Virtual machine

 

1. Create a virtual machine
Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.
Create a new Virtual Machine VM.
Install Kali Linux in the new Virtual Machine (use default settings).
Refer to the Kali Linux website located in the topic Resources for additional resources.
As you go, take instructional notes and screenshots that will help to reproduce your process.
Document the installation process using the “Report Template,” located in the Class Resources.
APA format is not required, but solid academic writing is expected.
**Plagiarism is checked for both**

2. Personal Data search.
Virtualization creates a safe sandbox for you to experiment with the various security tools that will be used in the class.Effective research is critical for success in the cybersecurity field.
1. Perform a data search of yourself or a family member. Use the PeekYou website located in the required readings or a similar free site.
2. Become familiar with the current cybersecurity vocabulary utilized by federal agencies such as the NSA, CISA, NIST, NCSD, etc.
In a 500–750-word report, describe:
1. Findings of your personal data search: Use screen captures and step-by-step instructions to document your findings.
2. The common security threats that can affect your digital footprint. Describe several potential system attacks and the actors that might perform them.
3. Provide a brief definition of the following terms: cyber operations, cybercrime, cyberlaw, cyber threats, risk analysis, cyber-attack/breach, threat mitigation, and disaster recovery.
4. The legal and ethical issues concerning “cyberstalking.” In cyberspace, people can act in ways they normally would not if their physical presence were required. For example, school bullying used to be over when a victim transfers to another school, but with cyberstalking, a victim is forever a victim, sometimes resulting in the victim’s suicide because of cyberstalking. Propose legal regulations to combat cyberstalking. Discuss your proposed regulations from a Christian worldview.
5. How to use the “defense against attacks” theory to protect your digital identity. Make sure to include a description of several cyber defense tools/measures, methods, and components that can help repel attacks.

 

Sample Solution

A Virtual Machine (VM) is a resource technology that uses software instead of a physical computer to run programs and deploy apps. One or more virtual “guest” machines run on a physical “host” machine.  Each virtual machine runs its own operating system and functions separately from the other VMs, even when they are all running on the same host. This means that, for example, a virtual macOS virtual machine can run on a physical PC. Virtual machine technology is used for many use cases across on-premises and cloud environments. More recently, public cloud services are using virtual machines to provide virtual application resources to multiple users at once, for even more cost-efficient and flexible computing.  

f we reduce our philosophy and theory of mind to one excluding mental, we deduct the importance of experience in understanding a phenomenon. Jackson explains that “mental states are inefficacious in respect to the physical world” (Jackson). Qualia only impact other mental states rather than physical states. Jackson reiterates this by providing three reasons. The first being causality. Just because A follows B does not mean B can follow A. The B follows A hypothesis can be refuted by proving there is a common underlying causal process for each distinct effect. Second, Jackson uses evolution to prove his dualism. Polar bears have evolved to have a thick coat. This thickness makes the coat heavy. Thus, the polar bears experience what it is like to carry a heavy coat. This is clearly not conducive to survival. Therefore, from Darwin’s Theory we know that any evolved characteristics are either conducive to survival or a by-product of an evolutionary action that is conducive to survival. Jackson uses this support his argument against physicalism: “qualia are a by-product of certain brain processes that are conducive to survival” (Jackson). Third, Jackson emphasizes the relationships between how we know our minds through behavior. We only know about others’ minds through observing their behavior. So, we must ask: how can a person’s behavior accurately reflect that he has qualia unless they conclude that behavior is an outcome of qualia? This gives rise to the main weakness of Jackson’s view – there is no proper evidence for the refutation of epiphenomenal qualia. Another weakness of Jackson’s view is the lack of clarity of source. Where do these qualia come from? If not physical, then where? This brings into questions spirits and “upper powers,” such as God, the existence of which are heavily debated in the scientific community. Despite this, the validity of dualism (and the lack of proving dualism to be incorrect), is a strong argument and will continue to allow Jackson’s argument to be considered valid.

Because Jackson clearly refutes any existence of physicalism in his explanation of phenomenal q

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.