I just placed an Order #LW92269 Therefore, I need a totally different writer for

I just placed an Order #LW92269
Therefore, I need a totally different writer for this order.
*If the wording and sources are exactly the same, I will submit a Revision Request*
ASSIGNMENT: Case Study
This assignment will help you evaluate the threats posed by personnel and make a recommendation for hiring a potentially risky candidate.
The U.S. Government, in an effort to increase transparency, has created a new rule which requires a civilian to be appointed to assist in the hiring of virus writers whose job will be to write viruses and malicious code for the military to be used offensively against an enemy.
Assume you have been asked to sit on this board to assist in the selection of an Candidate for this position.
You are presented with the following two candidates;
Candidate 1: Harold Highspeed
Harold is a Captain in the Air Force with a top secret clearance. He has had no issues or problems on his record. He grew up in Rolla, Missouri, attended The University of Arkansas with a bachelor’s degree in computer science . He has no prior criminal record or traffic tickets, his polygraph confirms he does not drink or smoke, and is a devout Christian who never married. His psychological and professional profile shows he is inclined to follow orders without question and his skill level as a virus writer is medium.
Candidate 2: Wo Fat
Wo was born and raised in Taiwan and showed potential at a young age for computing skills. He was accepted and attended RPI for computer engineering and graduated with a median GPA of 3.0. Wo has a bit of a troubled past and was a confirmed attendee at six Defcon conferences in the past. He is also suspected of engineering a DDOS attack against the Chinese’s government who recently jailed five Taiwanese fishermen for allegedly fishing in Chinese waters without a permit. They were given lengthy jail sentences which did not fit the crime and there have been several protests of the incident. He has no declared religion, is not married and his psychological profile indicates a high preference for just actions but questions authority. His skill level is considered very high and admittedly has micro-dosed DMT several times over the past few years.
Assignment Instructions
First Acknowledge the different risks associated with hiring either person and the different mitigation strategies you would have to use to lower those risk.
Next, Using 3 Pages, Answer the following Questions in a professional narrative language’
• Explain which candidate you would recommend for the position and why.
• What are the personnel and IS risks to the government of hiring a hacker?
• What is the level of risk for each Candidate and why?
• What makes this Recommended Candidate an asset and why? How could you leverage those strengths?
• What makes the Candidate a liability and why? How would you mitigate those risks?
• List 2-3 emerging security threats and how your recommended candidate would help the government address them. Be sure to use credible source that addresses the credibility of the threat.
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each bullet listed above.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

To practice your literature search and academic report writing skills, you are t

To practice your literature search and academic report writing skills, you are tasked with investigating the impact of social determinants of health and relevant programs/projects/policies across a variety of information resources.
The intent is for you to practice your research skills and to practice using the Library Resources. Each student will contribute their individual research and the team will then integrate the findings into a more comprehensive review and report.
INDIVIDUALLY, conduct a search for information, articles, and materials relevant to the SDOH. Find at least 3 sources on the specific focus (determined by your group) in relation to the Social Determinants of Health.
POST summary of the information and resource in your Team Discussion Board Address both SDOH issues and the type of information provided by the source, e.g., when and for what type of information would you access this resource to obtain. The correct APA citation for the source. Team Plan will determine if this posting also requires a Word document.
This criterion is linked to a Learning Outcome Initial Posting:
1. Provides a summary/critique of information on SDOH for 3 sources by Sep 30
2. Discusses value of each source – when and for what type of information is it useful … how and who might use
3. Provides APA reference for each source in APA format
NOTES:
– Three (3) paragraphs minimum
– Include Three Credible Sources (References & Citations)
– I have included a few articles but I will need a few better sources. I have included attachments as well.
– Three Paragraphs & One source per paragraph (citation & reference)
– Make sure to disucss the following mainpoints and provide articles as part of Neighborhood & Built Environment: Quality of housing, Access to Transportation, Avaliability of healthy foods, air & water quality, and neighborhood crime & violence.

*If the wording and sources are exactly the same, I will submit a Revision Reque

*If the wording and sources are exactly the same, I will submit a Revision Request*
DISCUSSION PART 1 CYBER VS TRADITIONAL ORGANIZED CRIME
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Answer the following questions:
• What is the first organization that pops into your head when you hear the phrase “digital organized crime.” Explain Why?
• How is this different from “organized crime”?
• How do the motivation, methods, and history of digital organized crime compare to “traditional” organized crime?
• How would these characteristics change your recommended countermeasures for each type of organization?
****Remember to only use 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: ESPIONAGE AS A SERVICE
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Answer the following questions:
What is Espionage as a Service (EaaS)?
How severe is this threat?
What are at least 3 effective and appropriate countermeasures or mitigation strategies?
How do they differentiate for public and private sector organizations as appropriate.
**** Remember to only use 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

NO extensions! DISCUSSION PART 1 DEFINING HACKING ****PLEASE USE only 137 WORDS

NO extensions!
DISCUSSION PART 1 DEFINING HACKING
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
First, consider hacking over time:
• How has the definition of hacking changed over the last 40 years, and what does this mean for hackers today?
• How have the characteristics of hackers changed over time?
Second, consider current hackers:
• Broadly speaking, what are the social characteristics and motivations of modern hackers?
• Choose one subtype, and outline 2-3 significant, unique threats that they pose
****Remember to only use 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: HACKTIVISM AND FREE ELECTRICITY
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Many hackers believe that exposing secrets that could benefit humanity is fair game. Imagine that a scientist develops a device that runs on medium size magnets and is only 6 by 3 by 4 feet in diameter. This device can provide free, clean, constant and safe electricity to any large home (5000 square feet). The scientist posts these plans on the internet, but the plans are taken down within 3 hours by the government for national security reasons.
• If a hacktivist were to re-post these plans all around the world, would you consider this a crime if the end result would benefit humanity? Why or why not?
• What criteria did you use to make your decision and why?
**** Remember to only use 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

NO extensions! I just placed an Order #LW92257 Therefore, I need a totally diffe

NO extensions!
I just placed an Order #LW92257
Therefore, I need a totally different writer for this order.
*If the wording and sources are exactly the same, I will submit a Revision Request*
DISCUSSION PART 1 DEFINING HACKING
****PLEASE USE only 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
First, consider hacking over time:
• How has the definition of hacking changed over the last 40 years, and what does this mean for hackers today?
• How have the characteristics of hackers changed over time?
Second, consider current hackers:
• Broadly speaking, what are the social characteristics and motivations of modern hackers?
• Choose one subtype, and outline 2-3 significant, unique threats that they pose
****Remember to only use 137 WORDS TO ANSWER Part 1 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***
DISCUSSION PART 2: HACKTIVISM AND FREE ELECTRICITY
****PLEASE USE only 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
ASSIGNMENT INSTRUCTION
Many hackers believe that exposing secrets that could benefit humanity is fair game. Imagine that a scientist develops a device that runs on medium size magnets and is only 6 by 3 by 4 feet in diameter. This device can provide free, clean, constant and safe electricity to any large home (5000 square feet). The scientist posts these plans on the internet, but the plans are taken down within 3 hours by the government for national security reasons.
• If a hacktivist were to re-post these plans all around the world, would you consider this a crime if the end result would benefit humanity? Why or why not?
• What criteria did you use to make your decision and why?
**** Remember to only use 137 WORDS TO ANSWER Part 2 IN A PARAGRAPH FORM****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

Case Study: Profiling Threats PURPOSE OF ASSIGNMENT This assignment will expose

Case Study: Profiling Threats
PURPOSE OF ASSIGNMENT
This assignment will expose you to current issues and gain insight into present threats to consider appropriate countermeasures. Profiling threats is a core skill for any strategic thinker in cyber security.
The Blackhat USA Conference of 2019 lists a number of different training opportunities. The following is a summary of one such training session:
Achieving Security Awareness Through Social Engineering Attacks
“Learn how to use modern social engineering attack tools and gain a better understanding of physical and network attack vectors. Classroom hands ¬on exercises will include basic open ¬source intelligence (OSINT) skill¬building, risk evaluation of humans, use of the Hak5 Pineapple to conduct WiFi-based spoofing and human attacks, and performing physical computer attacks with the Hak5 Bash Bunny. The emphasis of the class exercises, real¬ world case studies, and demonstrations is on building comprehension of attack techniques that can be used to perform pen testing and create awareness programs. Class activities will introduce students to profiling the online presence of employees and enterprises, as well as performing hands-on attacks against WiFi and physical computers”
ASSIGNMENT DESCRIPTION
Part 1:
Please use 1 pages to create a profile
Based upon what you know about hackers please create a profile of one fake individual named John Jones who would be attending the Blackhat USA Conference and would go to this training session. In your profile be sure to talk about the following assessments regarding the individual.
• Education.
• Background.
• Employment status/description.
• Political affiliation.
• Social movements or interests
• Family/relationship status.
• Activities most likely engaged in.
• List of potential hobbies.
• Social media activities.
• Music and television most likely preferred.
• Sports likely followed (if any).
• What threats does this person pose?
• What are 2 countermeasures you would propose to neutralize the more nefarious actions this person
could take?
REQUIREMENTS
Prepare 1 profile, 1 page long.
The profile should be in the form of a narrative, not a bulleted list. For the profile, address 3 unique threats and 2 unique countermeasures. Make sure you provide a rationale for your assessments of their background.
The countermeasures can be either at the organization or policy level or at the individual level. Make sure to provide a rationale for your choice of countermeasures and supply one piece of external evidence for the efficacy of your solutions.
Also, please describe how you would address the threats posed by this person if they worked for your company. Keep in mind that this person isn’t necessarily a proven or convicted hacker, but simply attended the conference.
Part 2:
Please use 2 pages to evaluate how profiling can help in the strategic planning process for public and private IS programs.
Be sure to address the following:
• Explain how to properly lead the strategic planning and management efforts of private and public sector organizations
• Explain how to evaluate and analyze emerging security issues, and threats
• Explain how to analyze and enhance personnel, and information security
****PLEASE MAKE SURE there is a well-detailed INTRODUCTION to begin the assignment and a CONCLUSION to end the assignment ****
****PLEASE BE SURE TO include at least one titled paragraph for each area.
****PLEASE BE SURE TO assign title subsections when needed****
***PLEASE MAKE SURE TO ONLY USE WEBSITE SOURCES***
***DO NOT USE BOOKS as sources for this assignment***
***DO NOT USE AI Technology for this assignment***
***If the sources are BOOKS, I will have to do a REVISION REQUEST to correct the sources to ONLINE sources***

DEAR WRITERS! BEFORE TAKING THE ORDER, CHECK INSTRUCTIONS AND MAKE SURE THAT YOU

DEAR WRITERS! BEFORE TAKING THE ORDER, CHECK INSTRUCTIONS AND MAKE SURE THAT YOU CAN COMPLETE IT.
please see the uploaded “3D Printing Stage 2” order instructions. the case study is also uploaded.
I have also included the completed stage 1 assignment for reference.

I need all 4 documents turned into 1 cohesive document. Written components of pr

I need all 4 documents turned into 1 cohesive document. Written components of projects must follow these formatting guidelines when applicable: double spacing, 12-point Times New Roman font, one-inch margins, and APA citations.
Submit a System Proposal Document. It should be a complete, polished Word document artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course.
Note that the course project intent is to introduce students to an entire systems analyst process. Each milestone is fairly significant in size if performing an actual project. For the intended learning and exposure to the course project topics, please know that assumptions will have to be made and that any such assumptions should be documented.

Complete tasks 1–4 for that mini-case and post your results. Your audience is a

Complete tasks 1–4 for that mini-case and post your results. Your audience is a systems analyst.
Victorian Creations
Victorian Creations specializes in the reproduction of furniture from the Victorian era. Recently the
company updated its payroll software as an in-house development project. Users and IT staff
members have completed comprehensive training sessions. The system has been operational for
about six weeks, and no major problems have occurred. You are responsible for the postimplementation evaluation.
Tasks
1. What are some techniques you might use to obtain an accurate evaluation?
2. What are some specific questions you would include in a questionnaire? Who should receive the
questionnaire?
3. Are there general guidelines that apply to the timing of a post-implementation evaluation? What
are they?
4. Is this the best time to schedule a post-implementation evaluation? Why or why not? Are there
other options? What are they?

test drive the user interfaces for each of the listed sites. Sample test actions

test drive the user interfaces for each of the listed sites. Sample test actions have been provided as a guide, but are not inclusive or required. Using the guidelines presented in Chapter 8, specifically outline and discuss what makes each of your selected sites a quality user interface design or an inferior user interface design for its intended purpose.
Retail and Shopping: Walmart, Amazon
Sample the action prompts below to perform on each of the websites provided above:
Find multiple items and add them to your cart in different quantities
Remove/adjust quantities
Continue shopping
Search for alternate items from the like options
Read the customer reviews