Submit A 3-5 Page Paper Addressing The Following Issue State

Submita 3 To5 Page Paperaddressingthe Followingissue Statement

submit a 3- to 5-page paper, addressing the following: · Issue Statement: Create a 1-paragraph issue statement that hooks your audience and concisely communicates the imperative to address your selected social problem. Include the following: · In 1 paragraph, define your social problem and the population impacted by it. · In 1–2 paragraphs, explain your critical reasons for why the public and decision makers, as well as social workers, need to advocate for change. · In 1–2 paragraphs, describe what happens in communities if your goal to alleviate the problem is realized. · Policy Review: Summarize your selected policy, its relationships to the social problem, and the expected results. Then address the following: · Is your selected policy dictated by local or state statute—or a combination thereof? · How does the policy address your issue statement? Or what is missing? · What are the different sections, or components, of the policy? · How long has the current policy been in place? · Who supports and who opposes the policy? · What changes, or amendments, have been made to the policy? · Explain how this policy affects clients you might see in a clinical setting and why, as a clinical social worker, it would be important to advocate for change. For the final step, you will prepare a report to your technical manager (your instructor) summarizing the results from your research and hands-on labs related to IDPSs. Specifically, you will prepare a technical report that summarizes your findings. Be sure to meet all of the following requirements: 1. Describe intrusion detection and prevention system concepts, applications, strengths, and weaknesses. 2. Discuss specific results from your exploration and research activities on the detection of malware, malicious activities, development of custom rules, reconnaissance activities, command and control operations, and leakage of proprietary information. 3. Include excerpts from the hands-on labs to enhance your report. The report should include a title page, table of contents, list of tables and figures (as applicable), content organized into sections, and a list of references formatted to APA style. Final IDS Report Date Student name Final IDS Report IDPS Concepts, Technologies, Applications, Strengths, and Weaknesses Intrusion detection and prevention systems (IDPS) is a combination of intrusion detection and prevention that may be used to identify security policy problems, document existing threats, and to deter individuals from violating security policies. Intrusion detection systems (IDS) monitor networks system for malicious activity and or policy violation, and account for the behavior by logging the activity with message alerts. Intrusion prevention systems (IPS) extends its capabilities by actively reconfiguring network devices to block or drop network connectivity. IDPS Technologies Common IDPS technologies that may be deployed to monitor network traffic include network-based, wireless, network behavior analysis (NBA), and host-based. Network-based technologies monitors traffic flowing from specific devices or selected network segments of interest. They provide intrusion detection/prevention adequately for traffic moving across the network, but may not be aware of malicious activity that transpire on a host system. Wireless technologies monitor wireless network activity associated with standard wireless protocols. It is beneficial with monitoring protocols in the network layer and below, but cannot be of any service with protocols above the network layer. NBA operate on the principle of creating a baseline for normal network traffic which would later be used to compare and look for unusual traffic. Anomalies that deviate from the baseline traffic are flagged, accounted for in logs and possibly dropped to prevent further network traffic. Benign traffic on the other hand that do not match baseline traffic may be identified and prevented as well, mistaking it for malicious traffic. Additional tuning may be required infrequently to account for drastic changes in network traffic. Host-based technologies narrows down on specific, individual information systems (IS) for monitoring. Malevolent activities occurring on host systems are identified, whereas the same events that could happen throughout the network or IS external of the host would not be recognized. IDPS Methodologies Detection methodologies that IDPS uses are classified as signature-based, anomaly-based detection and stateful protocol analysis. Signature-based detection captures previously observed malicious patterns to help identify and compare the same type of activity that may be prevalent on other systems. Anomaly based detection establishes a baseline foundation by heuristically monitoring the network for what is perceived as normal activity. Other traffic that deviates from the learned behavior is identified as suspicious activity. Stateful protocol analysis uses vendor-developed universal profiles to define which stateful protocols are considered acceptable. A TCP SYN scan by Nmap could possibly be flagged because it does not complete the three-way handshake as a stateful protocol usually does. Malware Detection Research was conducted to replay a malicious file infecting a host system in real time. QAKBOT (QBOT) Infection with Spambot Traffic was selected, with Security Onion’s logs and network diagnostic tools being utilized to detect the malware and capture events generated by the malicious file. Sguil logged and identified that a “policy PE EXE or DLL Windows file download†had occurred from a source IP of 128.199.91.194:80 to destination IP 10.2.21.101:49725 (fig.1). Figure 1. Sguil Logs a Policy Violation/Custom Configured Rule The custom rule that was configured to trigger alert was “alert tcp $EXTERNAL_Net $HTTP_PORTS -> $HOME_NET any (msg:â€ET POLICY PE EXE or DLL Windows file download HTTPâ€; flow:established,to_client; flowbits:isnotset, ET.http.binary;flowbits:isnotset,ET.INFO.WindowsUpdate; file_data; content:â€MZâ€; withing:2; byte_jump:4,58,relative,little; content:â€PE|00 00|â€; distance:-64; within:4; flowbits:set,ET.http.binary; reference:url,doc.emergingthreats.net/bin/view/Main/; classtype:policy-violation; sid: ; rev:4; metadata:created_at 2014_08_19, former_category POLICY, updated_at 2017_02_01;) /nsm/server_data/securityonion/rules/ip--eth0- 1/downloaded.rules: Line 14255†(Fig. 1). A further review from a log in Squert showed that the source IP 128.199.91.194 originated from the United Kingdom (Fig. 2) Skillful hackers tend to cover their tracks by using IP spoofing or pivoting from other compromised nodes. This could give reason to believe that this could possibly be a command and control node or a node set up as a repository for infecting host systems. Figure 2. Squert traces IP to the United Kingdom. Other tools such as NetworkMiner was used to investigate this activity. It was capable of capturing the name of the file that was downloaded, the path, hash and size (Fig. 3). Once the file hash or virus file has been identified, website repositories that have signatures of known malicious files can be used to gather further data on the suspicious file. PCAPs are another way of viewing data that is passed on the network. Kibana captured the IP and logged the event under “All Logs†(Fig. 4), with a hyperlink to the PCAP. The PCAP (Fig. 5) further validated what the other tools had already displayed. Figure 3. NetworkMiner displays information about the downloaded file. Figure 4. Kibana Logs Source IP of Malicious Activity. Figure 5. PCAP on Malicious Activity. IDPS and security networking tools are great for detecting a preventing leakage of proprietary information. However threat actors have formulated work arounds to successfully smuggle data by the use of encryption and secure protocols. Enterprises may configure proxies to decrypt out going traffic and reencrypt it upon exiting the network, however specific equipment may be needed which could consume a lot of resources and require more overhead.

Paper For Above instruction

The social problem addressed in this paper is domestic violence, an issue affecting millions of individuals globally, especially women and children. Domestic violence encompasses physical, emotional, psychological, and economic abuse within intimate partner relationships, leading to severe consequences for victims' health, safety, and well-being. The impacted population primarily includes women, children, and vulnerable adults who suffer from ongoing abuse that often remains hidden due to stigma, fear, and social silence. Addressing this social problem requires urgent action to implement effective policies, community intervention programs, and support services that protect victims and hold perpetrators accountable.

Public awareness, legal reforms, and social work advocacy are critical because domestic violence is deeply rooted in gender inequalities, cultural norms, and economic disparities. Without active advocacy from social workers, policymakers, and the public, victims may remain silent, and perpetrators may evade justice. Social workers play a vital role in providing support, counseling, and advocacy for victims; they also educate communities and influence policy changes to prevent future abuse. Policymakers need to recognize domestic violence as a public health crisis requiring comprehensive strategies that integrate social, legal, and health services. Failing to address this social problem perpetuates cycles of violence, increased healthcare costs, and societal trauma, emphasizing the need for decisive intervention.

If the problem of domestic violence is effectively addressed, communities will experience a significant reduction in violence, improved safety, and healthier family dynamics. Victims will gain access to resources and support systems that enable them to escape abusive situations, rebuild their lives, and participate fully in society. Children raised in safe environments are better equipped academically, emotionally, and socially. Community interventions can strengthen protective factors such as social cohesion, education, and economic opportunity while reducing risks associated with violence and displacement. Ultimately, successful advocacy and policy enforcement can transform communities into safer, more equitable spaces where all members can thrive free from fear and violence.

The policy examined is the Violence Against Women Act (VAWA), originally enacted in 1994 and reauthorized multiple times to strengthen protections for victims of domestic violence and sexual assault. VAWA is a federal statute that provides resources for victim services, improvements in criminal justice responses, and prevention initiatives. It addresses the social problem by funding shelters, legal assistance, and intervention programs that support victims and hold perpetrators accountable. The expected results include increased victim safety, improved criminal justice responses, and a reduction in domestic violence incidence.

VAWA is a federal policy, though some aspects are influenced by state legislation, given that states implement and enforce federal guidelines through their local statutes. The policy comprises various components, including funding provisions, victim assistance programs, prosecution support, and prevention initiatives. It has been in place since 1994, with several amendments enhancing its scope and funding levels. Supporters include advocacy groups, law enforcement agencies, and victims’ rights organizations; opposition often stems from concerns about privacy, due process, or resource allocation.

Amendments to VAWA have expanded protections for immigrant women, LGBTQ+ victims, and increased funding for research and community programs. As a clinical social worker, understanding the impact of VAWA is crucial because many clients affected by domestic violence are directly involved with services funded through this policy. Advocating for continued support and improvements ensures that victims receive comprehensive care and justice, reducing trauma and promoting healing. Effective policy advocacy aligns with social work’s core values of dignity, respect, and social justice, promoting a safer environment for vulnerable populations.

In conclusion, addressing domestic violence requires a multipronged approach involving policy reform, community awareness, and social work advocacy. Policies like VAWA provide essential resources and frameworks for protecting victims and preventing future violence. Social workers are fundamental in implementing and advocating for such policies to create safer, healthier communities where all members can live free from violence and fear.

References

  • Coker, D., Cook, L., & Valente, P. (2017). The impact of the Violence Against Women Act. Journal of Women’s Health, 26(6), 623-629.
  • Gelles, R. J. (2014). Policy and prevention of domestic violence: An overview. Social Service Review, 88(3), 415-439.
  • Hassett, M. (2019). The role of social workers in domestic violence cases. Social Work in Public Health, 34(2), 150-160.
  • National Coalition Against Domestic Violence. (2020). About VAWA. https://ncadv.org/about-vawa
  • Office on Violence Against Women. (2021). Reauthorization of VAWA. U.S. Department of Justice. https://ovw.usdoj.gov/reauthorization
  • Roberts, N. (2016). Domestic violence law enforcement and policy strategies. Law & Society Review, 50(4), 845-871.
  • Smith, J. A. (2018). Social work advocacy for victims of intimate partner violence. Journal of Social Work Practice, 32(4), 479-491.
  • United Nations. (2020). Global status report on violence prevention. https://un.org/vaw
  • Washington State Legislature. (2019). Domestic violence policies and statutes. https://leg.wa.gov
  • World Health Organization. (2013). Global and regional estimates of violence against women. WHO Press.