For the labs this week, we will be using the Lab materials provided by AWS that are part of the AWS Well-Architected Labs web site, located at: https://www.wellarchitectedlabs.com/security/
You will be assigned specific labs to execute for the week.
You will be expected to use an AWS Free Tier account for the execution of the labs. If you already have an AWS account, the cost, in most cases, is less than a dollar per month. I STRONGLY recommend that after you have completed the labs, you tear down (remove) any lab artifacts that will be charge. The labs also recommend the teardown of the lab when complete so please follow those instructions to avoid any unexpected charges.
For this week, we will be executing the following labs:
INCIDENT RESPONSE
https://www.wellarchitectedlabs.com/security/quests/quest_incident_response/
Click on “Start the Lab!” to begin the Lab
You will be taken to: LEVEL 300: INCIDENT RESPONSE WITH AWS CONSOLE AND CLI
Once there, execute the following steps:
OPTIONAL, BUT READ REGARDLESS: Getting Started
Identity & Access Management
Amazon VPC
REMOTE CONFIGURATION, INSTALLATION, AND VIEWING OF CLOUDWATCH LOGS
https://www.wellarchitectedlabs.com/security/200_labs/200_remote_configuration_installation_and_viewing_cloudwatch_logs/
Read the introduction and Click on “Start Lab” (BIG ORANGE BUTTON) – this will guide you through the steps
Follow the steps through the successive steps of the lab
Make sure to TEAR DOWN and artifacts you have created
Each of the sections has step by step instructions for how to execute the lab in AWS.
Critical criminology has gained traction in recent years, with its devotion to questioning the definitions of crime and measurements of official statistics, its critical view of agents, systems, and institutions of social control, and the connections with social justice and policy change (Carrington & Hogg, 2002). Theories of critical criminology are rooted in the structure of society, focusing on power systems and inequality. This paper will focus on labeling theory and crimes of the powerful, as they have a certain dichotomy regarding public vs. private criminality. With labeling theory, those in power have the authority to decide what is the “norm” and what is the “other,” ostracizing the “other” from the rest of society. The stigmatization of public shaming for the common citizen is carried out in all aspects of public life – the labeled individual is looked down on by family, peers, community, and employers, and it is very hard for them to shake the label (Denver et al., 2017; Kroska et al., 2016). Regarding crimes of the powerful, those in power have the privilege to escape stigmatization and consequences of illegal actions. Those in power protect their own through deciding what is illegal or not, and deciding the consequences for illegal actions. These crimes occur in private and are often underreported and under prosecuted, allowing the powerful to escape consequences. Critical analysis will address these dichotomies, challenging theoretical assumptions and criminal justice practices to advocate for structural change. Labeling Theory Background Labeling theory discusses the structural inequalities within society that explain criminality. It can be traced back to Mead’s theory of symbolic interactionism in 1934, which discusses the importance of language regarding informing social action through processes of constructing, interpreting, and transmitting meaning (Denver et al., 2017, p. 666). From there, labeling theory was further developed with Lemert’s distinction between primary and secondary deviance in 1951, which explained how deviance of an individual begins and continues (Thompson, 2014). Finally, and perhaps most influentially, we have Becker’s labeling theory of deviance in 1963, which is the version of the theory that will be guiding this discussion in the essay (Paternoster & Bachman, 2017). In Becker’s labeling theory, he describes crime as a social construct: