Explains personality disorders

We compared narcissism, psychopathy, and borderline personality disorder. Choose two, and describe them with at least five key characteristics for each, and give a real life example of someone with this particular personality disorder

Explains personality disorders, including possible causes and how you can access treatment and support. Includes tips for helping yourself, and guidance for friends and family.

How is idealistic evil similar to instrumental evil?

How is idealistic evil similar to instrumental evil? How are they different? Give real-life examples of idealistic evil and instrumental evil that highlight the differences between the two.

I recently impulse-bought A Philosophy of Evil by Lars Svendsen, a Norwegian philosopher I’d never heard of. The book called out to me from the bookstore shelf, the title on the stark cover promising a brave attempt to tackle a very difficult subject head-on.

The nature of evil — along with the closely related question of the nature of good — is one of the primary unresolved questions of ethical philosophy, and has remained unresolved from the age of Plato to today.

To frame the terms “good” and “evil” in a philosophical setting is to suggest that they can be defined in some kind of meaningful, pragmatic and universal way, but few attempts to provide these definitions have ever been considered successful.

Good scientists try to separate themselves from any emotional reaction

 

Baumeister makes a point that good scientists try to separate themselves from any emotional reaction in order to gain better understanding. Initially many of you agreed with Baumeister, but that was before we encountered some of the details of evil and theories related to evil. Now that the course is over, think about if you agree with his assessment of separating oneself from emotion in order to study and understand evil. Is it possible, and appropriate, to remain emotionally detached when studying evil actions?

Your opinion should only be the start of your response, a good grade will only be achieved if you use examples from the readings, the videos, and/or our discussion to explain and support your answer.

Replication of research that Baumeister performed

Replication of research that Baumeister performed

You write down a story about when you made another person angry and a different story about when someone made you angry. This activity was a replication of research that Baumeister performed in the past.

  1. Describe two of the key differences between the two competing stories found in the research, and give examples of each. (3 marks)
  2. Define the magnitude gap, and relate it to the competing stories of victim and perpetrator. (2 marks)
  3. Describe five of the myths of evil and how they relate to the victim’s perspective of events. (5 marks)

Devil’s advocate by challenging the legitimacy, effectiveness, or efficiency

Play devil’s advocate by challenging the legitimacy, effectiveness, or efficiency of the Adoption and Safe Families Act (ASFA)

What is a devil’s advocate? Learn the meaning of the phrase, and what it means to play the devil’s advocate in conversation.

a Roman Catholic official whose duty is to examine critically the evidence on which a demand for beatification or canonization rests. 2 : a person who champions the less accepted cause for the sake of argument.

Describe four reasons why evil grows and spreads within a group

aumeister describes four reasons why evil grows and spreads within a group (i.e., The Diffusion of Responsibility, Division of Labour, Trust in Groups, Private Doubt).

Define three (3) of these reasons, and give an example of each using details of real-life corporate actions that illustrate each (feel free to use examples from our discussion or from either documentary The Corporation or The New Corporation).

List and describe (with examples) five of the strategies outlined by Baumeister that people might use to reduce the guilt they feel before or after committing evil

Many choose to not do evil because of the debilitating amount of guilt they experience whenever harming another person. List and describe (with examples) five of the strategies outlined by Baumeister that people might use to reduce the guilt they feel before or after committing evil.

When there is harm/evil, there are often people who are not involved who are witnesses of the event. Witnesses often say or do nothing in response. How is the passivity and inaction of the witness perceived by the perpetrators of harm? Give real life examples. (5 marks)

How might a harmdoer manipulate a situation to encourage no response from the onlookers? Give an example of this.

Computer virtualization

For a business to expand and grow, the IT infrastructure must be able to support changing demand for services. Businesses may grow by expanding the existing business, or they may grow through mergers and acquisitions. When companies merge, the newly combined company needs systems to support it.

Research multiple options for computer virtualization and the “cloud” environment. Describe each option and how it differs from other alternatives. Explain how different options might affect a business’ ability to expand and grow naturally. Would any of the options enhance or inhibit the business’ ability to enter into mergers with other companies and combine business systems? Clarify any risks or constraints associated with a particular option. From a cybersecurity perspective, is cloud computing safer or riskier? Provide examples to support your answer. Based on the business you chose in week 1, would some virtualization and cloud computing options be a better fit than others to enable your business to grow? Please explain.

This paper must follow the formatting guidelines in The Publication Manual of the American Psychological Association [APA Manual] (2020), (7th ed.) using Times New Roman 12-point font. Remember to support your statements, including opinions, with factual material (e.g., citations/attribution).  This research-driven paper, as the minimum, must contain:

  • Four to five pages of text-based content
  • At least, three references from the Wilmington University library, but it can include additional references

Security risk analysis

a)  Select from the following the best definition of security risk analysis:
A) Risk analysis looks at the probability that your security measures won’t stop a hacker breaking in to your system.
B) Risk analysis looks at the consequences of being connected to the Internet.
C) Risk analysis looks at the probability that a hacker may break in to your system.
D) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them.
E) Risk analysis looks at the probability that a vulnerability exists in your system.

b)  What would be an example of a violation of the principle of confidentiality?
A) An employee accessing a payroll database to find out how much others are paid.
B) Financial records being altered to make it look like a company made more than they did.
C) Stealing records from a company to sell to other interested markets.
D) A file server going down due to lack of good maintenance of systems.

c)  A company is developing a new technology that is expected to become a huge success. The CSO is concerned about someone stealing the secrets related to this technology. Which of the following will help the CSO identify potential dangers related to the loss of this technology?
A) Vulnerability assessment
B) Privacy threshold assessment
C) Threat assessment
D) Privacy impact assessment

d)  Which of the following answers describes best what actions have to be taken in a certain situation like how long before users must change passwords, actions to take if a user steals corporate data or an infiltration takes place?
A) Policies
B) Documentation
C) Regulations
D) Procedures

a)  While using which type of networking device would each host ‘see’ all other traffic on the network?
A) network router
B) token ring network
C) network hub
D) network switch

b)  How does the use of a router differ from a bridge in telecommunication?
A) Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network.
B) A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
C) A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level.
D) A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.

c)  What destination MAC Address would be added to a packet on the route to a remote computer?
A) MAC Address of the far side of the default gateway
B) MAC Address of your computer
C) Exterior MAC Address of the remote Server
D) Interior MAC address of default gateway

d)  Which of the following devices is used to interface computer networks that use different communication protocols?
A) Bridge
B) Hub
C) Gateway
D) Router

a)  Which of the following would provide the strongest encryption?
A) Random one-time pad
B) DES with a 56-bit key
C) AES with a 256-bit key
D) RSA with a 1024-bit key

b)  Which concept of cryptography is used to make the ciphertext look significantly different than the plaintext after encryption?
A) Diffusion
B) Obfuscation
C) Collision
D) Confusion

c)  Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other’s public key. A wants to send B some message M. A selects random DES key K and send B the following two messages:

— Epub(B)( K, Sigprv(A)(K))
— EK(M)

“E” means encryption and “Sig” means digital signature. Which of the following statement(s) is true?
(A) Only B can decipher the contents of the message M
(B) B is certain that the message M is from A
C) B can prove to a third party that the message M arrived from A.

d)  You need to use an encryption protocol to encrypt credit card data within a database used by the application. Which of the following would be the fastest, while also providing strong confidentiality?
A) AES-256
B) DES
C) Blowfish
D) SHA-2
a)  Which of the following would a security administrator use to encrypt transmissions from an internal database to an internal server, keeping in mind that the encryption process must add as little latency to the process as possible?
A) ECC
B) RSA
C) SHA
D) 3DES

b)  Which of the following is the preferred system that provides both data security and non-repudiation?
A) PPTP – Point-to-Point Tunneling Protocol
B) 3DES – Triple Data Encryption Standard
C) PKI – Public Key Infrastructure
D) RSA – Data Security

c)  When a user needs to provide message authenticity, in the absence of a secure channel, what options may be the best?
A) Send a digital signature of the message to the recipient
B) Encrypt the message with a symmetric algorithm and send it
C) Create a checksum, append it to the message, encrypt the message, then send it to the recipient
D) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

d)  Which of the following is the best solution to protect the confidentiality of data on a laptop in the case it is stolen?
A) File level encryption with very strong alphanumeric passwords
B) Biometric authentication and cloud storage
C) Whole disk encryption with two-factor authentication
D) BIOS passwords and two-factor authentication

a)  Which of the following attacks enables a malicious person to view network traffic if the attacker is on the same network as the users?
A) Smurf attack.
B) Port redirection attack.
C) Man-in-the-middle attack.
D) DoS attack

b)  An attacker sent multiple broadcast messages to the network routers, spoofing an IP address of one of the network servers. This caused the network to send a flood of packets to that server and it is no longer responding. What best describes this attack?
A) DDoS attack
B) TCP SYN flood attack
C) Smurf Attack
D) TCP hijacking attack

c)  A network admin has noticed that several machines on her network are infected with malware that is sending a flood of packets to a target external to the network. What best describes this attack?
A) Backdoor
B) SYN Flood
C) DDoS
D) Botnet

d)  Which of the following is the most effective method to mitigate session hijacking?
A) Denying traffic originating from the Internet that shows an internal network address
B) Forcing users to reauthenticate before allowing transactions to occur
C) Reducing the amount of time before the reset of an unfinished TCP connection
D) Setting up filters on external routers to drop all incoming ICMP packets

The program that executes a malicious function

Identify the program that executes a malicious function of some kind when it detects certain conditions.

Group of answer choices

Multipartite virus

Logic bomb

Polymorphic virus

SYN flood

Which of the following is a typical network infrastructure defense?

Group of answer choices

Security awareness training

Workstation backup

Operating system patch

Choke point

Which of the following is a weakness of WLANs?

Group of answer choices

WPA

RF shielding

User groups

SSID beaconing

Which of the following is a typical application defense?

Group of answer choices

Security awareness training

Change detection software

IDS

Choke point

 

 

 

You are in a meeting about system security with your organization’s top management. Explain the placement and purpose of a border firewall deployment.

This popular port-scanning tool permits an attacker to find hosts via ping sweeps, probe for open TCP and UDP ports, and identify operating systems and applications. It is available for UNIX, Linux, and Windows.