Free Essay

Lab Step

In:

Submitted By Blood123
Words 3168
Pages 13
Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see exactly which hosts may be compromised and what destination IP addresses internal employees are accessing.

1. Double-click the RDP folder on the vWorkstation desktop to open the folder. 2. Double-click the TargetLinux01 file in the RDP folder to open a remote connection to the Linux machine. The remote desktop opens with the IP address of the remote machine (172.30.0.11) in the title bar at the top of the window. 3. From the Linux toolbar, select Applications > Accessories > Terminal to open the Linux command prompt. 4. At the command prompt, type su and press Enter to use the superuser account, instead of the student account, to access the root directory. 5. When prompted for a password, type toor and press Enter. 6. At the command prompt, type man tcpdump and press Enter to open the onscreen manual for the TCPdump utility. This screen displays all of the command line options for the tool and descriptions for each. Use the arrow keys to scroll through the manual to learn more about this tool. Press q to return to the command line prompt. Figure 2 TCPdump manual 7. At the command prompt, type cd /etc/network and press Enter to change the directory. 8. At the command prompt, type ls and press Enter to list the files in that directory. 9. At the command prompt, type cat interfaces and press Enter to display the available Ethernet interfaces. The system returns the list of Ethernet interfaces available. The iface eth0 inet static statement indicates that the physical Internet interface (eth0) is available. The IP address for this machine, 172.30.0.11, matches the IP address in the title bar of the remote window. 10. At the command prompt, type cd and press Enter to return to the root directory. 11. At the command prompt, type tcpdump -i eth0 -n -w tcpdumpcapturefile and press Enter to start the data capture. This command also instructs the utility to save the results of the data capture to a file (tcpdumpcapturefile) instead of printing the results. The TCPdump utility is now configured to capture data on the eth0 interface. Figure 3 Capture data to a file

12. Minimize the TargetLinux01 window to return to the vWorkstation desktop. 13. Double-click the Mozilla Firefox icon on the vWorkstation desktop to open the browser. You can access the DVWA tool using any Internet browser, but the steps in this lab will use the Firefox browser. 14. Type http://172.30.0.11/dvwa in the browser's address box and press Enter. The DVWA has been installed on the TargetLinux01 server within the virtual lab. 15. Type the following credentials and click Login to continue. Username: admin Password: password 16. On the DVWA Welcome screen, click the DVWA Security button. 17. Select low from the Script Security drop-down menu and click Submit to change the security level. 18. Click the XSS reflected button in the DVWA navigation menu. XSS vulnerabilities are generally found in Web forms that send and retrieve data to databases via HTML. 19. In the What's your name? box, type Simon and click Submit. The Web form will take the name you entered and repeat it back to you in a friendly welcome. 20. In the What's your name? box, type and click Submit. Figure 4 Output of script test Note: The greater and less-than arrows surrounding "Simon" are referred to as scripting tags in HTML. They are what allow you to add scripts to a Web page. By entering into a form field you are entering a script that contains only the instruction Simon. The fact that you see a response, even just the word "Hello" from the form indicates that this form is vulnerable. The Web form does not complain and it fails to return the expected outcome. Now that you have found a possible vulnerability, you will need to test it further. 21. In the What's your name? box, type alert('a vulnerability'); and click Submit. Note: In order to test the vulnerability, you need to enter a script that does something. The command "alert" is a scripting function that generates a pop-up alert window to the screen. The command is telling the form to run a script that generates a pop-up window with the statement "a vulnerability". The fact that you see this result, proves that the form will allow scripts to run. Since this simple script was processed correctly, you know that there is a good chance that any type of malicious script can be run. 22. Click OK to close the alert window. 23. Close the Firefox browser. 24. Maximize the TargetLinux01 window to return to that server. 25. In the terminal window, press CTRL+Z to stop the data capture and return to the command line prompt. 26. At the terminal command prompt, type tcpdump -n -r tcpdumpcapturefile and press Enter to display the contents of the tcpdumpcapturefile file on the screen. 27. Use the scrollbar to return to the top of the output stream, where the packets related to the DVWA were captured. Notice that the communication in this output is between 172.30.0.2, the vWorkstation, and 172.30.0.11, the TargetLinux01 machine. Notice too, that the port used for this data stream is port 80 (172.30.0.11.80), which corresponds to HTTP, as you might expect from a Web application. Figure 5 Results of the HTTP data capture 28. Make a screen capture showing the contents of the tcpdumpcapturefile file and paste it into a Lab Report file. 29. Close the terminal window. 30. When prompted, click the Close Terminal button to continue. 31. Close the TargetLinux01 window. Part 2: Capture Network Traffic with Wireshark

Note: In the next steps, you will start a packet capture of TCP/IP traffic on the virtual network using the Wireshark application. You will then use the PuTTY application to establish a Telnet or SSH connection to the IP addresses for several of the machines available in this lab. Each of these connections will gather more data for Wireshark to capture. Click the Topology link at the top of the Intro tab to view a visual representation of the devices used in this lab. TCP is a connection-oriented protocol and is used by applications that require this type of behavior. A three-way handshake (SYN > SYN-ACK > ACK) is performed between the IP source and IP destination to establish a connection-oriented connection. 1. Double-click the Wireshark icon on the vWorkstation desktop to open the application. 2. In the Capture pane, select the Student network interface from the drop-down menu, and click the green Start icon to begin the packet capture process. Figure 6?Start a packet capture using Wireshark 3. Minimize the Wireshark window. 4. Double-click the PuTTY icon on the desktop to start the PuTTY application. 5. In the Host Name (or IP address) box of the PuTTY Configuration dialog box, type 172.16.8.5 (the IP address for LanSwitch1), select the Telnet radio button and click Open to open an unsecure Telnet connection. Figure 7 Configure PuTTY for Telnet 6. Type the following credentials at the login prompt: Login: cisco Password: cisco 7. In the terminal console window, type show interface and press Enter to display the list of available interfaces. 8. In the terminal console window, type show vlan and press Enter to display the VLANs on this machine. Figure 8 Cisco show commands 9. In the terminal console window, type quit and press Enter to close the terminal console session to LanSwitch1. 10. Repeat steps 5-9 for each of the following IP addresses: LAN Switch 2: 172.16.20.5 Tampa 2811 router: 172.17.8.1 11. Double-click the PuTTY icon on the desktop to start the PuTTY application again. 12. In the Host Name (or IP address) box of the PuTTY Configuration dialog box, type 172.16.8.1 (the IP address for LanSwitch2), select the SSH radio button, if necessary, and click Open to start a secure connection. Figure 9 Configure PuTTY for SSH 13. Click Yes when prompted to close the PuTTY Security Alert pop-up, and type the following credentials at the login prompt: Login: cisco Password: cisco 14. In the terminal console window, type show interface and press Enter to display the list of available interfaces. 15. In the terminal console window, type quit and press Enter to close the terminal console to LanSwitch2. 16. Repeat steps 11-12 for the TargetLinux01 server, 172.30.0.11, click Yes when prompted to close the PuTTY Security Alert popup, and type the following credentials at the login prompt: Login: student Password: student 17. In the terminal console window, type exit and press Enter to close the terminal console. Part 3: Transfer Files using Tftpd64 and FileZilla Note: In the next steps, you will open a connection to the TargetWindows01 server and gather additional packet data for Wireshark by using the Tftpd64 application and FileZilla to send small files between clients and servers on the various machines. 1. In the RDP folder, double-click the TargetWindows01 file to open a remote connection to the Windows Server. The remote desktop opens with the IP address of the remote machine (172.30.0.10) in the title bar at the top of the window and the

FileZilla Server application open on the desktop. Figure 10 TargetWindows01 desktop 2. Minimize the TargetWindows01 window to return to the vWorkstation desktop. 3. Close the RDP folder. 4. Double-click the FileZilla Client icon on the vWorkstation desktop to open the application. 5. If prompted, click OK to close the Welcome to FileZilla pop-up. 6. Type the following login credentials in the text boxes at the top of the FileZilla window to connect to the FileZilla Server on the TargetWindows01 desktop. Host: 172.30.0.10 User name: student Password: P@ssw0rd! Port: 21 Note: You are required to enter a mixed-case password. If you are not using Citrix Receiver to access this lab please use the CAPS LOCK button or the On-Screen Keyboard to input this password. 7. Click the Quickconnect button to complete the connection to the FileZilla Server. 8. Click OK when prompted to remember FileZilla passwords and close the pop-up. 9. Navigate to the folders cited in the following list on both the Local site and the Remote site panes: Local site: (C:\ISSA_TOOLS\Documentation) Remote site: (Users/Administrator/Desktop) Figure 11 FTP connection to TargetWindows01 10. Right-click the AnyConnect_adminguide.pdf file in the Local site pane and select Upload from the context menu to upload the file to the vWorkstation desktop. Drag the Filename border to the right to see the entire filename and ensure that you are selecting the correct file. When the download process is complete, use the scrollbar in the Remote pane to see the new file. 11. Close the FileZilla Client window. 12. Maximize the TargetWindows01 window. 13. Make a screen capture showing the AnyConnect_adminguide.pdf on the TargetWindows01 desktop and paste it into your Lab Report file. 14. Right-click the Windows Start icon and select Search from the context menu. 15. In the Search pane, type tftpd to retrieve the list possible matches and click Tftpd64 from the resulting list to open the application. 16. When the application window launches, click the Tftp Client tab. 17. Minimize the TargetWindows01 window to return to the vWorkstation desktop. 18. Double-click the Tftpd64 icon on the vWorkstation desktop to launch the application. The Tftpd64 application uses the TFTP (Trivial File Transfer Protocol) to send (put) or receive (get) files between computers. 19. When the application window launches, click the Tftp Server. 20. Maximize the TargetWindows01 window. 21. On the Tftp Client tab, type or select the following information and click the Put button. Host: 172.30.0.2 (vWorkstation) Port: 69 Local File: C:\Users\Administrator\Desktop\AnyConnect_adminguide.pdf Block Size: Default This is the same file that you transferred using FileZilla earlier in this lab. The status responses in the area below the connection information indicate whether or not the file transfer was successful. Figure 12 Tftpd64 file transfer

22. Click OK when the TFTP transfer is completed and close the Tftpd64 application. 23. Minimize the TargetWindows01 window to return to the vWorkstation desktop. 24. In the Tftpd64 window, click the Show Dir button to verify that the AnyConnect_adminguide.pdf file was transferred to the vWorktation. 25. Make a screen capture showing the transferred file in the Tftpd64 directory and paste it into the Lab Report file. 26. Close the Tftpd64:directory window. 27. Close the Tftpd64 application on the vWorkstation desktop. Part 4: Analyze a Packet Capture with Wireshark Note: In the next steps, you will stop the data capture that Wireshark has been collecting and review Wireshark's built-in filters to gather important network traffic baseline definitions. You will also save a .pcap file for analysis later in this lab. 1. On the vWorkstation desktop, maximize the Wireshark application if necessary. 2. Click the Stop the running live capture icon on the Wireshark toolbar to stop the packet capture process. 3. From the Wireshark menu, select Statistics > Protocol Hierarchy. Wireshark opens a new window that describes the different protocol types captured on the LAN segment; this provides a clear indication of what protocols are on the LAN segment and which ones are permitted to be on the LAN segment as part of the network's overall baseline definition. Adjust the window size to view the entire report. Figure 13 Protocol Hierarchy Statistics 4. Make a screen capture showing the Protocol Hierarchy Statistics and paste it into your Lab Report file. 5. Close the Protocol Hierarchy Statistics window. 6. From the Wireshark menu, select Statistics > Packet Lengths. 7. On the Packet Lengths window, click the Create Stat button. Wireshark opens a new window that describes the packet size distribution of the capture. It is important to know and understand what protocols and what size of Ethernet frames are being used for the transmission on the LAN segment. This is an important network traffic baseline-definition. 8. Make a screen capture showing the Packet Lengths distribution and paste it into your Lab Report file. 9. Close the Packet Lengths with Filter window. 10. Click Cancel to close the Packet Lengths window. 11. From the Wireshark menu, select File > Save As. 12. In the Save As dialog box, navigate to the Security_Strategies folder (This PC > Local Disk (C:) > Security_Strategies), name the report yourname_WiresharkCapture, replacing yourname with your own name, select Wireshark/tcpdump/…-pcap from the Save as type drop-down list, and click Save. 13. Use the File Transfer button to download the yourname_WiresharkCapture file from the Security_Strategies folder (C:/Security_Strategies) your local computer and submit it as part of your deliverables. 14. Close the Wireshark window. Part 5: Analyze a Packet Capture File with NetWitness Investigator Note: In the next steps, you will import the Wireshark packet capture file into NetWitness Investigator and review the packet capture data in context, and compare the Wireshark statistical output with NetWitness Investigator's contextual view. While both Wireshark and NetWitness Investigator can be used to capture network traffic, the freeware version of NetWitness Investigator has a limitation of 1G of protocol capture per session. Wireshark does not have a limitation on the size of the capture file which makes it better suited to protocol capture. Wireshark can be used to analyze capture files, but NetWitness Investigator is a seven-layer protocol analyzer that provides detailed protocol analysis and protocol behavior analysis and is much more userfriendly in terms of understanding protocol behavior and protocol analysis.

1. Double-click the NetWitness Investigator icon on the vWorkstation desktop to start the application. 2. From the NetWitness Investigator menu, click Collection > New Local Collection. 3. In the Collection Name box, type yourname Collection, replacing yourname with your own name, and click OK to name the new collection. 4. In the left pane, double-click the yourname Collection you just created to activate it and change the status to Ready. 5. Right-click the yourname Collection and click Import Packets. Figure 14 Import a PCAP file 6. In the Open dialog box, navigate to the Security_Strategies folder (This PC > Local Disk (C:) > Security_Strategies), click the yourname_WiresharkCapture.pcap you saved earlier in this lab, and click Open. 7. When the file has finished importing, double-click the yourname Collection to open it in NetWitness Investigator. In the summary report, locate details about the PuTTY sessions and file transfers you performed in this lab. You should be able to identify the following: The IP protocol (TCP or UDP) used for each transaction. The IP addresses of the machines you interacted with in this lab. The name of the files transferred. The user accounts and passwords used in this lab. Figure 15 NetWitness Investigator summary information 8. Make a screen capture showing the password and filename used in the FTP transfer and paste it into your Lab Report file. 9. Make a screen capture showing the filename used in the TFTP file transfer and paste it into your Lab Report file. 10. Make a screen capture showing the IP addresses for the SSH sessions and paste it into your Lab Report file. 11. Close the NetWitness Investigator window. 12. Close the virtual lab, or proceed with Part 6 to answer the challenge question for this lab.

Copyright ? 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company

Similar Documents

Free Essay

Rea Explanation

...Now that my group mate just explained step 1 and step 2 of building an REA diagram which include the determination of events, agents and resources respectively. Lets move on to the step 3: determination of cardinalities. Cardinalities describe the nature of the relationship between the entities and are represented by the Row'`s foot notation. Circle means 0, stroke means 1 and crow`s foot means many. 1) Step by step. For this relationship we have this cardinalities. For each inventory type, the minimum inventory order and inventory receipt is zero, because if you dont purchase there will be no inflow of inventory and the maximum is many, because it can be more than one inventory item per order. 2) The inverse relationship shows that per each inventory order and inventory received there could be a minimum of one inventory associated and a maximum of many. for obvious reasons you can buy more than one 3) Next is a bit trick. We have to remember that order inventory is a commitment event, and when commitment events are linked to other events they reflect a cause and effect relationship . In this case the order will cause the receipt to happen, thats why the maximim will be one in both sides, however the inventory receipt will be the minimum for each other because in the case of ice cream you may not receive the inventory since delivery happnes in the next day. And for each received inventory the minimum order is also zero, because in the case of ordering toppings you dont have...

Words: 362 - Pages: 2

Free Essay

Nstp

...fghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfgh...

Words: 291 - Pages: 2

Free Essay

Training and Development

...himself. The supervisor also found him work to do and did not just keep him doing odd jobs. Some of the weaknesses include that Jacob did not receive sufficient training even though the task was easy just watching him do it a couple of times does not suffice. The supervisor did not acknowledge the fact that sometimes some people take longer to learn something even if it’s an easy task. The supervisor should have had a senior employee training Jacob if he did not have enough time to do it. Also the supervisor did not check back later in the day to see if everything was going okay and if he had any questions or if he needed support. The supervisor was consistent with Step 2: Instruction, of the job instruction training, he gave Jacob the instructions of how to do the job. However the supervisor failed to do the other 3 steps including preparation, performance and follow up. The supervisor did not fully prepare Jacob to do the job even though the job was simple he did not complete a vital part of preparation and that is communication. He did not see how much Jacob already knew about the task and develop a communication strategy that fits him. The supervisor also did not provide and feedback or reinforcement while Jacob was doing the job even though he watched him do the job a couple of times instead he just left him once he thought he got the hang of it. Lastly, the supervisor failed to follow up with Jacob, he did not monitor Jacob’ performance and at the end of the shift see how it...

Words: 1228 - Pages: 5

Free Essay

Phase 3 Eng 205

...Medicare Exhaust Billing Procedure Manual Project Cynthia Gause Colorado Technical University Online ENGL205-1301 Technical Writing and Speaking Phase 4IP Contents Contents 1 Phase 1 IP 2 Procedure Manual Outline 2 Phase 2 IP 3 Procedure Manual Proposal (Revised) 3 Brochure 4 Brochure Continued 5 Phase 3 IP 6 Medicare Exhaust Billing Checklist 6 Procedure Manual 7 Preparing Bill 3 Step I – Census 3 Step II – Bill Upload 4 Exhaust Billing Claim Coding 5 Step III- Xclaim 5 DDE Step IV 7 Secondary Claim Submission 8 How to submit Secondary Exhaust Claim 8 UB04 Claim examples 8 Billing Reference Tools 10 Type of Bills 11 Patient Status Codes 12 DDE Access/ Menu 13 Phase 1 IP Procedure Manual Outline Outline for Medicare Exhaust Billing Procedure Manual I. Introduction This section will provide an overview of Medicare exhaust billing and the purpose of this manual. II. Bill Uploads Upload bill and billing data in the Ram system to allow bills to be created. III. Claim Coding, and required remarks Once bills have been uploaded and created, bills need to be coded correctly and remarks need to be added to the claim. IV. Submit Bill to Medicare thru Xclaim...

Words: 2499 - Pages: 10

Free Essay

Business

...Creating a motion tween Step 1: Prepare the object to animate Important: Each object must be interpolated in a different layer and that object must be a symbol. If you do not have symbols in your library, this is a procedure: Step 2: Create the interpolation animation (motion tween) Then do one of the following: • Menu Insert> Motion Tween • Right-click (Windows) or Ctrl-click (Macintosh) on the object or the current "frame" and choose Create Motion Tween. [pic] In the following screenshot we used motion tween How to create fireworks; Step one prepare your brush tool and the draw a little dot in the center or anywhere in the picture [pic] Creating a classic tween [pic] Click anywhere on the stage and drag your mouse until you obtain an oval. You may use any color you like. [pic] Now, select Modify > Convert to Symbol (shortcut key: F8). This dialog box will appear: • In the Name field, enter green oval or any name you like. Choose names that will tell you what your movie clip is about and try to avoid using default names (Symbol 1, Symbol 2). Any name can seem good now, when you have just one movie clip. But once you have your library full of different symbols, intuitive symbol names can help you a lot. You will know instantly what any given symbol is about, and you’ll find them more quickly. Click OK. Creating a classic tween animation Write know my timeline looks like this: [pic] So go anywhere further...

Words: 374 - Pages: 2

Free Essay

Ethical and Legal Considerations Paper

...the last person you had didn’t mesh well with your team that isn’t very ethical. There are several legal considerations that you must consider. First you need to decide if the test you are giving is valid for the position you are giving it for. For example, it is valid to give a basic math test to someone that is applying for a bank position, or a typing test to a person applying for a data entry position. However, it wouldn’t be valid to give a switch them up by giving the basic math test to the data entry person because math skills do not apply to data entry so to do this would be against the law. Another thing one must do is if you decide to test for something valid you must give the test to every applicant that has made it to this step in the application process. If you do not you open yourself to a lawsuit for discrimination. For example, if you are giving swim tests for a lifeguard position you cannot just test someone because you think that they looks like they are less able to swim. Not only must you administer the test to every applicant you must do so in the same setting and time frame. This means that all applicants must have equal prep time, and the test should be given in the same location, under the same circumstances. In order to pick a valid test you should follow this process found on page 123 of our textbook: 1. Analyze the job, 2. Choose...

Words: 590 - Pages: 3

Free Essay

Decision Tree

...DECISION TREE Nurse Delegation to Nursing Assistive Personnel (NAP) Step One – Assessment and Planning Are there laws and rules/regulations in place that support the delegation? [NMAC 16.12.2] Yes Is the task within the scope of practice of the delegating nurse? [NMAC 16.12.2] Yes Has there been assessment of the client’s needs? Yes No Do not delegate. No If not in the licensed nurse’s scope of practice, he/she should not delegate to NAP. Authority to delegate varies from state-to-state; licensed nurses should check the local jurisdiction’s statutes and administrative rules/regulations. No Assess client’s needs; then proceed to a consideration of delegation. Does the delegating nurse have competencies to make the delegation decisions required? Yes No Do not delegate until evidence of competency is obtained and is documented; then reconsider delegation. Does the procedure/task meet all the following recommended criteria for delegating to NAP? • • • • • • • Task/procedure is within the range of approved functions for the NAP. Task/procedure frequently recurs in daily care of client or group of clients. Task/procedure is performed according to an established sequence of steps. Task/procedure involves little or no modification from one client-care situation to another. Task/procedure may be performed with a predictable outcome. Task/procedure does not inherently involve ongoing assessment, interpretation, or decision-making which cannot be logically separated from...

Words: 877 - Pages: 4

Premium Essay

Sci256

...more on accessories in store, it increases associate’s commission  Trading in back-up devices increases demand for insurance sales and reduces device returns. 3. Good for the environment  Instead of contributing to electronic scrap waste, Phobio reuses and recycles broken devices. Store Visit Priorities Training and Advocacy Relationship Building Direct Selling Merchandising Compliance Key Focus Express the value of Phobio Train associates on the Safetrade process Inform on Phobio support options Advocate for Phobio Objective Two: Train sales associates on Safetrade and go over the key steps. Please utilize the supplemental documents in the project materials. 1. Step One: IMEI Check a. Enter IMEI and device model is confirmed automatically. 2. Step Two: Grade Device a. Choose device condition, it a working device or a damaged device? 3. Step Three: Data Wipe a. Confirm password lock removed and data erased. Objective Four: Discuss the Phobio support options with store reps and increase IOS lock...

Words: 600 - Pages: 3

Free Essay

8 Step Process for Leading Change

...Step One: Establishing a Sense of Urgency Establishing a sense of urgency is essential to gain the cooperation needed to initiate a greater need for change. Some leaders misjudge the difficulty to get people out of their comfort zone, or give themselves too much credit for how well they think they have already done. They could also just lack the patience required to develop appropriate urgency. Leaders should understand the importance of having a sense off urgency. If they did, they would be able to differentiate between complacency, false urgency and true urgency. Many times change initiatives fail isn’t due to being poorly thought out, or insufficient facts, the problem is that the case is all head and no heart. Leaders should “Aim for the Heart.” This way they will connect to the values of their people and encourage them to become great. The business will then bloom with human experience, engage the senses, create messages that are simple and imaginative, and call people to aspire. Step Two: Creating the Guiding Coalition Forming the right coalition of people to lead a change initiative is detrimental to its success. The coalition must have the right composition, a substantial level of trust, and a mutual objective. Decision-making is an important component for teams. In a world that is constantly changing, organizations are forced to make decisions more quickly and with less certainty. Teams of leaders and managers acting together are the only effective way to make...

Words: 1988 - Pages: 8

Premium Essay

Canter

...Running Head: Canter’s Behavior Management Cycle: A Case Study Canter’s Behavior Management Cycle: A Case Study It only takes one student, whose disruptive behavior impacts the entire learning environment of the whole class. Disruptive behavior can be any behavior that bothers, interferes with, disturbs, or prevents effective learning (Canter, 2006). Disruptive behavior can be broken down into three categories: verbal behavior, physical movement, and participation in an activity. The largest category of disruptions can be found in verbal behavior (Canter, 2006). The following case study deals with classroom disruptions of verbal behavior. Case Study Eric is 15 years old. He is a sophomore at Everyday High School. Eric was a very good student last year with little behavioral issues. However this year, Eric has been displaying disruptive behavior in the classroom. Over the summer, Eric’s parents got divorced. Eric’s dad, Dennis, was having an affair, and moved in with his girlfriend thirty miles away. Eric’s mom, Julie, caught Dennis cheating on her which tore her to pieces. Julie has not taken the split of very well. She has begun drowning her sorrows with the heavy use of alcohol. Julie is also meeting with a counselor to help her work through this tough issue in her life. She has been having so much trouble dealing with the situation, that she sent Eric to live with her parents...

Words: 1918 - Pages: 8

Premium Essay

A Comprehensive Discussion on the Similarities of Change as Discussed in the Heart of Change and Organizational Behavior and Management

...A Comprehensive Discussion on the Similarities of Change as Discussed in The Heart of Change and Organizational Behavior and Management Webster University Introduction A famous Greek philosopher, Heraclitus, once said, “Change is the only constant.”  That can be said of business too.  “Business as usual” is no longer the world of the eight to five workday, Monday through Friday with the safety net of cornering the market place in the selected region. As Thomas Friedman’s bestselling book “The World is Flat” states due to globalization and advances in technology, “the world is on a level playing field, where all competitors around the globe have equal opportunity to compete,” in a global market that historically and geographical has been impossible several decades ago (The World Is Flat ). In light of this, the authors of “The Heart of Change”, John Kotter and David Cohen (2002) and “Organizational Behavior and Management” textbook by Ivancevich...

Words: 2625 - Pages: 11

Premium Essay

A Sales Plan

...business from your existing customers. There are four basic parts of a sales plan: 1. New business acquisition strategies 2. New business acquisition tactics 3. Existing business growth strategies 4. Existing business growth tactics Before you start, you need to get a handle on some definitions: • Sales quota: This critical element of your plan sets the tempo of your efforts throughout the year and provides quarterly, monthly, weekly and even daily sub-goals for you to achieve. • Sales territory: Refers to the geographic area, list of named accounts or specific market niche you have been assigned to in which you are to sell your products, services and solutions. • Strategies: The plan necessary to accomplish your goal. • Tactics: The steps necessary to carry out the plan. New Business Acquisition Strategies and Tactics Include the following four strategies in your sales plan. Remember, these strategies are all designed to capture new customers and new market share. Important note: The strategies are numbered and the tactics are italicized. 1. Exceed my quota. • Send no less than 50 letters of introduction to new prospects each week. • Make no less than 50 cold calls of introduction to new prospects each week. • Make no less than 20 face-to-face contacts with new prospects each week. • Create no less than 10 proposals each week. • Make no less than five presentations each week. Important note: Your numbers will, of course, vary. What's important here is that you...

Words: 1091 - Pages: 5

Premium Essay

Hr Planning

...begin to address this situation? (5 marks) Bob should begin to address the situation by using progressive discipline. The following steps will make Phil aware of what he is doing wrong, and give him the opportunity to resolve the issue. The steps for progressive discipline are; Step One: Management issues a verbal warning to the employee for their infraction. Bob should begin by addressing Peter with a verbal warning and outlining the fact that he needs to show up for work, and be on time. Bob should continue to state that if he is going to be absent he needs to advise his supervisor. He needs to make Peter aware that if he does not begin to follow these directions more serious action will be taken. Step Two: Management provides the employee with a written warning of the issue and outlines that they require a resolution. If Peter continues to show up late, Bob then needs to provide him with a written warning. This document should outline that Peter has been late, on more than one occasion, and that they had previously spoken about this issue before. The written warning should also outline that Peter needs to start showing up to work on time, or else further action will be taken. Step Three: If the issue has not been addressed to management satisfaction a suspension without pay (Min. 1 day, Max. 5 days) can be initiated. Next steps can be addressed if Peter still continues to show up late and...

Words: 1072 - Pages: 5

Free Essay

Bell and Tech

...Alcatel-Lucent is a global telecommunications corporation located in Paris, France. It has, under its wing, Bell Laboratories aka Bell Labs. They were previously known as AT&T Bell Laboratories and Bell Telephone Laboratories is now the research and development subsidiary of the French-owned Alcatel-Lucent. Over the past eight decades, Bell Labs R&D gave birth to new technologies and seminal scientific discoveries. (Alcatel Lucent, para 1) Elisha Grey and Enos N. Barton formed Western Electric Company in 1869. Both of them started a small manufacturing firm based in Cleveland, Ohio which was to become the largest electrical manufacturing company in America. In 1881, Alexander Graham Bell, an extraordinary leader of American Telephone & Telegraph (AT&T), purchased a controlling interest in Western Electric and made it the exclusive developer and manufacturer of all equipments for the Bell telephone companies. Now, the Bell system has provided much telephone services and support to America and Canada in the 1877 to 1984. It was then led by AT&T. In 1898, Compagnie Générale d'Electricité (CGE) was born, founded by a French engineer named Pierre Azaria. It was involved in business with several industries in Germany. Mainly it dabbled in electricity, transportation, electronics and telecommunications. CGE then rose up the ranks and became a leader in digital communications and would be known as well to produce train à grande vitesse – high speed trains in France. In...

Words: 2450 - Pages: 10

Free Essay

Bioe 431 Lab 7

...Lab Write-up for Lab #7 CATHETER MODELING BioE431 Abstract Catheters have many uses when it pertains to medicine, a simple design that consists of a long narrow tube connecting to the body externally or internally and the other end to an apparatus or module. It is a negative system meaning the catheter is always connected at both ends making it a closed system. This setup can be / is being used for medicine delivery, fluids input and output, measuring volume displacement and many other operations. We are constructing a similar catheter module to measure and display a step response to a catheter loosing its negative/closed environment. To achieve this data we have a tube filled with water connected to a pressure sensor that doubles up as a transducer converting the pressure change as an electrical signal, which via software is being graphed. The other end of the catheter is connected to a funnel with a balloon atop and this funnel is junctioned using a 3-way stopcock. The tube is filled with water end to end, the balloon attached on the funnel is blown up which in turn puts pressure on the water which puts pressure on the pressure sensor, that transudes the pressure difference in to an electrical signal and LabView software displays that signal as a graph. Documenting and analyzing the step input when the balloon is popped is the purpose of this lab. Introduction The purpose of this lab is to build a catheter system, with an inflated balloon applying pressure to the...

Words: 621 - Pages: 3