Proposal and Current Problem Statement

Proposal and Current Problem Statement/ Current problem or issue in homeland security, national security or intelligence studies

Proposal and Current Problem Statement
Proposal and Current Problem Statement

I need a proposal for Final research paper. So, these approximately 6 pages need to expand to 12-15 pgs. for Final paper.

Proposal and Current Problem Statement Assignment

For this assignment, you will choose a final paper topic and submit a proposal and problem statement. You may use the topic you developed in Discussion Forum #2 or select a new one. Topics must relate to a current problem or issue in homeland security, national security or

intelligence studies. Organize your paper into the following sections:

1. Topic Overview – summarize the topic and why you have selected it. Discuss why you believe it will make for a good research project and the importance of it for national security and intelligence studies.

  1. State the research problem(s) – describe it clearly and completely.
  2. State the subproblem(s) – be certain each is researchable in its own right. Keep these to a minimum.
  3. Identify the Theoretical or Conceptual Framework – Discuss the theoretical or conceptual frameworks (if applicable).
  4. State any a prior Hypotheses you might have – are you expecting to find certain kinds of results? Include a rationale for each.
  5. Identify general concepts and the variables that will be the focus of your study – independent and dependent variables.
  6. Write your assumptions – what do you assume you will find out as you conduct your research?
  7. Identify and describe the possible limitations of your study. Your essay must be a minimum of 5-7 pages. Include in-text citations and references in the APA style.

We can write this or a similar paper for you! Simply fill the order form!

Internet security/internet privacy Assignment

Internet security/internet privacy
Internet security/internet privacy

Internet security/internet privacy

A draft introduction for your paper that includes some context on your topic and your planned thesis statement/argument about your topic. A topic is general; a thesis statement is a specific argument about a topic.

At least 3 specific research sources (NOT from the textbook) sources where you will find information to support your thesis statement. A specific source is a book, an article posted at a website or a webpage containing specific information. A general website, such as census.gov is not a specific source. You should explain how each these sources will be valuable to you in supporting your argument.

An explanation of a counterargument that will be a part of your paper. This should be an explanation of how one might argue against your thesis, and your rebuttal of that counterargument.

(ALSO THE second page can just be a work cited page )

We can write this or a similar paper for you! Simply fill the order form!

Physical security methods for workstations

Physical security methods for workstations
Physical security methods for workstations

Physical security methods for workstations, servers, and network devices

Chapter7
1. Explain physical security methods for workstations, servers, and network devices
2. Implement a network topology for security
3. Explain network communications media in relation to security
4. Discuss how to train workstation users about physical security as shown on page 315 of the text.
5. Discuss the various configurations of wiring closets listed on page 321 of the text.
6. Discuss with students the structured wiring requirements listed on page 333 of the text.
7. Discuss the vertical wiring principles when planning your network as illustrated on page 335 of the text.
8. Discuss what it takes to implement a stable network topology.
9. Discuss the many reasons organizations use centralized or decentralized management.
Case Project 7-2: Expanding Workstation Security
Balsam Music is impressed by the document you created in Case Project 7-1 and they want to continue to explore ways to make user workstations more secure. The Security Steering Committee asks you to create a report that describes ways to secure workstations that go beyond configuring screen savers.
Answers to the Chapter 7 Review Questions

1. You are operating a network management station and discover that you cannot find out information about network performance at a NetWare 6.0 server. Which of the following is the best solution?
Answer:

2. The fire marshal in your city has just inspected the wiring that goes through the ceiling on the second floor of your building and says it is dangerous because the network wiring can cause toxic vapors in a fire. What is the wiring most likely to contain?
Answer:

3. You are designing the network in a building and want to use a cable that will provide speed and security for communications between floors in the building. Which of the following would be the best choice?
Answer

4. Which if the following is important when you centralize servers in a computer room? (Choose all that apply.)
Answer:

5. Which type of cable is most difficult for an intruder to tap into without causing attention to his action?
Answer:

6. In terms of security, a disadvantage of the star topology is that __________________________.
Answer:

7. You are consulting about an older thin coax network when the network goes down because of the work of an attacker. Which of the following is a likely cause of the problem?
Answer:

8. The twists in twisted-pair cable are there to __________________________________. (Choose all that apply.)
Answer:

9. On your NetWare server, someone occasionally loads NLMs that you have not authorized. The financial auditors are very concerned about this problem. Which of the following offer(s) a solution?
Answer:

10. Which of the following fit(s) the definition of a cipher lock that might be used to protect a machine room? (Choose all that apply.)
Answer:

11. In the design of a network you should plan to use which of the following? (Choose all that apply.)
Answer:

12. A department head calls you because she is working on personnel evaluations and she does not want to log off Red Hat Linux 9.x for security each time she leaves her desk for a few moments. What do you recommend?
Answer:

13. Wiring closets should follow the ___________________________ standard.
Answer:

14. When you replace a legacy cable plant, which of the following should you consider? (Choose all that apply.)
Answer:

15. Which cable is most flexible and has the tightest bending radius (providing some protection from a malicious attack)?
Answer:

16. Which parameter used with SCRSAVER in NetWare enables you to display the screen saver’s current settings?
Answer:

17. An intermediate cross-connect is ______________________________.
Answer:

18. SNMP is used with which of the following? (Choose all that apply.)
Answer: a. and d.

19. Your department is almost out of money that is budgeted for this year, and so you are installing twisted-pair cable yourself to connect several new computers to the network. Which of the following is important for you to consider? (Choose all that apply.)
Answer:

20. When you install SNMP, configure a _______________________ at the same time.
Answer:

Any assignment received after the time of the class is considered late (NO EXCUSES) and is graded with 0% off for each class it is late.

We can write this or a similar paper for you! Simply fill the order form!

Security threat groups Essay Assignment

Security threat groups
               Security threat groups

Security threat groups

In a one page paper, discuss what security threat groups are.
How do they pose a threat? What are some of approaches to managing them and are they effective?

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Homeland security and homeland defense

Homeland security and homeland defense
Homeland security and homeland defense

Homeland security and homeland defense

Topic 1: Fully describe the overall concepts of homeland security and homeland defense. Construct a response that provides the following related to both homeland security and homeland defense:

Primary missions, tasks, responsibilities, operations, etc. for:

Homeland Security and

Homeland Defense.

Highlight those areas that are shared between the two (what overlaps between HLS and HLD?)

Lastly, recommend a definition for homeland security.

Topic 2: Using the overarching themes of the National Security Strategy from 2017, provide your own recommendation for new National Strategy for Counterterrorism (it must be nested under the NSS according to the principle of strategic hierarchy). What key elements and focus areas would you suggest for the part of a new CT strategy that is domestic focused (homeland security, not overseas), and make sure to use the Ends, Ways, and Means strategy framework.

We can write this or a similar paper for you! Simply fill the order form!

Port Security Assignment paper available

Port Security Assignment
Port Security Assignment

Port Security Assignment

Port Security Assignment

The topic for your research paper can be anything pertaining to port security, the security of the maritime transportation system, threats to maritime critical infrastructure (including cyber or piracy) or ways that risk can be quantified within a port. You are to prepare your formal graduate research paper in a word document (Times New Roman, Font 12) using APA format. Your research paper should be 10-12 pages of content excluding your title page and reference list page. A minimum of 10 outside references, 6 of which MUST be peer-reviewed is required.

Prepare your final draft for submission to include at a minimum the following components:

Introduction, Research Study Question, and Hypothesis (1-2 pages): This section shall provide an overview of the topic that you are writing about, a concise synopsis of the issues, and why the topic presents an area of study suitable for graduate study. Critical to this section is your hypothesis which should conclude the introduction section.

Literature Review (4-6 pages): All research projects include a literature review to inform the reader what knowledge exists on the subject under study and helps the researcher develop the research strategy to use in the study. A good literature review is a thoughtful study of what has been written, a summary of the arguments that exist (whether you agree with them or not), and are arranged thematically. The literature review is not an annotated bibliography and should be written in coherent narrative style, grouped by subject area which provides a synthesis of the body of knowledge. At the end of the Literature Review summary, there should still be gaps in the literature that you intend to fill with your research.

Methodology (1-2 pages): This section provides the reader with a description of your research methodology. It is not enough to simply state that you are using “qualitative” methods. I want to know the SPECIFIC type of method employed….Case Study? ACH? etc. If you have any questions regarding this section seek additional reference support from the library. Constructing a solid academically rigorous methodology section will enhance the skills you will need to execute a successful thesis.

Analysis (2-3 pages): This section is not simply a summary of the references you developed nor is it the same as conclusions. In the analysis component of this section you identify how you analyzed the data.

The second part is the finding what you obtained from your analysis of the data. The findings are the facts that you developed, not your interpretation of the facts. These actions are at the very core of graduate level research that interpretation is conducted in the conclusions and recommendations section of the paper. Findings will come from the prior research you examined and your analysis of those prior findings to create new findings for your paper. While there may be some facts that are such that they will stand and translate to your paper, the intent is to create new knowledge, so you will normally analyze the data to create your own findings of what facts that data represents.

Conclusions and Recommendations (2-3 pages): This section is where you give your interpretation of the data. Here you tell the reader what the findings mean. Often the conclusions and recommendations sections will mirror the findings in construct as the researcher tells the reader what that researcher sees as the meaning of that data – their conclusions. Then, drawing on those conclusions, the researcher tells the reader what they believe needs to be done to solve/answer the research question. This section may include recognition of any needs for further research and then finishes with a traditional conclusion to the paper as a whole.

References: This section will contain all references, cited in APA format and alphabetically arranged. Your paper must contain a minimum of 10 reference sources with at least 6 of them being peer-reviewed journals or products of Think Tanks such as RAND, Brookings, CATO, or Heritage. Title this section as reference following the parenthetical and reference citation format style within APA. You should be compiling sources and adding to them as you gone along throughout the semester. They should be error free!!!

Technical Requirements:

Length: 10-12 pages double spaced, 1″ margins, 12 pitch type in Times New Roman font left justified format.

Citations/References: You must use APA parenthetical style for this assignment. A minimum of 10 outside references, 6 of which MUST be peer-reviewed is required.

We can write this or a similar paper for you! Simply fill the order form!

Growth and Contribution of Private Security Industry

Growth and Contribution of Private Security Industry Reflect on the growth and contribution of the private security industry to the contemporary policing landscape.

Growth and Contribution of Private Security Industry
Growth and Contribution of Private Security Industry

Private security is an indispensable cog in the American machinery of justice. The previous commentary outlines the Herculean contributions made by the industry in the protection of social and economic order. Even private security’s harshest, most strident critics realize that without the services of private security, a gaping, colossal protection vacuum would exist in the distribution of justice, the protection of assets and facilities, and related services. Public policing alone simply cannot fend off the escalating criminality or solely assure the integrity of the community and governmental infrastructures. 

Common Security Policies Assignment

Common Security Policies
              Common Security Policies

Common Security Policies

Use the Internet to research common policies that organizations typically implement.

Develop a corporate policy of your own that outlines the requirements of users on the network and provides punitive actions that will be taken against employees who misuse their account privileges or create a security risk that allows unauthorized access on the network. Submit this as a typical policy-type document which could be circulated in your organization and not in APA format.

Then write at least a two page paper in current APA format that breaks your policy down into separate points or actions and explain the reasoning behind each one.

We can write this or a similar paper for you! Simply fill the order form!

Cybersecurity and Risk Management Essay

Cybersecurity and Risk Management
   Cybersecurity and Risk Management

Cybersecurity and Risk Management

consider your organization or another organization that has been affected by a cyber-attack. Briefly describe the organization, and then answer the following questions:

  • What type of cyber-attack occurred?
  • How did the organization respond to the attack?
  • What were the impacts (or potential impacts) to the business?
  • What were the costs associated with the attack? If you do not have actual numbers, what types of costs were likely involved?
  • What did the organization do to mitigate the risk of future attacks? Did the organization change its processes or procedures?
  • As a business manager, what are some additional recommendations you would make to the organization, from a business perspective, to better defend itself in the future? What steps can the business take to better support the IT (information technology) department’s security efforts? Explain.

We can write this or a similar paper for you! Simply fill the order form!

Quantum Mechanics Research Assignment

Quantum Mechanics
Quantum Mechanics

Quantum Mechanics

Outline the major features of quantum mechanics and how they are applied to various fields.

Instructions

In a two-page paper, research three examples of technologies that use quantum mechanics. Explain, in your own words, how these applications impact society.

If you or someone you know has ever had an MRI scan for a medical diagnosis, you have experienced the result of quantum physics for measuring bodily structures. Finally, provide another specific example from your own life that could be influenced by these applications.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!