Archive for September 20th, 2019

Compare and contrast (mainly contrast) aspects of Sumerian (or Mesopotamian), Hindu, and Ancient Greek religion as conveyed in the epics.

Develop a well-detailed essay of 4-5 paragraphs on ONE of the topics listed below.  Don’t forget to review the guidelines for How to Succeed in the Written Assignments and the Sample paper in MLA format, and take advantage of the Smarthinking tutorial services before submitting your essay to the Assignment submission folder.  All writing assignments have Turnitin enabled for plagiarism detection.

 

1. In the epics, we have discussed female characters and the social power they do or do not possess.  Apart from Sita, who is the one female character you found to be either the most powerful or weakest in our study so far?  From where does she get her power and what is the extent of her influence in her culture?  Be sure to consider her character and/or actions in terms of what her culture most values.

 

2. Many of the ancient stories that we have read feature miracles, stupendous events or activities that we would normally consider beyond the reach of mortals.  Select one miracle that you found integral in one of our readings and explain not only why it is important but also what the miracle reveals about the text’s cultural values, beliefs, or customs.

 

3. Compare and contrast (mainly contrast) aspects of Sumerian (or Mesopotamian), Hindu, and Ancient Greek religion as conveyed in the epics.

 

4.  Select from one of the three epics one feature that seems most alien to our understanding or values today; detail the feature and then discuss why it seems so foreign to our modern culture.  Or select from one of the epics one feature that seems most understandable or familiar to our understanding and values today; detail the feature and then discuss why it seems so timeless or relevant to our modern culture.

 

Make sure you save time to submit your draft to Smarthinking via the Tutoring Services link for helpful feedback before the due date. 

 

Be sure to save the assignment in .doc, .docx, or PDF format.

 

 

 

 These are the 3 epics too choose from

 

  • Unit 1: Gilgamesh
  • Unit 2: Ramayana
  • Unit 3: The Odyssey

Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.

 

Scenario:

 

The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

 

Task:

 

Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

 

  • APA
  • Minimum 1 page
    • Title page
    • Abstract
    • Body (in-text citations)
    • Conclusion
    • References (3 min)

CJ 515 – CONSTITUTION AND THE JUSTICE PROCESS

*********PLEASE DO NOT COPY/ PASTE ANSWERS, IF THERE ARE SIGNS OF THIS YOU WILL RECEIVE ZERO POINTS. PLEASE DEFINE TERMS AND ANSWER QUESTIONS USING COMPLETE SENTENCES.

 

DEFINE KEY TERMS:

 

1. Child pornography

 

2. Commercial speech

 

3. Expressive conduct

 

4. Fighting words

 

5. Hate speech

 

6. Nonpublic forum

 

7. Obscenity

 

8. Panhandling

 

9. Public forum

 

10. Public forum by designation

 

11. Symbolic speech

 

12. Traditional public forum

 

13. Vulgar speech

 

ANSWER THE FOLLOWING DISCUSSION QUESTIONS:

 

1. The First Amendment concept of speech includes the right to:

 

2. Explain the case United States v. O’Brien.

 

3. Although free speech generally means freedom to speak on any subject, a small number of speech categories have been excluded from the First Amendment. List the categories.

 

4. What rules are designed to minimize the risk that constitutionally protected materials will be mistakenly seized while enforcing obscenity laws?

 

5. A person may be arrested for using “fighting words” only if the person’s language is:

 

6. A police officer arrested a woman for shoplifting. As he was taking her into custody, she snarled at him: “You f——ing son of a bitch!” Can the officer charge her with disorderly conduct for using profanity?

 

7. What is hate speech? What degree of protection—full, limited, or none—does hate speech enjoy? Can legislatures make it a crime to kill a person because of the person’s race, religion, or sexual orientation? Can legislatures provide enhanced punishments for persons who select their victims because of their race, religion, or sexual orientation?

Criminals Or Victims?

Criminals or Victims?

 

Again, looking to the paper by Walklate (2016), she cites Fattah’s (2010) paper which asks:

Is their objective to measure those criminal victimizations that meet the legal
criteria set by the criminal code, or are they meant to measure the subjective
victimizations experienced by the respondents? These, needless to say, are two
different realities. 

First, I want you to explain (in your own words) what you think Fattah (2010) meant when posing this question. More specifically who is the “THEY” that Fattah is referring to in the question and what are the two different realities that exist as referred to by Fattah?

Second, I want to tell the class if you agree or disagree with the following statement/question and why you agree or disagree. Make certain to cite relevant sources to support your argument.

 
 
 

Geopolitics And Globalization

Choose one state and one non-state actor and explain how each impacts geopolitics and globalization.

Research at least five peer-reviewed articles from academic journals, government sources, or research institutions (e.g. Rand) to form your findings.

Write a 1,050- to 1,400-word paper to include the following:

  • Identify the global challenges related to geopolitical influence
  • Compare similarities and differences of the influences based on your research
  • Determine the unique security considerations influencing globalization

Format your paper consistent with APA guidelines.

 
 
 

Why is it that statistically, there are more male criminals than female criminals?

Overview of why women in CJS part 2

 

Class,

 

For the questions below, you are refer to both the lectures and articles attached in the current modules. As with all assignments, you are to complete using Times New Roman, size 12pt font. While each response should be numbered (e.g 1, 2, etc.), all responses should be in essay format (full sentences), meaning that you should never have a simple yes or no response. 

 

QUESTIONS

 

1. Why is it that statistically, there are more male criminals than female criminals? Explain in  your own words.

 

2. Does the criminal justice system treat women unfairly? By this I mean, according to the lectures and readings thus far, is there any evidence that women are treated the same as men within the criminal justice system? Explain in detail why or why not, making certain to cite relevant research.

 

3. In the paper by Walklate (2016), what is the significance of “psychiatric victimology” and what role does it play in explaining crimes against women?

 

4. More specifically, what other term/concept is crucial to the understanding of psychiatric victimology and victimology as a whole?

 

5. In order to fully understand the “narrative” of the victim, especially since collection of victimization data continues to become more sophisticated, there are three terms that are essential to one’s analysis of the victim narrative. List and briefly describe these three (3) terms.

 

6. How and where do these victim narratives fit into the theoretical discussion presented in the lectures? More specifically, what would Smart say about these terms in reference to female punishment? What about some of the major theorists from the “sex role” side of the argument? Discuss. 

 

7. Lastly, whose side would Adler (see Adler reading) be on in the discussion of women as victims or criminals. Discuss.

Differnce Between Graduate And Undergrate Experience

How do you think your graduate educational experience will be   different from your undergraduate experience? How would you describe a   graduate learning community? What would be the key components of a   learning community and how might they be different from key   components of an undergraduate learning community? Are   communication and collaboration expectations the same in   a graduate learning community? Explain your response and provide examples.

 

The DQ response must be 150-200 words.

 

 

 

apa style and 1 reference

CMGT/400 – Threats, Attacks, And Vulnerability Assessment

Part A:

 

Select an organization you wish to explore and use throughout the course.

 

As you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments.

 

Part B:

 

A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests.

 

Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page assessment document. The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. 

 

Research and include the following:

 

  • Tangible assets:
  • Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system.
  • Asset descriptions:
  • Include a system model, A diagram and descriptions of each asset included in the assessment scope, and existing countermeasures already in place. (Microsoft® Visio® or Lucidchart®)
  • Threat agents and possible attacks
  • Exploitable vulnerabilities
  • Threat history
  • Evaluation of threats or impact of threats on the business
  • A prioritized list of identified risks
  • Countermeasures to reduce threat

 

Submit the assignment.

How you could use firewalls to support organizational security?

 Respond to the following in a minimum of 175 words: 

 

 

 

A firewall is a device that prevents unauthorized access to a host or a network either from within the corporate environment or coming from the public network, like the internet. Generally, there are two types of firewalls. A hardware firewall takes the form of a closed proprietary appliance with its own operating system. This is considered faster but a bit expensive. A software firewall is installed on a computer and it utilizes the computer’s operating system. Firewalls either hardware or software use rules to filter incoming and outgoing traffic to the network.

 

 

 

How you could use firewalls to support organizational security? What are the advantages and disadvantages of using hardware and software-based firewalls? What software tools could you use to assess the security of the firewalls used to protect your organization’s computer architecture? How can you bypass blocked sites using anonymous website surfing sites?

Theories On Women And Crime

Your task for this assignment is to create a power point document (saved as PDF) with main points and analysis of one of the theorists below.

 

Your PPT presentation should include at least 6 slides (not including title and references), with the first slide being a title page and your last page being a reference/works cited page of the work used to complete your analysis.

 

 If your last names begins with the letter A-I, then you are to complete your analysis on the first name(s).  

 

 1. Freda Adler 

 

 

 

This means, locate any resources (except Wikipedia), preferably peer-reviewed research, and synthesize the arguments of these major theorists on your ppt slides.

 

Aside from the title and reference pages, you should dedicate the others slides to the following:

 

a. one slide to the major theoretical perspective for which the author represents according to the lectures (e.g. biological)

 

b. another slide to the author’s major argument or theory 

 

c. another slide to major terms/concepts associated with their theories as they related to women and the CJS

 

d. and one slide dedicated to at least one major criticism or critique of their argument.

 

After completing all slides, you are to SAVE AS in PDF format. Just click “file” and the “save as PDF” in the drop box. Lastly, make certain that your reference page includes at least two (2) correctly formatted citations.