SlideShare a Scribd company logo
1 of 8
Due 12 10 2016
Week 10 Term Paper
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric
Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor
Center.
Term Paper: Penetration Testing
Due Week 10 and worth 120 points
As a penetration tester, you are hired as a consultant by a small-
to mid-sized business that is interested in calculating its overall
security risk today, January 1, 2012. The business specializes in
providing private loans to college students. This business uses
both an e-Commerce site and point-of-sales devices (credit card
swipes) to collect payment. Also, there exist a number of file
transfer operations where sensitive and confidential data is
transferred to and from several external partnering companies.
The typical volume of payment transactions totals is
approximately $100 million. You decide that the risk
assessments are to take into account the entire network of
workstations, VoIP phone sets, servers, routers, switches and
other networking gear. During your interview with one of the
business’s IT staff members, you are told that many external
vendors want to sell security networking products and software
solutions. The staff member also claimed that their network was
too “flat.” During the initial onsite visit, you captured the
following pertinent data to use in creation of the Penetration
Test Plan.
· Non-stateful packet firewall separates the business’s internal
network from its DMZ.
· All departments--including Finance, Marketing, Development,
and IT--connect into the same enterprise switch and are
therefore on the same LAN. Senior management (CEO, CIO,
President, etc.) and the Help Desk are not on that LAN; they are
connected via a common Ethernet hub and then to the switched
LAN.
· All of the workstations used by employees are either Windows
98 or Windows XP. None of the workstations have service
packs or updates beyond service pack one.
· Two (2) Web servers containing customer portals for logging
in and ordering products exist on the DMZ running Windows
2000 Server SP1, and IIS v5.
· One (1) internal server containing Active Directory (AD)
services to authenticate users, a DB where all data for the
company is stored (i.e. HR, financial, product design, customer,
transactions). The AD server is using LM instead of NTLM.
Write a six to eight (6-8) page paper in which you:
1. Explain the tests you would run and the reason(s) for running
them (e.g. to support the risk assessment plan).
2. Determine the expected results from tests and research based
on the specific informational details provided. (i.e., IIS v5,
Windows Server 2000, AD server not using NTLM)
3. Analyze the software tools you would use for your
investigation and reasons for choosing them.
4. Describe the legal requirements and ethical issues involved.
5. Using Visio or its open source alternative, provide a diagram
of how you would redesign this business’ network. Include a
description of your drawing. Note: The graphically depicted
solution is not included in the required page length.
6. Propose your final recommendations and reporting. Explain
what risks exist and ways to either eliminate or reduce the risk.
7. Use at least three (3) quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
· Perform vulnerability analysis as well as external and internal
penetration testing.
· Demonstrate the ability to describe and perform penetration
tests on communication media to include wireless networks,
VoIPs, VPNs, Bluetooth and handheld devices.
· Use technology and information resources to research issues in
penetration testing tools and techniques.
· Write clearly and concisely about Network Penetration Testing
topics using proper writing mechanics and technical style
conventions.
Click here to view the grading rubric for this assignment.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 120
Term Paper: Penetration Testing
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain the tests you would run and the reason(s) for running
them (e.g. to support the risk assessment plan).
Weight 10%
Did not submit or incompletely explained the tests you would
run and the reason(s) for running them (e.g. to support the risk
assessment plan).
Insufficiently explained the tests you would run and the
reason(s) for running them (e.g. to support the risk assessment
plan).
Partially explained the tests you would run and the reason(s) for
running them (e.g. to support the risk assessment plan).
Satisfactorily explained the tests you would run and the
reason(s) for running them (e.g. to support the risk assessment
plan).
Thoroughly explained the tests you would run and the reason(s)
for running them (e.g. to support the risk assessment plan).
2. Determine the expected results from tests and research based
on the specific informational details provided.
Weight: 10%
Did not submit or incompletely determined the expected results
from tests and research based on the specific informational
details provided.
Insufficiently determined the expected results from tests and
research based on the specific informational details provided.
Partially determined the expected results from tests and
research based on the specific informational details provided.
Satisfactorily determined the expected results from tests and
research based on the specific informational details provided.
Thoroughly determined the expected results from tests and
research based on the specific informational details provided.
3. Analyze the software tools you would use for your
investigation and reasons for choosing them.
Weight: 15%
Did not submit or incompletely analyzed the software tools you
would use for your investigation and reasons for choosing them.
Insufficiently analyzed the software tools you would use for
your investigation and reasons for choosing them.
Partially analyzed the software tools you would use for your
investigation and reasons for choosing them.
Satisfactorily analyzed the software tools you would use for
your investigation and reasons for choosing them.
Thoroughly analyzed the software tools you would use for your
investigation and reasons for choosing them.
4. Describe the legal requirements and ethical issues involved.
Weight: 15%
Did not submit or incompletely described the legal
requirements; did not submit or incompletely described ethical
issues involved.
Insufficiently described the legal requirements; insufficiently
described ethical issues involved.
Partially described the legal requirements; partially described
ethical issues involved.
Satisfactorily described the legal requirements; satisfactorily
described ethical issues involved.
Thoroughly described the legal requirements; thoroughly
described ethical issues involved.
5. Using Visio or its open source alternative, provide a diagram
of how you would redesign this business’ network. Include a
description of your drawing.
Weight: 20%
Did not submit or incompletely provided a diagram of how you
would redesign this business’ network using Visio or its open
source alternative. Did not submit or incompletely included a
description of your drawing.
Insufficiently provided a diagram of how you would redesign
this business’ network using Visio or its open source
alternative. Insufficiently included a description of your
drawing.
Partially provided a diagram of how you would redesign this
business’ network using Visio or its open source alternative.
Partially included a description of your drawing.
Satisfactorily provided a diagram of how you would redesign
this business’ network using Visio or its open source
alternative. Satisfactorily included a description of your
drawing.
Thoroughly provided a diagram of how you would redesign this
business’ network using Visio or its open source alternative.
Thoroughly included a description of your drawing.
6. Propose your final recommendations and reporting. Explain
what risks exist and ways to either eliminate or reduce the risk.
Weight: 15%
Did not submit or incompletely proposed your final
recommendations and reporting. Did not submit or
incompletely explained what risks exist and ways to either
eliminate or reduce the risk.
Insufficiently proposed your final recommendations and
reporting. Insufficiently explained what risks exist and ways to
either eliminate or reduce the risk.
Partially proposed your final recommendations and reporting.
Partially explained what risks exist and ways to either eliminate
or reduce the risk.
Satisfactorily proposed your final recommendations and
reporting. Satisfactorily explained what risks exist and ways to
either eliminate or reduce the risk.
Thoroughly proposed your final recommendations and
reporting. Thoroughly explained what risks exist and ways to
either eliminate or reduce the risk.
7. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
8. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present
For family therapy:
Write a paper in which you develop a diagnosis and an
alternative/rule-out diagnosis as indicated in the instructions
below.
This assignment starts by reading the Wikipedia articles about
Howard Hughes. Then, watch the recommended movie: The
Aviator. After watching the film, write a case analysis with
potential treatment options for Howard Hughes.
Specifically, develop a diagnosis and an alternative/rule-out
diagnosis. Substantiate each diagnosis and the rationale for
ruling out the alternative with evidence from the patient’s life.
Then, based on the primary diagnosis, describe at least four
different treatment options and evaluate them against each other
by comparing and contrasting the effectiveness and drawbacks
of each.
The four options that you have to include are: a)
psychopharmacological treatments, b) psychological treatments,
c) family therapy based treatments, and d) biomedical
treatments.
The content of this assignment will be evaluated for each of the
following components:
Your written support for primary and rule-out diagnoses
Discussion of a psychopharmacological treatment
Discussion of a psychological treatment
Discussion of a family therapy based treatment
Discussion of a biomedical treatment

More Related Content

Similar to Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx

Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxdannies7qbuggie
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxssuser562afc1
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxbfingarjcmc
 
Internet basic of it20
Internet basic of it20Internet basic of it20
Internet basic of it20rosu555
 
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxProject Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxanitramcroberts
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxIlonaThornburg83
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxbfingarjcmc
 
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxAssignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxfredharris32
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingNetsparker
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentAaravSunak
 
Points 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxPoints 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxharrisonhoward80223
 
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxAssignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxhoward4little59962
 
Formative Guidelines and Rubric.htmlCompetencyIn this proj
Formative Guidelines and Rubric.htmlCompetencyIn this projFormative Guidelines and Rubric.htmlCompetencyIn this proj
Formative Guidelines and Rubric.htmlCompetencyIn this projJeanmarieColbert3
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxrosemariebrayshaw
 
Hide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxHide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxsimonithomas47935
 
Scanned by CamScannerTechnical Writing Week V Asses.docx
Scanned by CamScannerTechnical Writing Week V Asses.docxScanned by CamScannerTechnical Writing Week V Asses.docx
Scanned by CamScannerTechnical Writing Week V Asses.docxkenjordan97598
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxbagotjesusa
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comchrysanthemu49
 

Similar to Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx (20)

Week 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docxWeek 10 Term Paper SubmissionClick the link above to submit your a.docx
Week 10 Term Paper SubmissionClick the link above to submit your a.docx
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Internet basic of it20
Internet basic of it20Internet basic of it20
Internet basic of it20
 
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxProject Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
 
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxAssignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure Assignment
 
Points 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxPoints 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docx
 
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxAssignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
 
Formative Guidelines and Rubric.htmlCompetencyIn this proj
Formative Guidelines and Rubric.htmlCompetencyIn this projFormative Guidelines and Rubric.htmlCompetencyIn this proj
Formative Guidelines and Rubric.htmlCompetencyIn this proj
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
Hide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docxHide Assignment InformationTurnitin®This assignment will be subm.docx
Hide Assignment InformationTurnitin®This assignment will be subm.docx
 
Scanned by CamScannerTechnical Writing Week V Asses.docx
Scanned by CamScannerTechnical Writing Week V Asses.docxScanned by CamScannerTechnical Writing Week V Asses.docx
Scanned by CamScannerTechnical Writing Week V Asses.docx
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 

More from sagarlesley

Eating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docx
Eating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docxEating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docx
Eating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docxsagarlesley
 
Earning Your Place in the Investment WorldThe CFA Program.docx
Earning Your Place in the Investment WorldThe CFA Program.docxEarning Your Place in the Investment WorldThe CFA Program.docx
Earning Your Place in the Investment WorldThe CFA Program.docxsagarlesley
 
Earned value management is only as good as the supporting systems .docx
Earned value management is only as good as the supporting systems .docxEarned value management is only as good as the supporting systems .docx
Earned value management is only as good as the supporting systems .docxsagarlesley
 
Early World Literature4 VIRTUE Page 4.2 The Buddha’s Birth.docx
Early World Literature4 VIRTUE  Page 4.2 The Buddha’s Birth.docxEarly World Literature4 VIRTUE  Page 4.2 The Buddha’s Birth.docx
Early World Literature4 VIRTUE Page 4.2 The Buddha’s Birth.docxsagarlesley
 
Early Warning Memo for the United States Governmen.docx
Early Warning Memo for the United States Governmen.docxEarly Warning Memo for the United States Governmen.docx
Early Warning Memo for the United States Governmen.docxsagarlesley
 
Early Learning Center PortfolioSPED 293C Assignment Outline.docx
Early Learning Center PortfolioSPED 293C Assignment Outline.docxEarly Learning Center PortfolioSPED 293C Assignment Outline.docx
Early Learning Center PortfolioSPED 293C Assignment Outline.docxsagarlesley
 
Early Intervention Research Paper CriteriaExemplary Proficie.docx
Early Intervention Research Paper CriteriaExemplary Proficie.docxEarly Intervention Research Paper CriteriaExemplary Proficie.docx
Early Intervention Research Paper CriteriaExemplary Proficie.docxsagarlesley
 
EARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docxEARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docxsagarlesley
 
Earned Value AnalysisTracking Project ProgressWh.docx
Earned Value AnalysisTracking Project ProgressWh.docxEarned Value AnalysisTracking Project ProgressWh.docx
Earned Value AnalysisTracking Project ProgressWh.docxsagarlesley
 
EARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docxEARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docxsagarlesley
 
Eastman Kodak CompanyHaley Duell5122016.docx
Eastman Kodak CompanyHaley Duell5122016.docxEastman Kodak CompanyHaley Duell5122016.docx
Eastman Kodak CompanyHaley Duell5122016.docxsagarlesley
 
Earth Systems Engineering and ManagementCEE 400Week 5.docx
Earth Systems Engineering and ManagementCEE 400Week 5.docxEarth Systems Engineering and ManagementCEE 400Week 5.docx
Earth Systems Engineering and ManagementCEE 400Week 5.docxsagarlesley
 
EASY Note CardsStudents need an easy” way to keep their stu.docx
EASY Note CardsStudents need an easy” way to keep their stu.docxEASY Note CardsStudents need an easy” way to keep their stu.docx
EASY Note CardsStudents need an easy” way to keep their stu.docxsagarlesley
 
Earthquake Activity San Francisco AreaComplete the activity o.docx
Earthquake Activity San Francisco AreaComplete the activity o.docxEarthquake Activity San Francisco AreaComplete the activity o.docx
Earthquake Activity San Francisco AreaComplete the activity o.docxsagarlesley
 
EARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docx
EARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docxEARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docx
EARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docxsagarlesley
 
Earthquake PreparednessWork individually and in groups t.docx
Earthquake PreparednessWork individually and in groups t.docxEarthquake PreparednessWork individually and in groups t.docx
Earthquake PreparednessWork individually and in groups t.docxsagarlesley
 
Early Head Start Relationships Associationwith Program Outc.docx
Early Head Start Relationships Associationwith Program Outc.docxEarly Head Start Relationships Associationwith Program Outc.docx
Early Head Start Relationships Associationwith Program Outc.docxsagarlesley
 
Each [art is its own paper and should be written as such- its o.docx
Each [art is its own paper and should be written as such- its o.docxEach [art is its own paper and should be written as such- its o.docx
Each [art is its own paper and should be written as such- its o.docxsagarlesley
 
Early Adopters Who needs Those…As technology spreads faster and.docx
Early Adopters Who needs Those…As technology spreads faster and.docxEarly Adopters Who needs Those…As technology spreads faster and.docx
Early Adopters Who needs Those…As technology spreads faster and.docxsagarlesley
 
Each topic should be summarized in your own words; why it was impo.docx
Each topic should be summarized in your own words; why it was impo.docxEach topic should be summarized in your own words; why it was impo.docx
Each topic should be summarized in your own words; why it was impo.docxsagarlesley
 

More from sagarlesley (20)

Eating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docx
Eating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docxEating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docx
Eating DisordersTOPIC OVERVIEWAnorexia NervosaThe Clinic.docx
 
Earning Your Place in the Investment WorldThe CFA Program.docx
Earning Your Place in the Investment WorldThe CFA Program.docxEarning Your Place in the Investment WorldThe CFA Program.docx
Earning Your Place in the Investment WorldThe CFA Program.docx
 
Earned value management is only as good as the supporting systems .docx
Earned value management is only as good as the supporting systems .docxEarned value management is only as good as the supporting systems .docx
Earned value management is only as good as the supporting systems .docx
 
Early World Literature4 VIRTUE Page 4.2 The Buddha’s Birth.docx
Early World Literature4 VIRTUE  Page 4.2 The Buddha’s Birth.docxEarly World Literature4 VIRTUE  Page 4.2 The Buddha’s Birth.docx
Early World Literature4 VIRTUE Page 4.2 The Buddha’s Birth.docx
 
Early Warning Memo for the United States Governmen.docx
Early Warning Memo for the United States Governmen.docxEarly Warning Memo for the United States Governmen.docx
Early Warning Memo for the United States Governmen.docx
 
Early Learning Center PortfolioSPED 293C Assignment Outline.docx
Early Learning Center PortfolioSPED 293C Assignment Outline.docxEarly Learning Center PortfolioSPED 293C Assignment Outline.docx
Early Learning Center PortfolioSPED 293C Assignment Outline.docx
 
Early Intervention Research Paper CriteriaExemplary Proficie.docx
Early Intervention Research Paper CriteriaExemplary Proficie.docxEarly Intervention Research Paper CriteriaExemplary Proficie.docx
Early Intervention Research Paper CriteriaExemplary Proficie.docx
 
EARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docxEARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA4Early immigrant in Mi.docx
 
Earned Value AnalysisTracking Project ProgressWh.docx
Earned Value AnalysisTracking Project ProgressWh.docxEarned Value AnalysisTracking Project ProgressWh.docx
Earned Value AnalysisTracking Project ProgressWh.docx
 
EARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docxEARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docx
EARLY IMMIGRANT IN MINNESOTA2Early immigrant in Mi.docx
 
Eastman Kodak CompanyHaley Duell5122016.docx
Eastman Kodak CompanyHaley Duell5122016.docxEastman Kodak CompanyHaley Duell5122016.docx
Eastman Kodak CompanyHaley Duell5122016.docx
 
Earth Systems Engineering and ManagementCEE 400Week 5.docx
Earth Systems Engineering and ManagementCEE 400Week 5.docxEarth Systems Engineering and ManagementCEE 400Week 5.docx
Earth Systems Engineering and ManagementCEE 400Week 5.docx
 
EASY Note CardsStudents need an easy” way to keep their stu.docx
EASY Note CardsStudents need an easy” way to keep their stu.docxEASY Note CardsStudents need an easy” way to keep their stu.docx
EASY Note CardsStudents need an easy” way to keep their stu.docx
 
Earthquake Activity San Francisco AreaComplete the activity o.docx
Earthquake Activity San Francisco AreaComplete the activity o.docxEarthquake Activity San Francisco AreaComplete the activity o.docx
Earthquake Activity San Francisco AreaComplete the activity o.docx
 
EARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docx
EARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docxEARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docx
EARLY IMMIGRANT IN MINNESOTA10Early immigrant in M.docx
 
Earthquake PreparednessWork individually and in groups t.docx
Earthquake PreparednessWork individually and in groups t.docxEarthquake PreparednessWork individually and in groups t.docx
Earthquake PreparednessWork individually and in groups t.docx
 
Early Head Start Relationships Associationwith Program Outc.docx
Early Head Start Relationships Associationwith Program Outc.docxEarly Head Start Relationships Associationwith Program Outc.docx
Early Head Start Relationships Associationwith Program Outc.docx
 
Each [art is its own paper and should be written as such- its o.docx
Each [art is its own paper and should be written as such- its o.docxEach [art is its own paper and should be written as such- its o.docx
Each [art is its own paper and should be written as such- its o.docx
 
Early Adopters Who needs Those…As technology spreads faster and.docx
Early Adopters Who needs Those…As technology spreads faster and.docxEarly Adopters Who needs Those…As technology spreads faster and.docx
Early Adopters Who needs Those…As technology spreads faster and.docx
 
Each topic should be summarized in your own words; why it was impo.docx
Each topic should be summarized in your own words; why it was impo.docxEach topic should be summarized in your own words; why it was impo.docx
Each topic should be summarized in your own words; why it was impo.docx
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx

  • 1. Due 12 10 2016 Week 10 Term Paper Click the link above to submit your assignment. Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. Instructors, training on how to grade is within the Instructor Center. Term Paper: Penetration Testing Due Week 10 and worth 120 points As a penetration tester, you are hired as a consultant by a small- to mid-sized business that is interested in calculating its overall security risk today, January 1, 2012. The business specializes in providing private loans to college students. This business uses both an e-Commerce site and point-of-sales devices (credit card swipes) to collect payment. Also, there exist a number of file transfer operations where sensitive and confidential data is transferred to and from several external partnering companies. The typical volume of payment transactions totals is approximately $100 million. You decide that the risk assessments are to take into account the entire network of workstations, VoIP phone sets, servers, routers, switches and other networking gear. During your interview with one of the business’s IT staff members, you are told that many external vendors want to sell security networking products and software solutions. The staff member also claimed that their network was too “flat.” During the initial onsite visit, you captured the following pertinent data to use in creation of the Penetration Test Plan. · Non-stateful packet firewall separates the business’s internal network from its DMZ. · All departments--including Finance, Marketing, Development, and IT--connect into the same enterprise switch and are therefore on the same LAN. Senior management (CEO, CIO,
  • 2. President, etc.) and the Help Desk are not on that LAN; they are connected via a common Ethernet hub and then to the switched LAN. · All of the workstations used by employees are either Windows 98 or Windows XP. None of the workstations have service packs or updates beyond service pack one. · Two (2) Web servers containing customer portals for logging in and ordering products exist on the DMZ running Windows 2000 Server SP1, and IIS v5. · One (1) internal server containing Active Directory (AD) services to authenticate users, a DB where all data for the company is stored (i.e. HR, financial, product design, customer, transactions). The AD server is using LM instead of NTLM. Write a six to eight (6-8) page paper in which you: 1. Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). 2. Determine the expected results from tests and research based on the specific informational details provided. (i.e., IIS v5, Windows Server 2000, AD server not using NTLM) 3. Analyze the software tools you would use for your investigation and reasons for choosing them. 4. Describe the legal requirements and ethical issues involved. 5. Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing. Note: The graphically depicted solution is not included in the required page length. 6. Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk. 7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references
  • 3. must follow APA or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: · Perform vulnerability analysis as well as external and internal penetration testing. · Demonstrate the ability to describe and perform penetration tests on communication media to include wireless networks, VoIPs, VPNs, Bluetooth and handheld devices. · Use technology and information resources to research issues in penetration testing tools and techniques. · Write clearly and concisely about Network Penetration Testing topics using proper writing mechanics and technical style conventions. Click here to view the grading rubric for this assignment. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 120 Term Paper: Penetration Testing Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair
  • 4. 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Weight 10% Did not submit or incompletely explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Insufficiently explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Partially explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Satisfactorily explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). Thoroughly explained the tests you would run and the reason(s) for running them (e.g. to support the risk assessment plan). 2. Determine the expected results from tests and research based on the specific informational details provided. Weight: 10% Did not submit or incompletely determined the expected results from tests and research based on the specific informational details provided. Insufficiently determined the expected results from tests and research based on the specific informational details provided. Partially determined the expected results from tests and research based on the specific informational details provided. Satisfactorily determined the expected results from tests and research based on the specific informational details provided. Thoroughly determined the expected results from tests and
  • 5. research based on the specific informational details provided. 3. Analyze the software tools you would use for your investigation and reasons for choosing them. Weight: 15% Did not submit or incompletely analyzed the software tools you would use for your investigation and reasons for choosing them. Insufficiently analyzed the software tools you would use for your investigation and reasons for choosing them. Partially analyzed the software tools you would use for your investigation and reasons for choosing them. Satisfactorily analyzed the software tools you would use for your investigation and reasons for choosing them. Thoroughly analyzed the software tools you would use for your investigation and reasons for choosing them. 4. Describe the legal requirements and ethical issues involved. Weight: 15% Did not submit or incompletely described the legal requirements; did not submit or incompletely described ethical issues involved. Insufficiently described the legal requirements; insufficiently described ethical issues involved. Partially described the legal requirements; partially described ethical issues involved. Satisfactorily described the legal requirements; satisfactorily described ethical issues involved. Thoroughly described the legal requirements; thoroughly described ethical issues involved. 5. Using Visio or its open source alternative, provide a diagram of how you would redesign this business’ network. Include a description of your drawing. Weight: 20% Did not submit or incompletely provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Did not submit or incompletely included a description of your drawing. Insufficiently provided a diagram of how you would redesign
  • 6. this business’ network using Visio or its open source alternative. Insufficiently included a description of your drawing. Partially provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Partially included a description of your drawing. Satisfactorily provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Satisfactorily included a description of your drawing. Thoroughly provided a diagram of how you would redesign this business’ network using Visio or its open source alternative. Thoroughly included a description of your drawing. 6. Propose your final recommendations and reporting. Explain what risks exist and ways to either eliminate or reduce the risk. Weight: 15% Did not submit or incompletely proposed your final recommendations and reporting. Did not submit or incompletely explained what risks exist and ways to either eliminate or reduce the risk. Insufficiently proposed your final recommendations and reporting. Insufficiently explained what risks exist and ways to either eliminate or reduce the risk. Partially proposed your final recommendations and reporting. Partially explained what risks exist and ways to either eliminate or reduce the risk. Satisfactorily proposed your final recommendations and reporting. Satisfactorily explained what risks exist and ways to either eliminate or reduce the risk. Thoroughly proposed your final recommendations and reporting. Thoroughly explained what risks exist and ways to either eliminate or reduce the risk. 7. 3 references Weight: 5% No references provided Does not meet the required number of references; all references
  • 7. poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 8. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present For family therapy: Write a paper in which you develop a diagnosis and an alternative/rule-out diagnosis as indicated in the instructions below. This assignment starts by reading the Wikipedia articles about Howard Hughes. Then, watch the recommended movie: The Aviator. After watching the film, write a case analysis with potential treatment options for Howard Hughes. Specifically, develop a diagnosis and an alternative/rule-out diagnosis. Substantiate each diagnosis and the rationale for ruling out the alternative with evidence from the patient’s life. Then, based on the primary diagnosis, describe at least four different treatment options and evaluate them against each other by comparing and contrasting the effectiveness and drawbacks
  • 8. of each. The four options that you have to include are: a) psychopharmacological treatments, b) psychological treatments, c) family therapy based treatments, and d) biomedical treatments. The content of this assignment will be evaluated for each of the following components: Your written support for primary and rule-out diagnoses Discussion of a psychopharmacological treatment Discussion of a psychological treatment Discussion of a family therapy based treatment Discussion of a biomedical treatment