SlideShare a Scribd company logo
5556125:WhiteHLSS154Midterm
.docx
by freddie white
Submission date: 29-Dec-2019 11:12PM (UTC-0500)
Submission ID: 1238710603
File name: ts_19cc6eb3-d0fb-4ae3-83df-
c962e85bf185_WhiteHLSS154Midterm.docx (43.3K)
Word count: 1134
Character count: 6192
57%
SIMILARITY INDEX
3%
INTERNET SOURCES
2%
PUBLICATIONS
57%
STUDENT PAPERS
5556125:WhiteHLSS154Midterm.docx
ORIGINALITY REPORT
MATCH ALL SOURCES (ONLY SELECTED SOURCE
PRINTED)
59%
Submitted to American Public University System
Student Paper
31%
Submitted to American Public University System on 2015-02-22
31%
Submitted to American Public University System on 2016-05-26
26%
Submitted to American Public University System on 2016-10-31
22%
Submitted to American Public University System on 2018-10-22
19%
Submitted to American Public University System on 2015-11-02
19%
Submitted to American Public University System on 2018-01-01
6%
Submitted to American Public University System on 2017-07-03
4%
Submitted to American Public University System on 2015-04-26
4%
Submitted to American Public University System on 2015-11-26
4%
Submitted to American Public University System on 2016-03-27
4%
Submitted to American Public University System on 2016-05-29
4%
Submitted to American Public University System on 2019-09-01
4%
Submitted to American Public University System on 2016-10-02
3%
Submitted to American Public University System on 2016-03-27
3%
Submitted to American Public University System on 2017-06-24
3%
Submitted to American Public University System on 2015-12-22
3%
Submitted to American Public University System on 2018-10-29
3%
Submitted to American Public University System on 2018-09-30
3%
Submitted to American Public University System on 2016-08-28
3%
Submitted to American Public University System on 2016-03-28
3%
Submitted to American Public University System on 2016-06-21
3%
Submitted to American Public University System on 2015-02-01
3%
Submitted to American Public University System on 2016-01-31
3%
Submitted to American Public University System on 2017-05-01
2%
Submitted to American Public University System on 2018-04-01
2%
Submitted to American Public University System on 2016-12-04
2%
Submitted to American Public University System on 2016-01-31
2%
Submitted to American Public University System on 2016-01-03
2%
Submitted to American Public University System on 2015-07-26
1%
Submitted to American Public University System on 2015-11-24
1%
Submitted to American Public University System on 2016-05-01
1%
Submitted to American Public University System on 2016-04-30
1%
Submitted to American Public University System on 2015-11-01
1%
Submitted to American Public University System on 2015-11-29
1%
Submitted to American Public University System on 2015-03-24
1%
Submitted to American Public University System on 2016-07-31
Exclude quotes Off
Exclude bibliography Off
Exclude matches Off
5556125:WhiteHLSS154Midterm.docx
PAGE 1
Missing "," Review the rules for using punctuation marks.
PAGE 2
Article Error You may need to use an article before this word.
PAGE 3
P/V You have used the passive voice in this sentence. You may
want to revise it using the active voice.
Prep. You may be using the wrong preposition.
S/V This subject and verb may not agree. Proofread the
sentence to make sure the subject agrees with
the verb.
P/V You have used the passive voice in this sentence. You may
want to revise it using the active voice.
PAGE 4
Article Error You may need to remove this article.
Sp. This word is misspelled. Use a dictionary or spellchecker
when you proofread your work.
P/V You have used the passive voice in this sentence. You may
want to revise it using the active voice.
Verb This verb may be incorrect. Proofread the sentence to
make sure you have used the correct form
of the verb.
P/V You have used the passive voice in this sentence. You may
want to revise it using the active voice.
Article Error You may need to use an article before this word.
PAGE 5
P/V You have used the passive voice in this sentence. You may
want to revise it using the active voice.
Run-on This sentence may be a run-on sentence.
Missing "," Review the rules for using punctuation marks.
Article Error You may need to remove this article.
PAGE 6
Missing "," Review the rules for using punctuation marks.
PAGE 7
5556125:WhiteHLSS154Midterm.docxby freddie
white5556125:WhiteHLSS154Midterm.docxORIGINALITY
REPORTMATCH ALL SOURCES (ONLY SELECTED
SOURCE PRINTED)5556125:WhiteHLSS154Midterm.docx
Running Head: CLOUD FORENSICS 2
CLOUD FORENSICS 2
Cloud Forensics:
Name:
Institution:
Date:
CLOUD FORENSICS
The current trend of the ever-increasing dependency on cloud
computing indicates that despite the lack of immediate need for
the utilization of cloud forensics’ features, future dependence is
to a great extent guaranteed (Pichan et al, 2015). Cloud
computing is at its natal stages of development, though the
possibility of exponential extrapolation is imminent and
therefore the need for development of an appropriate cloud
forensics systems to cater for the cloud computing needs when
they arise (Chen et al, 2019). The significance of security in
computing and associated systems is of utter importance to the
success of these undertakings. It is as a result of the noticeable
opportunities existent in the field of cloud forensics that makes
it of great importance. The existing opportunities in the cloud
forensics include, the abundance of data available and
continuously being availed for the development of the system as
well as the possibility for further and greater cost optimization
(Alex et al, 2017). It is due to these parameters that cloud
forensics is considered important going forward in the field of
computing and ultimately humanity.
References
Alex, M. E., & Kishore, R. (2017). Forensics framework for
cloud computing. Computers & Electrical Engineering, 60, 193-
205. Retrieved from:
http://isiarticles.com/bundles/Article/pre/pdf/155769.pdf
Chen, L., Takabi, H., & Le-Khac, N. A. (Eds.).
(2019). Security, Privacy, and Digital Forensics in the Cloud.
John Wiley & Sons. Retrieved from: https://www.wiley.com/en-
us/Security%2C+Privacy%2C+and+Digital+Forensics+in+the+C
loud-p-9781119053286
Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud
forensics: Technical challenges, solutions and comparative
analysis. Digital investigation, 13, 38-57. Retrieved from:
https://espace.curtin.edu.au/handle/20.500.11937/33937
CLOUD FORENSICS
Security measures
Definition
The forensics is the application of digital forensics science in
the cloud computing environment. technically, it consist of
hybrid different approaches for the generation of digital
evidence. It involves interactions among the clouds for
facilitation among internal and external investigation. It is
considered as legal implication of the tenant situation.
cloud computing
The delivery of cloud computing as service opposed to the
product with the three types:
Saas (Software as a services)
Paas (Platform as a services)
Iaas (Infrastructure as a services)
Importance of cloud
The significance of security in computing and associated
systems is of utter importance to the success of these
undertakings. It is as a result of the noticeable opportunities
existent in the field of cloud forensics that makes it of great
importance. It is very important in
Social media
Communications
Traditional route
Identification
Collection
Organization
Presentation
Opportunities
The existing opportunities in the cloud forensics include,
The abundance of data available and continuously being availed
for the development of the system.
Possibility for further and greater cost optimization
CONFLICT IN CLOUD
CLOUD
Location independence
Rapid elasticity
FORENSIC
Discovery of computable jurisdiction
Data reliability
Multi-tasking
General abstract
Data structure
Evidence preservation data integrity
Chain of custody
Chain of attributes
CHALLENGES FACE BY CLOUD
There are different challenges faced by the cloud forensics such
as:
Storage system is no more local
Every cloud server contains files from different users.
Even if the data relates to a specific identification, separating it
from other users data is considered as more difficult.
Other than corporate social responsibility there are no usual
evidence which relates to the specific data files.
Healthcare, business, or any other security which relates to the
data.
Running head: FACTORS PSYCHOLOGICAL AND
BEHAVIORS OF TERRORISM 1
FACTORS PSYCHOLOGICAL AND BEHAVIORS OF
TERRORISM 8FACTORS OF PSYCHOLOGY AND
BEHAVIORS OF TERRORISM
Freddie White
American Military University
Abstract
The very being of terrorism and the configuration of terrorists
themselves are a forever changing evolving subject of
inquisition throughout the globe. Also, during this assignment,
the behavioral and psychological factors of terrorism are one of
the things that will be described. I will mainly be focusing on
the suicide bomber by the name of Asmar Latin Sani, the culprit
behind the 2003 Marriott Hotel bombing. Finally, a brief
discussion of the psychological and behavioral factors of
terrorist organizations will be discussed.
FACTORS OF PSYCHOLOGY AND BEHAVIORS OF
TERRORISM
It is a common mistake to believe that all supporters and
members of terror acts start out portraying an active role as the
ones who are generally mentioned by the media. Most start as
just supporters of the Muslim/Islamic movement for the fight
against the Christian superpower, also known as the western
world.
The convergence of terrorists can range from individuals such
as doctors to university professors to the local mailman. A lot
of things can be aforementioned for the psychological and
behavioral factors of terrorism. Definitely, one thing that cannot
be argued is that terrorism brings thoughts of trepidation to
many individuals. As acknowledged before, “The West,” with
the hope of strengthening Muslim’s influence and power around
the globe, It is said that to understand such member falls into
two categories, that is the "committed actor" and the
"sympathizer."
You may find yourself asking why individuals suffer from fear
at the sounds and sights of terrorism; this process is called
psychological behavior. A few of the ways how terrorist and
terrorism enroot the psychological behavior of dread in the
psyche of individuals is in fostering a sense of being exposed
and unredeemable, in showing the sheer incompetence of the
authorities or law, destroying a sense of safety and defense, and
in inciting abnormal reactions from people and authorities.
Terrorists and individuals claiming to be terrorists are also
affected by psychological behavior, and Osama Bin Laden made
a point to voice his words in saying that in the terrorist group
itself, the constituents suffered from a psychological mindset of
defeat.
The study of psychological behavior is commonly brought on or
brings on another component called behavioral psychology. “It
is rather difficult to study the prevalence of psychopathology
and
maladaptive personality traits in terrorist populations.”( Borum)
Behavioral psychology is stated as to how people retort to a
psychological element. In the paragraph above, some examples
were discussed in how terrorists and terrorism inculcate the
psychological behavior of fearfulness. After a terrorist attack,
other than fear, a few behavioral, psychological factors are that
the people take themselves from some of their usual vocations
while becoming angered, or becoming indisposed. The fear that
terrorism instills, as well as these other behavioral,
psychological factors, helps with how terrorists communicate
and recruit, especially in how a terrorist organization spreads its
ideology and gets its message across to society.
Impatient adolescent recruits who do not retain an in-depth
understanding of Islam and Islamic views and see their aged
leaders as idle men who are not interested in Jihad any more are
easily manipulated; this is especially true for individuals such
as Asmar Latin Sani. The base causes of systematic terror
attacks and extremist movements are backwardness, unfairness,
illiteracy, poverty, inequality in politics and tutilage, and the
perversion of religious instructions.
In most cases, individuals are motivated to enlist into a terrorist
organization by an appetency to use their distinct skills, such as
bomb-making and ordnance handling. Indifference, articulate
individuals, join terrorist groups in an attempt to express their
religious or political views to call for change. Also, people
released from being incarcerated may resort to joining a
terrorist organization. This was hearsay about some of the
prisoners released at Guantanamo Bay.
Even though there are different reasons for joining a terrorist
organization, the result of this continuous methodology is that
the individual eventually joins a terrorist group. Too often,
when terrorism is talked about, it is often thought of as been
carried out only by men, but too often, women are left out.
Countless women play an essential role in terrorism. The
ultimate recognized course of approach to terrorism for female
terrorists is through political extremism. An abundance of
juvenile Iraqi women was radicalized by Al Queda and later end
up joining various terrorist groups and carrying out terror
attacks.
In terms of the psychology of defeat, it is a choice utilized by
top terrorist organizers who chose to utilize psychology as a
way of conquering our nation due to an absence of conventional
artillery. They believe that if they could ruin our nation from
the inside, that we would leave the Islamic nations. They
calculated that we, as a nation, would psychologically flee from
the dreadfulness they were inflicting on us. Al Queada's attempt
to destroy the United States of America is an example of how
they wanted to overmatch our nation psychologically. They
figured by doing so would expose our vulnerabilities by
conquering our infrastructure and murdering unjustly. As a
result, we would be involuntarily forced to retaliate against
them in their nation, and he would then look to annihilate us.
They figured they would then cause us to leave his nation as the
Russians did, broke and defeated. Once we as a nation had
experienced the atrociousness of battle in Afghanistan, they
believed that we, too, would depart in defeat—again, just as
they had seen in Somalia, and just as they believed it happened
in that Asian country, we dare not speak of. In their psyche,
they felt that their side was based on brawny moral principles
and Islamic beliefs. Their objective was not to dominate our
armed forces but rather to decimate our nations psychologically.
There is no absolute answer as to why people commit terror
attacks. There are many reasons for their decisions; nonetheless,
psychologists and scientists have started to recognize specific
customs for them committing terror attacks based on religious
or political beliefs, lack of character, or a feeling of belonging.
Understanding the psychological behavior of terrorism and the
behaviors associated with it may help prevent future terror
attacks like the one that occurred on September 11th.
Furthermore, in order for extremists to proceed with their cause
and increase recruitment, they may turn to various electronic
media social systems to promote their cause. We need to use
social media to our advantage against the terrorist. Forthcoming
psychological analysis of terrorism may shed light on
psychological paradigms on individual desires to commit
terrorist attacks based on several political and religious
convictions.
References
Boram, R. M. (2004). Psychology of terrorism. Pages 29 - 30.
Horgan, J. (2008). Pathways and Roots to Routes.
Victoroff, J (2005). The Mind of the Terrorist
Akhtar, S. 1999. The psychodynamic dimension of terrorism.
Psychiatric Annals 29:350-355.

More Related Content

Similar to 5556125WhiteHLSS154Midterm.docxby freddie whiteSubmis.docx

2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
- Mark - Fullbright
 
All About Phishing Exploring User Research Through A Systematic Literature R...
All About Phishing  Exploring User Research Through A Systematic Literature R...All About Phishing  Exploring User Research Through A Systematic Literature R...
All About Phishing Exploring User Research Through A Systematic Literature R...
Gina Rizzo
 
Cybercrime Investigation Methods Prior to beginning work on this assignment.docx
Cybercrime Investigation Methods Prior to beginning work on this assignment.docxCybercrime Investigation Methods Prior to beginning work on this assignment.docx
Cybercrime Investigation Methods Prior to beginning work on this assignment.docx
write5
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx
blondellchancy
 
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docxAssignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
astonrenna
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
jeffsrosalyn
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
stirlingvwriters
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
Nature And Its Beauty Essays - Internetup
Nature And Its Beauty Essays - InternetupNature And Its Beauty Essays - Internetup
Nature And Its Beauty Essays - Internetup
Nora Hernandez
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
infantsuk
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
stilliegeorgiana
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALJoseph White MPA CPM
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
marilucorr
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsNumaan Huq
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsThomas Hughes
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
jeanettehully
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
sleeperharwell
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211

Similar to 5556125WhiteHLSS154Midterm.docxby freddie whiteSubmis.docx (20)

2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
All About Phishing Exploring User Research Through A Systematic Literature R...
All About Phishing  Exploring User Research Through A Systematic Literature R...All About Phishing  Exploring User Research Through A Systematic Literature R...
All About Phishing Exploring User Research Through A Systematic Literature R...
 
Cybercrime Investigation Methods Prior to beginning work on this assignment.docx
Cybercrime Investigation Methods Prior to beginning work on this assignment.docxCybercrime Investigation Methods Prior to beginning work on this assignment.docx
Cybercrime Investigation Methods Prior to beginning work on this assignment.docx
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx
 
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docxAssignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
Assignment 2 Web Application Attack ScenarioDue Week 8 and worth .docx
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docxSafeAssign Originality ReportSummer 2019 - Security Architecture.docx
SafeAssign Originality ReportSummer 2019 - Security Architecture.docx
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Nature And Its Beauty Essays - Internetup
Nature And Its Beauty Essays - InternetupNature And Its Beauty Essays - Internetup
Nature And Its Beauty Essays - Internetup
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
 
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docxPLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
PLAGIARISM SCAN REPORTDate 2020-03-16Words 369Char.docx
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 

More from blondellchancy

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
blondellchancy
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
blondellchancy
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
blondellchancy
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
blondellchancy
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
blondellchancy
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
blondellchancy
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
blondellchancy
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
blondellchancy
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
blondellchancy
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
blondellchancy
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
blondellchancy
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
blondellchancy
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
blondellchancy
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
blondellchancy
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
blondellchancy
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
blondellchancy
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
blondellchancy
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
blondellchancy
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
blondellchancy
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
blondellchancy
 

More from blondellchancy (20)

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
 

Recently uploaded

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

5556125WhiteHLSS154Midterm.docxby freddie whiteSubmis.docx

  • 1. 5556125:WhiteHLSS154Midterm .docx by freddie white Submission date: 29-Dec-2019 11:12PM (UTC-0500) Submission ID: 1238710603 File name: ts_19cc6eb3-d0fb-4ae3-83df- c962e85bf185_WhiteHLSS154Midterm.docx (43.3K) Word count: 1134 Character count: 6192 57% SIMILARITY INDEX 3% INTERNET SOURCES
  • 2. 2% PUBLICATIONS 57% STUDENT PAPERS 5556125:WhiteHLSS154Midterm.docx ORIGINALITY REPORT MATCH ALL SOURCES (ONLY SELECTED SOURCE PRINTED) 59% Submitted to American Public University System Student Paper 31% Submitted to American Public University System on 2015-02-22 31% Submitted to American Public University System on 2016-05-26 26% Submitted to American Public University System on 2016-10-31 22% Submitted to American Public University System on 2018-10-22 19% Submitted to American Public University System on 2015-11-02 19% Submitted to American Public University System on 2018-01-01
  • 3. 6% Submitted to American Public University System on 2017-07-03 4% Submitted to American Public University System on 2015-04-26 4% Submitted to American Public University System on 2015-11-26 4% Submitted to American Public University System on 2016-03-27 4% Submitted to American Public University System on 2016-05-29 4% Submitted to American Public University System on 2019-09-01 4% Submitted to American Public University System on 2016-10-02 3% Submitted to American Public University System on 2016-03-27 3% Submitted to American Public University System on 2017-06-24 3% Submitted to American Public University System on 2015-12-22 3% Submitted to American Public University System on 2018-10-29
  • 4. 3% Submitted to American Public University System on 2018-09-30 3% Submitted to American Public University System on 2016-08-28 3% Submitted to American Public University System on 2016-03-28 3% Submitted to American Public University System on 2016-06-21 3% Submitted to American Public University System on 2015-02-01 3% Submitted to American Public University System on 2016-01-31 3% Submitted to American Public University System on 2017-05-01 2% Submitted to American Public University System on 2018-04-01 2% Submitted to American Public University System on 2016-12-04 2% Submitted to American Public University System on 2016-01-31 2% Submitted to American Public University System on 2016-01-03
  • 5. 2% Submitted to American Public University System on 2015-07-26 1% Submitted to American Public University System on 2015-11-24 1% Submitted to American Public University System on 2016-05-01 1% Submitted to American Public University System on 2016-04-30 1% Submitted to American Public University System on 2015-11-01 1% Submitted to American Public University System on 2015-11-29 1% Submitted to American Public University System on 2015-03-24 1% Submitted to American Public University System on 2016-07-31 Exclude quotes Off Exclude bibliography Off Exclude matches Off 5556125:WhiteHLSS154Midterm.docx PAGE 1
  • 6. Missing "," Review the rules for using punctuation marks. PAGE 2 Article Error You may need to use an article before this word. PAGE 3 P/V You have used the passive voice in this sentence. You may want to revise it using the active voice. Prep. You may be using the wrong preposition. S/V This subject and verb may not agree. Proofread the sentence to make sure the subject agrees with the verb. P/V You have used the passive voice in this sentence. You may want to revise it using the active voice. PAGE 4 Article Error You may need to remove this article. Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work. P/V You have used the passive voice in this sentence. You may want to revise it using the active voice. Verb This verb may be incorrect. Proofread the sentence to make sure you have used the correct form of the verb. P/V You have used the passive voice in this sentence. You may
  • 7. want to revise it using the active voice. Article Error You may need to use an article before this word. PAGE 5 P/V You have used the passive voice in this sentence. You may want to revise it using the active voice. Run-on This sentence may be a run-on sentence. Missing "," Review the rules for using punctuation marks. Article Error You may need to remove this article. PAGE 6 Missing "," Review the rules for using punctuation marks. PAGE 7 5556125:WhiteHLSS154Midterm.docxby freddie white5556125:WhiteHLSS154Midterm.docxORIGINALITY REPORTMATCH ALL SOURCES (ONLY SELECTED SOURCE PRINTED)5556125:WhiteHLSS154Midterm.docx Running Head: CLOUD FORENSICS 2 CLOUD FORENSICS 2 Cloud Forensics: Name: Institution: Date:
  • 8. CLOUD FORENSICS The current trend of the ever-increasing dependency on cloud computing indicates that despite the lack of immediate need for the utilization of cloud forensics’ features, future dependence is to a great extent guaranteed (Pichan et al, 2015). Cloud computing is at its natal stages of development, though the possibility of exponential extrapolation is imminent and therefore the need for development of an appropriate cloud forensics systems to cater for the cloud computing needs when they arise (Chen et al, 2019). The significance of security in computing and associated systems is of utter importance to the success of these undertakings. It is as a result of the noticeable opportunities existent in the field of cloud forensics that makes it of great importance. The existing opportunities in the cloud forensics include, the abundance of data available and continuously being availed for the development of the system as well as the possibility for further and greater cost optimization (Alex et al, 2017). It is due to these parameters that cloud forensics is considered important going forward in the field of computing and ultimately humanity. References Alex, M. E., & Kishore, R. (2017). Forensics framework for cloud computing. Computers & Electrical Engineering, 60, 193- 205. Retrieved from: http://isiarticles.com/bundles/Article/pre/pdf/155769.pdf Chen, L., Takabi, H., & Le-Khac, N. A. (Eds.). (2019). Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons. Retrieved from: https://www.wiley.com/en- us/Security%2C+Privacy%2C+and+Digital+Forensics+in+the+C loud-p-9781119053286 Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital investigation, 13, 38-57. Retrieved from: https://espace.curtin.edu.au/handle/20.500.11937/33937
  • 9. CLOUD FORENSICS Security measures Definition The forensics is the application of digital forensics science in the cloud computing environment. technically, it consist of hybrid different approaches for the generation of digital evidence. It involves interactions among the clouds for facilitation among internal and external investigation. It is considered as legal implication of the tenant situation. cloud computing The delivery of cloud computing as service opposed to the product with the three types: Saas (Software as a services) Paas (Platform as a services) Iaas (Infrastructure as a services) Importance of cloud The significance of security in computing and associated systems is of utter importance to the success of these undertakings. It is as a result of the noticeable opportunities existent in the field of cloud forensics that makes it of great importance. It is very important in Social media Communications Traditional route Identification
  • 10. Collection Organization Presentation Opportunities The existing opportunities in the cloud forensics include, The abundance of data available and continuously being availed for the development of the system. Possibility for further and greater cost optimization CONFLICT IN CLOUD CLOUD Location independence Rapid elasticity FORENSIC Discovery of computable jurisdiction Data reliability Multi-tasking General abstract Data structure
  • 11. Evidence preservation data integrity Chain of custody Chain of attributes CHALLENGES FACE BY CLOUD There are different challenges faced by the cloud forensics such as: Storage system is no more local Every cloud server contains files from different users. Even if the data relates to a specific identification, separating it from other users data is considered as more difficult. Other than corporate social responsibility there are no usual evidence which relates to the specific data files. Healthcare, business, or any other security which relates to the data. Running head: FACTORS PSYCHOLOGICAL AND BEHAVIORS OF TERRORISM 1 FACTORS PSYCHOLOGICAL AND BEHAVIORS OF TERRORISM 8FACTORS OF PSYCHOLOGY AND BEHAVIORS OF TERRORISM Freddie White American Military University
  • 12. Abstract The very being of terrorism and the configuration of terrorists themselves are a forever changing evolving subject of inquisition throughout the globe. Also, during this assignment, the behavioral and psychological factors of terrorism are one of the things that will be described. I will mainly be focusing on the suicide bomber by the name of Asmar Latin Sani, the culprit behind the 2003 Marriott Hotel bombing. Finally, a brief discussion of the psychological and behavioral factors of terrorist organizations will be discussed. FACTORS OF PSYCHOLOGY AND BEHAVIORS OF TERRORISM It is a common mistake to believe that all supporters and members of terror acts start out portraying an active role as the ones who are generally mentioned by the media. Most start as just supporters of the Muslim/Islamic movement for the fight against the Christian superpower, also known as the western world. The convergence of terrorists can range from individuals such as doctors to university professors to the local mailman. A lot of things can be aforementioned for the psychological and behavioral factors of terrorism. Definitely, one thing that cannot be argued is that terrorism brings thoughts of trepidation to many individuals. As acknowledged before, “The West,” with the hope of strengthening Muslim’s influence and power around the globe, It is said that to understand such member falls into two categories, that is the "committed actor" and the "sympathizer." You may find yourself asking why individuals suffer from fear at the sounds and sights of terrorism; this process is called psychological behavior. A few of the ways how terrorist and terrorism enroot the psychological behavior of dread in the psyche of individuals is in fostering a sense of being exposed and unredeemable, in showing the sheer incompetence of the
  • 13. authorities or law, destroying a sense of safety and defense, and in inciting abnormal reactions from people and authorities. Terrorists and individuals claiming to be terrorists are also affected by psychological behavior, and Osama Bin Laden made a point to voice his words in saying that in the terrorist group itself, the constituents suffered from a psychological mindset of defeat. The study of psychological behavior is commonly brought on or brings on another component called behavioral psychology. “It is rather difficult to study the prevalence of psychopathology and maladaptive personality traits in terrorist populations.”( Borum) Behavioral psychology is stated as to how people retort to a psychological element. In the paragraph above, some examples were discussed in how terrorists and terrorism inculcate the psychological behavior of fearfulness. After a terrorist attack, other than fear, a few behavioral, psychological factors are that the people take themselves from some of their usual vocations while becoming angered, or becoming indisposed. The fear that terrorism instills, as well as these other behavioral, psychological factors, helps with how terrorists communicate and recruit, especially in how a terrorist organization spreads its ideology and gets its message across to society. Impatient adolescent recruits who do not retain an in-depth understanding of Islam and Islamic views and see their aged leaders as idle men who are not interested in Jihad any more are easily manipulated; this is especially true for individuals such as Asmar Latin Sani. The base causes of systematic terror attacks and extremist movements are backwardness, unfairness, illiteracy, poverty, inequality in politics and tutilage, and the perversion of religious instructions. In most cases, individuals are motivated to enlist into a terrorist organization by an appetency to use their distinct skills, such as bomb-making and ordnance handling. Indifference, articulate individuals, join terrorist groups in an attempt to express their religious or political views to call for change. Also, people
  • 14. released from being incarcerated may resort to joining a terrorist organization. This was hearsay about some of the prisoners released at Guantanamo Bay. Even though there are different reasons for joining a terrorist organization, the result of this continuous methodology is that the individual eventually joins a terrorist group. Too often, when terrorism is talked about, it is often thought of as been carried out only by men, but too often, women are left out. Countless women play an essential role in terrorism. The ultimate recognized course of approach to terrorism for female terrorists is through political extremism. An abundance of juvenile Iraqi women was radicalized by Al Queda and later end up joining various terrorist groups and carrying out terror attacks. In terms of the psychology of defeat, it is a choice utilized by top terrorist organizers who chose to utilize psychology as a way of conquering our nation due to an absence of conventional artillery. They believe that if they could ruin our nation from the inside, that we would leave the Islamic nations. They calculated that we, as a nation, would psychologically flee from the dreadfulness they were inflicting on us. Al Queada's attempt to destroy the United States of America is an example of how they wanted to overmatch our nation psychologically. They figured by doing so would expose our vulnerabilities by conquering our infrastructure and murdering unjustly. As a result, we would be involuntarily forced to retaliate against them in their nation, and he would then look to annihilate us. They figured they would then cause us to leave his nation as the Russians did, broke and defeated. Once we as a nation had experienced the atrociousness of battle in Afghanistan, they believed that we, too, would depart in defeat—again, just as they had seen in Somalia, and just as they believed it happened in that Asian country, we dare not speak of. In their psyche, they felt that their side was based on brawny moral principles and Islamic beliefs. Their objective was not to dominate our armed forces but rather to decimate our nations psychologically.
  • 15. There is no absolute answer as to why people commit terror attacks. There are many reasons for their decisions; nonetheless, psychologists and scientists have started to recognize specific customs for them committing terror attacks based on religious or political beliefs, lack of character, or a feeling of belonging. Understanding the psychological behavior of terrorism and the behaviors associated with it may help prevent future terror attacks like the one that occurred on September 11th. Furthermore, in order for extremists to proceed with their cause and increase recruitment, they may turn to various electronic media social systems to promote their cause. We need to use social media to our advantage against the terrorist. Forthcoming psychological analysis of terrorism may shed light on psychological paradigms on individual desires to commit terrorist attacks based on several political and religious convictions. References Boram, R. M. (2004). Psychology of terrorism. Pages 29 - 30. Horgan, J. (2008). Pathways and Roots to Routes. Victoroff, J (2005). The Mind of the Terrorist Akhtar, S. 1999. The psychodynamic dimension of terrorism. Psychiatric Annals 29:350-355.