Motivational Interview Paper
A. Introduction: Overview of Motivational Interviewing:
Begin your paper by providing an overview of Motivational
Interviewing (MI). Ensure you include one article and
summarize the main components of MI and populations that are
appropriate to use the MI principles.
B. Assessment of Videos:
Using the key components of MI, assess the role play videos in
your chosen video for appropriate integration.
C. Discriminatory Analysis Section:
What would you do differently or similarly in the video you
chose to analyze? Provide rationales that are specific utilizing
sources for substance and depth.
D. Plan and Summary:
Integrate evidence-based information using one to two scholarly
articles in your plan and summary of the scenario you watched
(opioid or alcohol). How does the concept of coping play out in
the scenario you watched? Integrate coping psychotherapeutic
skills, as well as teaching and education, into your plan and
summary.
Paper Requirements
Your paper should be three to four pages in length, excluding a
required cover sheet and references page that includes one to
two textbooks and two to three scholarly articles (that were
published no longer than three years ago). Use APA formatting
for all components of your paper.
https://youtu.be/XsmY1VVxUIE
https://youtu.be/67I6g1I7Zao
Writing Assignment Rubric
Note: Scholarly resources are defined as evidence-based
practice, peer-reviewed journals; textbook (do not rely solely on
your textbook as a reference); and National Standard
Guidelines. Review assignment instructions, as this will provide
any additional requirements that are not specifically listed on
the rubric.
Writing Assignment Rubric – 100 Points
Criteria
Exemplary
Exceeds Expectations
Advanced
Meets Expectations
Intermediate
Needs Improvement
Novice
Inadequate
Total Points
Content of Paper
The writer demonstrates a well-articulated understanding of the
subject matter in a clear, complex, and informative manner. The
paper content and theories are well developed and linked to the
paper requirements and practical experience. The paper includes
relevant material that fulfills all objectives of the paper.
Follows the assignment instructions around expectations for
scholarly references. Uses scholarly resources that were not
provided in the course materials.
All instruction requirements noted.
30 points
The writer demonstrates an understanding of the subject matter,
and components of the paper are accurately represented with
explanations and application of knowledge to include evidence-
based practice, ethics, theory, and/or role. Course materials and
scholarly resources support required concepts. The paper
includes relevant material that fulfills all objectives of the
paper.
Follows the assignment instructions around expectations for
scholarly references.
All instruction requirements noted.
26 points
The writer demonstrates a moderate understanding of the
subject matter as evidenced by components of the paper being
summarized with minimal application to evidence-based
practice, theory, or role-development. Course content is present
but missing depth and or development.
Does not follow the assignment instructions around expectations
for scholarly references. Only uses scholarly resources that
were provided in the course materials.
Most instruction requirements are noted.
23 points
Absent application to evidence-based practice, theory, or role
development. Use of course content is superficial.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
Content of paper is inaccurately portrayed or missing.
Does not follow the assignment instructions around expectations
for scholarly references. Does not use scholarly resources.
Missing some instruction requirements.
20 points
30
Analysis and Synthesis of Paper Content and Meaning
Through critical analysis, the submitted paper provides an
accurate, clear, concise, and complete presentation of the
required content.
Information from scholarly resources is synthesized, providing
new information or insight related to the context of the
assignment by providing both supportive and alternative
information or viewpoints.
All instruction requirements noted.
30 points
Paper is complete, providing evidence of further synthesis of
course content via scholarly resources.
Information is synthesized to help fulfill paper requirements.
The content supports at least one viewpoint.
All instruction requirements noted.
26 points
Paper lacks clarification or new information. Scholarly
reference supports the content without adding any new
information or insight. The paper’s content may be confusing or
unclear, and the summary may be incomplete.
Most instruction requirements are noted.
23 points
Submission is primarily a summation of the assignment without
further synthesis of course content or analysis of the scenario.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
Missing some instruction requirements.
Submits assignment late.
20 points
30
Application of Knowledge
The summary of the paper provides information validated via
scholarly resources that offer a multidisciplinary approach.
The student’s application in practice is accurate and plausible,
and additional scholarly resource(s) supporting the application
is provided.
All questions posed within the assignment are answered in a
well-developed manner with citations for validation.
All instruction requirements noted.
30 points
A summary of the paper’s content, findings, and knowledge
gained from the assignment is presented.
Student indicates how the information will be used within their
professional practice.
All instruction requirements noted.
26 points
Objective criteria are not clearly used, allowing for a more
superficial application of content between the assignment and
the broader course content.
Student’s indication of how they will apply this new knowledge
to their clinical practice is vague.
Most instruction requirements are noted.
23 points
The application of knowledge is significantly lacking.
Student’s indication of how they will apply this new knowledge
to their clinical practice is not practical or feasible.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
Application of knowledge is incorrect and/or student fails to
explain how the information will be used within their personal
practice.
Missing several instruction requirements.
Submits assignment late.
20 points
30
Organization
Well-organized content with a clear and complex purpose
statement and content argument. Writing is concise with a
logical flow of ideas.
5 points
Organized content with an informative purpose statement and
supportive content and summary statement. Argument content is
developed with minimal issues in content flow.
4 points
Poor organization, and flow of ideas distract from content.
Narrative is difficult to follow and frequently causes reader to
reread work.
Purpose statement is noted.
3 points
Illogical flow of ideas. Missing significant content. Prose
rambles. Purpose statement is unclear or missing.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
No purpose statement.
Submits assignment late.
2 points
5
APA, Grammar, and Spelling
Correct APA formatting with no errors.
The writer correctly identifies reading audience, as
demonstrated by appropriate language (avoids jargon and
simplifies complex concepts appropriately).
Writing is concise, in active voice, and avoids awkward
transitions and overuse of conjunctions.
There are no spelling, punctuation, or word-usage errors
5 points
Correct and consistent APA formatting of references and cites
all references used. No more than two unique APA errors.
The writer demonstrates correct usage of formal English
language in sentence construction. Variation in sentence
structure and word usage promotes readability.
There are minimal to no grammar, punctuation, or word-usage
errors.
4 points
Three to four unique APA formatting errors.
The writer occasionally uses awkward sentence construction or
overuses/inappropriately uses complex sentence structure.
Problems with word usage (evidence of incorrect use of
thesaurus) and punctuation persist, often causing some
difficulties with grammar. Some words, transitional phrases,
and conjunctions are overused.
Multiple grammar, punctuation, or word usage errors.
3 points
Five or more unique formatting errors or no attempt to format in
APA.
The writer demonstrates limited understanding of formal written
language use; writing is colloquial (conforms to spoken
language).
The writer struggles with limited vocabulary and has difficulty
conveying meaning such that only the broadest, most general
messages are presented.
Grammar and punctuation are consistently incorrect. Spelling
errors are numerous.
Submits assignment late.
2 points
5
Total Points
3 hours ago
Vasanth Kumar Reddy Thipparthi
Week 2 Discussion
COLLAPSE
Top of Form
Advantages and disadvantages of a honey pot
With the use of a honey pot, organizations are able to engage in
deception by making use of a feature that deliberately misleads
the attackers or the adversaries, with the aim of pushing them
away from critical assets of an organization. Proper use of the
honey pots makes it easy for an organization to accurately study
the attackers’ behaviors before they actualize their attacks on an
organization’s critical resources. With this understanding, an
organization then gets a good starting point as it seeks to
enhance its overall information and information resources
security (Amoroso, 2011). The use of honeypots has various
advantages as well as disadvantages.
Advantages
The first advantage of using honeypots is that through its
exploitation, an organization is able to develop further security
measures, as it helps in attracting the attackers and studying
their behavior before they have an access to the actual
organizational resources (Amoroso, 2011). This is to mean that
through the use of the honey pot, an organization can
effectively identify the vulnerabilities that the attackers are
likely to use, and will in effect institute measures that will
address those vulnerabilities.
The second advantage is that through the use of honeypots,
organizations are able to understand their working environments
and security status better. Honeypots will assist in studying the
attackers with the aim of understanding how they typically
execute their operations. As organizations make use of the
honey pots, they can be observing the real-time events and
occurrences and gain useful insights to improve their security
(Amoroso, 2011).
Disadvantages
Despite its advantages, the use of honeypots has different
disadvantages or shortcomings. One of these disadvantages is
that its effectiveness is highly reliant on the situation where the
attacker does not understand that it is just a decoy which is
being used, for the organization to understand their behavior.
Once the attacker understands this, they cannot proceed with
their malicious intentions (Amoroso, 2011).
The other disadvantage is that it is quite technical or complex
for an organization to ensure that the attacker fully believes that
whatever they are attacking are real resources. These attackers
are knowledgeable, and may be aware of how typical honeypots
look like. In such a case, an organization has an uphill task of
ensuring that the attacker in question does not doubt the
functionality of the honeypot as a critical resource which is
worth an attacking (Amoroso, 2011).
References
Amoroso, E. G. (2011). Cyber attacks: Protecting national
infrastructure. Elsevier.
Bottom of Form
4 hours ago
Rakesh Kalumula
Discussion
COLLAPSE
Top of Form
Hello Everyone,
A honeypot is defined as a computer program or a system that is
designed to mimic the likely cyberattacks. It is mainly used in
detecting of attacks and deflect them from the legitimate
targets. In creating understanding, honeypots are important in
understanding how cybercriminal conduct attacks. In the recent
past, honeypots have gained prominence owing to their
contributions in the cyber world. As a result, they have a myriad
of advantage to the entities that have implemented honeypots in
enhancing their security protocols. The following are some
advantages and disadvantages of honeypots.
Advantages
Honeypots works by gathering data only when there is an
interaction taking place, this means that the lesser amount of
data collected, lower costs are incurred by the business, and this
helps an organization in keeping an eye on the costs
(Karthikeyan et al., 2017). IDS usually produce a lot of false
warning that are essentially ignored. For honeypots, any access
to them is usually unauthorized and therefore this makes it
possible to reduce the false warning. Usually, intrusion
detection systems may have a problem in detecting some of
undetermined attacks, this is however different for the case of
honeypots since every access to honeypots is unauthorized and
hence it becomes possible for the honeypot to thwart any
access.
Disadvantages
There are also some disadvantages associated with the
honeypots despite all the mentioned advantages. Mainly,
honeypots tend to monitor activity if there is an outline is an
interaction with honeypot. In the event that an attack is
launched on another system, honeypots might not be able to
recognize such incidents. On the other hand, honeypots are
usually the main targets by the attackers and therefore makes
them hard to prevent an organization.
Reference
Karthikeyan, R., Geetha, D. T., Shyamamol, K. S., & Sivagami,
G. (2017). Advanced Honey Pot Architecture for Network
Threats Quantification. the international journal of Engineering
and Techniques, 3(2), 2395-1303.
Bottom of Form
1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 2
Deception
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Introduction
• Deception is deliberately misleading an adversary by
creating a system component that looks real but is in
reality a trap
– Sometimes called a honey pot
• Deception helps accomplish the following security
objectives
– Attention
– Energy
– Uncertainty
– Analysis
3
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
• If adversaries are aware that perceived vulnerabilities
may, in fact, be a trap, deception may defuse actual
vulnerabilities that security mangers know nothing
about.
Introduction
4
Fig. 2.1 – Use of deception in
computing
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
5
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Introduction
• Four distinct attack stages:
– Scanning
– Discovery
– Exploitation
– Exposing
6
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.2 – Stages of deception for
national infrastructure protection
7
• Adversary is scanning for exploitation points
– May include both online and offline scanning
• Deceptive design goal: Design an interface with the
following components
– Authorized services
– Real vulnerabilities
– Bogus vulnerabilities
• Data can be collected in real-time when adversary
attacks honey pot
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Scanning Stage
8
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.3 – National asset service
interface with deception
9
• Deliberately inserting an open service port on an
Internet-facing server is the most straightforward
deceptive computing practice
• Adversaries face three views
– Valid open ports
– Inadvertently open ports
– Deliberately open ports connected to honey pots
• Must take care the real assets aren’t put at risk by
bogus ports
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Deliberately Open Ports
10
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.4 – Use of deceptive bogus
ports to bogus assets
11
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.5 – Embedding a honey pot
server into a normal server complex
12
• The discovery stage is when an adversary finds and
accepts security bait embedded in the trap
• Make adversary believe real assets are bogus
– Sponsored research
– Published case studies
– Open solicitations
• Make adversary believe bogus assets are real
– Technique of duplication is often used for honey pot
design
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Discovery Stage
13
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.6 – Duplication in honey pot
design
14
• Creation and special placement of deceptive
documents can be used to trick an adversary
(Especially useful for detecting a malicious insider)
– Only works when content is convincing and
– Protections appear real
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Deceptive Documents
15
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.7 – Planting a bogus document
in protected enclaves
16
• This stage is when an adversary exploits a discovered
vulnerability
– Early activity called low radar actions
– When detected called indications and warnings
• Key requirement: Any exploitation of a bogus asset
must not cause disclosure, integrity, theft, or
availability problems with any real asset
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Exploitation Stage
17
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.8 – Pre- and post-attack stages
at the exploitation stage
Copyright © 2012, Elsevier Inc.
All rights Reserved
18
• Related issue: Intrusion detection and incident
response teams might be fooled into believing trap
functionality is real. False alarms can be avoided by
– Process coordination
– Trap isolation
– Back-end insiders
– Process allowance
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Exploitation Stage
19
• Understand adversary behavior by comparing it in
different environments.
• The procurement lifecycle is one of the most
underestimated components in national
infrastructure protection (from an attack
perspective)
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Procurement Tricks
20
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.9 – Using deception against
malicious suppliers
21
• The deception lifecycle ends with the adversary
exposing behavior to the deception operator
• Therefore, deception must allow a window for
observing that behavior
– Sufficient detail
– Hidden probes
– Real-time observation
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Exposing Stage
22
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.10 – Adversary exposing stage
during deception
23
Interfaces Between
Humans and Computers
• Gathering of forensic evidence relies on
understanding how systems, protocols, and services
interact
– Human-to-human
– Human-to-computer
– Computer-to-human
– Computer-to-computer
• Real-time forensic analysis not possible for every
scenario
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
24
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.11 – Deceptively exploiting the
human-to-human interface
25
• Programs for national deception would be better
designed based on the following assumptions:
– Selective infrastructure use
– Sharing of results and insights
– Reuse of tools and methods
• An objection to deception that remains is that it is
not effective against botnet attacks
– Though a tarpit might degrade the effectiveness of a
botnet
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
National Deception Program
Motivational Interview PaperA. Introduction Overview of Motivat.docx

More Related Content

DOCX
As part of continuing your work on your evidence-based project p.docx
DOCX
Writing Assignment Rubric – 100 PointsCriteriaExemplaryExcee.docx
DOCX
Writing Assignment RubricNote Scholarly resources are defined a.docx
DOCX
You will be writing a quantitative critique on one of the studie.docx
DOCX
OverviewFor this assignment, you write your own qualitative .docx
DOCX
Food addiction is a somewhat controversial term. When considerin.docx
DOCX
With flu season or should we say flu vaccination season in mind,.docx
DOCX
Bdisorder Paper.docx
As part of continuing your work on your evidence-based project p.docx
Writing Assignment Rubric – 100 PointsCriteriaExemplaryExcee.docx
Writing Assignment RubricNote Scholarly resources are defined a.docx
You will be writing a quantitative critique on one of the studie.docx
OverviewFor this assignment, you write your own qualitative .docx
Food addiction is a somewhat controversial term. When considerin.docx
With flu season or should we say flu vaccination season in mind,.docx
Bdisorder Paper.docx

Similar to Motivational Interview PaperA. Introduction Overview of Motivat.docx (20)

DOCX
Annotated Bibliography Rubric – 100 PointsCriteriaExemplaryE.docx
DOCX
Levels of prevention (primary prevention is most important in ad.docx
DOCX
Write two to three well-developed paragraphs (450–500 words) usi.docx
DOCX
For this week’s discussion, you should focus on the vulnerable popul.docx
DOCX
Answer the following questions in three well-developed paragraph.docx
DOCX
This discussion will allow you to examine several different prev.docx
DOCX
Examine current practice guidelines related to suicide screeni.docx
DOCX
As part of continuing your work on your EBP proposal, you create.docx
DOCX
3162020 Discussion Question Rubrichttpslmscontent.emb.docx
DOCX
3162020 Discussion Question Rubrichttpslmscontent.emb.docx
DOCX
Patient 2 is a 53-year-old male with no diagnosed diabetes mel.docx
DOCX
Performing health assessments as an APRN will help you to develo
DOCX
Pros and Cons to Delivering Participatory Care to Those Who.docx
DOCX
My selected Topic  Hydrocele & Spermatocele & Varicocele .docx
DOCX
Reflect on the focus area - lungs, thorax, vascular and peripher
DOCX
This discussion will allow you to examine several different prev.docx
DOCX
Focus System - HEENT NECKReflect on the focus area or syste.docx
DOCX
Review the case study and answer all the questions posed in the .docx
DOCX
Choose one of the Case Studies from Chapter 13 using the Week 6 C.docx
DOCX
El Centro College Psychology Assessment of Critical Thinking Rub.docx
Annotated Bibliography Rubric – 100 PointsCriteriaExemplaryE.docx
Levels of prevention (primary prevention is most important in ad.docx
Write two to three well-developed paragraphs (450–500 words) usi.docx
For this week’s discussion, you should focus on the vulnerable popul.docx
Answer the following questions in three well-developed paragraph.docx
This discussion will allow you to examine several different prev.docx
Examine current practice guidelines related to suicide screeni.docx
As part of continuing your work on your EBP proposal, you create.docx
3162020 Discussion Question Rubrichttpslmscontent.emb.docx
3162020 Discussion Question Rubrichttpslmscontent.emb.docx
Patient 2 is a 53-year-old male with no diagnosed diabetes mel.docx
Performing health assessments as an APRN will help you to develo
Pros and Cons to Delivering Participatory Care to Those Who.docx
My selected Topic  Hydrocele & Spermatocele & Varicocele .docx
Reflect on the focus area - lungs, thorax, vascular and peripher
This discussion will allow you to examine several different prev.docx
Focus System - HEENT NECKReflect on the focus area or syste.docx
Review the case study and answer all the questions posed in the .docx
Choose one of the Case Studies from Chapter 13 using the Week 6 C.docx
El Centro College Psychology Assessment of Critical Thinking Rub.docx

More from ssuserf9c51d (20)

DOCX
Muslims in the Golden Age is the theme for the research project. You.docx
DOCX
Multiple Sources of MediaExamine the impact of multiple sour.docx
DOCX
Multicultural Event WrittenPlease choose and research a cult.docx
DOCX
Multi-Party NegotiationFor this Essay, you will explore the co.docx
DOCX
Music has long been used by movements seeking social change.  In the.docx
DOCX
MSW Advanced Clinical Concentration -Student Learning AgreementW.docx
DOCX
Multimedia Instructional MaterialsStaying current on technolog.docx
DOCX
Murray Bowen is one of the most respected family theorists in th.docx
DOCX
Mrs. Thomas is a 54, year old African American widow, mother and gra.docx
DOCX
Multiple Source Essay, Speculating about CausesProposing a Solution.docx
DOCX
Multiyear Plans Please respond to the followingDo you.docx
DOCX
Multinational Financial ManagementDetermine key reasons wh.docx
DOCX
Murder CasePreambleAn organization system administrator .docx
DOCX
Multimodal Personal Narrative – Develop a multimodal document to bot.docx
DOCX
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
DOCX
Multimedia activity Business OrganizationVisit the Choose Your .docx
DOCX
Multicultural PerspectiveToday’s classrooms are diverse and .docx
DOCX
Muhammad Ali, how did his refusal to go into the army affect his.docx
DOCX
MS 113 Some key concepts that you need to know to navigate th.docx
DOCX
Much has been made of the new Web 2.0 phenomenon, including social n.docx
Muslims in the Golden Age is the theme for the research project. You.docx
Multiple Sources of MediaExamine the impact of multiple sour.docx
Multicultural Event WrittenPlease choose and research a cult.docx
Multi-Party NegotiationFor this Essay, you will explore the co.docx
Music has long been used by movements seeking social change.  In the.docx
MSW Advanced Clinical Concentration -Student Learning AgreementW.docx
Multimedia Instructional MaterialsStaying current on technolog.docx
Murray Bowen is one of the most respected family theorists in th.docx
Mrs. Thomas is a 54, year old African American widow, mother and gra.docx
Multiple Source Essay, Speculating about CausesProposing a Solution.docx
Multiyear Plans Please respond to the followingDo you.docx
Multinational Financial ManagementDetermine key reasons wh.docx
Murder CasePreambleAn organization system administrator .docx
Multimodal Personal Narrative – Develop a multimodal document to bot.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multimedia activity Business OrganizationVisit the Choose Your .docx
Multicultural PerspectiveToday’s classrooms are diverse and .docx
Muhammad Ali, how did his refusal to go into the army affect his.docx
MS 113 Some key concepts that you need to know to navigate th.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docx

Recently uploaded (20)

PDF
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
PPTX
GW4 BioMed Candidate Support Webinar 2025
PDF
Review of Related Literature & Studies.pdf
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PDF
Laparoscopic Imaging Systems at World Laparoscopy Hospital
PDF
Physical pharmaceutics two in b pharmacy
PDF
IS1343_2012...........................pdf
PPTX
Math 2 Quarter 2 Week 1 Matatag Curriculum
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
Health aspects of bilberry: A review on its general benefits
PDF
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PPTX
CHROMIUM & Glucose Tolerance Factor.pptx
PDF
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
PPTX
ENGlishGrade8_Quarter2_WEEK1_LESSON1.pptx
PPTX
Neurology of Systemic disease all systems
PDF
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
PDF
FYJC - Chemistry textbook - standard 11.
PDF
English 2nd semesteNotesh biology biopsy results from the other day and I jus...
PPTX
operating_systems_presentations_delhi_nc
LATAM’s Top EdTech Innovators Transforming Learning in 2025.pdf
GW4 BioMed Candidate Support Webinar 2025
Review of Related Literature & Studies.pdf
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Laparoscopic Imaging Systems at World Laparoscopy Hospital
Physical pharmaceutics two in b pharmacy
IS1343_2012...........................pdf
Math 2 Quarter 2 Week 1 Matatag Curriculum
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
Health aspects of bilberry: A review on its general benefits
Kalaari-SaaS-Founder-Playbook-2024-Edition-.pdf
ACFE CERTIFICATION TRAINING ON LAW.pptx
CHROMIUM & Glucose Tolerance Factor.pptx
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
ENGlishGrade8_Quarter2_WEEK1_LESSON1.pptx
Neurology of Systemic disease all systems
BSc-Zoology-02Sem-DrVijay-Comparative anatomy of vertebrates.pdf
FYJC - Chemistry textbook - standard 11.
English 2nd semesteNotesh biology biopsy results from the other day and I jus...
operating_systems_presentations_delhi_nc

Motivational Interview PaperA. Introduction Overview of Motivat.docx

  • 1. Motivational Interview Paper A. Introduction: Overview of Motivational Interviewing: Begin your paper by providing an overview of Motivational Interviewing (MI). Ensure you include one article and summarize the main components of MI and populations that are appropriate to use the MI principles. B. Assessment of Videos: Using the key components of MI, assess the role play videos in your chosen video for appropriate integration. C. Discriminatory Analysis Section: What would you do differently or similarly in the video you chose to analyze? Provide rationales that are specific utilizing sources for substance and depth. D. Plan and Summary: Integrate evidence-based information using one to two scholarly articles in your plan and summary of the scenario you watched (opioid or alcohol). How does the concept of coping play out in the scenario you watched? Integrate coping psychotherapeutic skills, as well as teaching and education, into your plan and summary. Paper Requirements Your paper should be three to four pages in length, excluding a required cover sheet and references page that includes one to two textbooks and two to three scholarly articles (that were published no longer than three years ago). Use APA formatting for all components of your paper. https://youtu.be/XsmY1VVxUIE https://youtu.be/67I6g1I7Zao
  • 2. Writing Assignment Rubric Note: Scholarly resources are defined as evidence-based practice, peer-reviewed journals; textbook (do not rely solely on your textbook as a reference); and National Standard Guidelines. Review assignment instructions, as this will provide any additional requirements that are not specifically listed on the rubric. Writing Assignment Rubric – 100 Points Criteria Exemplary Exceeds Expectations Advanced Meets Expectations Intermediate Needs Improvement Novice Inadequate Total Points Content of Paper The writer demonstrates a well-articulated understanding of the subject matter in a clear, complex, and informative manner. The paper content and theories are well developed and linked to the paper requirements and practical experience. The paper includes relevant material that fulfills all objectives of the paper. Follows the assignment instructions around expectations for scholarly references. Uses scholarly resources that were not provided in the course materials. All instruction requirements noted. 30 points The writer demonstrates an understanding of the subject matter, and components of the paper are accurately represented with explanations and application of knowledge to include evidence-
  • 3. based practice, ethics, theory, and/or role. Course materials and scholarly resources support required concepts. The paper includes relevant material that fulfills all objectives of the paper. Follows the assignment instructions around expectations for scholarly references. All instruction requirements noted. 26 points The writer demonstrates a moderate understanding of the subject matter as evidenced by components of the paper being summarized with minimal application to evidence-based practice, theory, or role-development. Course content is present but missing depth and or development. Does not follow the assignment instructions around expectations for scholarly references. Only uses scholarly resources that were provided in the course materials. Most instruction requirements are noted. 23 points Absent application to evidence-based practice, theory, or role development. Use of course content is superficial. Demonstrates incomplete understanding of content and/or inadequate preparation. Content of paper is inaccurately portrayed or missing. Does not follow the assignment instructions around expectations for scholarly references. Does not use scholarly resources. Missing some instruction requirements.
  • 4. 20 points 30 Analysis and Synthesis of Paper Content and Meaning Through critical analysis, the submitted paper provides an accurate, clear, concise, and complete presentation of the required content. Information from scholarly resources is synthesized, providing new information or insight related to the context of the assignment by providing both supportive and alternative information or viewpoints. All instruction requirements noted. 30 points Paper is complete, providing evidence of further synthesis of course content via scholarly resources. Information is synthesized to help fulfill paper requirements. The content supports at least one viewpoint. All instruction requirements noted. 26 points Paper lacks clarification or new information. Scholarly reference supports the content without adding any new information or insight. The paper’s content may be confusing or unclear, and the summary may be incomplete. Most instruction requirements are noted. 23 points Submission is primarily a summation of the assignment without further synthesis of course content or analysis of the scenario.
  • 5. Demonstrates incomplete understanding of content and/or inadequate preparation. Missing some instruction requirements. Submits assignment late. 20 points 30 Application of Knowledge The summary of the paper provides information validated via scholarly resources that offer a multidisciplinary approach. The student’s application in practice is accurate and plausible, and additional scholarly resource(s) supporting the application is provided. All questions posed within the assignment are answered in a well-developed manner with citations for validation. All instruction requirements noted. 30 points A summary of the paper’s content, findings, and knowledge gained from the assignment is presented. Student indicates how the information will be used within their professional practice. All instruction requirements noted. 26 points Objective criteria are not clearly used, allowing for a more superficial application of content between the assignment and the broader course content.
  • 6. Student’s indication of how they will apply this new knowledge to their clinical practice is vague. Most instruction requirements are noted. 23 points The application of knowledge is significantly lacking. Student’s indication of how they will apply this new knowledge to their clinical practice is not practical or feasible. Demonstrates incomplete understanding of content and/or inadequate preparation. Application of knowledge is incorrect and/or student fails to explain how the information will be used within their personal practice. Missing several instruction requirements. Submits assignment late. 20 points 30 Organization Well-organized content with a clear and complex purpose statement and content argument. Writing is concise with a logical flow of ideas. 5 points Organized content with an informative purpose statement and supportive content and summary statement. Argument content is developed with minimal issues in content flow. 4 points Poor organization, and flow of ideas distract from content.
  • 7. Narrative is difficult to follow and frequently causes reader to reread work. Purpose statement is noted. 3 points Illogical flow of ideas. Missing significant content. Prose rambles. Purpose statement is unclear or missing. Demonstrates incomplete understanding of content and/or inadequate preparation. No purpose statement. Submits assignment late. 2 points 5 APA, Grammar, and Spelling Correct APA formatting with no errors. The writer correctly identifies reading audience, as demonstrated by appropriate language (avoids jargon and simplifies complex concepts appropriately). Writing is concise, in active voice, and avoids awkward transitions and overuse of conjunctions. There are no spelling, punctuation, or word-usage errors 5 points Correct and consistent APA formatting of references and cites all references used. No more than two unique APA errors. The writer demonstrates correct usage of formal English language in sentence construction. Variation in sentence
  • 8. structure and word usage promotes readability. There are minimal to no grammar, punctuation, or word-usage errors. 4 points Three to four unique APA formatting errors. The writer occasionally uses awkward sentence construction or overuses/inappropriately uses complex sentence structure. Problems with word usage (evidence of incorrect use of thesaurus) and punctuation persist, often causing some difficulties with grammar. Some words, transitional phrases, and conjunctions are overused. Multiple grammar, punctuation, or word usage errors. 3 points Five or more unique formatting errors or no attempt to format in APA. The writer demonstrates limited understanding of formal written language use; writing is colloquial (conforms to spoken language). The writer struggles with limited vocabulary and has difficulty conveying meaning such that only the broadest, most general messages are presented. Grammar and punctuation are consistently incorrect. Spelling errors are numerous. Submits assignment late. 2 points 5
  • 9. Total Points 3 hours ago Vasanth Kumar Reddy Thipparthi Week 2 Discussion COLLAPSE Top of Form Advantages and disadvantages of a honey pot With the use of a honey pot, organizations are able to engage in deception by making use of a feature that deliberately misleads the attackers or the adversaries, with the aim of pushing them away from critical assets of an organization. Proper use of the honey pots makes it easy for an organization to accurately study the attackers’ behaviors before they actualize their attacks on an organization’s critical resources. With this understanding, an organization then gets a good starting point as it seeks to enhance its overall information and information resources security (Amoroso, 2011). The use of honeypots has various advantages as well as disadvantages. Advantages The first advantage of using honeypots is that through its exploitation, an organization is able to develop further security measures, as it helps in attracting the attackers and studying their behavior before they have an access to the actual organizational resources (Amoroso, 2011). This is to mean that through the use of the honey pot, an organization can effectively identify the vulnerabilities that the attackers are likely to use, and will in effect institute measures that will address those vulnerabilities. The second advantage is that through the use of honeypots, organizations are able to understand their working environments and security status better. Honeypots will assist in studying the attackers with the aim of understanding how they typically
  • 10. execute their operations. As organizations make use of the honey pots, they can be observing the real-time events and occurrences and gain useful insights to improve their security (Amoroso, 2011). Disadvantages Despite its advantages, the use of honeypots has different disadvantages or shortcomings. One of these disadvantages is that its effectiveness is highly reliant on the situation where the attacker does not understand that it is just a decoy which is being used, for the organization to understand their behavior. Once the attacker understands this, they cannot proceed with their malicious intentions (Amoroso, 2011). The other disadvantage is that it is quite technical or complex for an organization to ensure that the attacker fully believes that whatever they are attacking are real resources. These attackers are knowledgeable, and may be aware of how typical honeypots look like. In such a case, an organization has an uphill task of ensuring that the attacker in question does not doubt the functionality of the honeypot as a critical resource which is worth an attacking (Amoroso, 2011). References Amoroso, E. G. (2011). Cyber attacks: Protecting national infrastructure. Elsevier. Bottom of Form 4 hours ago Rakesh Kalumula Discussion COLLAPSE Top of Form Hello Everyone,
  • 11. A honeypot is defined as a computer program or a system that is designed to mimic the likely cyberattacks. It is mainly used in detecting of attacks and deflect them from the legitimate targets. In creating understanding, honeypots are important in understanding how cybercriminal conduct attacks. In the recent past, honeypots have gained prominence owing to their contributions in the cyber world. As a result, they have a myriad of advantage to the entities that have implemented honeypots in enhancing their security protocols. The following are some advantages and disadvantages of honeypots. Advantages Honeypots works by gathering data only when there is an interaction taking place, this means that the lesser amount of data collected, lower costs are incurred by the business, and this helps an organization in keeping an eye on the costs (Karthikeyan et al., 2017). IDS usually produce a lot of false warning that are essentially ignored. For honeypots, any access to them is usually unauthorized and therefore this makes it possible to reduce the false warning. Usually, intrusion detection systems may have a problem in detecting some of undetermined attacks, this is however different for the case of honeypots since every access to honeypots is unauthorized and hence it becomes possible for the honeypot to thwart any access. Disadvantages There are also some disadvantages associated with the honeypots despite all the mentioned advantages. Mainly, honeypots tend to monitor activity if there is an outline is an interaction with honeypot. In the event that an attack is launched on another system, honeypots might not be able to recognize such incidents. On the other hand, honeypots are
  • 12. usually the main targets by the attackers and therefore makes them hard to prevent an organization. Reference Karthikeyan, R., Geetha, D. T., Shyamamol, K. S., & Sivagami, G. (2017). Advanced Honey Pot Architecture for Network Threats Quantification. the international journal of Engineering and Techniques, 3(2), 2395-1303. Bottom of Form 1 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 2 Deception Cyber Attacks Protecting National Infrastructure, 1st ed. 2 Copyright © 2012, Elsevier Inc. All rights Reserved
  • 13. C h a p te r 2 – D e c e p tio n Introduction • Deception is deliberately misleading an adversary by creating a system component that looks real but is in reality a trap – Sometimes called a honey pot • Deception helps accomplish the following security objectives – Attention – Energy – Uncertainty – Analysis
  • 14. 3 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n • If adversaries are aware that perceived vulnerabilities may, in fact, be a trap, deception may defuse actual vulnerabilities that security mangers know nothing about. Introduction 4
  • 15. Fig. 2.1 – Use of deception in computing Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n 5 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 16. a p te r 2 – D e c e p tio n Introduction • Four distinct attack stages: – Scanning – Discovery – Exploitation – Exposing 6 Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 17. h a p te r 2 – D e c e p tio n Fig. 2.2 – Stages of deception for national infrastructure protection 7 • Adversary is scanning for exploitation points – May include both online and offline scanning • Deceptive design goal: Design an interface with the following components – Authorized services – Real vulnerabilities – Bogus vulnerabilities • Data can be collected in real-time when adversary
  • 18. attacks honey pot Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n Scanning Stage 8 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 19. a p te r 2 – D e c e p tio n Fig. 2.3 – National asset service interface with deception 9 • Deliberately inserting an open service port on an Internet-facing server is the most straightforward deceptive computing practice • Adversaries face three views – Valid open ports – Inadvertently open ports – Deliberately open ports connected to honey pots • Must take care the real assets aren’t put at risk by
  • 20. bogus ports Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n Deliberately Open Ports 10 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 21. a p te r 2 – D e c e p tio n Fig. 2.4 – Use of deceptive bogus ports to bogus assets 11 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 –
  • 22. D e c e p tio n Fig. 2.5 – Embedding a honey pot server into a normal server complex 12 • The discovery stage is when an adversary finds and accepts security bait embedded in the trap • Make adversary believe real assets are bogus – Sponsored research – Published case studies – Open solicitations • Make adversary believe bogus assets are real – Technique of duplication is often used for honey pot design Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 23. h a p te r 2 – D e c e p tio n Discovery Stage 13 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 –
  • 24. D e c e p tio n Fig. 2.6 – Duplication in honey pot design 14 • Creation and special placement of deceptive documents can be used to trick an adversary (Especially useful for detecting a malicious insider) – Only works when content is convincing and – Protections appear real Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 –
  • 25. D e c e p tio n Deceptive Documents 15 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n
  • 26. Fig. 2.7 – Planting a bogus document in protected enclaves 16 • This stage is when an adversary exploits a discovered vulnerability – Early activity called low radar actions – When detected called indications and warnings • Key requirement: Any exploitation of a bogus asset must not cause disclosure, integrity, theft, or availability problems with any real asset Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p
  • 27. tio n Exploitation Stage 17 C h a p te r 2 – D e c e p tio n Fig. 2.8 – Pre- and post-attack stages at the exploitation stage Copyright © 2012, Elsevier Inc. All rights Reserved
  • 28. 18 • Related issue: Intrusion detection and incident response teams might be fooled into believing trap functionality is real. False alarms can be avoided by – Process coordination – Trap isolation – Back-end insiders – Process allowance Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n
  • 29. Exploitation Stage 19 • Understand adversary behavior by comparing it in different environments. • The procurement lifecycle is one of the most underestimated components in national infrastructure protection (from an attack perspective) Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n
  • 30. Procurement Tricks 20 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n Fig. 2.9 – Using deception against malicious suppliers 21 • The deception lifecycle ends with the adversary
  • 31. exposing behavior to the deception operator • Therefore, deception must allow a window for observing that behavior – Sufficient detail – Hidden probes – Real-time observation Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n Exposing Stage
  • 32. 22 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n Fig. 2.10 – Adversary exposing stage during deception 23 Interfaces Between Humans and Computers • Gathering of forensic evidence relies on understanding how systems, protocols, and services
  • 33. interact – Human-to-human – Human-to-computer – Computer-to-human – Computer-to-computer • Real-time forensic analysis not possible for every scenario Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n
  • 34. 24 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n Fig. 2.11 – Deceptively exploiting the human-to-human interface 25 • Programs for national deception would be better designed based on the following assumptions: – Selective infrastructure use – Sharing of results and insights
  • 35. – Reuse of tools and methods • An objection to deception that remains is that it is not effective against botnet attacks – Though a tarpit might degrade the effectiveness of a botnet Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 2 – D e c e p tio n National Deception Program