“Exploring the Interdisciplinary Conversation: A Research Paper on the Role of ENG240 in Undergraduate Majors” “Excellence in Writing: The Importance of Clear Evidence in Academic Papers”

The library guide for this class (https://nu.libguides.com/ENG240) contains readings in every undergraduate major that requires this class. Read the articles in the tab that corresponds to your major area of study. If you don′t know what your major will be or if you are pursuing general studies, you may choose any subject that interests you.
Compose a 5- or 6-page double-spaced research paper written in response to one or more of the class readings. This paper will focus on an argument. This means it will make an arguable claim on a debatable subject or (possibly) propose and answer a research question in your field. All the assignments in this class have helped you prepare for the final assignment, so you should have much of the work completed already. Now it is time to assemble it all into a coherent whole.
Submit your final paper as a .docx or .rtf file.
Other Requirements:
Citation Style
You will cite your paper in the citation style preferred by the discipline in which you are writing. Include a works cited or references page in the same citation style. If you use a citation style that is not MLA or APA, please let your instructor know which citation style you use.
Sources
Academic writing is a conversation. Your final paper must use five credible sources that support your argument or add to the conversation around your main point. Two of your sources must be peer-reviewed journals. Two of your sources must not be listed on the course library guide. You must find them through your own research.
Acceptable scholarly sources include:
Books/ebooks
Scholarly or Professional Journals
Acceptable popular sources include:
Magazines
Newspapers
Websites (if scrupulously chosen)
In many academic papers, popular sources will not be allowed, but since this paper may make a claim about a topical, polemic subject in your field, popular sources used for the sake of conveying popular interest or public exigency in a problem are acceptable if used judiciously.
The paper should consider all of the basic conventions of academic writing learned in ENG 102 (or whichever introductory composition course you completed at another university). The paper should be thoroughly edited and proofread.
Submission
To repeat, final papers should be submitted as a Microsoft Word document (.doc or .docx) or as a .rtf file. Do not submit as a .pdf, a Microsoft Works file, or a WordPerfect file.
If you think there may have been any technological error when submitting your paper, it is best to email your paper to your instructor as a backup so you will not be counted late.
No Recycling!
If you took English 102 here at National, it may be tempting to improve your ENG 102 paper and turn it in for ENG 240. This is against the rules. You are expected to write a wholly new paper. Your instructor in this class will have taught ENG 102 many times before and will be familiar with all the subjects in ENG 102. On the flip side, since we are focusing on disciplines in this class, it might be tempting to try to recycle a research paper you have written in another class. This is also against the rules and will easily be detected by your instructor. To use the work written in one class to fulfill the requirements of another will be considered academic dishonesty, and the university may reprimand you. This class is about practice. You don′t become an excellent writer with just one try. So, please, recycle your aluminum cans and your plastic water bottles, but recycling papers is not allowed in college-level work.
Criteria for Success
To understand what makes a successful paper, let’s look at the highest levels of the associated rubric.
Critical Thinking
Paper enacts critical thinking in written discourse by evaluating sources, questioning assumptions, being fair to other viewpoints, and using higher-level thinking skills of analysis and synthesis. Critical thinking is clearly developed through productive struggle in the writing process as a way to find, develop, and support ideas with clear evidence.
Text in Conversation/Research
Paper makes a very strong and necessary point that adds to the conversation. Paper finds a research “niche” so research is relevant and valuable in itself. Paper impeccably employs use of summary, quotations, and framing the conversation in both primary and secondary sources. Sources are used judiciously and properly.
Thesis and Organization
Thesis is specific, insightful, and predicts the paper’s main points. Organization moves flawlessly, and the reader at no times feels lost. Paper uses metacommentary and other forecasting strategies. Each paragraph of the paper fulfills its role and feels necessary.
Revision
Paper shows that the student is using the writing process as a thinking process, discovering and changing major points along the way toward significant improvement. Revision efforts show the student does not settle for “good enough,” even if the initial draft is solid.
Grammar, Style, and Citation
Paper is free of grammatical errors that would impede comprehension. Proper citation style use shows the use of a style guide for difficult citations. APA citation style here is my current rough draft

IP Address Attack Report: 10.6.1.50 on Kali OpenVas VM and 10.6.1.100 on Metasploitable VM

IP addresses to attack 10.6.1.50 on Kali OpenVas VM
10.6.1.100 on Metasploitable VM
Introduction
In this section, create an overview and discuss the scope of your network scan. Note the operating system of your attack machine and describe the tools that you will use (Zenmap, OpenVAS). Remember that this report will be reviewed by nontechnical people who may not know about Zenmap or OpenVAS.
Target
In this section, list the IP address and hostname of the target system as well as the IP address assigned to your attack machine. Focus on the open ports and describe the corresponding services associated with the open ports. Maintain the tone you set in the introduction, keeping in mind that the report will be reviewed by some who will not know about FTP or SSH or what functions those services provide on a network. Place the information about the ports and corresponding services into a table and label it appropriately. Zenmap Scan
In this section, use Zenmap to scan the victim machine as well as a screenshot of the connection to the victim system. Show a labeled screenshot of the Zenmap scan. Explain the results and how the vulnerabilities might impact the client. OpenVAS Scan
In this section, use OpenVAS to scan the victim machine as well as a screenshot of the connection to the victim system. Show a labeled screenshot of the OpenVAS scan. Explain the results and how the vulnerabilities might impact the client. Open Socket
Now that you have scanned the system with Zenmap and OpenVAS, go back to either of the reports and look for a port that provided little information about the banner or provided you with an unknown. By manually connecting to the IP and port (socket), you can sometimes discover a vulnerability not listed by the tool. This shows you the importance of not just relying on a tool. Show a labeled screenshot of a connection to a socket providing results using a browser or netcat, etc. If you find something concerning, explain that to the client. Recommendations
In this section, you will suggest that the client amend the contract to add a full penetration test. Explain that you are confident that you will be able to exploit the system and take proprietary data from the network. References
In this section, validate your recommendations using industry standard techniques by including at least two to three references in IEEE format.
Delete the instructional text from the template before you submit

“The Evolution and Impact of a Fortune 500 Technology Company: A Case Study Analysis”

Prior to beginning work on this assignment, read Chapter 1 in the textbook, The Top Technology Companies of the Fortune 500 Download The Top Technology Companies of the Fortune 500 article.
The IT industry is always evolving and IT plays a very important role in business. Several of the technology companies that have dominated IT are Fortune 500 and even Fortune Global 500 organizations bringing in billions of dollars in revenue. Companies like IBM and HP started as hardware vendors, but now have ventured into software, and other areas of IT. Their contributions have shaped the IT industry. For this assignment, you will choose one of the IT industry leaders discussed in the Week One Lecture and create an analysis of that company. Include the following elements in your analysis supporting your statements using the required sources for this assignment. Must use at least one credible source in addition to attached article.
– Explain how the organization started in the IT industry.
– Explain the current state of the organization.
– Evaluate the impact the technology organization you chose has had on business and/or business operations.
– Analyze the role of IT in the chosen business and describe the innovations the organization has launched. – Explain the reasons the innovations were either successes or failures for the company.

HFA BYOD Registration Form: Investigating and Explaining Device Specifications

Scenario:
You will assume the role of a help desk and computing support technician for a fictitious company, Hudson Fisher Associates (HFA). As part of the HFA onboarding process, you have been asked to complete the HFA BYOD Registration Form.
Assignment Information Instructions:
In Section 1 (already done, see CMIT Project 1 with snippets), you will provide the specifications of your personal BYOD computing device. In Section 2, you will provide a brief description/explanation of the specifications of your device.
This task will require you to investigate your machine’s internals. How you locate your system information will vary by operating system.
How Will My Work Be Evaluated?
For this assignment, you are asked to complete the Hudson Fisher Associates (HFA) Bring Your Own Device (BYOD) Registration Form to ensure your device meets the organization’s minimum information technology (IT) baseline specifications and security requirements. The first part of the assignment requires you to access and document your machine’s specifications. In the second part, you will provide explanatory details on the specifications.
By documenting your specifications and explaining your results in an effective narrative format, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

“Digital Badging for Professional Development: Opportunities and Challenges in the Modern Workplace”

This Discussion aims to spark a critical and creative exploration of how digital badging can be used to recognize and foster professional development (PD) across the professions. Drawing upon the insights from the week’s materials and your own experience and understanding of digital badges, answer all of the following:
Applications: How are digital badges currently used to support and recognize professional development in your particular profession? How can digital badges contribute to your own professional development goals?
Considerations: What are the potential challenges associated with using digital badges for PD in your profession? Consider issues such as badge design, verification, and alignment with learning objectives.
Impact: How can badges contribute to a culture of continuous learning and professional growth?
Services: Explore several existing frameworks/services for creating and offering digital badges. Which would you choose to create and offer badges and why?
Innovation Phase: Of the five key phases of Gartner’s Hype Cycle, where would you classify the infusion of badging as an innovation? Support your answer with evidence, an image, and data from the most current Hype Cycle report and graph.
The discussion threads in this course require a high level of thought and investigation on a
number of important topics and related questions. Your posts must demonstrate course-related
knowledge from the assigned readings and presentations, and you are to support your assertions
with at least two scholarly research articles in current APA format. Sources cited must have been
published within the last five years

Title: The Impact of Harmonious Definitions on Cyber Laws: A Critical Analysis of the Draft United Nations Convention Against Cybercrime and the Computer and Fraud Abuse Act Q1. According to both the Draft United Nations Convention Against Cybercrime and the Computer

In Chapter 2 of Law, Policy & Technology: Cyberterrorism, Information Warfare, and Internet Immobilization, Eduardo Gelbstein discusses the resulting economic costs consequential to information security incidents, and in Chapter 8, Pauline Reich discusses the lack of harmonious definitions on a global basis and its impact on cyber laws. Read the Draft United Nations Convention Against Cybercrime and the definitions found in the Computer and Fraud Abuse Act (“CFAA”), 18 U.S.C. Section 1030. Then, keeping mind Ms. Reich’s comments about the lack of harmonious definitions.
Q1. Could legitimate activities like penetration testing be considered “access without authorization” under either legal framework? Why or why not?
Q2. Write a brief essay, using a Word document in APA format, not to exceed 3 paragraphs, on an article from a contemporary academic or media source which demonstrates one or more concept(s) and/or topic(s) discussed in the assigned reading for this week. If the article cannot be accessed from a url (i.e. an article from a professional association where you are a member), please upload a pdf of the article. Be sure to write a few sentences identifying the basis for selecting this article and how the events described in the article specifically correlate to a concept/topic/idea from the current week’s course materials.
NOTE: Please provide one source for question and answer them separately in same page.

The Evolution and Impact of Cloud Computing in the Information Technology Industry

You are required to write a 5 to 10-page, double-spaced (excluding Cover page, Table of Contents (TOC), Reference page, and Index) paper on a technical topic of your choice using Microsoft Word. You are to use the built-in features of MS Word for the Cover page, TOC, Reference page, and Index. For the body of the paper all Headings must use the Styles feature of MS Word. It is reasonable to ask that there be one reference per page. This will amount to a total of five in-text citations. However, I will accept no less than 3 in-text citations. Use Times New Roman, 12 Point font, 1-inch margins all around. Also, please do not include images unless you are proficient using that feature of MS Word.
All these assignments are cumulative, which means they build on each other as follows:
TOPIC : This first submission should be your Topic written as an Introduction in your Microsoft Word document. The Introduction should discuss what your topic is and why you chose it. Your submission should have a Cover page, TOC, with one entry (Introduction) and one page with a Heading 1 titled “Introduction”.
OUTLINE : This would be your updated Table of Contents with multiple entries as Headings (level 1, 2, and 3 if necessary). Each Heading 1 should have a paragraph explaining what you will be discussing. Your Outline should have at least 5 Heading 1s.
FIRST or Rough DRAFT : Your document is coming together and should be very close to completion. The TOC is almost complete. Each Heading has prose written under it, and you should have in-text citations, figures, tables (if appropriate), and a Reference page. INDEX : This is added to your First Draft using the Index feature of MS Word and will appear in the TOC. FINAL PAPER : This is the completed MS Word document with a Cover Page, Introduction, TOC, List of Tables and Figures (if any), Body, Reference page, and Index. VERY IMPORTANT: Don’t forget to include a Heading 1 that discusses the Scope and Principal features of Technical Writing in general, not specific to your paper. You have two shots at submitting your Final draft. I expect your First Final Draft will have the updates from my rough draft feedback. I suggest you take advantage of this opportunity for additional feedback.
Remember, any Information Technology related topic is fine!
What do you find interesting in the information technology industry?
Take a look at the Gartner link and other interesting links provided in the COURSE MATERIALS area in the LESSONS section for some ideas.
Review IT-based literature. These websites will give you some thoughts on Technology.
Go to PCMagazine.com (http://www.pcmag.com/),
PCWorld.com (http://www.pcworld.com/),
ITWorld.com (http://www.itworld.com/).
Also, what are you experiencing in your day-to-day operation in technology?

Title: The Rise of 5G Technology in Telecommunications: Current Trends, Future Prospects, and Regulatory Challenges

Research and select a current trend in the area of telecommunications. Prepare a 10-15 page paper in Microsoft Word.
At a minimum include the following:
Detailed descriiption of the area researched
Technology involved in the area
Future trends in the area
Example companies involved in the area
Regulatory issues surrounding the area
Global implications for the area
References (minimum of 10)