PATHOPHYSIOLOGY DISC 2,3,4

  

Read the discussion prompts. In 200250 words, create an initial post using the prompts to guide your content. Then, respond to at least two of your peers posts in a substantive manner. I agree or Good point are not accepted as substantive responses to your peers.

Discussion Prompts: Initial Post

Don't use plagiarized sources. Get Your Custom Essay on
PATHOPHYSIOLOGY DISC 2,3,4
Just from $13/Page
Order Essay

1. Choose one of the diseases or disorders you studied in this module. You can refer to the table in the Module 2 Learning Guide to do so, if needed.
2. Write a fictional case study for this disease. DO NOT mention the name of the disease within your initial post. Include the following information in your post:
Etiology: Is it an infection? Is it genetic?
What risk factors are associated with this disease or disorder?
What symptoms or clinical manifestations (e.g., blood work, X-ray) can be seen with this disease?
What is the diagnostic testing for this disease?

Discussion Prompts: Responses Posts

Response Post 1:In your response posts to each other, the student responding will predict what disease or disorder the fictional client in the case study has. In addition, the student will respond with treatments, medications, and prognosis for the client in the case study. You must include sources in your response post (e.g., pictures and videos of this disease).

Response Post 2:After the case study has been solved, the person who initially posted the fictional case study must respond to the individual(s) who guessed the disease or disorder. In your response, discuss if the responder(s) is/are correct and present 12 more facts about the disease or disorder. No sources are required for this second response post.

Example Case Study from Textbook:

Sara, a 51-year-old woman, was recently diagnosed with an autoimmune disease. She had made an appointment to see her physician because she was experiencing chronic low fever, muscle pain, and joint pain. Her physician noted a butterfly-shaped rash on Saras face and ordered follow-up tests. Laboratory results revealed a positive antinuclear antibodies test, anemia, and thrombocytopenia. Follow-up anti-double-strand DNA and anti-Sm antibody tests were positive. What is the condition? What are your clues?

Citations:

Capriotti, T. M. (2020).
Davis Advantage for Pathophysiology: Introductory concepts and clinical perspectives(2nd ed.). F. A. Davis Company.

Due

DISCUSSION WEEK 2

Initial post due Wednesday, by 11:59 p.m.
Responses to two classmates posts due Saturday, by 11:59 p.m.
This schedule ensures that you have adequate time to prepare initial responses, read through the posts, and supply meaningful reactions that extend the conversation.

Submission and Assessment Guidelines

Post to the Discussion Board in Canvas. For help on how to submit discussion posts, review

How do I reply to a discussion as a student?
Links to an external site.

Respond to at least two (2) of your peers posts in a substantive manner.
Remember that a substantive post should provide a reason for your beliefs. In other words, why do you feel the way you feel? Your opinion is acceptable, but you must have a solid rationale for it. You will need to respond critically and persuasively.
Responses that include comments like I agree or Good point are not accepted as required responses.
Review the Discussion Board Rubric for grading criteria. For instructions on how to view the rubric for this assignment, review

How do I view the rubric for my graded discussion?
Links to an external site.

This discussion is worth 25 points.
Discussions posted after the due date but within the assigned week will receive a 10% deduction. No points will be earned for posts submitted after the Saturday deadline.

DISCUSSION 3

Overview

In this module, you were introduced to the cardiovascular and respiratory systems. Use what you learned about this topic to participate in the discussion.

Instructions

Read the discussion prompts. In 200250 words, create an initial post using the prompts to guide your content. Then, respond to at least two of your peers posts in a substantive manner. I agree or Good point are not accepted as substantive responses to your peers.

Discussion Prompts: Initial Post

1. Part 1: Evaluate the course so far (including Module 3). Write 23 paragraphs about your experience in the course to this point. What has been the most confusing topic for you? What have you found the most interesting? What topic(s) would you like to know more about? How do you plan to study for the midterm exam in the next module? Do you have any questions for the instructor about the course or the exam?
2. Part 2: What cardiovascular or respiratory disease did you think was most interesting in this module? Why did you choose this disease?

Discussion Prompts: Responses Posts

1. Give helpful feedback for any students who may have expressed difficulties in their post with navigating the course or being successful in their time management. What study tips do you have for them?

Due

Initial post due Wednesday, by 11:59 p.m.
Responses to two classmates posts due Saturday, by 11:59 p.m.
This schedule ensures that you have adequate time to prepare initial responses, read through the posts, and supply meaningful reactions that extend the conversation.

Submission and Assessment Guidelines

Post to the Discussion Board in Canvas. For help on how to submit discussion posts, review

How do I reply to a discussion as a student?
Links to an external site.

Respond to at least two (2) of your peers posts in a substantive manner.
Remember that a substantive post should provide a reason for your beliefs. In other words, why do you feel the way you feel? Your opinion is acceptable, but you must have a solid rationale for it. You will need to respond critically and persuasively.
Responses that include comments like I agree or Good point are not accepted as required responses.
Review the Discussion Board Rubric for grading criteria. For instructions on how to view the rubric for this assignment, review

How do I view the rubric for my graded discussion?
Links to an external site.

This discussion is worth 25 points.
Discussions posted after the due date but within the assigned week will receive a 10% deduction. No points will be earned for posts submitted after the Saturday deadline.

DISCUSSION 4

Overview

In this module, you were introduced to musculoskeletal disorders. Use what you learned about this topic to participate in the discussion.

Instructions

Read the discussion prompts. Create a PowerPoint slide or Word document (which will be your initial post) using the prompts to guide your content. Then, respond to at least two of your peers posts in a substantive manner. I agree or Good point are not accepted as substantive responses to your peers.

Discussion Prompts: Initial Post

1. Choose a topic in Modules 14 that you enjoyed or would like to know more about.
2. Research this topic and create ONE PowerPoint slide or a Microsoft Word document that you can present to the class. You should include the name of the disorder or disease, pictures, and any interesting facts about it.
3. Record and upload a 12 minute video discussing your topic. You can use the

Canvas Record
Links to an external site.
feature or

upload an MP4 from your computer or phone
Links to an external site.
.

Recording Options:
1.

Zoom
Links to an external site.

2.

Canvas
Links to an external site.

3.

Screencast
Links to an external site.

4.

Loom
Links to an external site.

4. In your post, include the upload of your single PowerPoint slide or Microsoft Word document.

Discussion Prompts: Responses Posts

1. Give feedback to two students videos and/or content. You are welcome to include another video or supply written feedback. In your posts, you can offer helpful topics regarding the video or information regarding the content. The discussion post for this module is designed to be a helpful way for you to make sure you know the technology required for the presentation.

Due

Initial post due Wednesday, by 11:59 p.m.
Responses to two classmates posts due Saturday, by 11:59 p.m.
This schedule ensures that you have adequate time to prepare initial responses, read through the posts, and supply meaningful reactions that extend the conversation.

Submission and Assessment Guidelines

Post to the Discussion Board in Canvas. For help on how to submit discussion posts, review

How do I reply to a discussion as a student?
Links to an external site.

Respond to at least two (2) of your peers posts in a substantive manner.
Remember that a substantive post should provide a reason for your beliefs. In other words, why do you feel the way you feel? Your opinion is acceptable, but you must have a solid rationale for it. You will need to respond critically and persuasively.
Responses that include comments like I agree or Good point are not accepted as required responses.
Review the Discussion Board Rubric for grading criteria. For instructions on how to view the rubric for this assignment, review

How do I view the rubric for my graded discussion?
Links to an external site.

This discussion is worth 25 points.
Discussions posted after the due date but within the assigned week will receive a 10% deduction. No points will be earned for posts submitted after the Saturday deadline.

SHOW MORE…

Lab 3

Write this reflection for lab
Weekly Learning and Reflection
In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you’re confused about. Questions asked here will be summarized and answered anonymously in the next class.

Lab-3: Cyber Threat Analysis

In Lab-3, you will do some cyber threat analysis by browsing several websites and services maintained by either security companies, volunteers, or hackers. Nothing will harm your computer as long as you don’t push the limits by clicking on the links and ignoring the browser’s security warnings.
To ensure %100 security, you can consider using the Firefox browser inside your Kali VM instead of using the browser at your computer. If you proceed with your computer, then it is recommended to update your browser if it is out of date.
Section-1: Analysis of zone-h.org
Zone-h.org is used and most probably operated by hackers to share the websites that they defaced. They don’t provide any details on how they hacked the website; instead, they share the URL of the defaced website and a mirror for the defaced webpage.
If you are planning to use your computer instead of Kali VM, it is strongly suggested to open a new incognito/InPrivate/Private browser window for the following steps:
1) Enter the website:
www.zone-h.org

2) Click on the Archive menu on the top menu. You will see the result screen similar to below:

There is a lot of information on defaced websites on this page, including the original URL and the hacked version of the website (on the mirror link at the rightmost column). Hacked versions of the websites give some clues on the motivations of the hackers; you can see political reasons, have some fun, or a basis to make cyberspace secure.
The legends M and R provide more insight on the defacement. M means mass defacement. If you click one of the M letters, you can see the defacements initiated from a specific IP address. Mass defacements are usually succeeded by the help of scripts. Hackers prepare the scanning and exploitation scripts, scan thousands of websites for a particular vulnerability, and exploit the ones that have the specific vulnerability.
3) Click on one of the M letters you spotted, and see the websites defaced from the same IP address. You can see the IP address in the address bar.
Note: You can perform a whois query to see the detailed information about the IP address you found, including contact information and geographical location.

4) To see a redefacement, you can click one of the R letters you spotted.
Below is an example screenshot of a redefacement, myschool.ng website has been defaced twice in two years.

5) You can click the ENABLE FILTERS link at the top and search for the websites with gov extension. You can see the result of this query below.

Section-2: Pastebin.com
A pastebin site hosts the text-based data such as source codes, code snippets, and anything worth sharing. Pastebin.com is the oldest pastebin site. Pastebin.com had been hosting the pastes of the hacktivist group, Anonymous. After pastebin.com started monitoring the site for illegally pasted data, Anonymous began to a new service:
https://anonpaste.org. This pastebin site is used for hacktivist purposes. Anybody can paste text here and -so-called- securely sent. You cannot search among pasted content.

There are many small and restricted pastebin sites on the dark web. A specific hacker group may share things like exploit codes, malicious payloads internally. They also use the pastebin services to share the information they stole like passwords, credit card numbers, etc.

You can see the public pastes in the pastebin website. Google indexes public pastes. You can perform the following searches on Google and check whether there are pastes in pastebin.com. Please review the search sites to get an idea of what kind of information is being shared among hackers in the pastebin.
Exploit code site:pastebin.com
Shellcode site:pastebin.com
Malware code site:pastebin.com
Keylogger code site:pastebin.com
Section-3: Interactive Threat Maps
There are many websites and services that provide threat intelligence data. Some of them provide information for free; most of them offer paid subscriptions.

These are two services from Cisco and SANS Institute, respectively.

https://talosintelligence.com/reputation_center/: Shows the malicious hosts spreading malware and sending spam e-mail on the world map. You can check the reputation of the IP addresses and domain names on this serves as well.

https://isc.sans.edu/threatmap.html: Shows the density of the different threat feed per country.

SANS Institute provides a FightBack service on this address:
https://isc.sans.edu/fightback.html. They forward the strong cases to the ISPs after analyzing the logs and other evidence provided by the Internet user.

Last but not least, the following blog page provides the top 10 cyber-attack maps; it is worth reviewing as it gives the screenshots and a fair amount of information.

https://securitytrails.com/blog/cyber-attack-maps

Section-4: Fighting with Spam and Malware
Thousands of phishing websites try to trick people into believing that they are on the official website so that they try to steal sensitive information like passwords, credit card numbers, SSNs. If you come up with such a website, you can submit it to Phishtank.org. Phishtank database has been used by reputation engines and virus scanners, such as virustotal.com. Therefore you help to secure cyberspace. The website of PhishTank is
https://phishtank.org.

URLhaus does a similar thing for the websites that spread virus. The website of URLhaus is
https://urlhaus.abuse.ch.

You can review both web services. For example, enter the PhishTank website and see the recent submissions similar to below:

You can click on the ID numbers to see the phishing websites.
Section-5: Checking URLs
Below services are just two examples by which you can check websites:

https://www.virustotal.com: Check the website if it spreads malware, or it is a phishing website. Currently, VirusTotal makes the controls of the submitted URLs using ~80 different antivirus services.

https://sitecheck.sucuri.net: Check the website for malware and blacklisting.

You can choose some websites from PhishTank and URLhaus and scan them using VirusTotal and Sucuris SiteCheck.
Weekly Learning and Reflection
In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you’re confused about. Questions asked here will be summarized and answered anonymously in the next class.

image4.png

image5.png

image6.png

image1.png

image2.png

image3.png

  

Leave a Reply

Your email address will not be published.

Related Post

businessbusiness

  DQ1 100-150 words pls Off-the-shelf enterprise IS often forces an organization to redesign its business processes. What are the critical success factors that make sure the implementation of an enterprise

READ MOREREAD MORE
Open chat
💬 Need help?
Hello 👋
Can we help you?