimum of three credible and relevant resources to support your plan. You may wish to begin your search by checking out the CIS – Computer Information Systems page in the Strayer Library for a list of guides and databases.

War

War has always been one of the primary foci of global studies. Write about what you have learned about the causes of conflict, role of perspective in approaching global issues, interrelated nature of global issues (war, economy, natural resources, politics, human rights, population issues, etc),about the purpose and function of international organizations such as the United Nations, and about recent global events. Then, convince me of ONE of the following statements:

a. The United Nations should have much stronger military powers.

b. The United Nations should have zero military powers.

Text Book: John McCormick Introduction to Global Studies ISBN: 978-1-352-00399-4

http://www.bbc.co.uk/news/world/

“White Paper” for the Biden Administration

Assume you are the new Secretary of Homeland Security. You are drafting a Policy Document referred to as a “White Paper” for the
Biden Administration to highlight the impact of open/closed borders in the age of COVID-19 on migration, asylum seekers, and economic recovery. In this
white paper, consider the following to frame your paper.
Define what YOU believe an “OPEN” vs “CLOSED” border means especially when dealing with those seeking asylum. Reminder that you can provide your
opinion without using “I think” or something similar.
How do you believe illegal migrants can be treated humanely and with dignity/inclusion?
How does an “open” vs a “closed” border impact the United States economy?
What are your recommendations for the next 12-24 months on specific steps that the new administration needs to take?
DO NOT answer this as if it is a four Question Exam. This is a WHITE PAPER and is a single narrative framed by these questions, but do NOT use first person
(I statements).