SlideShare a Scribd company logo
1 of 25
Running Head: THE BACKGROUND QUESTION 1
THE BACKGROUND QUESTION 3
https://southu-nur.meduapp.com/users/sign_in
The Background Question
Name
Institution
Course
Instructor’s Name
Date
The Background Question
Obesity is defined as a BMI at or above the 95th percentile for
children and teens of the same age and sex (Liu, Li, Li, Li,
Wang & Li, 2018). Liu et al. (2018) argue that childhood
obesity lead to such health problems as type 2 diabetes and
cardiovascular disease. These could either occur at a young age,
or even during adulthood. Children are also at risk of
psychological problems like anxiety and depression. In addition,
obesity causes significant economic challenges. These include
for both the society and the family.
Obesity has emerged as a significant public health concern
across the globe; the importance of early prevention and
treatment cannot be exaggerated. Pediatric primary care is a
promising setting for behavioral obesity prevention and
treatment interventions. Primary care doctors provide a wide
source of health information and interventions to the help the
children and their families how to manage obesity. Primary care
provides a multidisciplinary team approach where the children
and their families are taught how to follow a healthy diet, the
importance to practice physical exercises at least three times per
week, the appropriate portion sizes and to limit the sweetened
beverages (Byrne, Brown, Ball, Wild, Maximova, Holt, Cave,
Martz, & Ellendt, 2018).
According to Byrne et al. (2018), obesity results from a
combination of factors. They include behavioral, dietary, social,
physical, genetic, and psychological factors. Nutrition during
pregnancy as well as during early life are also thought of as
causal factors (Byrne et al., 2018; Park & Cormier, 2018). Since
a significant number of factors are known, it seems likely that
effective solutions would be found. Nevertheless, this has not
been the case so far. Indeed, the prevalence rate continues to
rise.
The proposed study is, therefore, aimed at uncovering how
childhood obesity develops, and how it could be prevented. The
presumption is that changes should come from above. Working
on policy changes would bring about timely solutions as the
entire society would rallied towards a single aim (Liu et al.,
2018). It is on this basis that the background question for the
proposed research is “What policy changes are needed to
address childhood obesity in an effective manner?”. Other
questions to add for research that may help to build better my
background question are:
How is Childhood obesity defined and how is it diagnosed in
primary care?
What population is at the most risk for Childhood obesity?
What are some of the causes of Childhood obesity?
How is Childhood obesity identified and treated?
References
Byrne, J.L.S., Browne, N.E., Ball, G.D.C., Wild, C.T.,
Maximova, K., Holt, N.L., Cave, A.J., Martz, P., & Ellendt, C.
(2018). A brief eHealth tool delivered in primary care to help
parents prevent childhood obesity: a randomized controlled
trial. Pediatric Obesity, 13(11), 659–667.
https://doi.org/10.1111/ijpo.12200
Liu, W., Li, Q., Li, H., Li, J., Wang, H.J., & Li, B. (2018). 20-
year trends in prevalence of overweight and obesity among
children aged 0-6 in Harbin, China: A multiple cross-sectional
study. PLoS ONE, 13(6), 1–12.
https://doi.org/10.1371/journal.pone.0198032
Park, S. H., & Cormier, E. (2018). Influence of siblings on child
health behaviors and obesity: A systematic review. Journal of
Child & Family Studies, 27(7), 2069–2081.
https://doi.org/10.1007/s10826-018-1049-9
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
1
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
Introduction
Welcome to our sixth week together covering the protection of
our national infrastructure. This week we’ll be
examining collection and correlation of cyberthreat intelligence
for applying data to the defense of your local
network and across the national critical infrastructure.
Assigned Reading
Textbook Chapters 8 and 9 covering discretion as a mechanism
of protecting
the digital infrastructure of our national cybersecurity
infrastructure.
Discussion
Pick a popular strain of malware currently affecting the digital
community.
Try to select a unique bit of malware that your peers haven’t
covered yet.
Tell how the malware originated, what it does, who is
responsible for
creating and distributing it, and how to recover from it.
Explain any special elements of it that make it interesting or
particularly
effective.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
2
Learning Outcomes
This week we will be learning about how to utilize discretion
the protection of our local networks and the overall
national critical infrastructure. We will also look at how we can
use passive protections to decrease the likelihood
of vulnerability discovery. The less that you look like a target
and the less attention you draw to yourself
decreases the likelihood of an intentional attack.
Collection and Correlation
What is collection and how does it apply to the national critical
infrastructure?
What is correlation and how does it apply to the national CI?
Describe malware and the categories of attack associated with
it.
Describe state-sponsored malware.
Distinguish state-sponsored malware from cybercrime.
Explain malware prevention mechanisms.
What is reverse engineering and how does it work?
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
3
Research Paper
Next week you will have a requirement to create a research
paper as a final term project. You will be required to
select one case study from the textbook, research the topic, and
report on the case.
Content
The structure of your paper should be about seven to eight
pages, not including
the title, abstract, and reference pages. That’s seven to eight
pages of content.
Your submission must be in full APA 7th Edition format.
Title page (no Running Head):
Abstract
Body (7-8 pages)
Introduction
Case Study with appropriate citation
Discussion
Conclusion
Proper Section Headers
References (at least four)
Correct grammar, spelling, form, and format.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
4
Collection
“The principle of collection involves automated gathering of
system-related information about national
infrastructure to enable security analysis.” (Amoroso, 2012)
Local versus National
International third-party providers like PacketViperTM have
sensors deployed around the
world that monitor malicious traffic and report back to
governments and businesses.
Locally, you can install packet traffic monitors like Wireshark
(below) and logging tools
(right) to collect system-related information.
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
https://www.packetviper.com
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
5
Correlation
“The principle of correlation involves a specific type of analysis
that can be performed on factors related to national
infrastructure protection. The goal of correlation is to identify
whether security-related indicators might emerge
from the analysis.” (Amoroso, 2012)
Local versus National
Huge volumes of data are collected every data at the local level
and must
be analyzed. This volume makes manual analysis impossible.
There are
tools available in both open-
source and commercial
products that will facilitate this
analysis. At the national level,
refined data is sent to the cyber
threat intelligence groups we’ve
already discussed for wider
dissemination in forms such as
Yara rules as seen to the left.
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
https://github.com/Yara-Rules/rules
https://www.tenable.com/
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
6
Malware
Noun – Software that is specifically designed to disrupt,
damage, or gain unauthorized access to a computer system.
Origin: 1990s blend of ‘malicious’ and ‘software’. (Oxford
Dictionary)
Impact
How has malware directly affected you? As an individual, you
have probably had your personal identifiable information (PII)
stolen and perhaps even been the victim of identity theft. As
a cybersecurity professional, you’ve probably had several
occasions where you’ve had to clean up a computer or a
network that has been infected. As an employee of a business
or even student you may have been kept from working on a
project or missed a deadline due to malware infection. Malware
affects everyone and there seems to be no escape from it.
Reference
Sikorski, M. and Horig, A. (2012). Practical malware analysis:
A hands-on guide to dissecting malicious software.
San Francisco, CA: No Starch Press. ISBN: 978-1593272906.
https://honigconte.com/
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
7
State-Sponsored Malware
“It is the policy of the United States to strengthen the security
and resilience of its critical infrastructure against
both physical and cyber threats” (PPD-21, 2013).
Local versus National
Countries have a vested interest in developing and
protecting their critical infrastructures. Some countries
attempt to enhance their capabilities by stealing from
others. Some countries want to harm competition from
foreign countries. And still others want to prepare for
kinetic warfare by practicing attacks against foreign
critical infrastructure.
References
Gertz, B. (September 28, 2016). China cyber espionage
continues. The Washington Time. Retrieved 7/23/2018 from
https://www.washingtontimes.com/news/2016/sep/28/china-
cyber-espionage-continues/.
Kaspersky, E. (February 25, 2015). The most sophisticated
cyber espionage campaign ever – but who’s behind it? Forbes.
Retrieved 7/20/2018 from
https://www.forbes.com/sites/eugenekaspersky/2015/02/25/the-
most-sophisticated-cyber-espionage-campaign-ever-but-whos-
behind-it/#2155f9eefa0a.
Yan, S. (March 24, 2016). Chinese man admits to cyberspying
on Boeing and other US firms. CNN. Retrieved 7/23/2016) from
https://money.cnn.com/2016/03/24/technology/china-cyber-
espionage-military/index.html.
PPD-21. (February 12, 2013). Presidential Policy Directive 21 –
Critical Infrastructure Security and Resilience. Retrieved
7/20/2018 from
https://obamawhitehouse.archives.gov/the-press-
office/2013/02/12/presidential-policy-directive-critical-
infrastructure-security-and-resil.
https://www.fbi.gov
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
8
Cybercrime
Criminal activity (such as fraud, theft, or distribution of child
pornography) committed using a computer especially
to illegally access, transmit, or manipulate data.
(https://www.merriam-webster.com/)
Local versus National
Theft of digital content, encryption ransomware, DDoS ransom
attacks,
corporate espionage, identity theft, business email compromise,
phishing
attacks, and the list goes on. There are also digital components
of traditional
criminal activity that can be attributed as cybercrime. Organized
criminal
organizations from all over the world are now involved making
this a multi-
billion-dollar international criminal business. Coordinating the
response to
these attacks requires interdiction at the national and
international level.
Critical infrastructure systems are especially vulnerable to
system shut-down
attacks as they can’t afford to be non-operational for any
duration of time.
References
NJCCIC. (2018). Ransomware. New Jersey Cybersecurity and
Communications Integration Cell (NJCCIC). Retrieved
7/22/2018 from https://www.cyber.nj.gov/threat-
profiles/ransomware-variants/.
US v. Sazonov. (2017). United States v. Sazonov, Docket 1:17-
mj-02798. United States District Court for the Southern District
of New York. Retrieve 7/23/2018 from
http://tsi.brooklaw.edu/cases/united-states-v-sazonov.
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
9
Experimenting and Prevention
Where do hacker go for their training, support, and services?
They go to the dark web. Several research programs have found
that more content is there than on the surface web.
Signature versus Behavioral
The anti-malware systems that you’re used are called signature
based. That’s because once malware is identified, it is sent to
a lab for analysis and a hash value is created. That hash is sent
to anti-malware systems on servers and desktops for comparison
to incoming files to quarantine matches. Behavior based anti-
malware continuously watches the activity of programs,
services,
and processes for aberrant behavior like unexpected encryption
occurring on files. Suspecting ransomware, the anti-malware
will shut down the offending process until a human can
intervene
and determine if was a legitimate execution.
cdn.images.dailystar.co.uk/
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
10
Reverse Engineering
It’s not like you see in the movies. It’s also not for the faint-
hearted. Still, it’s something you should know about.
Reference
Google. (2018). Retrieved 7/20/2018 from
http://www.virustotal.com.
Windbg screenshot
Ollydbg screenshot
ITS 834 Emerging Threats & Countermeasures
Week 6 – Collection and Correlation
Dr. Brian Toevs ([email protected])
11
Conclusion
This week you were asked to read Chapters 8 and 9 of our
textbook. In addition to the lecture you have just followed,
you should have met the learning objectives expected of you
this week. You will now be evaluated on the
retention of this material through your Discussion posts and
weekly Quiz.
Lessons Learned
What is collection and how does it apply to the national critical
infrastructure?
What is correlation and how does it apply to the national CI?
Describe malware and the categories of attack associated with
it.
Describe state-sponsored malware.
Distinguish state-sponsored malware from cybercrime.
Explain malware prevention mechanisms.
What is reverse engineering and how does it work?
Next Week
Read Chapter 10 of your textbook about Awareness. You will
have a Discussion thread to post and a quiz on the material
presented in the textbook.
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
1
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
Introduction
Welcome to our seventh week together covering the protection
of our national infrastructure. This week we’ll be
examining awareness of cyberthreat intelligence.
IMPORTANT: Next week is a short week ending on Wednesday
night at midnight!
Assigned Reading
Textbook Chapter 10 covering discretion as a mechanism of
protecting
the digital infrastructure of our national cybersecurity
infrastructure.
Discussion
Pick a cyberthreat intelligence provider.
Identify its audience and the type of information shared.
Provide a history of independent reviews of the provider.
Explain why you would use and / or recommend this provider
to your peers.
I ran out of room for all the logos
that I could find
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
2
Learning Outcomes
This week we will be learning about how to utilize awareness in
support of the
national critical infrastructure. We will also look at how we can
use passive protections to decrease the likelihood
of vulnerability discovery. The less that you look like a target
and the less attention you draw to yourself
decreases the likelihood of an intentional attack.
Awareness
What is awareness and how does it apply to the national critical
infrastructure?
Describe the Cybersecurity Awareness Lifecycle.
Explain the difference between perception of awareness at the
national level
versus the local level on your own network and how they
interact.
Describe effective use of employee training to increase
awareness.
Keep current in best practices through personal training.
Explain the impact of the mobile workforce on awareness
Identify your exposure.
Reference
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure, 1st Ed. Butterworth-Heinemann.
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
3
Research Paper – Case Study
This week you have a requirement to create a research paper as
a final term project. You are required to
select one case study from the textbook, research the topic, and
report on the case.
Content
The structure of your paper should be about seven to eight
pages, not including
the title, abstract, and reference pages. That’s seven to eight
pages of content.
Your submission must be in full APA 7th Edition format.
Title page (no Running Head):
Abstract
Body (7-8 pages)
Introduction
Case Study with appropriate citation
Discussion
Conclusion
Proper Section Headers
References (at least four)
Correct grammar, spelling, form, and format.
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
4
Awareness
The principle of awareness involves an organization
understanding the differences, in real time and at all times,
between observed and normal status in national infrastructure.
This status can include risks, vulnerabilities, and
behavior in the target infrastructure.
Behavior refers here to the mix of user activity, system
processing, network traffic, and computing volumes in the
software, computers, and systems that comprise infrastructure.
Situational awareness refers to the collective real-time
understanding
within an organization of its security risk posture. Security risk
measures
the likelihood that an attack might produce significant
consequences to
some set of locally valued assets.
Amoroso, E. (2012). Cyber attacks: Protecting national
infrastructure,
1st Ed. Butterworth-Heinemann.
www.samatters.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
5
Cybersecurity Awareness Lifecycle
Cybersecurity awareness is an ongoing effort by the
cybersecurity professional. The threat landscape is constantly
changing and we must also continuously adapt to the
cyberthreats as they adapt and exploit our systems.
Closing the Loop
Identify Threats – We now know where to go look for
cyberthreat intelligence
information, how to correlate it, and how to apply it to our
cyber defense.
Identify Vulnerabilities – Knowing the threats that apply to our
systems allows
us to prepare a proper and relevant defense.
Access Risk Exposure – Prioritize the threat – vulnerability
combinations to
address the most critical first.
Develop Protection and Detection Measures – You will have
intrusion detection
/ intrusion protection systems.
Establish Contingency Plans – Systems will go end-of-life.
What are you going
to do then?
Respond to Cyber Security Incidents – Develop an Incident
Response Plan.
Participate in sector-wide tabletop incident tabletop exercises
https://s3-eu-west-2.amazonaws.com/north-live/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
6
The Complete Cyberspace Awareness Picture
Cybersecurity is about more than just your local network. There
is an entire national critical infrastructure sector relying upon
you to participate and contribute.
Network Awareness – Asset management, control over
configurations, vulnerability auditing, patch management,
and compliance reporting.
Threat Awareness – Monitor and respond to internal
incidents and suspicious behavior and integrate external
threat intelligence.
Mission Awareness – Establish a comprehensive image of
your critical dependencies through the cybersecurity
awareness lifecycle.
Infrastructure Sector Awareness – Support your sector
critical infrastructure cyberthreat intelligence providers by
sharing your own threat information taken from your internal
monitoring systems.
https://www.valuewalk.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
7
Training, training, and more training
What do you think could be a better way to increase
cybersecurity awareness within your organization or across
the national critical infrastructure sector than training?
Focused Training – Inside the Organization
Establish a culture of cybersecurity protection
Business email compromise continues to be the most
vulnerable aspect of security your local networks
Online training providers take the trouble out of your
responsibility
Repeat the training at least every year
Test the effectiveness of your training
Focused Training – Sector-wide
Infrastructure support training from your sector
cyberthreat intelligence resources
https://threatshieldsecurity.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
8
Continuous Ongoing Professional Training Requirement
Continuous training for assessing risks, threats, and evaluating
trends in best practices for cybersecurity is a mandatory
requirement
for the cybersecurity professional.
DoD 8570.01M Information Assurance Workforce Improvement
Program (WIP)
The program that you see here is only one of many annual
training
events tailored specifically to the national critical
infrastructure.
Most have sector-specific programs that are tailored to the
industry that represents your organization. A mix of sector-
specific
programs and global infrastructure programs will provide an
excellent exposure to the best practices and threat mitigation
strategies that are going to be critical for you to master in
support
of your own organization and the national critical infrastructure
as
a whole.
https://public.cyber.mil/training/cyber-awareness-challenge/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
9
Awareness Extends Beyond the Physical Boundaries of your
Organization
Remote workforce, mobile devices, third party providers, Cloud
services are the new realities of the modern
workforce. This is also true for critical infrastructure systems
and organizations. Maintaining communications
and oversight of this mobile workforce is going to be the new
challenge for organization leadership.
Maintaining Communications
Awareness includes knowing what your employees are doing.
It’s
facilitating interactions between them while working away from
the
centralized office environment. It’s protecting a
wider range of systems and devices that may not
be ‘owned’ by the organization. It’s providing 24-
hour support for teams that used to work set office
hours. It’s increasing efficiency of the workplace
while maintaining security controls and overall
cybersecurity compliance within your sector
rules and regulations.
https://cyware.com/cyber-threat-situational-awareness
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
10
Know Your Exposure
A crucial component of heightening your cyber-defensive
awareness is knowing where the threats are originating.
Two simple ways to prioritize your focus are through
geographic location and industry sector. Where you are and
what you do plays an important role in your exposure to cyber-
attackers.
What are the most Vulnerable Sectors and Regions?
California, New York, Texas, and Florida suffer from the
greatest
number of breaches across the country.
Source: Comparitech retrieved from
https://docs.google.com/spreadsheets/d/1n2Ck49UtCQf_jtlk2ed
Kj9gM_MLCNd4fqVimhsu6AUs/
edit#gid=856445414
Industry breakdown of incident response reports are:
Healthcare (including Biotech and Pharma) – 25%
Financial Services (including Insurance) – 17%
Professional Services (Engineering and Transportation) – 17%
Retail (including media and entertainment) – 12%
Education – 11%
Source: BakerHostetler retrieved from
https://www.bakerlaw.com/
https://norse-corp.com/
ITS 834 Emerging Threats & Countermeasures
Week 7 – Awareness
Dr. Brian Toevs ([email protected])
11
Conclusion
This week you were asked to read Chapters 10 of our textbook.
In addition to the lecture you have just followed,
you should have met the learning objectives expected of you
this week. You will now be evaluated on the
retention of this material through your Discussion posts and
weekly Quiz.
Next Week
Read Chapter 11 of your textbook about Response. You will
have a Discussion thread to post and a quiz on the material
presented in the textbook. Remember that next week ends on
Wednesday night at midnight.
Lessons Learned
What is awareness and how does it apply to the national critical
infrastructure?
Describe the Cybersecurity Awareness Lifecycle.
Explain the difference between perception of awareness at the
national level
versus the local level on your own network and how they
interact.
Describe effective use of employee training to increase
awareness.
Keep current in best practices through personal training.
Explain the impact of the mobile workforce on awareness
Identify your exposure.
Don’t forget that the course closes
next Wednesday night at midnight.
All Discussion posts and your quiz
must be completed prior to this
deadline.
Hello Brittany,
I found really important the topic that you selected for your
research. The papilloma virus infection is considered one of the
main causes of pre-malignant lesions and neoplasia associated
with an infectious process. The health care has a tremendous
necessity to control and reduce the morbidity provoke by the
virus. This virus has a high incidence between the malignant
illness that affect the women. During the 80’s the papilloma
virus is recognized as the principal etiologic agent that causes
cervical cancer (Shaltout, El-Dein, Elsers, Shahine, Abbas, &
Osman, 2020). I believe the importance of this topic, encourage
us to continue to investigate the etiopathology of this disease to
let us view and increase the different treatment options to be
more accurate with the principal objective that is diminished the
mortality for this cause. Primary care plays an important role in
detecting cervical cancer since this disease doesn’t cause
symptoms. It is vital that women have regular screening tests to
detect any precancerous changes in the cervix that might lead to
cancer. Furthermore, the education provided to our patients in
general is the key on how we are going to manage them on
preventing the risk factors that may develop any malignant or
chronic illness. In this particular case the major risk factor for
HPV are: number of sexual partners, age, weakened immune
system, damaged skin and personal contact (Shaltout et al.,
2020). I am interested to read your thought-provoking research.
Good-luck.
References
Shaltout, S. E.-D., El-Dein, H., Elsers, D., Shahine, M., Abbas,
H., & Osman, M. (2020). Study the association among human
papilloma virus subtypes 16 and 18, codon 72 P53 gene
polymorphism, and oral squamous cell carcinoma in Upper
Egypt: a case–control study. Egyptian Journal of Surgery, 39(2),
364–370. https://doi-
org.su.idm.oclc.org/10.4103/ejs.ejs_215_19
https://quizlet.com/387447750/fnp-pretest-questions-flash-
cards/#
https://southu-nur.meduapp.com/users/sign_in
Hello Marie, you have selected a revolutionary topic. The use of
telemedicine has been shown to allow for better long-term care
management and patient satisfaction. It also offers a new
method of communication and information with the
practitioners like via e-mail, interactive chats and video
conferences. It also has convenience, reducing the amount of
potential travel required for the patient and the physician
(Abdellatif & Mohamed, 2020). I believe you have an extensive
area to explore on this topic. I would like you to suggest some
questions that maybe can help in your investigation:
What are the advantages of telemedicine?
Why is the telemedicine important in healthcare?
What are the pros and cons of telemedicine?
Does telemedicine will replace the in-person doctor visits?
The last question has an important implication, because I
believe that without the physical ability to touch the patient, the
doctor is limited to perform a complete physical exam, establish
the proper diagnosis and provide the proper care that the patient
needs. Finally, I have to recognize that during the COVID-19
pandemic situation, telemedicine has been an enormous help for
the healthcare system.
Abdellatif, M. M., & Mohamed, W. (2020). Telemedicine: An
IoT Based Remote Healthcare System. International Journal of
Online & Biomedical Engineering, 16(6), 72.

More Related Content

Similar to Running Head THE BACKGROUND QUESTION 1THE BACKGROUND QUESTION.docx

Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Nicola Marae Allain, PhD
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing PromptsRenee Spahn
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing PromptsMelissa Williams
 
8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.Monica Rivera
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? IJNSA Journal
 
Big Data Means Big Potential Challenges for Nurse Execs Response.pdf
Big Data Means Big Potential Challenges for Nurse Execs Response.pdfBig Data Means Big Potential Challenges for Nurse Execs Response.pdf
Big Data Means Big Potential Challenges for Nurse Execs Response.pdfbkbk37
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxbriancrawford30935
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare DesignCarmen Martin
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Ann Johnson
 

Similar to Running Head THE BACKGROUND QUESTION 1THE BACKGROUND QUESTION.docx (13)

Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
Designing Schneier’s Five Step Risk Analysis Process into an Online Role Play...
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts
 
8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts8Th Grade Essay Writing Prompts
8Th Grade Essay Writing Prompts
 
8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.8Th Grade Essay Writing Prompts. Online assignment writing service.
8Th Grade Essay Writing Prompts. Online assignment writing service.
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Big Data Means Big Potential Challenges for Nurse Execs Response.pdf
Big Data Means Big Potential Challenges for Nurse Execs Response.pdfBig Data Means Big Potential Challenges for Nurse Execs Response.pdf
Big Data Means Big Potential Challenges for Nurse Execs Response.pdf
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
 

More from todd521

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxtodd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docxtodd521
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docxtodd521
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxtodd521
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxtodd521
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxtodd521
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxtodd521
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxtodd521
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docxtodd521
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxtodd521
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docxtodd521
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxtodd521
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxtodd521
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxtodd521
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxtodd521
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxtodd521
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxtodd521
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxtodd521
 

More from todd521 (20)

Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docxRunning head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
Running head SHORT TITLE OF PAPER (= 50 CHARACTERS)TitleAu.docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)    .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docxRunning head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS)        .docx
Running head SHORT TITLE OF PAPER (50 CHARACTERS OR LESS) .docx
 
Running head SEMESTER PAPER .docx
Running head SEMESTER PAPER                                  .docxRunning head SEMESTER PAPER                                  .docx
Running head SEMESTER PAPER .docx
 
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Running Head THE BACKGROUND QUESTION 1THE BACKGROUND QUESTION.docx

  • 1. Running Head: THE BACKGROUND QUESTION 1 THE BACKGROUND QUESTION 3 https://southu-nur.meduapp.com/users/sign_in The Background Question Name Institution Course Instructor’s Name Date The Background Question Obesity is defined as a BMI at or above the 95th percentile for children and teens of the same age and sex (Liu, Li, Li, Li, Wang & Li, 2018). Liu et al. (2018) argue that childhood obesity lead to such health problems as type 2 diabetes and cardiovascular disease. These could either occur at a young age, or even during adulthood. Children are also at risk of psychological problems like anxiety and depression. In addition, obesity causes significant economic challenges. These include for both the society and the family. Obesity has emerged as a significant public health concern across the globe; the importance of early prevention and treatment cannot be exaggerated. Pediatric primary care is a promising setting for behavioral obesity prevention and
  • 2. treatment interventions. Primary care doctors provide a wide source of health information and interventions to the help the children and their families how to manage obesity. Primary care provides a multidisciplinary team approach where the children and their families are taught how to follow a healthy diet, the importance to practice physical exercises at least three times per week, the appropriate portion sizes and to limit the sweetened beverages (Byrne, Brown, Ball, Wild, Maximova, Holt, Cave, Martz, & Ellendt, 2018). According to Byrne et al. (2018), obesity results from a combination of factors. They include behavioral, dietary, social, physical, genetic, and psychological factors. Nutrition during pregnancy as well as during early life are also thought of as causal factors (Byrne et al., 2018; Park & Cormier, 2018). Since a significant number of factors are known, it seems likely that effective solutions would be found. Nevertheless, this has not been the case so far. Indeed, the prevalence rate continues to rise. The proposed study is, therefore, aimed at uncovering how childhood obesity develops, and how it could be prevented. The presumption is that changes should come from above. Working on policy changes would bring about timely solutions as the entire society would rallied towards a single aim (Liu et al., 2018). It is on this basis that the background question for the proposed research is “What policy changes are needed to address childhood obesity in an effective manner?”. Other questions to add for research that may help to build better my background question are: How is Childhood obesity defined and how is it diagnosed in primary care? What population is at the most risk for Childhood obesity? What are some of the causes of Childhood obesity? How is Childhood obesity identified and treated?
  • 3. References Byrne, J.L.S., Browne, N.E., Ball, G.D.C., Wild, C.T., Maximova, K., Holt, N.L., Cave, A.J., Martz, P., & Ellendt, C. (2018). A brief eHealth tool delivered in primary care to help parents prevent childhood obesity: a randomized controlled trial. Pediatric Obesity, 13(11), 659–667. https://doi.org/10.1111/ijpo.12200 Liu, W., Li, Q., Li, H., Li, J., Wang, H.J., & Li, B. (2018). 20- year trends in prevalence of overweight and obesity among children aged 0-6 in Harbin, China: A multiple cross-sectional study. PLoS ONE, 13(6), 1–12. https://doi.org/10.1371/journal.pone.0198032 Park, S. H., & Cormier, E. (2018). Influence of siblings on child health behaviors and obesity: A systematic review. Journal of Child & Family Studies, 27(7), 2069–2081. https://doi.org/10.1007/s10826-018-1049-9 ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 1 Reference Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. Introduction Welcome to our sixth week together covering the protection of our national infrastructure. This week we’ll be examining collection and correlation of cyberthreat intelligence for applying data to the defense of your local network and across the national critical infrastructure. Assigned Reading Textbook Chapters 8 and 9 covering discretion as a mechanism of protecting the digital infrastructure of our national cybersecurity
  • 4. infrastructure. Discussion Pick a popular strain of malware currently affecting the digital community. Try to select a unique bit of malware that your peers haven’t covered yet. Tell how the malware originated, what it does, who is responsible for creating and distributing it, and how to recover from it. Explain any special elements of it that make it interesting or particularly effective. ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 2 Learning Outcomes This week we will be learning about how to utilize discretion the protection of our local networks and the overall national critical infrastructure. We will also look at how we can use passive protections to decrease the likelihood of vulnerability discovery. The less that you look like a target and the less attention you draw to yourself decreases the likelihood of an intentional attack. Collection and Correlation What is collection and how does it apply to the national critical infrastructure? What is correlation and how does it apply to the national CI? Describe malware and the categories of attack associated with it. Describe state-sponsored malware.
  • 5. Distinguish state-sponsored malware from cybercrime. Explain malware prevention mechanisms. What is reverse engineering and how does it work? Reference Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 3 Research Paper Next week you will have a requirement to create a research paper as a final term project. You will be required to select one case study from the textbook, research the topic, and report on the case. Content The structure of your paper should be about seven to eight pages, not including the title, abstract, and reference pages. That’s seven to eight pages of content. Your submission must be in full APA 7th Edition format. Title page (no Running Head): Abstract Body (7-8 pages) Introduction Case Study with appropriate citation Discussion Conclusion Proper Section Headers References (at least four) Correct grammar, spelling, form, and format.
  • 6. ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 4 Collection “The principle of collection involves automated gathering of system-related information about national infrastructure to enable security analysis.” (Amoroso, 2012) Local versus National International third-party providers like PacketViperTM have sensors deployed around the world that monitor malicious traffic and report back to governments and businesses. Locally, you can install packet traffic monitors like Wireshark (below) and logging tools (right) to collect system-related information. Reference Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. https://www.packetviper.com ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected])
  • 7. 5 Correlation “The principle of correlation involves a specific type of analysis that can be performed on factors related to national infrastructure protection. The goal of correlation is to identify whether security-related indicators might emerge from the analysis.” (Amoroso, 2012) Local versus National Huge volumes of data are collected every data at the local level and must be analyzed. This volume makes manual analysis impossible. There are tools available in both open- source and commercial products that will facilitate this analysis. At the national level, refined data is sent to the cyber threat intelligence groups we’ve already discussed for wider dissemination in forms such as Yara rules as seen to the left. Reference Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. https://github.com/Yara-Rules/rules https://www.tenable.com/ ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 6
  • 8. Malware Noun – Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Origin: 1990s blend of ‘malicious’ and ‘software’. (Oxford Dictionary) Impact How has malware directly affected you? As an individual, you have probably had your personal identifiable information (PII) stolen and perhaps even been the victim of identity theft. As a cybersecurity professional, you’ve probably had several occasions where you’ve had to clean up a computer or a network that has been infected. As an employee of a business or even student you may have been kept from working on a project or missed a deadline due to malware infection. Malware affects everyone and there seems to be no escape from it. Reference Sikorski, M. and Horig, A. (2012). Practical malware analysis: A hands-on guide to dissecting malicious software. San Francisco, CA: No Starch Press. ISBN: 978-1593272906. https://honigconte.com/ ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 7 State-Sponsored Malware “It is the policy of the United States to strengthen the security and resilience of its critical infrastructure against both physical and cyber threats” (PPD-21, 2013). Local versus National Countries have a vested interest in developing and protecting their critical infrastructures. Some countries
  • 9. attempt to enhance their capabilities by stealing from others. Some countries want to harm competition from foreign countries. And still others want to prepare for kinetic warfare by practicing attacks against foreign critical infrastructure. References Gertz, B. (September 28, 2016). China cyber espionage continues. The Washington Time. Retrieved 7/23/2018 from https://www.washingtontimes.com/news/2016/sep/28/china- cyber-espionage-continues/. Kaspersky, E. (February 25, 2015). The most sophisticated cyber espionage campaign ever – but who’s behind it? Forbes. Retrieved 7/20/2018 from https://www.forbes.com/sites/eugenekaspersky/2015/02/25/the- most-sophisticated-cyber-espionage-campaign-ever-but-whos- behind-it/#2155f9eefa0a. Yan, S. (March 24, 2016). Chinese man admits to cyberspying on Boeing and other US firms. CNN. Retrieved 7/23/2016) from https://money.cnn.com/2016/03/24/technology/china-cyber- espionage-military/index.html. PPD-21. (February 12, 2013). Presidential Policy Directive 21 – Critical Infrastructure Security and Resilience. Retrieved 7/20/2018 from https://obamawhitehouse.archives.gov/the-press- office/2013/02/12/presidential-policy-directive-critical- infrastructure-security-and-resil. https://www.fbi.gov ITS 834 Emerging Threats & Countermeasures
  • 10. Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 8 Cybercrime Criminal activity (such as fraud, theft, or distribution of child pornography) committed using a computer especially to illegally access, transmit, or manipulate data. (https://www.merriam-webster.com/) Local versus National Theft of digital content, encryption ransomware, DDoS ransom attacks, corporate espionage, identity theft, business email compromise, phishing attacks, and the list goes on. There are also digital components of traditional criminal activity that can be attributed as cybercrime. Organized criminal organizations from all over the world are now involved making this a multi- billion-dollar international criminal business. Coordinating the response to these attacks requires interdiction at the national and international level. Critical infrastructure systems are especially vulnerable to system shut-down attacks as they can’t afford to be non-operational for any duration of time. References NJCCIC. (2018). Ransomware. New Jersey Cybersecurity and Communications Integration Cell (NJCCIC). Retrieved 7/22/2018 from https://www.cyber.nj.gov/threat- profiles/ransomware-variants/. US v. Sazonov. (2017). United States v. Sazonov, Docket 1:17- mj-02798. United States District Court for the Southern District of New York. Retrieve 7/23/2018 from
  • 11. http://tsi.brooklaw.edu/cases/united-states-v-sazonov. ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 9 Experimenting and Prevention Where do hacker go for their training, support, and services? They go to the dark web. Several research programs have found that more content is there than on the surface web. Signature versus Behavioral The anti-malware systems that you’re used are called signature based. That’s because once malware is identified, it is sent to a lab for analysis and a hash value is created. That hash is sent to anti-malware systems on servers and desktops for comparison to incoming files to quarantine matches. Behavior based anti- malware continuously watches the activity of programs, services, and processes for aberrant behavior like unexpected encryption occurring on files. Suspecting ransomware, the anti-malware will shut down the offending process until a human can intervene and determine if was a legitimate execution. cdn.images.dailystar.co.uk/ ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected])
  • 12. 10 Reverse Engineering It’s not like you see in the movies. It’s also not for the faint- hearted. Still, it’s something you should know about. Reference Google. (2018). Retrieved 7/20/2018 from http://www.virustotal.com. Windbg screenshot Ollydbg screenshot ITS 834 Emerging Threats & Countermeasures Week 6 – Collection and Correlation Dr. Brian Toevs ([email protected]) 11 Conclusion This week you were asked to read Chapters 8 and 9 of our textbook. In addition to the lecture you have just followed, you should have met the learning objectives expected of you this week. You will now be evaluated on the retention of this material through your Discussion posts and weekly Quiz. Lessons Learned What is collection and how does it apply to the national critical infrastructure? What is correlation and how does it apply to the national CI? Describe malware and the categories of attack associated with it. Describe state-sponsored malware. Distinguish state-sponsored malware from cybercrime. Explain malware prevention mechanisms. What is reverse engineering and how does it work?
  • 13. Next Week Read Chapter 10 of your textbook about Awareness. You will have a Discussion thread to post and a quiz on the material presented in the textbook. ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 1 Reference Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. Introduction Welcome to our seventh week together covering the protection of our national infrastructure. This week we’ll be examining awareness of cyberthreat intelligence. IMPORTANT: Next week is a short week ending on Wednesday night at midnight! Assigned Reading Textbook Chapter 10 covering discretion as a mechanism of protecting the digital infrastructure of our national cybersecurity infrastructure. Discussion Pick a cyberthreat intelligence provider. Identify its audience and the type of information shared. Provide a history of independent reviews of the provider. Explain why you would use and / or recommend this provider to your peers.
  • 14. I ran out of room for all the logos that I could find ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 2 Learning Outcomes This week we will be learning about how to utilize awareness in support of the national critical infrastructure. We will also look at how we can use passive protections to decrease the likelihood of vulnerability discovery. The less that you look like a target and the less attention you draw to yourself decreases the likelihood of an intentional attack. Awareness
  • 15. What is awareness and how does it apply to the national critical infrastructure? Describe the Cybersecurity Awareness Lifecycle. Explain the difference between perception of awareness at the national level versus the local level on your own network and how they interact. Describe effective use of employee training to increase awareness. Keep current in best practices through personal training. Explain the impact of the mobile workforce on awareness Identify your exposure. Reference Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 3 Research Paper – Case Study This week you have a requirement to create a research paper as a final term project. You are required to select one case study from the textbook, research the topic, and report on the case. Content The structure of your paper should be about seven to eight pages, not including the title, abstract, and reference pages. That’s seven to eight pages of content. Your submission must be in full APA 7th Edition format. Title page (no Running Head):
  • 16. Abstract Body (7-8 pages) Introduction Case Study with appropriate citation Discussion Conclusion Proper Section Headers References (at least four) Correct grammar, spelling, form, and format. ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 4 Awareness The principle of awareness involves an organization understanding the differences, in real time and at all times, between observed and normal status in national infrastructure. This status can include risks, vulnerabilities, and behavior in the target infrastructure. Behavior refers here to the mix of user activity, system processing, network traffic, and computing volumes in the software, computers, and systems that comprise infrastructure. Situational awareness refers to the collective real-time understanding within an organization of its security risk posture. Security risk measures the likelihood that an attack might produce significant consequences to
  • 17. some set of locally valued assets. Amoroso, E. (2012). Cyber attacks: Protecting national infrastructure, 1st Ed. Butterworth-Heinemann. www.samatters.com/ ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 5 Cybersecurity Awareness Lifecycle Cybersecurity awareness is an ongoing effort by the cybersecurity professional. The threat landscape is constantly changing and we must also continuously adapt to the cyberthreats as they adapt and exploit our systems. Closing the Loop Identify Threats – We now know where to go look for cyberthreat intelligence information, how to correlate it, and how to apply it to our cyber defense. Identify Vulnerabilities – Knowing the threats that apply to our systems allows us to prepare a proper and relevant defense. Access Risk Exposure – Prioritize the threat – vulnerability combinations to address the most critical first. Develop Protection and Detection Measures – You will have intrusion detection / intrusion protection systems. Establish Contingency Plans – Systems will go end-of-life. What are you going
  • 18. to do then? Respond to Cyber Security Incidents – Develop an Incident Response Plan. Participate in sector-wide tabletop incident tabletop exercises https://s3-eu-west-2.amazonaws.com/north-live/ ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 6 The Complete Cyberspace Awareness Picture Cybersecurity is about more than just your local network. There is an entire national critical infrastructure sector relying upon you to participate and contribute. Network Awareness – Asset management, control over configurations, vulnerability auditing, patch management, and compliance reporting. Threat Awareness – Monitor and respond to internal incidents and suspicious behavior and integrate external threat intelligence. Mission Awareness – Establish a comprehensive image of your critical dependencies through the cybersecurity awareness lifecycle. Infrastructure Sector Awareness – Support your sector critical infrastructure cyberthreat intelligence providers by sharing your own threat information taken from your internal monitoring systems. https://www.valuewalk.com/
  • 19. ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 7 Training, training, and more training What do you think could be a better way to increase cybersecurity awareness within your organization or across the national critical infrastructure sector than training? Focused Training – Inside the Organization Establish a culture of cybersecurity protection Business email compromise continues to be the most vulnerable aspect of security your local networks Online training providers take the trouble out of your responsibility Repeat the training at least every year Test the effectiveness of your training Focused Training – Sector-wide Infrastructure support training from your sector cyberthreat intelligence resources https://threatshieldsecurity.com/ ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 8 Continuous Ongoing Professional Training Requirement Continuous training for assessing risks, threats, and evaluating trends in best practices for cybersecurity is a mandatory requirement for the cybersecurity professional.
  • 20. DoD 8570.01M Information Assurance Workforce Improvement Program (WIP) The program that you see here is only one of many annual training events tailored specifically to the national critical infrastructure. Most have sector-specific programs that are tailored to the industry that represents your organization. A mix of sector- specific programs and global infrastructure programs will provide an excellent exposure to the best practices and threat mitigation strategies that are going to be critical for you to master in support of your own organization and the national critical infrastructure as a whole. https://public.cyber.mil/training/cyber-awareness-challenge/ ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 9 Awareness Extends Beyond the Physical Boundaries of your Organization Remote workforce, mobile devices, third party providers, Cloud services are the new realities of the modern workforce. This is also true for critical infrastructure systems and organizations. Maintaining communications and oversight of this mobile workforce is going to be the new challenge for organization leadership. Maintaining Communications Awareness includes knowing what your employees are doing.
  • 21. It’s facilitating interactions between them while working away from the centralized office environment. It’s protecting a wider range of systems and devices that may not be ‘owned’ by the organization. It’s providing 24- hour support for teams that used to work set office hours. It’s increasing efficiency of the workplace while maintaining security controls and overall cybersecurity compliance within your sector rules and regulations. https://cyware.com/cyber-threat-situational-awareness ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 10 Know Your Exposure A crucial component of heightening your cyber-defensive awareness is knowing where the threats are originating. Two simple ways to prioritize your focus are through geographic location and industry sector. Where you are and what you do plays an important role in your exposure to cyber- attackers. What are the most Vulnerable Sectors and Regions? California, New York, Texas, and Florida suffer from the greatest number of breaches across the country. Source: Comparitech retrieved from https://docs.google.com/spreadsheets/d/1n2Ck49UtCQf_jtlk2ed Kj9gM_MLCNd4fqVimhsu6AUs/
  • 22. edit#gid=856445414 Industry breakdown of incident response reports are: Healthcare (including Biotech and Pharma) – 25% Financial Services (including Insurance) – 17% Professional Services (Engineering and Transportation) – 17% Retail (including media and entertainment) – 12% Education – 11% Source: BakerHostetler retrieved from https://www.bakerlaw.com/ https://norse-corp.com/ ITS 834 Emerging Threats & Countermeasures Week 7 – Awareness Dr. Brian Toevs ([email protected]) 11 Conclusion This week you were asked to read Chapters 10 of our textbook. In addition to the lecture you have just followed, you should have met the learning objectives expected of you this week. You will now be evaluated on the retention of this material through your Discussion posts and weekly Quiz. Next Week Read Chapter 11 of your textbook about Response. You will have a Discussion thread to post and a quiz on the material presented in the textbook. Remember that next week ends on Wednesday night at midnight. Lessons Learned What is awareness and how does it apply to the national critical infrastructure? Describe the Cybersecurity Awareness Lifecycle.
  • 23. Explain the difference between perception of awareness at the national level versus the local level on your own network and how they interact. Describe effective use of employee training to increase awareness. Keep current in best practices through personal training. Explain the impact of the mobile workforce on awareness Identify your exposure. Don’t forget that the course closes next Wednesday night at midnight. All Discussion posts and your quiz must be completed prior to this deadline. Hello Brittany, I found really important the topic that you selected for your research. The papilloma virus infection is considered one of the main causes of pre-malignant lesions and neoplasia associated with an infectious process. The health care has a tremendous necessity to control and reduce the morbidity provoke by the virus. This virus has a high incidence between the malignant illness that affect the women. During the 80’s the papilloma virus is recognized as the principal etiologic agent that causes cervical cancer (Shaltout, El-Dein, Elsers, Shahine, Abbas, & Osman, 2020). I believe the importance of this topic, encourage us to continue to investigate the etiopathology of this disease to let us view and increase the different treatment options to be more accurate with the principal objective that is diminished the mortality for this cause. Primary care plays an important role in detecting cervical cancer since this disease doesn’t cause
  • 24. symptoms. It is vital that women have regular screening tests to detect any precancerous changes in the cervix that might lead to cancer. Furthermore, the education provided to our patients in general is the key on how we are going to manage them on preventing the risk factors that may develop any malignant or chronic illness. In this particular case the major risk factor for HPV are: number of sexual partners, age, weakened immune system, damaged skin and personal contact (Shaltout et al., 2020). I am interested to read your thought-provoking research. Good-luck. References Shaltout, S. E.-D., El-Dein, H., Elsers, D., Shahine, M., Abbas, H., & Osman, M. (2020). Study the association among human papilloma virus subtypes 16 and 18, codon 72 P53 gene polymorphism, and oral squamous cell carcinoma in Upper Egypt: a case–control study. Egyptian Journal of Surgery, 39(2), 364–370. https://doi- org.su.idm.oclc.org/10.4103/ejs.ejs_215_19 https://quizlet.com/387447750/fnp-pretest-questions-flash- cards/# https://southu-nur.meduapp.com/users/sign_in
  • 25. Hello Marie, you have selected a revolutionary topic. The use of telemedicine has been shown to allow for better long-term care management and patient satisfaction. It also offers a new method of communication and information with the practitioners like via e-mail, interactive chats and video conferences. It also has convenience, reducing the amount of potential travel required for the patient and the physician (Abdellatif & Mohamed, 2020). I believe you have an extensive area to explore on this topic. I would like you to suggest some questions that maybe can help in your investigation: What are the advantages of telemedicine? Why is the telemedicine important in healthcare? What are the pros and cons of telemedicine? Does telemedicine will replace the in-person doctor visits? The last question has an important implication, because I believe that without the physical ability to touch the patient, the doctor is limited to perform a complete physical exam, establish the proper diagnosis and provide the proper care that the patient needs. Finally, I have to recognize that during the COVID-19 pandemic situation, telemedicine has been an enormous help for the healthcare system. Abdellatif, M. M., & Mohamed, W. (2020). Telemedicine: An IoT Based Remote Healthcare System. International Journal of Online & Biomedical Engineering, 16(6), 72.