System: Defense Travel System (DTS)
Style Guide: APA Format
Minimum of 2 endnotes per page count
Minimum of 2 references per page count
10 or 12 font, Times New Roman, 1 inch margins, double spaced.
Develop an analysis of the security of a cyber-system (DTS) utilizing the 1st five SANS Critical Security Controls methodology. During this research project we will perform a security analysis of the Defense Travel System (DTS) by utilizing the SANS first 5 Critical Security Controls methodology. Below is the list of controls that will be covered.
1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
4. Continuous Vulnerability Assessment and Remediation
5. Malware Defenses
System Overview
DTS provides web-based, automated commercial and government temporary duty (TDY) travel support services to DoD agencies and military services. DTS is a network of interconnected systems that provide the necessary interfaces, data processing and storage, and security services to support secure automated TDY travel services. DTS uses a JAVA applet called the “DBsign Universal Web Signer (UWS)” for logging in to the system as well as signing documents. In order to install and run this applet, it is important that your JAVA installation is up-to-date. The DoD Public Key Infrastructure/Enabling (PKI) certificate is normally located in the chip on your Common Access Card (CAC). This certificate is used by the DBsign UWS applet mentioned above to verify your identity and authority to use DTS. Because of this, a CAC reader is required to access DTS. DTS is used by approximately 165,000 DoD personnel each weekday.
DTS supports the entire range of DoD travel activities, including:
• Travel planning
• Interfacing with travelers, Authorizing Officials (AOs), and Defense Travel Administrators (DTAs)
• Maintaining travel data, including receipts
• Monitoring the status of the travel process
• Enforcing compliance with DoD travel policies
• Supporting digital signature capability
• Performing financial computation and accounting
• Providing electronic interfaces to external automated systems
• Archiving official travel documents in accordance with regulatory and statutory requirements
DTS is web-based and travelers use the system to generate travel authorizations, make trip reservations, and route travel requests for approval, from anywhere that internet access is available. Users access the system via the DTS Web Portal.
1. A parent who helps a child learn how to tie his shoe by showing the child the process and reminding the child of the steps each time the child tries to tie the shoe himself is using: ––––Piaget’s concept of egocentric thought.
––––Vygotsky’s concept of zone of proximal development
–––Gelman’s theory of demonstration.
–––Piaget’s concept of transformation. ...
System Defense Travel System (DTS)Style Guide APA Forma.docx
1. System: Defense Travel System (DTS)
Style Guide: APA Format
spaced.
Develop an analysis of the security of a cyber-system (DTS)
utilizing the 1st five SANS Critical Security Controls
methodology. During this research project we will perform a
security analysis of the Defense Travel System (DTS) by
utilizing the SANS first 5 Critical Security Controls
methodology. Below is the list of controls that will be covered.
1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software on Mobile
Devices, Laptops, Workstations, and Servers
4. Continuous Vulnerability Assessment and Remediation
5. Malware Defenses
2. System Overview
DTS provides web-based, automated commercial and
government temporary duty (TDY) travel support services to
DoD agencies and military services. DTS is a network of
interconnected systems that provide the necessary interfaces,
data processing and storage, and security services to support
secure automated TDY travel services. DTS uses a JAVA applet
called the “DBsign Universal Web Signer (UWS)” for logging
in to the system as well as signing documents. In order to install
and run this applet, it is important that your JAVA installation
is up-to-date. The DoD Public Key Infrastructure/Enabling
(PKI) certificate is normally located in the chip on your
Common Access Card (CAC). This certificate is used by the
DBsign UWS applet mentioned above to verify your identity
and authority to use DTS. Because of this, a CAC reader is
required to access DTS. DTS is used by approximately 165,000
DoD personnel each weekday.
DTS supports the entire range of DoD travel activities,
including:
• Travel planning
• Interfacing with travelers, Authorizing Officials (AOs),
and Defense Travel Administrators (DTAs)
• Maintaining travel data, including receipts
• Monitoring the status of the travel process
• Enforcing compliance with DoD travel policies
• Supporting digital signature capability
• Performing financial computation and accounting
• Providing electronic interfaces to external automated
systems
• Archiving official travel documents in accordance with
regulatory and statutory requirements
DTS is web-based and travelers use the system to generate
travel authorizations, make trip reservations, and route travel
requests for approval, from anywhere that internet access is
available. Users access the system via the DTS Web Portal.
3. 1. A parent who helps a child learn how to tie his shoe by
showing the child the process and reminding the child of the
steps each time the child tries to tie the shoe himself is using: –
–––Piaget’s concept of egocentric thought.
––––Vygotsky’s concept of zone of proximal
development
–––Gelman’s theory of demonstration.
–––Piaget’s concept of transformation.
2. Preschool children develop a sense of themselves through: ––
– transformation, conservation, and identification.
––– gender schemas, functional play, and
identification.
––– self-perception, their parents' behaviors, and
society.
––– self-perception, functional play, and
transformation.
3. Most four year olds who view the picture below would
incorrectly state that the top pencil is longer than the bottom
pencil. This is because:
–– preschoolers have not mastered the concept of
centration.
––– preschoolers have not mastered the concept of
transformation.
–– preschoolers have not mastered the concept of
intuitive thought.
–– preschoolers have not mastered the concept of
conservatism.
4. 4. Younger preschooler's reasons for relationships are based
on:
–– play, fun, and trust.
–– fun, parental influence, and trust.
–– companionship, parental influence, and play
–– companionship, play, and fun.
5. One difference between Piaget's theory of development and
the information process approach is __________.
–––– the information process approach believes that cognitive
skills progress in a continuous manner, while Piaget's theory is
set with distinct stages.
–––– Piaget theory asserts that children have an innate ability to
count and developmentalists believe that preschooler's thinking
regarding numbers is skewed.
–––– the information process approach explains cognitive
learning as a process of transformation, while Piaget's theory
asserts learning is based on a series of scripts.
–––– Piaget believed that children have a comprehensive
capability of cognitive learning at a very early age, while
developmentalists believe preschoolers do not have cognitive
capabilities.
Your response should be at least 75 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
6. Discuss the role lateralization plays in brain growth. Include
5. in your discussion the roles gender and culture play in
lateralization.
7. According to Feldman (2011, p. 244), “gender schemas are
developed early in life and serve as a lens through which
preschoolers view the world.” In your opinion, should
preschoolers be encouraged to be androgynous (develop
characteristics thought typical of both sexes), or encouraged to
develop characteristics specific to their own gender? Use
examples from your own experience to support your belief.
Support your belief and examples with a reference from a
scholarly source.
9. ”How reliable is a child’s testimony in the courtroom?" This
is a question brought up by researchers in an area of
developmental psychology know as forensic developmental
psychology. Explain why preschoolers should or should not be
allowed to testify in a courtroom. What theories of development
support your answer?
10. Describe a specific example you’ve seen in your
observations of how a sense of self is developed as a
preschooler moves out of Erickson’s autonomy-versus shame
and doubt stage into the initiative versus guilt stage.
11. Describe the different styles of parenting found in Western
Culture. Explain with your own examples how these styles
effect the social and personality development of preschoolers.
Your response should be at least 200 words in length. You are
required to use at least your textbook as source material for
your response. All sources used, including the textbook, must
be referenced; paraphrased and quoted material must have
accompanying citations.
12. Feldman (2011) discusses three different theories used to
6. explain cognitive development: Piaget’s Stage of Preoperational
Thinking, Information Processing Approach, and Vygotsky’s
Social Leaning Theory. Choose a theory and discuss why you
believe it best describes the developmental cognitive process of
preschoolers.