Running Head: THE BACKGROUND QUESTION 1
THE BACKGROUND QUESTION 3
https://southu-nur.meduapp.com/users/sign_in
The Background Question
Name
Institution
Course
Instructor’s Name
Date
The Background Question
Obesity is defined as a BMI at or above the 95th percentile for children and teens of the same age and sex (Liu, Li, Li, Li, Wang & Li, 2018). Liu et al. (2018) argue that childhood obesity lead to such health problems as type 2 diabetes and cardiovascular disease. These could either occur at a young age, or even during adulthood. Children are also at risk of psychological problems like anxiety and depression. In addition, obesity causes significant economic challenges. These include for both the society and the family.
Obesity has emerged as a significant public health concern across the globe; the importance of early prevention and treatment cannot be exaggerated. Pediatric primary care is a promising setting for behavioral obesity prevention and treatment interventions. Primary care doctors provide a wide source of health information and interventions to the help the children and their families how to manage obesity. Primary care provides a multidisciplinary team approach where the children and their families are taught how to follow a healthy diet, the importance to practice physical exercises at least three times per week, the appropriate portion sizes and to limit the sweetened beverages (Byrne, Brown, Ball, Wild, Maximova, Holt, Cave, Martz, & Ellendt, 2018).
According to Byrne et al. (2018), obesity results from a combination of factors. They include behavioral, dietary, social, physical, genetic, and psychological factors. Nutrition during pregnancy as well as during early life are also thought of as causal factors (Byrne et al., 2018; Park & Cormier, 2018). Since a significant number of factors are known, it seems likely that effective solutions would be found. Nevertheless, this has not been the case so far. Indeed, the prevalence rate continues to rise.
The proposed study is, therefore, aimed at uncovering how childhood obesity develops, and how it could be prevented. The presumption is that changes should come from above. Working on policy changes would bring about timely solutions as the entire society would rallied towards a single aim (Liu et al., 2018). It is on this basis that the background question for the proposed research is “What policy changes are needed to address childhood obesity in an effective manner?”. Other questions to add for research that may help to build better my background question are:
How is Childhood obesity defined and how is it diagnosed in primary care?
What population is at the most risk for Childhood obesity?
What are some of the causes of Childhood obesity?
How is Childhood obesity identified and treated?
References
Byrne, J.L.S., Browne, N.E., Ball, G.D.C., Wild, C.T., Maximova, K., Holt, N.L., Cave, A.J., Martz, P., & Ellendt, C. (2018). A brief eHealth tool delivered in pri.
Running Head THE BACKGROUND QUESTION 1THE BACKGROUND QUESTION.docx
1. Running Head: THE BACKGROUND QUESTION 1
THE BACKGROUND QUESTION 3
https://southu-nur.meduapp.com/users/sign_in
The Background Question
Name
Institution
Course
Instructor’s Name
Date
The Background Question
Obesity is defined as a BMI at or above the 95th percentile for
children and teens of the same age and sex (Liu, Li, Li, Li,
Wang & Li, 2018). Liu et al. (2018) argue that childhood
obesity lead to such health problems as type 2 diabetes and
cardiovascular disease. These could either occur at a young age,
or even during adulthood. Children are also at risk of
psychological problems like anxiety and depression. In addition,
obesity causes significant economic challenges. These include
for both the society and the family.
Obesity has emerged as a significant public health concern
across the globe; the importance of early prevention and
treatment cannot be exaggerated. Pediatric primary care is a
promising setting for behavioral obesity prevention and
2. treatment interventions. Primary care doctors provide a wide
source of health information and interventions to the help the
children and their families how to manage obesity. Primary care
provides a multidisciplinary team approach where the children
and their families are taught how to follow a healthy diet, the
importance to practice physical exercises at least three times per
week, the appropriate portion sizes and to limit the sweetened
beverages (Byrne, Brown, Ball, Wild, Maximova, Holt, Cave,
Martz, & Ellendt, 2018).
According to Byrne et al. (2018), obesity results from a
combination of factors. They include behavioral, dietary, social,
physical, genetic, and psychological factors. Nutrition during
pregnancy as well as during early life are also thought of as
causal factors (Byrne et al., 2018; Park & Cormier, 2018). Since
a significant number of factors are known, it seems likely that
effective solutions would be found. Nevertheless, this has not
been the case so far. Indeed, the prevalence rate continues to
rise.
The proposed study is, therefore, aimed at uncovering how
childhood obesity develops, and how it could be prevented. The
presumption is that changes should come from above. Working
on policy changes would bring about timely solutions as the
entire society would rallied towards a single aim (Liu et al.,
2018). It is on this basis that the background question for the
proposed research is “What policy changes are needed to
address childhood obesity in an effective manner?”. Other
questions to add for research that may help to build better my
background question are:
How is Childhood obesity defined and how is it diagnosed in
primary care?
What population is at the most risk for Childhood obesity?
What are some of the causes of Childhood obesity?
How is Childhood obesity identified and treated?
3. References
Byrne, J.L.S., Browne, N.E., Ball, G.D.C., Wild, C.T.,
Maximova, K., Holt, N.L., Cave, A.J., Martz, P., & Ellendt, C.
(2018). A brief eHealth tool delivered in primary care to help
parents prevent childhood obesity: a randomized controlled
trial. Pediatric Obesity, 13(11), 659–667.
https://doi.org/10.1111/ijpo.12200
Liu, W., Li, Q., Li, H., Li, J., Wang, H.J., & Li, B. (2018). 20-
year trends in prevalence of overweight and obesity among
children aged 0-6 in Harbin, China: A multiple cross-sectional
study. PLoS ONE, 13(6), 1–12.
https://doi.org/10.1371/journal.pone.0198032
Park, S. H., & Cormier, E. (2018). Influence of siblings on child
health behaviors and obesity: A systematic review. Journal of
Child & Family Studies, 27(7), 2069–2081.
https://doi.org/10.1007/s10826-018-1049-9
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
1
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
Introduction
Welcome to our sixth week together covering the protection of
our national infrastructure. This week we’ll be
examining collection and correlation of cyberthreat intelligence
for applying data to the defense of your local
network and across the national critical infrastructure.
Assigned Reading
Textbook Chapters 8 and 9 covering discretion as a mechanism
of protecting
the digital infrastructure of our national cybersecurity
4. infrastructure.
Discussion
Pick a popular strain of malware currently affecting the digital
community.
Try to select a unique bit of malware that your peers haven’t
covered yet.
Tell how the malware originated, what it does, who is
responsible for
creating and distributing it, and how to recover from it.
Explain any special elements of it that make it interesting or
particularly
effective.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
2
Learning Outcomes
This week we will be learning about how to utilize discretion
the protection of our local networks and the overall
national critical infrastructure. We will also look at how we can
use passive protections to decrease the likelihood
of vulnerability discovery. The less that you look like a target
and the less attention you draw to yourself
decreases the likelihood of an intentional attack.
Collection and Correlation
What is collection and how does it apply to the national critical
infrastructure?
What is correlation and how does it apply to the national CI?
Describe malware and the categories of attack associated with
it.
Describe state-sponsored malware.
5. Distinguish state-sponsored malware from cybercrime.
Explain malware prevention mechanisms.
What is reverse engineering and how does it work?
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
3
Research Paper
Next week you will have a requirement to create a research
paper as a final term project. You will be required to
select one case study from the textbook, research the topic, and
report on the case.
Content
The structure of your paper should be about seven to eight
pages, not including
the title, abstract, and reference pages. That’s seven to eight
pages of content.
Your submission must be in full APA 7th Edition format.
Title page (no Running Head):
Abstract
Body (7-8 pages)
Introduction
Case Study with appropriate citation
Discussion
Conclusion
Proper Section Headers
References (at least four)
Correct grammar, spelling, form, and format.
6. ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
4
Collection
“The principle of collection involves automated gathering of
system-related information about national
infrastructure to enable security analysis.” (Amoroso, 2012)
Local versus National
International third-party providers like PacketViperTM have
sensors deployed around the
world that monitor malicious traffic and report back to
governments and businesses.
Locally, you can install packet traffic monitors like Wireshark
(below) and logging tools
(right) to collect system-related information.
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
https://www.packetviper.com
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
7. 5
Correlation
“The principle of correlation involves a specific type of analysis
that can be performed on factors related to national
infrastructure protection. The goal of correlation is to identify
whether security-related indicators might emerge
from the analysis.” (Amoroso, 2012)
Local versus National
Huge volumes of data are collected every data at the local level
and must
be analyzed. This volume makes manual analysis impossible.
There are
tools available in both open-
source and commercial
products that will facilitate this
analysis. At the national level,
refined data is sent to the cyber
threat intelligence groups we’ve
already discussed for wider
dissemination in forms such as
Yara rules as seen to the left.
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
https://github.com/Yara-Rules/rules
https://www.tenable.com/
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
6
8. Malware
Noun – Software that is specifically designed to disrupt,
damage, or gain unauthorized access to a computer system.
Origin: 1990s blend of ‘malicious’ and ‘software’. (Oxford
Dictionary)
Impact
How has malware directly affected you? As an individual, you
have probably had your personal identifiable information (PII)
stolen and perhaps even been the victim of identity theft. As
a cybersecurity professional, you’ve probably had several
occasions where you’ve had to clean up a computer or a
network that has been infected. As an employee of a business
or even student you may have been kept from working on a
project or missed a deadline due to malware infection. Malware
affects everyone and there seems to be no escape from it.
Reference
Sikorski, M. and Horig, A. (2012). Practical malware analysis:
A hands-on guide to dissecting malicious software.
San Francisco, CA: No Starch Press. ISBN: 978-1593272906.
https://honigconte.com/
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
7
State-Sponsored Malware
“It is the policy of the United States to strengthen the security
and resilience of its critical infrastructure against
both physical and cyber threats” (PPD-21, 2013).
Local versus National
Countries have a vested interest in developing and
protecting their critical infrastructures. Some countries
9. attempt to enhance their capabilities by stealing from
others. Some countries want to harm competition from
foreign countries. And still others want to prepare for
kinetic warfare by practicing attacks against foreign
critical infrastructure.
References
Gertz, B. (September 28, 2016). China cyber espionage
continues. The Washington Time. Retrieved 7/23/2018 from
https://www.washingtontimes.com/news/2016/sep/28/china-
cyber-espionage-continues/.
Kaspersky, E. (February 25, 2015). The most sophisticated
cyber espionage campaign ever – but who’s behind it? Forbes.
Retrieved 7/20/2018 from
https://www.forbes.com/sites/eugenekaspersky/2015/02/25/the-
most-sophisticated-cyber-espionage-campaign-ever-but-whos-
behind-it/#2155f9eefa0a.
Yan, S. (March 24, 2016). Chinese man admits to cyberspying
on Boeing and other US firms. CNN. Retrieved 7/23/2016) from
https://money.cnn.com/2016/03/24/technology/china-cyber-
espionage-military/index.html.
PPD-21. (February 12, 2013). Presidential Policy Directive 21 –
Critical Infrastructure Security and Resilience. Retrieved
7/20/2018 from
https://obamawhitehouse.archives.gov/the-press-
office/2013/02/12/presidential-policy-directive-critical-
infrastructure-security-and-resil.
https://www.fbi.gov
ITS 834 Emerging Threats & Countermeasures
10. Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
8
Cybercrime
Criminal activity (such as fraud, theft, or distribution of child
pornography) committed using a computer especially
to illegally access, transmit, or manipulate data.
(https://www.merriam-webster.com/)
Local versus National
Theft of digital content, encryption ransomware, DDoS ransom
attacks,
corporate espionage, identity theft, business email compromise,
phishing
attacks, and the list goes on. There are also digital components
of traditional
criminal activity that can be attributed as cybercrime. Organized
criminal
organizations from all over the world are now involved making
this a multi-
billion-dollar international criminal business. Coordinating the
response to
these attacks requires interdiction at the national and
international level.
Critical infrastructure systems are especially vulnerable to
system shut-down
attacks as they can’t afford to be non-operational for any
duration of time.
References
NJCCIC. (2018). Ransomware. New Jersey Cybersecurity and
Communications Integration Cell (NJCCIC). Retrieved
7/22/2018 from https://www.cyber.nj.gov/threat-
profiles/ransomware-variants/.
US v. Sazonov. (2017). United States v. Sazonov, Docket 1:17-
mj-02798. United States District Court for the Southern District
of New York. Retrieve 7/23/2018 from
11. http://tsi.brooklaw.edu/cases/united-states-v-sazonov.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
9
Experimenting and Prevention
Where do hacker go for their training, support, and services?
They go to the dark web. Several research programs have found
that more content is there than on the surface web.
Signature versus Behavioral
The anti-malware systems that you’re used are called signature
based. That’s because once malware is identified, it is sent to
a lab for analysis and a hash value is created. That hash is sent
to anti-malware systems on servers and desktops for comparison
to incoming files to quarantine matches. Behavior based anti-
malware continuously watches the activity of programs,
services,
and processes for aberrant behavior like unexpected encryption
occurring on files. Suspecting ransomware, the anti-malware
will shut down the offending process until a human can
intervene
and determine if was a legitimate execution.
cdn.images.dailystar.co.uk/
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
12. 10
Reverse Engineering
It’s not like you see in the movies. It’s also not for the faint-
hearted. Still, it’s something you should know about.
Reference
Google. (2018). Retrieved 7/20/2018 from
http://www.virustotal.com.
Windbg screenshot
Ollydbg screenshot
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
11
Conclusion
This week you were asked to read Chapters 8 and 9 of our
textbook. In addition to the lecture you have just followed,
you should have met the learning objectives expected of you
this week. You will now be evaluated on the
retention of this material through your Discussion posts and
weekly Quiz.
Lessons Learned
What is collection and how does it apply to the national critical
infrastructure?
What is correlation and how does it apply to the national CI?
Describe malware and the categories of attack associated with
it.
Describe state-sponsored malware.
Distinguish state-sponsored malware from cybercrime.
Explain malware prevention mechanisms.
What is reverse engineering and how does it work?
13. Next Week
Read Chapter 10 of your textbook about Awareness. You will
have a Discussion thread to post and a quiz on the material
presented in the textbook.
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
1
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
Introduction
Welcome to our seventh week together covering the protection
of our national infrastructure. This week we’ll be
examining awareness of cyberthreat intelligence.
IMPORTANT: Next week is a short week ending on Wednesday
night at midnight!
Assigned Reading
Textbook Chapter 10 covering discretion as a mechanism of
protecting
the digital infrastructure of our national cybersecurity
infrastructure.
Discussion
Pick a cyberthreat intelligence provider.
Identify its audience and the type of information shared.
Provide a history of independent reviews of the provider.
Explain why you would use and / or recommend this provider
to your peers.
14. I ran out of room for all the logos
that I could find
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
2
Learning Outcomes
This week we will be learning about how to utilize awareness in
support of the
national critical infrastructure. We will also look at how we can
use passive protections to decrease the likelihood
of vulnerability discovery. The less that you look like a target
and the less attention you draw to yourself
decreases the likelihood of an intentional attack.
Awareness
15. What is awareness and how does it apply to the national critical
infrastructure?
Describe the Cybersecurity Awareness Lifecycle.
Explain the difference between perception of awareness at the
national level
versus the local level on your own network and how they
interact.
Describe effective use of employee training to increase
awareness.
Keep current in best practices through personal training.
Explain the impact of the mobile workforce on awareness
Identify your exposure.
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
3
Research Paper – Case Study
This week you have a requirement to create a research paper as
a final term project. You are required to
select one case study from the textbook, research the topic, and
report on the case.
Content
The structure of your paper should be about seven to eight
pages, not including
the title, abstract, and reference pages. That’s seven to eight
pages of content.
Your submission must be in full APA 7th Edition format.
Title page (no Running Head):
16. Abstract
Body (7-8 pages)
Introduction
Case Study with appropriate citation
Discussion
Conclusion
Proper Section Headers
References (at least four)
Correct grammar, spelling, form, and format.
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
4
Awareness
The principle of awareness involves an organization
understanding the differences, in real time and at all times,
between observed and normal status in national infrastructure.
This status can include risks, vulnerabilities, and
behavior in the target infrastructure.
Behavior refers here to the mix of user activity, system
processing, network traffic, and computing volumes in the
software, computers, and systems that comprise infrastructure.
Situational awareness refers to the collective real-time
understanding
within an organization of its security risk posture. Security risk
measures
the likelihood that an attack might produce significant
consequences to
17. some set of locally valued assets.
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure,
1st Ed. Butterworth-Heinemann.
www.samatters.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
5
Cybersecurity Awareness Lifecycle
Cybersecurity awareness is an ongoing effort by the
cybersecurity professional. The threat landscape is constantly
changing and we must also continuously adapt to the
cyberthreats as they adapt and exploit our systems.
Closing the Loop
Identify Threats – We now know where to go look for
cyberthreat intelligence
information, how to correlate it, and how to apply it to our
cyber defense.
Identify Vulnerabilities – Knowing the threats that apply to our
systems allows
us to prepare a proper and relevant defense.
Access Risk Exposure – Prioritize the threat – vulnerability
combinations to
address the most critical first.
Develop Protection and Detection Measures – You will have
intrusion detection
/ intrusion protection systems.
Establish Contingency Plans – Systems will go end-of-life.
What are you going
18. to do then?
Respond to Cyber Security Incidents – Develop an Incident
Response Plan.
Participate in sector-wide tabletop incident tabletop exercises
https://s3-eu-west-2.amazonaws.com/north-live/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
6
The Complete Cyberspace Awareness Picture
Cybersecurity is about more than just your local network. There
is an entire national critical infrastructure sector relying upon
you to participate and contribute.
Network Awareness – Asset management, control over
configurations, vulnerability auditing, patch management,
and compliance reporting.
Threat Awareness – Monitor and respond to internal
incidents and suspicious behavior and integrate external
threat intelligence.
Mission Awareness – Establish a comprehensive image of
your critical dependencies through the cybersecurity
awareness lifecycle.
Infrastructure Sector Awareness – Support your sector
critical infrastructure cyberthreat intelligence providers by
sharing your own threat information taken from your internal
monitoring systems.
https://www.valuewalk.com/
19. ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
7
Training, training, and more training
What do you think could be a better way to increase
cybersecurity awareness within your organization or across
the national critical infrastructure sector than training?
Focused Training – Inside the Organization
Establish a culture of cybersecurity protection
Business email compromise continues to be the most
vulnerable aspect of security your local networks
Online training providers take the trouble out of your
responsibility
Repeat the training at least every year
Test the effectiveness of your training
Focused Training – Sector-wide
Infrastructure support training from your sector
cyberthreat intelligence resources
https://threatshieldsecurity.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
8
Continuous Ongoing Professional Training Requirement
Continuous training for assessing risks, threats, and evaluating
trends in best practices for cybersecurity is a mandatory
requirement
for the cybersecurity professional.
20. DoD 8570.01M Information Assurance Workforce Improvement
Program (WIP)
The program that you see here is only one of many annual
training
events tailored specifically to the national critical
infrastructure.
Most have sector-specific programs that are tailored to the
industry that represents your organization. A mix of sector-
specific
programs and global infrastructure programs will provide an
excellent exposure to the best practices and threat mitigation
strategies that are going to be critical for you to master in
support
of your own organization and the national critical infrastructure
as
a whole.
https://public.cyber.mil/training/cyber-awareness-challenge/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
9
Awareness Extends Beyond the Physical Boundaries of your
Organization
Remote workforce, mobile devices, third party providers, Cloud
services are the new realities of the modern
workforce. This is also true for critical infrastructure systems
and organizations. Maintaining communications
and oversight of this mobile workforce is going to be the new
challenge for organization leadership.
Maintaining Communications
Awareness includes knowing what your employees are doing.
21. It’s
facilitating interactions between them while working away from
the
centralized office environment. It’s protecting a
wider range of systems and devices that may not
be ‘owned’ by the organization. It’s providing 24-
hour support for teams that used to work set office
hours. It’s increasing efficiency of the workplace
while maintaining security controls and overall
cybersecurity compliance within your sector
rules and regulations.
https://cyware.com/cyber-threat-situational-awareness
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
10
Know Your Exposure
A crucial component of heightening your cyber-defensive
awareness is knowing where the threats are originating.
Two simple ways to prioritize your focus are through
geographic location and industry sector. Where you are and
what you do plays an important role in your exposure to cyber-
attackers.
What are the most Vulnerable Sectors and Regions?
California, New York, Texas, and Florida suffer from the
greatest
number of breaches across the country.
Source: Comparitech retrieved from
https://docs.google.com/spreadsheets/d/1n2Ck49UtCQf_jtlk2ed
Kj9gM_MLCNd4fqVimhsu6AUs/
22. edit#gid=856445414
Industry breakdown of incident response reports are:
Healthcare (including Biotech and Pharma) – 25%
Financial Services (including Insurance) – 17%
Professional Services (Engineering and Transportation) – 17%
Retail (including media and entertainment) – 12%
Education – 11%
Source: BakerHostetler retrieved from
https://www.bakerlaw.com/
https://norse-corp.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
11
Conclusion
This week you were asked to read Chapters 10 of our textbook.
In addition to the lecture you have just followed,
you should have met the learning objectives expected of you
this week. You will now be evaluated on the
retention of this material through your Discussion posts and
weekly Quiz.
Next Week
Read Chapter 11 of your textbook about Response. You will
have a Discussion thread to post and a quiz on the material
presented in the textbook. Remember that next week ends on
Wednesday night at midnight.
Lessons Learned
What is awareness and how does it apply to the national critical
infrastructure?
Describe the Cybersecurity Awareness Lifecycle.
23. Explain the difference between perception of awareness at the
national level
versus the local level on your own network and how they
interact.
Describe effective use of employee training to increase
awareness.
Keep current in best practices through personal training.
Explain the impact of the mobile workforce on awareness
Identify your exposure.
Don’t forget that the course closes
next Wednesday night at midnight.
All Discussion posts and your quiz
must be completed prior to this
deadline.
Hello Brittany,
I found really important the topic that you selected for your
research. The papilloma virus infection is considered one of the
main causes of pre-malignant lesions and neoplasia associated
with an infectious process. The health care has a tremendous
necessity to control and reduce the morbidity provoke by the
virus. This virus has a high incidence between the malignant
illness that affect the women. During the 80’s the papilloma
virus is recognized as the principal etiologic agent that causes
cervical cancer (Shaltout, El-Dein, Elsers, Shahine, Abbas, &
Osman, 2020). I believe the importance of this topic, encourage
us to continue to investigate the etiopathology of this disease to
let us view and increase the different treatment options to be
more accurate with the principal objective that is diminished the
mortality for this cause. Primary care plays an important role in
detecting cervical cancer since this disease doesn’t cause
24. symptoms. It is vital that women have regular screening tests to
detect any precancerous changes in the cervix that might lead to
cancer. Furthermore, the education provided to our patients in
general is the key on how we are going to manage them on
preventing the risk factors that may develop any malignant or
chronic illness. In this particular case the major risk factor for
HPV are: number of sexual partners, age, weakened immune
system, damaged skin and personal contact (Shaltout et al.,
2020). I am interested to read your thought-provoking research.
Good-luck.
References
Shaltout, S. E.-D., El-Dein, H., Elsers, D., Shahine, M., Abbas,
H., & Osman, M. (2020). Study the association among human
papilloma virus subtypes 16 and 18, codon 72 P53 gene
polymorphism, and oral squamous cell carcinoma in Upper
Egypt: a case–control study. Egyptian Journal of Surgery, 39(2),
364–370. https://doi-
org.su.idm.oclc.org/10.4103/ejs.ejs_215_19
https://quizlet.com/387447750/fnp-pretest-questions-flash-
cards/#
https://southu-nur.meduapp.com/users/sign_in
25. Hello Marie, you have selected a revolutionary topic. The use of
telemedicine has been shown to allow for better long-term care
management and patient satisfaction. It also offers a new
method of communication and information with the
practitioners like via e-mail, interactive chats and video
conferences. It also has convenience, reducing the amount of
potential travel required for the patient and the physician
(Abdellatif & Mohamed, 2020). I believe you have an extensive
area to explore on this topic. I would like you to suggest some
questions that maybe can help in your investigation:
What are the advantages of telemedicine?
Why is the telemedicine important in healthcare?
What are the pros and cons of telemedicine?
Does telemedicine will replace the in-person doctor visits?
The last question has an important implication, because I
believe that without the physical ability to touch the patient, the
doctor is limited to perform a complete physical exam, establish
the proper diagnosis and provide the proper care that the patient
needs. Finally, I have to recognize that during the COVID-19
pandemic situation, telemedicine has been an enormous help for
the healthcare system.
Abdellatif, M. M., & Mohamed, W. (2020). Telemedicine: An
IoT Based Remote Healthcare System. International Journal of
Online & Biomedical Engineering, 16(6), 72.