Provide The Correct Citation To The Following Fictional Case

Provide the correct citation to the following fictional cases with support in Bluebook format

Section Four 20 points directions provide The Correct Citation To The F

Section Four 20 points directions provide The Correct Citation To The F

Section Four 20 points directions: Provide the correct citation to the following fictional cases. Cite Bluebook page numbers to support each response. The US Supreme Court ruled on Charter v. Ohio in 2001. The opinion can be located in volume 353 of the official reporter, page 67; on page 114 of Vol. 362 of West’s Supreme Court Reporter; and in Lawyer’s Edition, second series, volume 15, page 196. You have located United States v. Finkerton from the 5th circuit in the spring of 1992 on page 417 of the Federal Reporter, volume 7, second series. Richards v. Stentworth may apply to a case your attorney is working on. It is located in volume 54 of Michigan Reports on page 143, and on page 315 of volume 118 of the 2nd series of North Western Reporter. The case was decided in 2011. The United States District Court for the Eastern District of New York heard Clark Cable’s case against Vincent V. Morretti and the opinion can be located on page 241 of volume 9 in the 3rd series. The case was tried in 2015. The Colorado Court of Appeals upheld the conviction in Bigwell versus the State of Colorado in October of 1999. The opinion is published in the second series of the regional reporter, page 62, volume 10. Milly Maples lost the case she filed against Shelly Sharker, and appealed to 3rd Circuit Court of Appeals in 1996. This federal opinion can be located on page 30 of volume 400 in the 3rd series of this reporter. In 2012, Smythe Trapp won the appeal on his conviction for robbery in the Tennessee Court of Criminal Appeals. Opinion can be located in the 3rd series of the regional reporter, volume 33, page 159. Clifford Hancock lost his claim against Terrence Pike and appealed to the Massachusetts Appeals Court in 1981. The opinion is set forth in volume 212 of the regional reporter on page 154, and on page 126 of the official reporter, volume 19. The federal district court in the Central District of California heard Wrangler’s case against MacPherson in January of 2009. The opinion can be found on page 85, volume 262 of the correct series for this reporter. The Court of Special Appeals in Maryland heard the defendant’s appeal in the State’s case against James. N. Crickett in 1998. You have located the opinion in the 12th volume of the regional reporter on page 655, and on page 112 in volume five of the official reporter. Firewall is a quintessential feature of cybersecurity architecture that ensures the security of networks, be it wired or wireless. It provides the authority to the administrators to execute access controls between the internal network and the external world. Today, wireless networks are everywhere and enable the wireless network users to access it from anywhere and anytime. But this freedom comes at a risk, and it also poses high security risks and threats to the network. It’s relatively easier to intercept the communication between the users and the network and the introduction of malicious software. But this could be controlled by using WiFi firewall – these are the servers that have the capacity to observe and sift the WiFi traffic. They are also known as WIPS (Wireless Intrusion Prevention System) that enables security enforcement all through the entire WLAN (wireless LAN). The wired networks are susceptible too and to protect it, a user/admin can utilize some measures to ensure security. One would be to audit and map the network by clearly recognizing the infrastructure of the network, keeping the network up to date by staying on top of software updates and assessing settings to spot any insecure configuration. MAC address filtering is another approach that avoids the neighbor intrusion if not the hacker intrusion. Although firewalls can protect the networks, it is also vulnerable to issues such as – insider attacks, any missed security patches if the associated software is not managed properly, any configuration anomalies occurred during the firewall setup and DDoS – Distributed Denial of Service that could cause protracted inability to deliver services. References Firewalls for Security in Wireless Networks U. Murthy1 , O. Bukhres2 , W. Winn2 , E. Vanderdez 3 Jeong, J., Chung, M., & Choo, H. (2006). Secure User Authentication Mechanism in Digital Home Network Environments What are wired and wireless network Wired networks uses electric pules or light waves within physical cables to facilitate data transfer between devices. Wireless networks uses radio frequencies over air between devices to facilitate data transfer using wireless access points (WAP) and wireless network interface cards (WNIC) . Wireless network vulnerabilities 1. Packet sniffing An attacker can connect to a network and phish the content of packets for any valuable information. 2. Man in the middle attack Attackers can modify the information/data being sent over a network and fool the sender and receiver if the network is vulnerable. 3. Distributed Denial of service attack Attackers send multiple packets to throttle a network thus disallowing legit users to access network resources. 4. War driving Attackers drive through an area on a moving vehicle and search for vulnerable networks to attack. 5. Camp out An attacker can ‘camp out’ at free public wifi networks like cafeteria or restaurants or airports which are usually less secure and attempt to check out data from users by inspecting packets. How does firewall protect a system or a network Firewall acts a layer of protection that tries to act as a shield to a system or a network thus protecting it from unnecessary traffic or malicious software attacking a system. Firewalls can be of two types software and hardware. 1. Software firewall: In this case a firewall software is installed in a system to protect the system itself against threats from the outside world as well as network access by applications installed on the system. One of the disadvantages for a software firewall is that since its installed on the system itself, it restricts the ability of the software to detect and stop attacks or malicious software outside the system. The other disadvantage is that it is difficult to manage multiple systems in a network since the installed software has to be updated on each system, If even one system is compromised it can have adverse effects on the network itself. 2. Hardware firewall: These are physical components that are placed between the system and the network. A disadvantage of having physical hardware is that since it’s a sophisticated device it requires trained professional to make sure that the device is configured correctly and maintained. References- Understanding Firewalls for Home and Small Office Use. Joe Kelmencic. Basic Security Mechanisms for Wireless Networks. Wi-Fi is a wireless network technology that permits gadgets, cell phones and other hardware to interface with the Internet. Most households and organizations put forth an admirable attempt to keep unauthorized clients off their networks, however Wi-Fi passages and routers can give hackers a helpful route in. Firewall – It is designed to prevent any external or unauthorized users from bugging in even from their private network. These firewalls protect any unrecognized users from accessing organizations private network like intranets. The few types of firewalls include Packet Filters, Stateful inspection, Next generation, Circuit-level and Application level gateway. There are several ways in which we can protect wireless networks – •Use a secure WPA password – Each and every router comes with encryption. This encryption is helpful in scrambling the data which makes it unreadable. The password used here should be random and long so that it is almost impossible for the hacker to crack it. •Changing the Router’s SSID – Service set identifier (SSID) is used as a default by many vendors who ship their wireless networks using the same. If we still use the default SSID then it signals the hackers that your wireless network is not properly configured and thus is prone to attack. •Providing separate network for guests •Using a firewall •Change the credentials of router’s admin •To ensure Wifi connection is strong •Remote Management should be turned off Many hardware firewalls are using packet filtering, to find out the destination and source we need to look at the packet header. This provides details whether to use the packet means it is legitimate or not, if so we can discard it.Software firewall provides better network traffic or idea to pass through the device and they usually run on the end point of the device. Following are the few ways that can expose firewall security- 1. The more we modernized the firewall, the more difficult it become to operate and manage. 2. Oversize integration and poor management can also lead to blind spot the admins to handle the chaos. 3. Due to great evolution in firewall industry, as they can look for the originating application or user device. It requires deep technology to look for the thread which again lead to breakage of complete security system. References- Soewito, B., & Hirzi. (2014). Building secure wireless access point based on certificate authentication and firewall captive portal. EPJ Web of Conferences. Issue 68, p1-6. 6p Abbas, M.A., Song, H., &Hong, J. (2019). Secure Wireless Communications in Broadcast Channels With Confidential Messages . IEEE Access Access, IEEE. 7: Thompson, Scott D. (2005). Securing your wireless LAN electronically and physically. Cabling Installation & Maintenance. Vol. 13 Issue 5, p32-38. 4p From the basic definition we identify network as connection between two or more computers with a purpose of sharing information, resources etc. On a broader perspective, network can be classified into wired and wireless. Cyber-attacks being very often these days use both wired and wireless networks as primary medium of transmission. The main reason being, the necessity of internet in many organizations and confidential information is being transmitted. Wired network is a traditional way of connecting computers through wires and physical network access points. Ethernet cables for Local area networks and Wide area networks comes under this. Frequency of cyber security attacks in wired networks are comparatively lower than that of wireless networks because of its fixed network structure. Here are some ways of securing wired network through firewall technologies (Stallings & Brown, 2018). · Packet filtering firewall consists of a proxy which blocks unauthorized network traffic. This proxy server has the capability of filtering both incoming and outgoing traffic. · Stateful packet inspection firewall controls the network traffic by creating stricter outbound rules for TCP traffic. · Application level gateway is a type of firewall which requires valid user credentials to connect to remote host. · Circuit level gateway is slightly different from application level gateway where it does not allow every user request to connect to remote host but instead creates two TCP connections and only allows users to connect from one to another. An easier example would be organization employees being trusted and given access by system admin. Wireless networks on other hand have gained prominence during the past couple of decades due to its convenience of being able to connect without a wire, within closer distances. Because of its comfort, wireless networks are becoming more sophisticated with higher generations like 4G, 5G and increasing bandwidths. Not only wireless networks are gaining more fame and user base, but also cyber attackers/abusers. Hence many security and privacy concerns are faced by organizations and strong firewall system is really needed. Firewall can be understood as a wall between enterprise network and overall network. Every operating system comes with and inbuilt system firewall. Wireless networks can be secured in following ways. · Use a strong firewall to control and protect all incoming and outgoing network traffic. · Enabling only authorized domain URLs, applications through firewall. Allowing certain IP addresses is better. Encrypt entire network traffic and dismiss all incoming unauthorized traffic. Standardize and make a note of application running on each port. Potential exposures · Rogue access points: Setting up a rogue access point is very prominent way of exposing wireless networks. This could either be done intentionally by a hacker or unknowingly by an employee when he connects his drive/device to corporate network, and this becomes a way for hackers to intrude. · Denial of service: Which means limiting the capability of host by sending loads of unwanted traffic to that service. Another simpler way could be by interfering with devices on the wireless network. For example, a wireless network having a bandwidth of 2.4 GHz has limitation of three channels and interference can even be caused by a device like oven on the same channel. · Passive capturing: Attacker can be in the network range of a wireless networking and stealing the information passively. However, this exposure occurs mainly in the unsecured wireless networks like malls, airports, etc. References 1. Wilkins, S. (2019, April 05). Common Wireless Network Security Threats. Retrieved July 19, 2020, from 2. Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. New York: Pearson 3. U. Murthy, O. Bukhres, W. Winn and E. Vanderdez, "Firewalls for security in wireless networks," Proceedings of the Thirty-First Hawaii International Conference on System Sciences, Kohala Coast, HI, USA, 1998, pp. vol.7, doi: 10.1109/HICSS.1998.. Securing Your Wireless Network. (2018, March 13). Retrieved July 20, 2020, from

Paper For Above instruction

The citation of legal cases in legal writing is a fundamental skill that ensures clarity, precision, and adherence to established legal standards. The Bluebook citation system is the most widely used authoritative guide for citing cases, statutes, and other legal documents in the United States. Properly citing cases involves including the correct reporter volume, page number, court abbreviation, and year of decision, which collectively enable readers to locate the original case easily and verify information. In this paper, we analyze how to properly cite a series of fictional cases using Bluebook standards, supported by examples and explanations consistent with Bluebook rules.

First, the Supreme Court case, Charter v. Ohio (2001), has multiple reported sources, each with different citation conventions. The correct Bluebook citation should include the volume, reporter abbreviation, page, court abbreviation, and year. The official reporter abbreviation for United States Reports is "U.S.", so the correct citation from the official reporter is "353 U.S. 67 (2001)." The West’s Supreme Court Reporter is abbreviated as "West’s U.S.S.Ct.", thus the citation would be “362 W. U.S. 114 (2001)." Similarly, Lawyer’s Edition second series is abbreviated as "L. Ed. 2d," resulting in “15 L. Ed. 2d 196 (2001).” Using these, the full citations support referencing the case from multiple sources as required by Bluebook rules for citing cases from different reporters.

Next, the 5th Circuit case, United States v. Finkerton (1992), located in volume 7 of the Federal Reporter, second series, on page 417, is cited as “United States v. Finkerton, 7 F.3d 417 (5th Cir. 1990).” Note that the year used in the citation corresponds to the decision year, which is typically consistent with the year of the reporter volume, but the Bluebook emphasizes using the decision year. Since the case was decided in spring 1992, the correct citation is “7 F.3d 417 (5th Cir. 1992)." This format includes the volume, reporter abbreviation, page number, court abbreviation, and year of decision, adhering to the Bluebook standard.

Third, Richards v. Stentworth (2011) has multiple reports. The case was decided in 2011 and can be cited as “Richards v. Stentworth, 54 Mich. App. 143, 118 N.W.2d 315 (2011).” The first citation is to Michigan Reports, volume 54, starting at page 143. The second citation is to the North Western Reporter, second series, volume 118, page 315. Bluebook rules allow citing multiple reporters, and the typical format is to provide the most authoritative source first, followed by other relevant reporters.

The case of Clark Cable v. Vincent V. Morretti (2015) was heard in the Eastern District of New York. The appropriate citation should follow federal district court case rules: “Cable v. Morretti, No. 15-CV-241 (E.D.N.Y. 2015).” When citing district court cases, including the docket number is helpful; otherwise, the standard format includes the court abbreviation and year.

Bigwell v. State of Colorado (1999) was appealed to the Colorado Court of Appeals. Its citation is “Bigwell v. Colorado, 10 Colo. App. 62, 1999 WL 123456 (Colo. Ct. App. 1999).” Since the case was decided in October 1999, the reporter volume and page number are combined; additionally, the citation to the regional reporter is “10 Colo. App. 62.”

Milly Maples v. Sharker (1996) appealed to the Third Circuit Court of Appeals can be cited as “Maples v. Sharker, 400 F.3d 30 (3d Cir. 1996).” This citation uses the Federal Reporter, third series, volume 400, page 30, and the circuit abbreviation.

Smythe Trapp’s 2012 appeal in the Tennessee Court of Criminal Appeals is cited as “Smythe Trapp v. Tennessee, 33 S.W.3d 159 (Tenn. Ct. Crim. App. 2012).” This follows Bluebook rules for state intermediate appellate courts, with volume and page number, court abbreviation, and year.

Clifford Hancock’s case against Terrence Pike (1981) is cited as “Hancock v. Pike, 212 Mass. 154, 19 N.E.2d 126 (Mass. 1981).” This format includes the regional reporter for Massachusetts and the official California reporter as per Bluebook specifications for reporting decisions.

Wrangler’s case against MacPherson (2009) from the Central District of California is cited as “Wrangler v. MacPherson, No. 2:09-cv-00085 (C.D. Cal. 2009).” District court cases often include the docket number when available, following standard Bluebook practice.

Finally, the Maryland Court of Special Appeals case against James N. Crickett (1998) can be cited as “Crickett v. Maryland, 12 Md. App. 655, 112 Md. App. 5 (1998).” or simply following the regional reporter citation as “Crickett v. Maryland, 12 Md. App. 655 (Md. Ct.