1RUNNING HEAD: MANAGING HOST BASED SECURITY IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin permission so as to access the programs and get to know how it is commanded to the action it should peform. Also, to use a virtual box one should have knowledge in how to operate the virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are found in the control panel.
2. The application is used only when you login your system as an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from https://dougvitale.wordpress.com/2011/11/18/microsoft-baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from https://www.winhelp.us/configure-windows-defender-in-windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form of malware by running in the background of the computer system and gives notification if any suspicious item is found in the syatem for the user to take action. It can also be used by a computer to scan the system if the system has issues e.g becomes slow, switches off when not commanded to, hanging among other things. Windows defender should be updated over time so that it is not outdated and also to improve its performance.
Windows defender is found in the control panel icon, steps of opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page appears
a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown below
d) For quick results check the button just before you click on scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on advance
Then check the box just before removing any removable drivers and click save
b. Procedure to configure Windows Firewall for Windows 8.1
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects against suspicious items, It helps in blocking suspicious programs .
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
Lab #2: Managing Host Based Security
Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Objectives
1. Develop systems administration procedures to configure and manage host-based security capabilities (firewall and anti-virus/anti-malware).
2. Develop systems management procedures to scan for and remediate software and configuration vulnerabilities in Windows 8.1 systems.
Overview
In this lab, our focus is upon implementing and managing host-based security for Windows 8.1 systems using the following tools:
· Windows Defender
· Windows Firewall
· Microsoft Baseline Security Analyzer (MBSA)
Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can be found using Windows Search (Windows Key + R).
For each tool, you will research and then write a step-by-step procedure to configure the tool according to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of an overall information security vulnerability management business process.
You will write three separate procedures for this lab:
(a) Managing Windows Defender
(b) Managing Windows Firewall
(c) Managing Vulnerabilities using Microsoft Baseline Security Analyzer
Each procedure will have the following major sections (see Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g. Scanning for Threats) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for running scans using Windows Defender….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
InstructionsPart (a): Managing Windows Defender
1. Investigate the use of Windows Defender to protect a Windows 8/8.1 system against viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using host-based anti-malware software.
2. Develop step by step procedures to implement best practices for protecting a Windows 8/8.1 system from malware. At a minimum, your procedures must accomplish the following:
a. Update anti-virus definition files
b. Configure real-time scanning
c. Full system scanning
d. Fast or quick scan for high vulnerability areas of the system
e. Removable media scanning
f. Reviewing scan results including reviewi ...
A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxDIPESH30
Lab Deliverable for Lab nYour NameDate
Title: Creating, Using, Removing System Restore Points for Windows 8.1Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware
3. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
1
2
· Week 4 Discussion
· Discussion response - your response to the discussion question should be between 150 - 300 words.
· Must provide a minimum of at least one (1) reference in your discussion.
Discussion Topic
Updated
Discuss ONE of the following: (Try not replicate other’s answers)
e) What is an installment loan?
Make sure you are properly citing your source(s) and providing your reference(s) for information you obtain from another source.
· Week 4 Lecture (embedded below)
· Code of Federal Regulations (eCFR). TITLE 42 Chapter IV Centers for Medicare & Medicaid Services, U.S. Department of Health & Human Services Subchapter G. Standards and Certification.
http://www.ecfr.gov/cgi-bin/text-idx?c=ecfr&tpl=/ecfrbrowse/Title42/42cfr483_main_02.tpl
· NCSL. (2009). Certificate of Need Programs by State and Service. The National Conference of State Legislatures, Denver CO.
· http://www.ncsl.org/issues-research/health/con-certificate-of-need-state-laws.aspx#Regulated
· Healthcare accreditation systems: further perspectives on performance measures http://intqhc.oxfordjournals.org/content/23/6/645.full
· Week 4 Discussion
Discussion Topic
Updated
Please address all three questions:
Article 1.....Regulations for Long Term Care Facilities.
A. Identify by name and location and research a Long Term Care Facility that had a regulatory deficiency.
-What was the deficiency?
-How was the deficiency addressed by the facility?
-Were there any penalties involved?
Article 2, CON
A. From the map choose a state that has CON regulations.
B. From that state, identify a hospital/ health system that had project review by CON.
C. Describe the project and the outcome of the CON process.
Article 3, Accreditation,
A. Joint Commission on the Accreditation of Healthcare Organizations (JCAHO)....define their m ...
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
Lab #2: Managing Host Based Security
Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Objectives
1. Develop systems administration procedures to configure and manage host-based security capabilities (firewall and anti-virus/anti-malware).
2. Develop systems management procedures to scan for and remediate software and configuration vulnerabilities in Windows 8.1 systems.
Overview
In this lab, our focus is upon implementing and managing host-based security for Windows 8.1 systems using the following tools:
· Windows Defender
· Windows Firewall
· Microsoft Baseline Security Analyzer (MBSA)
Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can be found using Windows Search (Windows Key + R).
For each tool, you will research and then write a step-by-step procedure to configure the tool according to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of an overall information security vulnerability management business process.
You will write three separate procedures for this lab:
(a) Managing Windows Defender
(b) Managing Windows Firewall
(c) Managing Vulnerabilities using Microsoft Baseline Security Analyzer
Each procedure will have the following major sections (see Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g. Scanning for Threats) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for running scans using Windows Defender….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
InstructionsPart (a): Managing Windows Defender
1. Investigate the use of Windows Defender to protect a Windows 8/8.1 system against viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using host-based anti-malware software.
2. Develop step by step procedures to implement best practices for protecting a Windows 8/8.1 system from malware. At a minimum, your procedures must accomplish the following:
a. Update anti-virus definition files
b. Configure real-time scanning
c. Full system scanning
d. Fast or quick scan for high vulnerability areas of the system
e. Removable media scanning
f. Reviewing scan results including reviewi ...
A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxDIPESH30
Lab Deliverable for Lab nYour NameDate
Title: Creating, Using, Removing System Restore Points for Windows 8.1Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware
3. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
1
2
· Week 4 Discussion
· Discussion response - your response to the discussion question should be between 150 - 300 words.
· Must provide a minimum of at least one (1) reference in your discussion.
Discussion Topic
Updated
Discuss ONE of the following: (Try not replicate other’s answers)
e) What is an installment loan?
Make sure you are properly citing your source(s) and providing your reference(s) for information you obtain from another source.
· Week 4 Lecture (embedded below)
· Code of Federal Regulations (eCFR). TITLE 42 Chapter IV Centers for Medicare & Medicaid Services, U.S. Department of Health & Human Services Subchapter G. Standards and Certification.
http://www.ecfr.gov/cgi-bin/text-idx?c=ecfr&tpl=/ecfrbrowse/Title42/42cfr483_main_02.tpl
· NCSL. (2009). Certificate of Need Programs by State and Service. The National Conference of State Legislatures, Denver CO.
· http://www.ncsl.org/issues-research/health/con-certificate-of-need-state-laws.aspx#Regulated
· Healthcare accreditation systems: further perspectives on performance measures http://intqhc.oxfordjournals.org/content/23/6/645.full
· Week 4 Discussion
Discussion Topic
Updated
Please address all three questions:
Article 1.....Regulations for Long Term Care Facilities.
A. Identify by name and location and research a Long Term Care Facility that had a regulatory deficiency.
-What was the deficiency?
-How was the deficiency addressed by the facility?
-Were there any penalties involved?
Article 2, CON
A. From the map choose a state that has CON regulations.
B. From that state, identify a hospital/ health system that had project review by CON.
C. Describe the project and the outcome of the CON process.
Article 3, Accreditation,
A. Joint Commission on the Accreditation of Healthcare Organizations (JCAHO)....define their m ...
Modern Personal ComputerBoot up ProcessThe boot up process i.docxraju957290
Modern Personal Computer
Boot up Process
The boot up process is necessary for Windows as the hardware does not know where the Operating system is stored. There has to be a simple yet powerful program which loads the kernel in the main memory and executes it. This program in Windows is known as the Bootstrap Loader.
The Windows boot up process comprises of the following procedures:
· The Power-On Self-Test Phase:
Firstly a self-test is performed by the power supply to ensure that the volume and current levels are correct before the Power Good signal is sent to the processor. As soon as this stage is cleared, the microprocessor triggers the BIOS to perform a series of operations.
· BIOS ROM Phase:
BIOS first carry out the P.O.S.T that performs and verifies all initial hardware checks. After this, the hardware' firmware will individually carry out its own diagnostic test such as S.M.A.R.T.
The system will now attempt to determine the sequence of devices to load based on the settings stored in the BIOS to start the operating system. It will start by reading from the first boot up device which usually is the Floppy disk. If the floppy drive does not contain a diskette, it bypasses the first boot up device and detects the second device, which is usually the hard disk. It'll then start by reading the boot code instructions located in the master boot record and copies all execution into the memory when the instructions are validated and no errors are found.
· Boot Loader Phase
Control is then passed on to the partition loader code which accesses the partition table to identify the primary partition, extended partitions and active partition which is needed to determine the file system and locate the operating system loader file which will call upon the boot.ini file which is located at the root directory to determine the location and entries of the operating system boot partition. At this point in time, the boot up menu is displayed on the screen to allow you to select an operating system to start.
NTLDR will pass all information from the Windows registry and Boot.ini file into the next phase.
· Operating System Configuration Phase
Next step is to load the kernel, hardware abstraction layer and registry information.
After this is completed, the control is passed over to the DOS based program which collects and configures all installed hardware devices such as the video adapters and communication ports.
It searches for hardware profiles information and load the essential software drivers to control the hardware devices.
· Security & Logon Phase
Lastly, Ntoskrnl.exe will start up Winlogon.exe which triggers the Lsass.exe or Local Security Administration which is the logon dialog interface that prompts you to select your user profile and verifies your necessary credentials before you are transferred to the Windows desktop.
Scheduling Strategies:
· Windows has 6 process classes with 7 priorities within each class
· Process Classes included:
1. Idle
2. ...
This document is a guide to set-up Mobile App security testing environment and help performing Static and Dynamic security testing. All the information provided in this document is for educational purpose only. The author is not responsible for any misuse of the information or your bricked devices.
This presentation discusses most common appliacation compatibility issues in Windows 7 that applications designed for Windows Xp may experience. It explains the new features of the OS such as UAC, file and registry virtualization, WRP, Session 0 isolation, Mandatory Integrity Level that compatible applications have to be aware with to run well on Windows 7
From the infection phase to the command & control functionalities, this talk is a 360 degrees analysis of a recent Russian botnet distribution package. Particular features of this botnet are communication over HTTP protocol and use of PHP and Mysql.
I need a 7 pg research essay on the following Select a real o.docxeugeniadean34240
I need a 7 pg research essay on the following:
Select a real or hypothetical crisis, such as a natural disaster (hurricane, tornado, flooding, or earthquake), a catastrophic building failure, or an act of terrorism.
Discuss resource management based on ethical approaches used during crisis management.
Consider issues such as patient triage or current as well as incoming patients, supply, and personnel availability.
Discuss and develop an authoritative chain of command for crisis management.
Include such responsibilities as Incident Commander, Communications Officer, and other members of the chain of command for the incident.
Discuss the importance and implementation of community communication, involvement, and coordination.
Discuss the necessary policies for personnel management and safety.
Include provisions for lock-down status and family communication abilities.
Outline the steps for supply chain management, both for personnel and the supplies needed to provide care.
.
I need a 4-5 APA formatted paper with references that is clearly wri.docxeugeniadean34240
I need a 4-5 APA formatted paper with references that is clearly written and includes the following:
The attendance of an AA meeting. Describe the meeting's atmosphere, the participants and their appearances, details on the group discussion, engagement, timeframe, the pros and cons of the meeting, and other helpful information.
.
More Related Content
Similar to 1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxraju957290
Modern Personal Computer
Boot up Process
The boot up process is necessary for Windows as the hardware does not know where the Operating system is stored. There has to be a simple yet powerful program which loads the kernel in the main memory and executes it. This program in Windows is known as the Bootstrap Loader.
The Windows boot up process comprises of the following procedures:
· The Power-On Self-Test Phase:
Firstly a self-test is performed by the power supply to ensure that the volume and current levels are correct before the Power Good signal is sent to the processor. As soon as this stage is cleared, the microprocessor triggers the BIOS to perform a series of operations.
· BIOS ROM Phase:
BIOS first carry out the P.O.S.T that performs and verifies all initial hardware checks. After this, the hardware' firmware will individually carry out its own diagnostic test such as S.M.A.R.T.
The system will now attempt to determine the sequence of devices to load based on the settings stored in the BIOS to start the operating system. It will start by reading from the first boot up device which usually is the Floppy disk. If the floppy drive does not contain a diskette, it bypasses the first boot up device and detects the second device, which is usually the hard disk. It'll then start by reading the boot code instructions located in the master boot record and copies all execution into the memory when the instructions are validated and no errors are found.
· Boot Loader Phase
Control is then passed on to the partition loader code which accesses the partition table to identify the primary partition, extended partitions and active partition which is needed to determine the file system and locate the operating system loader file which will call upon the boot.ini file which is located at the root directory to determine the location and entries of the operating system boot partition. At this point in time, the boot up menu is displayed on the screen to allow you to select an operating system to start.
NTLDR will pass all information from the Windows registry and Boot.ini file into the next phase.
· Operating System Configuration Phase
Next step is to load the kernel, hardware abstraction layer and registry information.
After this is completed, the control is passed over to the DOS based program which collects and configures all installed hardware devices such as the video adapters and communication ports.
It searches for hardware profiles information and load the essential software drivers to control the hardware devices.
· Security & Logon Phase
Lastly, Ntoskrnl.exe will start up Winlogon.exe which triggers the Lsass.exe or Local Security Administration which is the logon dialog interface that prompts you to select your user profile and verifies your necessary credentials before you are transferred to the Windows desktop.
Scheduling Strategies:
· Windows has 6 process classes with 7 priorities within each class
· Process Classes included:
1. Idle
2. ...
This document is a guide to set-up Mobile App security testing environment and help performing Static and Dynamic security testing. All the information provided in this document is for educational purpose only. The author is not responsible for any misuse of the information or your bricked devices.
This presentation discusses most common appliacation compatibility issues in Windows 7 that applications designed for Windows Xp may experience. It explains the new features of the OS such as UAC, file and registry virtualization, WRP, Session 0 isolation, Mandatory Integrity Level that compatible applications have to be aware with to run well on Windows 7
From the infection phase to the command & control functionalities, this talk is a 360 degrees analysis of a recent Russian botnet distribution package. Particular features of this botnet are communication over HTTP protocol and use of PHP and Mysql.
Similar to 1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx (20)
I need a 7 pg research essay on the following Select a real o.docxeugeniadean34240
I need a 7 pg research essay on the following:
Select a real or hypothetical crisis, such as a natural disaster (hurricane, tornado, flooding, or earthquake), a catastrophic building failure, or an act of terrorism.
Discuss resource management based on ethical approaches used during crisis management.
Consider issues such as patient triage or current as well as incoming patients, supply, and personnel availability.
Discuss and develop an authoritative chain of command for crisis management.
Include such responsibilities as Incident Commander, Communications Officer, and other members of the chain of command for the incident.
Discuss the importance and implementation of community communication, involvement, and coordination.
Discuss the necessary policies for personnel management and safety.
Include provisions for lock-down status and family communication abilities.
Outline the steps for supply chain management, both for personnel and the supplies needed to provide care.
.
I need a 4-5 APA formatted paper with references that is clearly wri.docxeugeniadean34240
I need a 4-5 APA formatted paper with references that is clearly written and includes the following:
The attendance of an AA meeting. Describe the meeting's atmosphere, the participants and their appearances, details on the group discussion, engagement, timeframe, the pros and cons of the meeting, and other helpful information.
.
I need a 3 page research paper on Title Addictive being youn.docxeugeniadean34240
I need a 3 page research paper on
Title:
Addictive being young and older on Social Media, why activities outdoors can prevent addiction
In the attached zip file, I have provided 10 journals that you need to use for this research paper.
In the word doc, I have shared the topic and sub-topics that you have to use. And it also has guidelines from the teacher for this paper.
Due on Saturday, 13th March 4PM PST
.
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docxeugeniadean34240
I need a 3 page double-spaced 12-point paper on Immunotherapy. the information must be obtained from at least three original research articles, not from blogs news, etc.. must have work cited page. should include Introductory, Body(divided into smaller sections), Summary or Conclusion, followed by the references. I need this done by April 30, 2021 10:30pm Eastern Daylight Time
.
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docxeugeniadean34240
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. The paper needs to start with training the unit before deploying to Vietnam. How they perfected thier new traininf with helicopters. It needs to talk about both LTC Hal Moore and CSM Basil Plumbly. It needs to talk about how the unit remained resilient and how they over came racism and the battle in Vietnam.
.
I need a 200-word paper that answers the following questions:D.docxeugeniadean34240
I need a 200-word paper that answers the following questions:
Describe the term Enterprise Architecture (EA), what it means, how it can be used, and the core elements on EA. What are the core elements within EA.?
Now compare EA to Information Systems – are there any similarities, any differences?
.
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docxeugeniadean34240
i need a 2 page essay on LA crimes as it pertains to Rape you will have to response to the data regarding observed disparities in offenders vs. incarcertaion of Rape offense in Louisiana. also you will have to included a critical and well reasoned to the incarceration rate in Louisiana as a whole vs. the US.
.
I need a 1 page professional bio. My cover letter and resume i.docxeugeniadean34240
I need a 1 page professional bio.
My cover letter and resume is attached.
As an experienced and motivated professional with exceptional leadership and interpersonal abilities, I am prepared to significantly contribute to your organization’s goals in this role.
My background lies in workforce and economic development, managing operations, teams, conflict resolution, and processes to propel revenue increases while realizing enhanced corporate success and productivity. From establishing and implementing visionary business strategies to driving employees to achieve peak performance levels, I excel at directing strategic enhancements to outperform open objectives while communicating openly and effectively with staff and management teams.
Highlights of my experience include the following:
Ø Excelling as the Manager of the workforce development team with the Shelby County Alternative Schools for the past 10 years, federal grant management, identifying employment opportunities for youth and adult offenders, educating and supporting clients through vocational training initiatives, evaluating client work interests and aptitudes, and connecting clients with eligible and appropriate employment programs.
Ø Assisting program participants in identifying anger, recognizing aggressive behavior triggers, and learning tension and anger management techniques.
Ø Coaching and mentoring staff to ensure outstanding job performances and maximum program effectiveness. (virtual and face-to-face)
Ø Scheduling and coordinating opportunities for training, recreation, and leisure activities tailored to participants ‘preferences and age-appropriateness
Ø Encouraging an atmosphere supportive of constructive feedback and performance evaluation/improvement
Ø Adept at establishing goals and driving achievement through education, training, communication, and resource utilization
Ø Maintaining detailed records and reports to document participant progress and status
Ø Demonstrating solid time management, interpersonal, and organizational skills, as well as Microsoft Office proficiency.
Ø Compiling and analyzing client data obtained through records, tests, interviews, and other professional sources, determining clients’ suitability for various job opportunities and vocational training programs
Ø Facilitating and leading both individual and group orientation sessions and educating participants on requirements for participation in agency- sponsored programs
Ø Establishing solid and trusting relationships through exceptional relationship-building skills; utilizing solid communication and interpersonal abilities to secure employer and client trust
My proven dedication to optimizing workforce development and employment success through my expert knowledge of learning, development, and conflict resolution strategies will contribute immensely to the success of your-team.
.
I need 100 words response for this two discussion forum1 discu.docxeugeniadean34240
I need 100 words response for this two discussion forum
1 discussion
Colin Kaepernick comes to mind as I speak of racial differences, principles and morals. Colin Kaepernick, when he chose to go beyond the usual practice, effectively gave up his dream. Colin Kaepernick, the American football player who started the National Anthem "take knee" campaign against racial violence against African American and other races. Business ethics is the study of what constitutes right or wrong, good or bad human conduct in a business environment. The introduction of universal ethical principles to particular practical problems in the modern environment, such as dishonesty in ads, bullying, etc., is intended to assess what is "valid" behavior; i.e. what is considered appropriate or "right" conduct in line with universal ethical values (Christie et al, 2003).
I served with a social-service organization in 2013. Within this unique setting, I have been forced to interact alongside a variety of communities and faiths. Each of the SNAP entitlements (Food stamps) is dependent on family revenue and wealth. There was, however, a misconception and theory circulated inside the department that African American culture is lazy and that many of them do not want to function and want to rely on the government for assistance. I know that the theory and the story arose from the deep-rooted fear of the Slavery. Under which racial violence persists and so other groups are still competing and killing each other.
At another agency I worked for I worked with youth directly in a foster care setting. I am African American, and the rest of the children I represent are Hispanic / Latino. I note that when I'm out in the city with my Hispanic / Latino clientele, I typically get a number of stares from various cultures. One of my four-year-old children sometimes holds a temper tantrum to get what she needs from her mother. She decided to have one of these tantrums with me when we were in the grocery shop. I dismissed her actions, and there was a Hispanic lady who came up to me with a really unpleasant attitude, telling me to know what I was doing to the girl. I dismissed her and proceeded to focus on the actions of my client. I assume that she just got embroiled in this scenario because I mistreated this Hispanic child in her opinion, even though I gave her my badge for work. Anything I did with the child was in compliance with the Agency's rules and practices, even when I was being confronted by a consumer in the shop. It's really difficult to deal with babies, youth and even the elderly, so you also have to make sure that you perform it according to policies and procedures. Mandatory ethics was enforced to safeguard the employees who work for the specific organization and even the clients. Professionals are required to recognize and live by their Code of Ethics. Practitioners will need to demonstrate awareness regarding the adaptation of their codes to different cultures (Weber 20004).
I need 200 words response for each discussion post.Guided Respon.docxeugeniadean34240
I need 200 words response for each discussion post.
Guided Response: Respond to at least two of your classmates’ postings. Support your initial and subsequent posts by citing at least two scholarly and peer-reviewed sources in addition to the course text. The Scholarly, Peer-Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types.
Forum 1)One psychosocial issue that could cause a serious issue in the school setting to me would be Bullying. Bullying can scare a person’s ability to feel be ant to bully and be mean to someone because they may act different or look different to them, beautiful, safe, and secure about who they are, and be lasting ongoing issue that will last forever by making them feel insecure, and not wanted along while feeling like no one cares about them. Bullying is a form of abuse, aggressiveness, coercion, force. There are other things that bullies do to feel like they are important or better than everyone else, like be dominated, intimidating, or threatening. “Bullying in schools, particularly bias-based bullying, is an important issue for many reasons, but chief among them include evidence that victims being bullied experience both short and long term consequences, including poor school performance, depression, and increased health problems” (Martin, M. E. (2018).
I believe that the services of all three would be required because the bully would be evaluated three different times on his behavior and other things that no one may know about. Each of them has their own specialty that would fit working with the bully and being able to determine what is the issue or problem that makes the bully act out of character the way he or she does.
“An analysis of this phenomenon in schools, according to different authors [1,7.8, reveals that children involved in bullying behavior can play different roles; (a) aggressors/intimidators; (b) victim; (c) aggressors who are also victims and (d) passive observers. These observers are neither directly involved as aggressors nor as victims. As such, they can play a number of different roles: they can defend the victims, thus reducing this type of behavior; they can support the aggressors, actively reinforcing intimidation; children who merely observe are neutral or indifferent”. (www.ncbi.nim.nih.gov) (Links to an external site.) . There should something put into place that will stop individuals with aggressive behavior to stop bullying other individuals who just want to be themselves and live their lives. It leads to most children feeling depressed and wanting to end their lives because of it, and it happens in our society today children ending their lives because they are being targeted by bullies. Rules should also be put into place for the bullies to let them know what will happen if they continue to bully others.
REFERENCES:
Martin, M. E. (2018). Introduction to human services: Through the eyes of practice settings .
I need 3 pages discussion for an intersection (Attached image).docxeugeniadean34240
I need 3 pages discussion for an intersection (Attached image)
North Harbor Drive and Harbor Island Drive intersection, San Diego CA 92111 US
Please address the following:
a. Right of Way Issues
b. Utility Relocation
c. Air Quality Conformity
d. Title VI Considerations
e. Visual / Landscape Considerations
f. Required Permits
g. Stormwater Management
h. Cultural Resources
i. Risk Management Plan
j. Transportation Management Plan (TMP)
k. Transit Services
If you think any other better ideas, please address them as well.
University Level
Please no plagiarism
I also attached an example, you can follow it to get ideas to write about
.
I need 1page write up on Hypothesis & Methods Proposal,Due on .docxeugeniadean34240
I need 1page write up on Hypothesis & Methods Proposal,
Due on 3rd Feb 7PM PST
Please see attached doc for details on title, notes and questions to be answered.
Please cite everything, You might need the previous APA paper (attached image), but not sure. so please review
.
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docxeugeniadean34240
I need 2-3 pages written about the sieve of Eratosthenes. Starting from the Eratosthenes-legendre sieve going to Eratosthenes general sieve, while giving some detailed formulas and explanations for each, using some lemma and examples. And finishing with some applications.
The work has to be authentic and original (not copied), with the references stated where its used on the paper and at the end
.
I need 120 words for each question. Please ensure to post individual.docxeugeniadean34240
I need 120 words for each question. Please ensure to post individual reference with each question
Unit 1
Q 1;
Identify two organizational structures used in health care. What are the central characteristics of each? To what extent is bureaucracy necessary in health care organizations? Explain.
Q 2;
How does a doctorally prepared nurse work across and between levels of an organization? What are the challenges and/or rewards to be gained? Does one outweigh the other?
Resources
Delmatoff, J., & Lazarus, I. R. (2014). The most effective leadership style for the new landscape of healthcare.
Journal of Healthcare Management, 59
(4), 245-249. URL:
https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com.lopes.idm.oclc.org/login.aspx?direct=true&db=a9h&AN=97206195&site=ehost-live&scope=site
Arbab Kash, B., Spaulding, A., Johnson, C. E., & Gamm, L. (2014). Success factors for strategic change initiatives: A qualitative study of healthcare administrators' perspectives.
Journal of Healthcare Management, 59
(1), 65-81. URL:
https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com.lopes.idm.oclc.org/login.aspx?direct=true&db=a9h&AN=94059299&site=ehost-live&scope=site
Kritsonis, A. (2004/2005). Comparison of change theories.
International Journal of Scholarly Academic Intellectual Diversity, 8
(1) 1-7. URL:
http://qiroadmap.org/?wpfb_dl=12
Suter, E., Goldman, J., Martimianakis, T., Chatalalsingh, C., Dematteo, D. J., & Reeves, S. (2013). The use of systems and organizational theories in the interprofessional field: Findings from a scoping review.
Journal of Interprofessional Care, 27
(1), 57-64. doi:10.3109/13561820.2012.739670 URL:
https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com.lopes.idm.oclc.org/login.aspx?direct=true&db=a9h&AN=84423842&site=ehost-live&scope=site
Narayana, E. A. (1992). Bureaucratization of non-governmental organizations: An analysis of employees' perceptions and attitudes.
Public Administration and Development, 12
(2), 123-137. URL:
https://lopes.idm.oclc.org/login?url=http://search.proquest.com.lopes.idm.oclc.org/docview/194674953?accountid=7374
Klemsdal, L. (2013). From bureaucracy to learning organization: Critical minimum specification design as space for sensemaking.
Systemic Practice & Action Research
,
26
(1), 39-52. doi:10.1007/s11213-012-9267-3 URL:
https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=84739308&site=ehost-live&scope=site
Unit 2
Q 1:
What are three payment structures used in the health care industry across the care continuum? How are they similar? How are they different? Is there a single problem that transverses all three of the identified payment structures? Explain.
Q 2:
Identify a significant problem with one of the three payment structures used in the health care industry across the care continuum (from DQ 1) and propose a solution from one of the other two payment structures.
Resources
.
I need 10-12 slides Presentation with detailed speaker notes. Instru.docxeugeniadean34240
I need 10-12 slides Presentation with detailed speaker notes. Instruction is given below. It is a Religion Class. No Plagiarism Please. Due in 24 hours.
Wk 3 - Christianity Presentation
Create
a 10- to 12-slide presentation comparing
2
of the following branches of Christianity:
Catholic
Orthodox
Protestant
Include
a brief history of the 2 religious traditions and a comparison of their approaches to the Bible. Some concepts to include are:
Examples of art
Central symbols of the faith
Rituals and core beliefs
Ethics role in the faith
You might consider visiting one or more of these churches in person or exploring church websites to add to your own experiences.
.
I N N O V A T I O N N E T W O R K , I N C . www.innone.docxeugeniadean34240
I N N O V A T I O N N E T W O R K , I N C .
www.innonet.org • [email protected]
L o g i c M o d e l W o r k b o o k
I N N O V A T I O N N E T W O R K , I N C .
www.innonet.org • [email protected]
L o g i c M o d e l W o r k b o o k
T a b l e o f C o n t e n t s
P a g e
Introduction - How to Use this Workbook .....................................................................2
Before You Begin .................................................................................................................3
Developing a Logic Model .................................................................................................4
Purposes of a Logic Model ............................................................................................... 5
The Logic Model’s Role in Evaluation ............................................................................ 6
Logic Model Components – Step by Step ....................................................................... 6
Problem Statement: What problem does your program address? ......................... 6
Goal: What is the overall purpose of your program? .............................................. 7
Rationale and Assumptions: What are some implicit underlying dynamics? ....8
Resources: What do you have to work with? ......................................................... 9
Activities: What will you do with your resources? ................................................ 11
Outputs: What are the tangible products of your activities? ................................. 13
Outcomes: What changes do you expect to occur as a result of your work?.......... 14
Outcomes Chain ....................................................................................... 16
Outcomes vs. Outputs ............................................................................. 17
Logic Model Review ...........................................................................................................18
Appendix A: Logic Model Template
Appendix B: Worksheet: Developing an Outcomes Chain
Logic Model Workbook
Page 2
I N N O V A T I O N N E T W O R K , I N C .
www.innonet.org • [email protected]
I n t r o d u c t i o n - H o w t o U s e t h i s W o r k b o o k
Welcome to Innovation Network’s Logic Model Workbook. A logic model is a commonly-used
tool to clarify and depict a program within an organization. You may have heard it described as
a logical framework, theory of change, or program matrix—but the purpose is usually the same:
to graphically depict your program, initiative, project or even the sum total of all of your
organization’s work. It also serves as a
foundation for program planning and
evaluation.
This workbook is a do-it-yourself guide to
the concepts and use of the logic model. It
describes the steps necessary for you to
create logic models fo.
I like to tie my learning to Biblical Principles. On Virtuous Le.docxeugeniadean34240
I like to tie my learning to Biblical Principles. On Virtuous Leadership, I think about what leader in the Bible do I know that stands out as a virtuous leader. Although there are many, one that stands out to me is Nehemiah. Nehemiah's brother and others said that they had been to Jerusalem and the Wall has been broken down, and the gates were burned. Nehemiah listened and took this news personally as if he was the wounded party. In other words, it broke his heart to hear this news.
He then took personal responsibility, prayed, and asked God to forgive him and his people for not obeying his commands. Then he took personal action, and at great danger to himself, he appeared before the King sad - remember that no King wants a sad cupbearer. When the King saw how sad Nehemiah was, he asked him why, and Nehemiah explained the state of his city walls and asked permission to go and fix them. He went and fixed the walls. He got involved in the work as a servant leader and getting the people what they needed. They had a city again with walls and a gate, and most importantly, they had protection!
We can see in this story that a servant leader is someone who takes personal responsibility for what has gone wrong and sets out to fix it, but not only does he/she fix the problem, the servant leader gets involved in the work and works alongside his workers to get the job done right. By doing so, the servant leader demonstrates his care for his workers and organization.
Share a story of a servant leader either in the Bible or someone you know.
.
I just want one paragraph.!!C.W.Mills described ‘sociological im.docxeugeniadean34240
I just want one paragraph.!!
C.W.Mills described ‘sociological imagination’ as an ability to understand “the intersection of one's own biography and other biographies with history and the present social structure you find yourself and others in.” In short, it is the ability to understand the private in public terms. Essentially, Mills is describing an ability to discern patterns in social events and view personal experiences in light of those patterns. To highlight that, he uses two terms – “the personal troubles of milieu” and “the public issues of social structure.” ‘Troubles’ happen to us as individuals, and are a private matter of individual choices and biography. ‘Issues’ are public matters that transcend the individual, and have to do with societal structures and processes.
Here is the Question!!!
1- For this discussion, I want you to select one of the following health/medical issues, and offer a thoughtful reflection on it as both a hypothetical ‘personal trouble’ and a ‘public issue.’
- ADHD; obesity; eating disorder; infertility; Alzheimer’s disease; COVID.
.
i just need serious help answering the question. I have answered mos.docxeugeniadean34240
i just need serious help answering the question. I have answered most of them but the following posted questions are giving me problem.
# 1.1
(1 pts.) In the textbook case, what information led Dr. Tobin to conclude that Shaun Boyden's sexual attraction to children was not a passing fancy? '
A) the fact that he reported having the urges since adolescence
B) the fact that his wife was unaware of his problem
C) the fact that he was never caught in the past
D) the fact that he had a relatively normal sexual development
# 1.2
(1 pts.) Charlie has opted to have psychosurgery performed in order to change his pedophilic patterns. Which of the following procedures will Charlie have done?
A) prefrontal lobotomy
B) hypothalamotomy
C) castration
D) vasectomy
# 1.3
(1 pts.) Dr. Walters is instructing Harry to imagine that he has just "flashed" his genitals at an unsuspecting woman on the street. After the woman responds in horror, Harry is to imagine that all of his closest friends jump out of a nearby alley and start laughing at him. Dr. Walters is using the technique known as
A) systematic desensitization.
B) cognitive restructuring.
C) covert conditioning.
D) behavior modification.
# 1.4
(1 pts.) Who is most likely to be the target of a frotteurist's desires?
A) a person from work
B) a life-long friend
C) a shopper at the mall
D) a close relative
# 1.9
(1 pts.) Based on the information presented in the textbook case, Shaun Boyden might be considered a ______ since he had a normal history of sexual development and interests.
A) child rapist
B) preference molester
C) situational molester
D) generalized molester
# 1.12
(1 pts.) Joe becomes sexually aroused when he views sexually explicit photographs. He also gets really turned on when his lover undresses in front of him. Joe's behavior might be described as
A) fetishistic.
B) frotteuristic.
C) voyeuristic.
D) normal.
# 1.21
(1 pts.) John gets nauseous when he thinks about having sexual intercourse and he actively avoids the sexual advances of others. John might be diagnosed as having
A) male erectile disorder.
B) sexual aversion disorder.
C) dyspareunia.
D) inhibited male orgasm disorder.
# 1.27
(1 pts.) Five-year-old Timmy has older sisters who dress him up occasionally and call him "Timbelina" since they really wanted a little sister instead of a little brother. If this pattern continues it is possible that Tim might develop
A) sexual masochism.
B) sexual sadism.
C) pedophilia.
D) transvestic fetishism.
# 1.29
(1 pts.) Carol is extremely interested in sex but does not experience the vaginal changes that ordinarily precede sexual intercourse. Carol may have
A) sexual aversion disorder.
B) hypoactive sexual desire disorder.
C) inhibited female orgasm disorder.
D) female sexual arousal disorder.
# 1.32
(1 pts.) John is in a p.
I Headnotes and indexes are copyrighted and may not be duplica.docxeugeniadean34240
I Headnotes and indexes are copyrighted and may not be duplicated by photocopying, printing.
I or other means without the express permission of the publishers. 1 -800-351-0917
43 Fla. L. Weekly S512 SUPREME COURT OF FLORIDA
Committee later submitted a revised proposal in response to comments. While we
generally approve the Committee's revisions, the revised proposal would have allowed
twenty days[ ratherthan ten, to serve a reply brief. In order to maintain consistency with
otherprovisions in rule 9.146(g)(3)(B), we haverevised the Committee's proposal such
that parties are allowed twenty days to respond after the last initial brief, and ten days
to respond after the last answer brief.
3Wehave revised the Committee's proposal to refer specifically to requirements for
electronic service in Rule ofJudicial Administration 2.516(b).
"See CoastalDev. ofN. Fla.,Inc. v. City ofJacksonville Beach, 788 So. 2d 204,205
footnotes.
(a) Florida Supreme Court.
(111887-present: Fenelonv. State. 594 So. 2d 292 (Fla. 1992).
{211846-1886: Livingston v. L 'Engle, 22 Fla. 427 (1886).
J ±' C-fl&LL/fl 1
n.3(Fla.20CII); Fla. Power &Light Co. v.CityofDania,76l So.2d 1089,1094 (Fla.
2000) ("No statewide criterion exists at this time."); see also Broward Cty. v. G.B. V.
Intern., Ltd.
Anstead,J.)
, 787 So. 2d 838, 849-53 (Fla. 2001) (Pariente, J., dissenting, joined by
(LEWIS, J., concurring in part and dissenting in part.) I dissent
because there is no need to amend the rule with regard to joinder on
appeal. This amendment is likely to generate more confusion than
clarity. I concur with the remainder ofthe amendments.
! * * *
I ■
! ..■■■■
Rules of Appellate Procedure—Amendment—Uniform Citation
System
IN RE: AMENDMENTS TO FLORIDA RULE OF APPELLATE PROCEDURE
9.800. Supreme Court of Florida. Case No. SC17-999. October 25,2018. Original
Proceeding—Florida Rules of Appellate Procedure. Counsel: Courtney Rebecca
Brewer, Ch lir, Appellate CourtRules Committee, Tallahassee, Kristin A. Norse, Past
Chair, App sllate Court Rules Committee, Tampa; and Joshua E. Doyle, Executive
Director, and Heather Savage Telfer, Staff Liaison, The Florida Bar, Tallahassee, for
Petitioner.
(PER CUjRIAM.) This matter is before the Court for consideration of
proposed, amendments to Florida Rule ofAppellate Procedure 9.800
(Uniforn
Fla. Cons t.
TheFlorida Bar's Appellate CourtRules Committee (Committee)
proposes
uniform
proposal
Citation System). We havejurisdiction. See art. V, § 2(a),
amendments to rule 9.800 to substantially update the
citation formats provided in that rule. The Committee's
to amend the rule was first presented to the Court in the
Commirt 5e' s regular-cycle report ofproposed rule amendments in In
re Amendments to the Florida Rules ofAppellate Procedure—2017
Regular-Cycle Report, No. SC17-152 (Fla. report filed Jan. 31,
2017).' The Court, on its own motion, entered an order directing that
the proposed amendments to rule 9.800 be .
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1. 1RUNNING HEAD: MANAGING HOST BASED SECURITY
IN WINDOWS 8.1
Lab Deliverable for Lab 2
a. Procedure to Manage Windows Defender
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Description:
This window configuration project will require the sytem admin
permission so as to access the programs and get to know how it
is commanded to the action it should peform. Also, to use a
virtual box one should have knowledge in how to operate the
virtual box and explore the virtual programs
Notes, Warnings and Restrictions:
1. Windows Defender come with windows 8.1 software and are
found in the control panel.
2. The application is used only when you login your system as
an administarator or have permitted to act as the administrator.
3. For windows defender to run in the system it should be
2. turned on and no other antivirus should be active
4. Scanning the system with windows defender deletes infected
files. Also ensure you do the required scanning
5. If a different anti virus has been previously deleted, then
windows defender needs to be turned off and to be restarted
Resources (Futher Reading):
Firewalls. (n.d.). Retrieved from
https://technet.microsoft.com/en-us/library/cc700820.aspx
Microsoft Baseline Security Analyzer. (2011). Retrieved from
https://dougvitale.wordpress.com/2011/11/18/microsoft-
baseline-security-analyzer/
CloudFlare. (n.d.). Retrieved from
https://www.winhelp.us/configure-windows-defender-in-
windows-8.html
Procedures:
Windows defender
Window defender protects a computer system against any form
of malware by running in the background of the computer
system and gives notification if any suspicious item is found in
the syatem for the user to take action. It can also be used by a
computer to scan the system if the system has issues e.g
becomes slow, switches off when not commanded to, hanging
among other things. Windows defender should be updated over
time so that it is not outdated and also to improve its
performance.
Windows defender is found in the control panel icon, steps of
opening are
i. Open control panel and select “windows defender”
ii. While you click on windows defender, the following page
appears
3. a) To update the system click on “update”
b) Real time scanning
c) For the full scan results it will appear in the table as shown
below
d) For quick results check the button just before you click on
scan. Then the results will appear as shown below.
e) To scan removable device, select “setting” and click on
advance
Then check the box just before removing any removable drivers
and click save
b. Procedure to configure Windows Firewall for Windows 8.1
4. Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
Windows firewall is a protection application that protects
against suspicious items, It helps in blocking suspicious
programs and even network traffic.
Notes, Warning and Restrictions:
1. Windows firewall is an application that comes with windows
8/8.1 in the control panel list.
2. Windows firewall blocks some programs from running if they
look suspicious or are from an untrusted site.
3. When windows firewall is off, it doesn’t work efficiently.
4. Always check the boxes to ensure you check the right boxes
for what you want to enable and those you want to disable.
5. To protect the computer from viruses and spyware, ensure
windows firewall is turned on
Resources (Futher Reading):
Firewalls - Springer. (n.d.). Retrieved from
http://link.springer.com/referenceworkentry/10.1007%2F978-1-
4419-5906-5_911
How to Start & Use The Windows Firewall with Advanced
Security. (n.d.). Retrieved from
http://www.digitalcitizen.life/gain-additional-control-using-
windows-firewall-advanced-security
Windows Firewall Is Blocking a Program. (n.d.). Retrieved from
https://technet.microsoft.com/en-
us/library/cc766312(v=ws.10).aspx
Procedures:
Windows firewall
1. windows firewall has a policy design that enables the
computer to accept or share data or create traffic with only the
other computers or systems that are authorized. This protects
the system from any intrusion from an outsider. This also helps
the system from virus attacks. Windows firewall also have a
5. policy termed as domain isolation, with this, traffic is created
and information shared to the computers whose domains are
recognized by the system. Server isolation policy in windows
firewall restricts the server from distributing information to
only certain machines
(a). Steps in configuring windows firewall
i. In the control panel select “windows firewall”
ii. Then click on “Allow an app or feature through windows
firewall”
iii. In this window you choose the apps in the box and check
those you need to communicate with.
(b)
i. In windows firewall settings click “advanced setting”
Advanced setting will display the window below
Choose “windows firewall properties” it will give you options
of blocking or allowing connections.
For any application that you need to block or allow e.g network
then click on outbound
6. Manage Vulnerabilities Using Microsoft Baseline Security
Analyzer (MBSA)
Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware: A Laptop
3. Software: VMware Horizon Client Installed
Descriptions:
MBSA is a microsoft application product that can access the
state of security in a computer system. It checks for security
updates. It is also designed to give guidance on the security
state of a system
Notes, Warning and Restrictions:
1. MBSA is operated only when one has administrator rights to
access the computer system.
2. MBSA is installed differently to the system for additional
security for the computer syatem.
3. Scanning in MBSA updates works only with connected
network.
4. MBSA does not scan or report on missing non-security
updates in a system.
5. If MBSA fails to open from the command prompt or the run
application, you can still look for it in installed programs and
open the program
Resources (Futher Reading):
How To: Use the Microsoft Baseline Security Analyzer. (n.d.).
Retrieved from https://msdn.microsoft.com/en-
us/library/ff647642.aspx
Rountree, D. (2010). Security for Microsoft Windows System
Administrators: Introduction to key information security
concepts. Rockland, MA: Syngress.
Security for Microsoft Windows System Administrators -
7. ScienceDirect. (n.d.). Retrieved from
http://www.sciencedirect.com/science/book/9781597495943
Procedures:Manage Vulnerabilities Using Microsoft Baseline
Security Analyzer (MBSA)
1. MBSA is an application supported by windows that helps in
managing the security state in a system against
recommendations of Microsoft. This application can easily
detect misconfiguration security and missing security updates in
Windows.
(Click Win+R) and type MBSAcli.exe command in the box
This opens MBSA application
While you Click on “scan a computer” the following box will
appear in which you will check the boxes of what you want to
scan
Then click on “start scan” of which it will display result after
scanning
To see the results after scan then in the first page still select
It will then display results as shown below
Security assessment:
Incomplete Scan (Could not complete one or more requested
checks.)
Computer name:
UMUC-CLOUDSP16-CSIA-017
IP address:
10.5.2.103
Security report name:
UMUC-CLOUD - SP16-CSIA-017 (1-22-2016 11-38 PM)
Scan date:
1/22/2016 11:38 PM
8. Catalog synchronization date:
Security update catalog:
Microsoft Update
Security Updates
Score
Issue
Result
Lab Deliverable for Lab nYour NameDate
Title: Creating, Using, Removing System Restore Points for
Windows 8.1Operating Environment:
1. Operating System: Windows 8.1 Pro
2. Hardware
3. SoftwareDescription:
Notes, Warnings, & Restrictions:Resources (Further
Reading):Procedures:
[First Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Second Section Heading & Brief Intro / Explanation]
[Step-by-Step]
[Last Section Heading & Brief Intro / Explanation]
[Step-by-Step]
Title:Operating Environment:
1. Hardware
2. SoftwareDescription:
10. Lab 0 Part 0
Valorie J. King
6/25/2015
Title: Media Sanitization
Operating Environment:
1. Operating System: Linux (Paladin version 3.0 boot USB or
DVD/CD)
2. Firmware: BIOS which allows boot from removable media
3. Hardware:
a. Compatible workstation or laptop
b. Boot Device: DVD, CD-ROM, or USB port
c. Boot Media containing Paladin
Description:
This system administration procedure provides instructions for
using Paladin to sanitize media prior to reuse or disposal. This
operation results in media which are forensically sterile. The
“forensically sterile” state is achieved by using the following
approved procedure to overwrite the media with a pattern of
0x00 in every byte.
Notes, Warnings, & Restrictions:
1. The Paladin tool is distributed free of charge by Sumuri,
LLC. See the vendor’s website
http://sumuri.com/products/paladin/ for additional details about
the product. You must register before you can download the
software distribution. Instructions for creating bootable media
from the software distribution package are available from the
vendor’s Website.
11. 2. All imaging media checked out from inventory or supply
cabinets must be verified as forensically sterile before use as
target media for a forensic imaging process. To verify that
media is forensically sterile, you should perform steps 7 – 9 in
the Sterilization Procedure (as shown earlier in this document).
3. This procedure will remove all information (“wipe”) from the
selected hard disk, solid state drive, or other writable computer
storage media (“device”).
4. Verify that the correct device has been selected prior to
starting the “wipe” operation. Selecting the wrong device or
drive may result in corruption of the system hard drive for the
workstation or laptop on which Paladin is running.
5. This procedure will remove all partitioning and/or formatting
information from the hard drive or removable media. This
information must be restored using the appropriate partitioning
and/or formatting utility prior to the media being used.
Resources:
Kissel, R., Regenscheid, A., Scholl, M., & Stine, K. (2014).
Guidelines for media sanitization (NIST SP 800-88, revision 1).
Retrieved from
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8
00-88r1.pdf
Sumuri, LLC. (2015). Paladin. Retrieved from
http://sumuri.com/products/paladin/
Procedures:
Boot & Launch Paladin
In this section, you will launch the Paladin Toolbox after
booting the local computer using the Paladin Boot Media. This
media can be either USB or Live CD/DVD. You may need to
change the BIOS or UEFI options in order to boot from USB.
1. Boot a laptop or workstation using a Sumuri Paladin version
3.0 Live CD/DVD or boot USB.
2. Choose your Language Option (English is the default)
3. Boot Paladin (default choice) by pressing Enter
12. 4. Click OK to accept the usage agreement
5. Launch the Paladin Toolbox application
6. Paladin Toolbox at Startup
Forensic Sterilization of Physical Devices / Media
In this section, you will forensically sterilize a physical device
(USB or hard drive) using the “Wipe” function in Paladin. After
the wipe operation has completed, you will verify that the
device is forensically sterile using DCFLDD (to check for
zeroes in all bytes of the device).
1. Physically connect the drive or media to be sterilized (Note:
You do not need to put a hardware write-blocking device into
the data path since Paladin has a software write-block installed
in the operating system’s control files.)
2. Click on the WIPE tab at the top of the Paladin window
3. Using the drop down box, select the drive to be wiped. Note
the drive designation as displayed by Paladin, e.g. /dev/sdc.
4. Click WIPE to start the wiping process.
5. You can switch to the TASKS tab to monitor the progress of
the WIPE operation from within Paladin. There should also be a
pop-up window which provides task progress.
6. After the wipe has completed, launch a terminal window
7. Type the following command to verify the wipe: sudo dcfldd
pattern=00 vf=drivedesignator
For our example, the drive designator was /dev/sdc
The command to verify the wipe is: sudo dcfldd pattern=00
vf=/dev/sdc
13. 8. If the command output is “match” then your media has been
properly wiped and is now forensically sterile. If you receive
any other output, your media has not been properly wiped.
Restart this procedure at step 4.
9. If the media is to be reused, label it appropriately and then
store in an approved storage container. For installed hard
drives, affix the label to the outside of the drive enclosure.
Lab #3: Implementing Access Controls
Purpose: To develop and verify system administration
procedures which implement access controls for a Windows 8.1
system.
Objectives
1. Develop system administration procedures to manage account
policies for a Windows 8.1 system
2. Develop system administration procedures to manage local
user accounts and local user groups in a Windows 8.1 system
3. Develop system administration procedures to manage a
“drop-box” using discretionary access controls for resources in
a Windows 8.1 system
Overview
Access controls are an important part of identity &
authorization management business processes. There are three
primary types of access controls which are used for desktop
computing: mandatory access controls, discretionary access
controls, and role-based access controls.
· Mandatory access controls are built into and managed by the
operating system. The two types of Windows user accounts,
administrator and standard user, are examples of mandatory
access controls.
· Discretionary access controls are provided by operating
14. system components (e.g. the file system) and can be managed by
system administrators and resource owners.
· Role-based access controls can be implemented under
Windows 8 using the “user group” discretionary access control.
Each “role” is assigned to a specific user group (one and only
one “role” per group).
For this lab, you will write and test step-by-step procedures
which can be used to implement access controls using local user
accounts, i.e. accounts which only exist on the local workstation
or laptop. You will not create or manage domain accounts.
Your step-by-step system administration procedures will be
used to perform the following tasks:
· Manage local user account policies (including implementing
policy-based password restrictions)
· Create and manage local user accounts (both standard user and
administrators)
· Create and manage local groups (to implement role-based
access controls)
· Create and manage a “drop-box” folder (using group
membership and resource permissions to implement role-based
access controls)
Your procedures should use the following tools:
· Group Policy Management Console (GPMC)
· PC Settings
· User Accounts (access from Control Panel)
· Windows File Explorer
Deliverables
(a) Step-by-Step Local Computer Account Policies Management
System Administration Procedure
(b) Step-by-Step LocalUser Accounts & Groups Management
System Administration Procedure
(c) Step-by-Step Drop-Box Management System Administration
Procedure
15. Submit your deliverables in a SINGLE FILE in MS Word
format (.docx or .doc file types) using the corresponding
assignment folder entry (in LEO). (Use the Deliverable
Template file from Course Resources > Sample Files > CSIA
310 Lab Deliverable Template.docx.) Every deliverable must
use the format shown below. (Replace [Section Name] with the
heading for the section, e.g. Local Computer Account Policies).
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
16. InstructionsPart (a): Managing Local Computer Account
Policies
1. Investigate the use of Group Policy Management Console
(access using icon on Desktop or via Microsoft Management
Console). This tool is usedto manage account policies for the
local workstation. The group of settings that must be managed
are found under: Local Computer PolicyComputer
ConfigurationWindows SettingsSecurity SettingsAccount
Policies
2. Identify appropriate sources of information (e.g. Windows
Help, Microsoft Technet, etc.) for instructions for setting
account policies for Windows 8/8.1. Using those sources,
research the procedures required to perform the following tasks:
a. Set or change Password Policy (enumerate the individual
settings in your procedure, e.g. minimum password age)
b. Set or change Account Lockout Policy (enumerate the
individual settings in your procedure)
3. Develop a step-by-step systems administration procedure to
manage the local account policies for passwords and account
lockout.
4. Test your draft procedures using the virtual machine
provided in the online lab environment or using a locally
installed Virtual Machine (VM) running Microsoft Windows 8.1
Professional. As you run your tests, collect screen snapshots to
illustrate key steps in your procedures. Part (b): Managing
Local User Accounts and Local Groups
1. Investigate the use of the Windows 8.1 PC Settings tool (PC
Settings > Accounts > Other Accounts) to create and manage
local user accounts
2. Investigate the use of the Windows 8.1 User Accounts tool
(Control Panel > Administrative Tools > User Accounts) to
create and manage local user accounts
3. Identify appropriate sources of information about both tools
17. (e.g. Windows Help, Microsoft Technet, etc.) with particular
focus upon the steps required to create and manage local User
Accounts for Windows 8/8.1.
4. Develop step-by-step procedures to create and manage local
user accounts using the Accounts menu in the PC Settings tool
(Access from the Windows Start Screen). Your procedures
should accomplish the following:
a. Create a standard local user account (do not use Microsoft
Account for sign-in)
b. Change account type (add or remove administrator access)
5. Develop step-by-step procedures which use the Control Panel
User Accounts tool to perform the following tasks:
a. Create a standard account (for a local user)
b. Create an administrator account (privileged access for a local
user)
c. Modify a local user account
i. Change Password
ii. Change Account Type (add or remove administrator access)
iii. Change Account Settings (disable, must-change password,
etc.)
d. Delete a local user account
e. Turn On/Off “Guest” account
Later in this lab, you will need several local user test accounts.
The required accounts are:
a. Instructor01
b. TA01
c. Student01
d. Student02
You may wish to use these accounts as your examples for
creating and managing Local User Accounts. (Instructor01 can
be your administrator account for step #5.)
6. Investigate the use of the lusrmgr.exe utility to create and
manage local Groups. This tool can be accessed via Control
Panel > User Accounts (switch to the Advanced tab then click
18. on the Advanced button).
7. Identify appropriate sources of information (e.g. Windows
Help, Microsoft Technet, etc.) for instructions for implementing
local groups under Windows 8/8.1. Using those sources,
research the procedures required to perform the following tasks:
a. Create user groups which correspond to roles within an
organization (e.g. instructors, students, managers, employees)
b. Assign individual user accounts to one or more groups.
8. Develop a systems administration procedure for Group
Management which can be used to perform the following tasks:
a. Create the following roles using named groups
i. Instructors
ii. Teaching Assistants (TA)
iii. CSIA310_Students
b. Assign a role to one or more users
i. Assign users to a group during group creation
ii. Assign a user to an existing group
c. Remove a role from a user (delete user account from group)
d. Use the following usernames and groups for your examples.
(Create the users if you have not done so previously.)
Username
Assigned to Group
Instructor01
Instructors
TA01
Teaching Assistants(TA)
Student01
CSIA310_Students
Student02
CSIA310_Students
9. Test your draft procedures using the virtual machine provided
in the online lab environment or using a locally installed Virtual
Machine (VM) running Microsoft Windows 8.1 Professional. As
you run your tests, collect screen snapshots to illustrate key
steps in your procedures.
19. 10. Incorporate your screen snapshots for key steps into the
draft procedures. Each snapshot should be placed UNDER
(after) the step to which it applies. Captions are not required.
11. Make any additional changes required to address issues
found during testing of the step-by-step procedures.Part (c):
Creating & Managing a Drop-Box – An Example of
Discretionary Access Controls
1. A drop-box is a folder which is write-only for some users
(e.g. students) and read-only for other users (e.g. graders).
Under Windows 8/8.1, one method for accomplishing this goal
is to define user groups corresponding to roles and then
assigning / restricting access to resources for specific groups.
The figure below shows an example of permission settings for a
drop-box that has three assigned roles: instructors, teaching
assistants (TA), and students (CSIA310_Students). The
instructor role is granted full access. This means that the
instructor can grant access, remove access, take ownership, etc.
The TA role has limited permissions which only permit the user
to read files submitted to the drop-box. The permissions granted
to the CSIA310_Students role are even more limited – creating
and writing files.
2. Now that you have an idea of what a drop-box is and how it
works, investigate the use of Windows Explorer to implement a
drop-box. Begin by researching how to set advanced “sharing”
and/or “access” permissions (discretionary access controls)
under Windows 8/8.1. For this lab, you should focus on the
capabilities provided via the right-click menu (for a folder):
a. Right click on folder > Properties > Security tab > Edit
b. Right click on folder > Properties > Security tab > Advanced
Settings
3. Investigate the view function for permissions. From the
“Advanced Security Settings” pop-up, click on one of the
“principals” and then click View. Switch between the “basic
permissions” and “advanced permissions” views.
4. Next, you should explore how to view (list) effective access
for specific local user account. This will be needed to verify
20. that you have permissions set appropriately and that
permissions granted to other groups do not interfere with
permissions you wish to set for your “role” groups.
5. Identify appropriate additional sources of information (e.g.
Windows Help, Microsoft Technet, etc.) for instructions for
configuring resource permissions under Windows 8/8.1.
6. Develop a systems administration procedure for Windows
Update to accomplish the following:
a. Create a folder named Assignments
b. Change the owner of Assignments (use “Instructor01” as your
example)
c. Remove access for all groups except Administrators and
Owners (use check effective access to verify).
d. Give a named group “Full Control” (use the “Instructors”
group as your example)
e. Give a named group “Read&Execute” access (use the “TA”
group as your example)
f. Give a named group “Write” access ( use the
“CSIA310_Students” group)
g. Verify effective access for each of the named groups
7. Test your draft procedures using the virtual machine provided
in the online lab environment or using a locally installed Virtual
Machine (VM) running Microsoft Windows 8.1 Professional. As
you run your tests, collect screen snapshots to illustrate key
steps in your procedures.
8. Incorporate your screen snapshots for key steps into the draft
procedures. Each snapshot should be placed UNDER (after) the
step to which it applies. Captions are not required.
9. Make any additional changes required to address issues found
during testing of the step-by-step procedures.Finalize Your
Procedures
1. Using the grading rubric as a guide, refine your step-by-step
procedures. Your final products should be suitable for inclusion
in an organization’s Systems Administrator’s Handbook.
Remember that you are preparing multiple separate procedures.
2. As appropriate, cite your sources using footnotes or another
21. appropriate citation style.
3. Use the resources section to provide information about
recommended readings and any sources that you cite. Use a
standard bibliographic format (you may wish to use APA since
this is required in other CSIA courses). Information about
sources and recommended readings, including in-text citations,
should be formatted consistently and professionally.
4. At a minimum, each systems administration or system
management procedure document must include the following
sections:
a. Title
b. Operating Environment
c. Description
d. Notes, Warnings, & Restrictions
e. Resources (format as Bibliography or Reference list)
f. Procedures
Additional Requirements for this Lab
1. Your step-by-step procedures should tell the reader where to
find and how to launch the systems administration tools or
applications used to change security configuration settings.
2. You must address each required configuration change
separately and include enough detail that your reader will
understand how to perform the required steps to implement each
change.
3. Use screen snapshots to cue the reader to important steps or
provide information required to complete check points for
proper completion of a step or set of steps (e.g. including a
snapshot which shows the “after” state for a group of security
settings).
4. Make sure that your snapshots will enhance the reader’s
understanding of the procedure and required configuration
changes. Too many snapshots or illustrations can make a
procedure difficult to use.
5. All snapshots must be created by you for this lab using screen
captures showing how you personally performed (tested) the
22. systems administration procedure as written by you. You may
not copy and paste images from help pages, manuals, or the
Internet.
6. Images (screen snapshots) should be cropped and sized
appropriately.
7. A screen snapshot belonging to a specific procedure step does
not require a caption.
8. Your procedures must be submitted to Turn It In for
originality checking. You are encouraged to consult existing
configuration instructions, guidance, and procedures for both
content and format. Your work must be substantially your own,
however, which means you should paraphrase whenever
possible. Credit the sources of information used via footnotes
and in your “Resources” section.
9. Make sure that the sources you cite or recommend (additional
reading) are authoritative and are the best ones available.
10. Your Operating Environment section should identify the
hardware, operating system, and/or software applications to
which the procedure applies. For this lab, your procedures will
apply to:
a. Hardware: Laptop or Desktop Computers
b. Operating System: Windows 8.1 Professional
11. The Notes, Warnings, & Restrictions section should include
important information that is not found elsewhere in the
procedures document. For example, this section could include
information about alternatives to the selected security
configuration settings. Or, this section could include
information about related security procedures or policies. This
section should also include important information about harm or
risk that could occur if the procedure is not correctly followed
or implemented. If there are no such warnings then this section
should so state.