Friday, May 31, 2019

Essay --

Using Xervmon for planning and provisioning redundancy across ten-fold availability zonesThe cost of droptimeDowntime costs enterprises money, in fact a great deal of money. The actual cost depends on the industry, but on average the revenue losses amount to between $84,000 and $108,000 for every hour of chance(prenominal) downtime. That isnt the only loss on to that you need to add the intangible costs of the impact of downtime on reputation and loyalty.Managing downtimeThere is a big deviation between scheduled and unscheduled downtime. Scheduled downtime is necessary in order to perform maintenance such as software patches, system configuration changes and database and hardware maintenance. Unscheduled downtime occurs typically as the result of hardware or software misfortune or an event such as a power rationalize or environmental catastrophe. High availabilityDesigning a system for high availability is problematic. Increasing system complexity increases the number of pos sible failure points. Simply installing internal hardware redundancy isnt an answer as it means that the whole system must be taken down for maintenance. It is necessary so design the system so that it can be maintained without affecting service availability. Such a management tool necessitate to satisfy three criteria high availability, fault tolerance and scalability.High availability implies that the uptime of an application is 99.9999%, which is often termed five nines. It equates to a maximum downtime of 5.26 minutes a twelvemonth which includes both planned and unplanned outages or downtime. Of course the ultimate goal is an application that has no downtime at all and is ever available.Xervmon Solution Users can at present unleash the power of visualized deployments with ... ... have been restored. ELB and Auto Scaling combine ideally ELB gives a single DNS name for addressing and auto scaling ensures there is always the right number of healthy Amazon EC2 instances to a ccept requests. Fault ToleranceBuilding fault-tolerant applications on Amazon EC2 requires that the best practices are followed, for instanceCommission electric switch instances rapidlyAmazon EBS should be used for persistent storage Multiple Availability Zones along with elastic IP addresses. Multi AZ architectureBy distributing applications geographically one can achieve greater fault tolerance. As the Amazon EC2 commitment is 99.95% availability for every EC2 Region, it is essential to deploy applications across multiple AZs.Redundant instances are placed in distinct AZs and ELB will automatically balance traffic across multiple instances and multiple AZs.

Thursday, May 30, 2019

The Real National Treasure :: essays research papers

THE REAL NATIONAL TREASUREThe United States, along with the allied forces of the world, is shortly fighting to find Osama bin Laden as well as his organization, al Qaeda, in Afghanistan. The new declaration of the fight on Terrorism has sequestered all boundaries that the terrorist organizations have been hiding behind. Although this war is a new idea to the average American Citizen, it is an old foe of the governments in most countries, which have already established anti act of terrorism and counter-terrorism task forces, but are now working together under an allied force. With the tightened security at the airports and military facilities, the counter-terrorism efforts are fighting cover song to counter the terrorists follow outs, but the key to fighting terrorism is to prevent the attacks from happening at all. More than a majority of the American public supports this military action against countries that terrorize the United States. In fact according to a gallop poll, eight y-eight percent of Americans polled agree that the United States should take military action in retaliation for attacks on the World Trade Center and the Pentagon. The problem that is being faced by the world is how to avoid future attacks after the smoke clears from the underway engagement.There are two types of forces that are surely employed against terrorism and both have the same mission of fighting terrorism, with different applications. The antiterrorism force is apply as a preventive action against future attacks while the counter-terrorism task force has many more post-action responsibilities. According to the Office of Counter-Terrorism, there are foursome policies being implemented as guidelines Make no concessions to terrorists and strike no deals, bring terrorists to justice for their crimes, isolate and apply pressure on states that sponsor terrorism to force them to change their behavior, and bolster the counter-terrorism capabilities of those countries that work with the U.S. and require assistance. These steps are necessary to fight terrorism after the actions of horror have occurred, and the current Afghanistan action in search of the al-Qaeda members (including bin Laden) is an example of a counter-terrorism action.In order to prevent future attacks, the United States must put a stronger emphasis on strengthening the antiterrorism forces. Putting more numbers on the membership board of this force is what is going to make headway in the War on Terrorism. It is a lot more difficult to fight terrorism before the attacks have taken place, but history has already demonstrate that the oldest form of intelligence collection, human intelligence, can be used to fight an entire country.

Wednesday, May 29, 2019

intro to networking and the tcp/ip stack :: essays research papers

SLIP is a transmission control protocol/IP parleys protocol workd for communication between devil machines that are previously configured for communication with each different. For example, your mesh legion provider may provide you with a SLIP lodge so that the providers server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. A better service is provided by the Point-to-Point communications protocol (uvulopalatopharyngoplasty). Point-to-Point Protocol is a protocol for communication between two com frame iners using a serial interface, typically a personal computer connected by phone line of products to a server. For example, your Internet server provider may provide you with a uvulopalatopharyngoplasty connection so that the providers server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses the Internet protocol and is designed to handle others. It is sometimes considered a member of the TCP/IP suite of protocols. Relative to the OSI reference model, PPP provides layer 2 (data-link layer) service. Essentially, it packages your computers TCP/IP packets and forwards them to the server where they can actually be put on the Internet. PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber opthalmic lines or send transmission. PPP is usually preferred over the earlier standard SLIP because it can handle synchronous as well as asynchronous communication. PPP can share a line with other users and it has error detection that SLIP lacks. Where a choice is possible, PPP is preferred. HTTP (Hypertext Transfer Protocol) is the pot of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that r uns on top of the TCP/IP suite of protocols. HTTP concepts include the idea that files can contain references to other files whose selection will excerpt additional transfer requests. Your Web browser is an HTTP client, sending requests to server machines. When the browser user enters file requests by either "opening" a Web identify or clicking on a link, the browser builds an HTTP request and sends it to the Internet Protocol address indicated by the URL. File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet.intro to networking and the tcp/ip stack essays research papers SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other. For example, your Internet server provider may provide you with a SLIP connection so that the providers server can respond to your requests, pass them on to the Internet, and forward your re quested Internet responses back to you. A better service is provided by the Point-to-Point Protocol (PPP). Point-to-Point Protocol is a protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. For example, your Internet server provider may provide you with a PPP connection so that the providers server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses the Internet protocol and is designed to handle others. It is sometimes considered a member of the TCP/IP suite of protocols. Relative to the OSI reference model, PPP provides layer 2 (data-link layer) service. Essentially, it packages your computers TCP/IP packets and forwards them to the server where they can actually be put on the Internet. PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber optic lines or satellite tran smission. PPP is usually preferred over the earlier standard SLIP because it can handle synchronous as well as asynchronous communication. PPP can share a line with other users and it has error detection that SLIP lacks. Where a choice is possible, PPP is preferred. HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the Web. As soon as a Web user opens their Web browser, the user is indirectly making use of HTTP. HTTP is an application protocol that runs on top of the TCP/IP suite of protocols. HTTP concepts include the idea that files can contain references to other files whose selection will elicit additional transfer requests. Your Web browser is an HTTP client, sending requests to server machines. When the browser user enters file requests by either "opening" a Web site or clicking on a link, the browser builds an HTTP request and sends it to the Internet Protocol address indic ated by the URL. File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet.

Admiral Jarok as a Traitor Essay examples -- Star Trek Essays Papers

Admiral Jarok as a TraitorAlthough a somewhat tacky and foreseeable program, Star Trek The Next Generation, succeeds where other television shows dont. Beneath all the glitz and glamour, a very straightforward theme arises in each issue parallel to our own society. One such episode is The Defector, wherein the intrepid crew of the U.S.S. Enterprise happens upon a Romulan renegade requesting asylum in Federation space. The Federation, (protected by its armed forces organization Starfleet), and the Romulans, (governed by the Romulan Star empire), are long-time foes. Throughout the episode the Romulan, (initially calling himself Cetol), skates around the truth before revealing his true identity as the disreputable Admiral Jarok, and further explains his motivations for defecting to the Federation. Here one must ponder the fine line between vengeful treason and inspired salvation. Jarok is a traitor of the Romulan Empire, just not of his people he reluctantly betrays state secrets t o save Romulus from the bitter consequences of war.Jaroks betrayal commences when he flees into Federation space to inform Starfleet of the impending completion of a secret supply depot within the Neutral Zone, a no-mans boundary between Federation and Romulan space. Jarok claims that this depot, orbiting the planet of Nelvana III, will undoubtedly serve as the institution point of the Romulan Empires invasion into Federation space. Convinced he is still loyal to the Empire, Jarok lies about his identity and his true intentions. Jarok attempts to act both as an Admiral of the Romulan Empire and a champion willing to abandon his rank for the sake of his race. Jarok destroys his shuttle, insisting that he will only reveal the bare minimum of Romulan... ...flicting administrative insurance policy and wonder why nothing is ever resolved. Perhaps in a sudden epiphany, we will realize the same truth Jarok did on the holodeck genuine quiescence is not possible without compromise and sa crifice.Works CitedAchim, Jo. The Romulan Empire. TOS TrekMUSE - Romulan Empire. 1994 http//tos-www.tos.net/tos/romulan/romulan.html (1994)Tong, Andrew. NCC-1701 Destroyed, Constitution Class Starships Withdrawn. The Star Trek Chronology. May 27, 1994. http//cruciform.cid.com/werdna/sttng/trek6/trek6-3b1.html (15 Jan. 1995)The Defector. Synopsis from The Vidiots TNG Program Guide. (date unknown) http//cruciform.cid.com/werdna/sttng/synopsis/defector.syn.html (15 Jan.1995)The Romulans. The Starlog STTNG Official Magazine technological Journal. (Date unknown). http//www.cms.dmu.ac.uk/AUG/StarTrek/romulan.html (12 Jun. 1995)

Tuesday, May 28, 2019

Ray Kroc :: essays research papers

Ray KrocPROBLEM STATEMENT      In order for McDonalds to come home its goal of "par excellence", it mustuse the full meaning and definition of marketing. Marketing is giving the targetmarket what they want, when and where they want it, at a price they are willingto pay for it.REFLECTION / OPINION     For McDonalds to achieve its "par excellence", they must focus on thefact that there is an of all time changing market and that the wants and needs ofconsumers are constantly changing. Since McDonalds has been around for forty-one years, it is safe to say that they are the father of the fast forage industryand that they take a leak set an example for others to follow.     When Ray Kroc bought the first McDonalds in 1955, he focused on whatpeople wanted. With this focus came the utilization of Mr. Krocs theory of QSC( quality, service, and cleanliness ).     QSC successfully got McDonalds off the ground, notwithstanding as times changed,the company saw many more market pieces and opportunities. In the 1970s and1980s once again McDonalds lead the way in the fast food industry. The changeswe saw included, for example, the fact that women were now a major part of thework force and dual income families were becoming a more common occurrence.McDonalds became a orchestrate of marketing toward specific markets bypioneering ideas such as breakfast menus, healthier choices and alternatives,and "adult" foods. McDonalds has truly evolved into a world power by paying solicitude to the needs and wants of the changing market and adjusting to theseneeds.LINKING THEORY      Ray Kroc saw early on what needed to be done. He changed what was at onetime a product orientation, into a marketing orientation. Back in 1955, this wasstill a new type of management. From the beginning, Kroc was already in theforefront of marketing.     Marketin g orientation focuses on the customer and what they want in aproduct, rather than product orientation which focuses on the product itself.McDonalds has taken every aspect of marketing orientation and use thephilosophy to its fullest. McDonalds has focused in on the customer needs andwants, sometimes even putting the ideas into the consumers mind before theyeven knew what they wanted or expected. McDonalds could recall They have doneextensive market analysis and product development based on this analysis. Theyhave packaged their food and priced it exactly to the market segment which theyhave targeted.     Showing McDonalds innovations in marketing even further, is its earlyadaptation of societal marketing. Societal marketing takes into account theoverall concerns of the target market, the environment, for example.

Ray Kroc :: essays research papers

Ray KrocPROBLEM STATEMENT      In order for McDonalds to reach its goal of " equating excellence", it mustuse the full meaning and interpretation of marketing. Marketing is giving the targetmarket what they want, when and where they want it, at a price they are willingto pay for it.REFLECTION / OPINION     For McDonalds to achieve its "par excellence", they must focus on thefact that there is an ever changing market and that the wants and needs ofconsumers are constantly changing. Since McDonalds has been around for forty-one years, it is salutary to say that they are the father of the fast food industryand that they have set an example for others to follow.     When Ray Kroc bought the first McDonalds in 1955, he focused on whatpeople wanted. With this focus came the utilization of Mr. Krocs theory of QSC( quality, service, and cleanliness ).     QSC successfully got McDonalds off the ground, but as times changed,the company saw many more market segments and opportunities. In the 1970s and1980s once again McDonalds lead the way in the fast food industry. The changeswe saw included, for example, the fact that women were now a major part of thework gouge and dual income families were becoming a more common occurrence.McDonalds became a mastermind of marketing toward specific markets bypioneering ideas such as breakfast menus, healthier choices and alternatives,and " big(a)" foods. McDonalds has truly evolved into a world power by payingattention to the needs and wants of the changing market and adjusting to theseneeds.LINKING THEORY      Ray Kroc saw early on what needed to be done. He changed what was at onetime a product orientation, into a marketing orientation. Back in 1955, this wasstill a tonic type of management. From the beginning, Kroc was already in theforefront of marketing.     Marketing orientation focu ses on the customer and what they want in aproduct, rather than product orientation which focuses on the product itself.McDonalds has taken every aspect of marketing orientation and utilized thephilosophy to its fullest. McDonalds has focused in on the customer needs andwants, sometimes yet putting the ideas into the consumers mind before theyeven knew what they wanted or expected. McDonalds could deliver They have doneextensive market analysis and product development base on this analysis. Theyhave packaged their food and priced it exactly to the market segment which theyhave targeted.     Showing McDonalds innovations in marketing even further, is its earlyadaptation of social marketing. Societal marketing takes into account theoverall concerns of the target market, the environment, for example.

Monday, May 27, 2019

Why Did Chartism Fail in the 19th Century

In this essay it will be necessary to examine the savvy why Chartism failed during the 17th century. Chartists were formed during 1838, 6 years after the great reform act was passed. When a group of men met in a local pothouse and were extremely angry about how badly the reform act was making so little changes, so they made a list of things they thought were qualified for voting rules and branded themselves The Chartists and they were out to change how the MPs were elected throughout Great Britain.The five main men in this debate were doubting Thomas Attwood, William Lovett, Fergus OConnor, Francis Place and John Frost. Francis, Thomas and William all believed peaceful methods were accepted and the right thing to do, however, on the opposing side was Fergus and John who were certain that military force was the way forward to get political and social changes.I think this point about the chartists is long term because, the men had to settle their differences to come to an obligati on on what the next stage would be, therefore the negative side to this would be the disagreement but the positive being the fact they had two smaller groups to have got the publics different opinions, I think the long term cause of disagreement was the crusade for distress. Throughout the Chartism event, the Chartists set up 3 supplicants for the popular public to sign, and in total they gained 10,296,710 signatures.The first petition was set up in 1839 with 1. million signatures and it was almost 3 miles long, however, it was rejected. But then in 1842, 3 years later, they made yet another petition with a 3. 3 million signatures, but yet again, it was rejected. Finally, in 1848 they made a third petition with a staggering 5. 5 million signatures and yes, it was rejected despite all the hard work and names. These short term causes, I believe, didnt contribute to the failure of Chartism as the reliability of this source is not good as we dont know if the figures are exact and c ompared to the previous point, this is less reliable.Another reason I think that Chartism in the 17th century failed is that on the 10th April 1848, the Chartism demonstration day, only 20,000 people turned up due to the unexpected rainwater fall that day. Therefore they didnt get as much popularity and votes as expected and couldnt get the voting rights they had initially hoped for. This trigger cause I presume was not one of the main reasons Chartism failed as the previous points are more understandable and useful than this one.In conclusion, I believe that the main reason that Chartism in the 17th century failed is because the 5 men who led the organisation all had different views and ideas on how to win the publics vote 3 of the men believed that peaceful communications were the way forward and the other 2 men reckoned that violence and abuse was going to win the public and government over. alike as this is what I believe to be the most reliable and useful statement it makes m ore sense as to why they did not get the rights they treasured originally.

Sunday, May 26, 2019

Healthy foods vs. not healthy foods Essay

Eating is something that we all have to do to stay brisk and we do it at least three times a daytime. We live in a world where there are so many choices and no one but ourselves are responsible for the foods we eat. In this essay I will compare and contrast the differences between eating healthy foods instead of not so healthy foods. First Im going to discuss the healthy foods. The two areas of healthy food Im going to run out about are the take ins and judgment. The Benefits of eating healthy foods are that our bodies stay healthy, keeps you full and satisfied longer during the day, giving you more energy through out the day and in the long run keeping us out of the doctors office. If youre trying to lose weight consuming healthy foods is a start to lose weight.The taste of healthy foods is fresher and if you prepare it well the taste will satifa you but it can sometimes lack good taste if you dont know how to prepare it. Second Im going to discuss the benefits and taste of the not healthy foods. There is no benefit of eating food that isnt healthy for you. When we consume foods that have no benefits we end up with all types of health problems like diabetes, heart conditions and being grueling Which all can lead to high medical bills. The taste of these kinds of food might tastes better at the moment due to all the ingredients that are in them and might cost cheaper so it becomes easier for us to consume. In the long run we are responsible for what we eat and the choices of food we buy but we should all fence the benefits it will make or not make.

Saturday, May 25, 2019

Print Media: an Early History

Print Medias Early History Print media is constantly evolving. Back in 1690, stories in the newspaper required royal swallow to be printed. Benjamin Harris who wrote a story of an affair about the King of France, was jailed for his words. It was this that sparked the protest against royal consent. The paper industry expanded. It eventually split in to two types of papers, federalist (for the crown) and anti-federalist (against the crown), these papers were constantly competing.In 1791, after the American revolution, free press was born. Allowing people to write what they think without risking jail, this saw the first African-American and Cherokee papers. As engineering science ripe, more and more papers could be produced at a time, with steam power, 4000 copies could be printed an hour, this was called mass newspapers. The Literacy rate was low in 1830, so the role of newspapers changed, it was direct to support literacy and public education.Public Schools now taught people to re ad and understand the issues of politics, so they could make an informed vote, seeing as now everyone could vote, not just the rich. consequently began the Penny Press era, this involved, mass printing, which meant mass distribution. You could buy 100 papers for 67 cents, sell them for 1 cent a piece and turn a profit. With newspapers now everywhere, this meant mass education therefore mass literacy, and mass vote.Newspaper industries began to compete for profits, and advertising was a result of that, more ads meant more money for the newspaper companies. Advertisements were nearly for five major reasons To sell products / services, to educate people about products, to reach a mass audience, for economic / business reasons, and to perform a social function. Advertisements were overly very common in magazines. The idea for magazines came from Benjamin Franklin and his brother.Read also History QuizzesMagazines are different from newspapers because they specialize in certain areas, where as newspapers state on everything. A magazines focus was on a niche market. The number of magazines rose exponentially from 260 to 1800 between the years 1860 and 1900. There was better printing technology, subvert prices and special mail rates. After the war there was a larger selection of topics, from golf to porn. People had much more leisure time. Print media has advanced and developed for hundreds of years, but it often keeps the same format, just look at news websites today.

Friday, May 24, 2019

Chemistry

Mixture insularism Lab I am one of the chemists assigned to design a cost effective procedure for handling the separation and recovery and hazardous waste disposal. The difficulties were trying to figure out Is how we can effectively separate Carbons, good sense, and naphthalene? The possibleness we chose to solve this problem was If we put the mixture into water, alcohol, and mineral spirit, whence in each solution one or more substance forget not dissolve, will be visible, and also able to separate.According to our data our hypothesis supported the experiment beca put on and sand are lobule in water while naphthalene is not. The CARBONS, and sand will dissolve in the liquid solvent and the naphthalene will remain in the solid phase. In the other substances methanol and mineral spirit were not disintegrable in both Carbons and sand. Also in naphthalene mineral spirit was not soluble. To accomplish this experiment we did the following as to have a successful hypothesis.First us e three separate ml test tube, and added ml of each substance Including water, methanol, and mineral split. If the Carbons Is any(prenominal)thing that Is water soluble, then water can be added to the mixture and then It can be altered as the sand is insoluble and will be left behind. Also add 0. 20 grams of each mixture including Carbons, naphthalene, and sand to each test tube. Try to stir or shake the substance to dissolve.If that didnt work to dissolve the mixture we made a filter paper and situated it in a funnel then try to filter it by pouring the sample in. After that this leads us on to the third option of separation which is evaporation. At last we placed our sample test in an Erlenmeyer flask and then placed it on a hot surface with melting tear 8. 2 0 c, waited to evaporate then recorded our data. After each test, try to observe If the sample was soluble In any of the substance.My data by all odds supported my hypothesis because In that experience we found out In the lab that H2O was not soluble In naphthalene, and sand. Methanol was not soluble in Carbons, and sand. Also mineral spirit was not soluble in all the substances. Some errors that might have affected my experiment was the evaporation relegate I think we left it a little bit too long or took it our earlier for the solution. In the filtering stage we might have spilled some of the sample result so hats why we maybe got different result.

Thursday, May 23, 2019

Capstone Analysis

Cybercaf Is defined as any crime that Is conducted Vela the Internet or another electronic computer network. When It comes to cybercaf It Is very easy for soulfulness to fall volt to It. We use computers for everything searching the Internet, shopping. Accessing our bank accounts, email, and online gaming are some examples. Communication is faster and much to a greater extent reliable than in the past which has allowed more to be accomplished in any given day.The problem is just like anything else vulnerability. There are individuals that common scold into computers as well as networks of businesses and government agencies. The problem is that sensitive data can be stolen and/or destroyed. There needs to be more focalise on the security of computers and the internet. Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophilia, sometimes accurately delineation events, sometimes misconceiving the role of t echnology in such activities.The increase in cybercaf has been documented in the news media. Both the increase in the incidence of roughshod activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercaf is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like ere TVs, or you have won $1,000.In general, I feel that in this day and age you really need to be aware of your surrounding and that also includes the cyber world. By Sabina-Fazing Cybercaf is defined as any crime that is conducted via the Internet or another computer network. When it comes to cybercaf it is very easy for someone to fall victim to it. We use computers for everything searching the internet, shopping, more to be accomplished in any given day. The problem i s Just like anything else

Wednesday, May 22, 2019

Cultural knowledge

Cultural knowledge is of great importance for contemporary society, because in the global world it is necessary to set well-disposed relations and overworking contacts with all the cultures and countries. A potential classmate for me is Chinese scholarly person, because Chinese culture is significantly different from others and I would be able to mark off new things, ideas, core beliefs from Chinese student.I know that Chinese culture is one of the oldest in the world and, therefore, it is really worth examining and studying. It would be interesting to know much about Chinese family values and belief, communication peculiarities, about economic and political objectives of the country as well as about their leisure time.Thus, Chinese student would certainly help me in expanding my cultural knowledge. Chinese people are outwardly restrained, because they are influenced by Confucius philosophical thinking and thus they are to a greater extent reserved in verbal and nonverbal commun ication.Emotional gestures and body language is less expressive as compared with Cuba or Brasilia, for example. As for me, I am very communicatory person and it is interesting for me get acquainted with completely different behavior.I know that there are peculiar values in Chinese culture and I think we should pay special attention and, maybe, even to adopt them. For example, family is considered the basis of Chinese culture, especially extended families, when several generations are living together in one house.The elder generation is respected for their wisdom and usually they are provided with good pensions compared with that in other countries. It is important to know that Chinese family members tend to work as a team living under one roof as it is mentioned above.The family welfare is contributed by every family member, either young or elder. I understand that we should follow Chinese in certain traditions, customs. So, I would be provided with an opportunity to adopt some Chin ese values as well as to share my culture and my knowledge with Chinese student. Furthermore, they are considered non-conflict people.ReferencesCountrys Profile China. Retrieved January 17, 2007, from http//www.cp-pc.ca/english/china/index.html

Tuesday, May 21, 2019

Dad By Elaine Feinstein

The poem that Ill be analyzing in this commentary is called Dad by Elaine Feinstein. This poem is an emotional and lyrical poem in which the author is reflecting and recalling upon the memories of her deceased father. The main tones that ar portrayed in this poem are sorrow, pleasantness and mournfulness, and one way in which this is portrayed is through the methodology in which the poem is read, which is in a slow rhythmic speech and enjambment since it is a free verse poem. The authors intentions behind this poem are clear. She is simply portraying her loving feelings for her father and the grief that she undergoes through his decease.She shows her intentions through the loving lines and sentimental memories, for example in lines 1-3 Those black fat raisins you like to press into my palm from your soft corpulent hands the author recalls such simple yet meaningful memories with great detail which shows that she valued the memories dearly. Signs of grief are shown from when the sh e moans almost her father, such as in lines 12-14 when she says, Beached cold, white-faced, shivering. What happened, old bull, my loyal hoarse-voiced warrior? In these lines, Elaine uses diction to prove a stronger point .As fountainhead as that, Elaine uses lots of imagery throughout this poem, such as in that last quote and in lines 4-6 I see you staggering back up the path with sacks of potatoes from some local farm, fresh eggs, flowers. This quote however overly shows how dearly she loved her father. Imagery is an effective poetic device for this poem since it generates/creates an emotional connection for the audience/reader making her message clearer. As well as imagery, the author uses many different poetic devices, for example in lines 13-14 when she says Beached cold, white-faced, shivering.What happened, old bull, my loyal hoarse-voiced warrior? she is using a metaphor and comparing her father to a bull, which is a courageous and strong animal. With this metaphor, Ela ine is portraying how dearly she loved her father and how he was a bull in her eyes. As well as that in lines 5-6 when Elaine says Farm, fresh eggs, flowers the author uses alliteration to evokes emotion and the pleasing tone of alliteration then catches the readers attention before telling the audience about her fathers death Every day I grieve at the end of line 6.

Monday, May 20, 2019

Literary Analysis of Sunrise over Fallujah Essay

The refreshed Sunrise Over Fallujah by Walter Dean Myers is a historical parable novel that retells the memories of redbreast Perrys experience in Iraqi civil war. He was in a civil affairs unit, which is dedicated to protecting by standers in the war. Robin encounters various setbacks that try to slow down the progress of his unit such as the demise of his close friend Jonsey. Walter Dean Myers portrayed his knowledge of the setting, aspects from the past, and do the patch very thinkable in the historical fiction novel Sunrise Over Fallujah.Firstly, the historical, cultural, and geographical content involving the setting was portrayed accurately and was authentic. In addition, pens must complete detailed research of their settings before attempting to write a book of this genre.If reservoirs want To create accurate and authentic settings in their books, they must research the time period thoroughly (Read). once the origin has completed a detailed research of the setting they are looking to portray they keister then start the writing process of their novel. Furthermore, an accurate setting makes the sham divulge of the story believable and is what keeps the readers attention. The unit Robin was in had a R egresse that was northward through the city and just out of it to Al Kazimayn mosque (p.131, 14-15).This is an example of accurate geographical knowledge of the setting. Moreover, reservation the setting accurate is important, but making it authentic is just as important. When the main character Robin and his crew raided a home they Couldnt tell if it was an apartment house or cardinal big family (p. 53, 7-8). Researching about how the civilian population lived, ate, and what artifacts were a common part of their lives can make the settings in the novel more authentic. This concludes the impressiveness of the setting in a historical fiction novel.Secondly, aspects from the past were used to help the reader fancy the startment of the plot an d fictional characters. Moreover, aspects from the past are important in a historical fiction novel because the readers see get word elements develop. Many authors suggest that Any aspect from the past can be useful to the contemporary novelist attempting to reanimate it to serve as the context for character and plot development (Facts). Plots and characters begin developing from the authors research of aspects from the Iraq War. Furthermore, the war in Iraq was full of question, which created many aspects for Walter Dean Myers to choose from. Captain moth miller was Mad because there were kids in and playing around the school when they attacked it (p. 100, 24-25).Those types of features from the war in Iraq helped the author develop fictional characters. In addition, aspects from the war in Iraq can be used for the development of the plot. For example, at one point in the novel The vehicle ahead of Robins crew made a sharp U-turn, RPGs Jonsey shouted he braked to a skidding halt (p. 101, 23). This commonly used tactic of the Iraqi soldiery was a feature that Walter Dean Myers used to help develop the plot. After analyzing the novel, readers quickly realize the importance of using aspects to develop characters and the plot. Finally, the most important part of a historical fiction novel by far is the believability of the plot.Moreover, the plot of a historical fiction novel is the most important part because this specific element of a novel is what keeps the readers attention. In a historical fiction novel The fictional characters, settings, and plot events must be portrayed authentically as if they actually couldve happened (Read). This is a key fraction to make sure that everything in the fictional event is accurate and authentic to keep the readers attention. Furthermore, the plot consists of threefold parts in the story but the most looked forward to moment is the climax. The main character Robin was explaining that, I had my head turned when the bus e xploded. The impact went through my body and slammed me against the back of the Humvee (p. 199, 22-24).The climax of the novel is successful as it creates suspense and kept the reader focused on the rest of the novel. A key component of making the plot believable is using terms based on the event the author is writing about. When Robins division had to move they Were supposed to go from the FOB (forward operations base), which was postal code but a few tents in the sand, to mining area about fifteen to twenty miles outdoor(a) (p. 78, 2-4). Complex terminology such as FOB can keep the readers attention because it seems like the author knows what he writing about. Walter Dean Myers successfully made the plot believable and kept the readers attention.The three major(ip) components to writing a historical fiction novel knowledge of the setting, using aspects from the past, and the believability of the plot is what made Sunrise Over Fallujah a successful novel of this genre. This novel met ends with the criteria to writing a historical fiction novel, which is why it is recommended to readers that enjoy this genre. In the end, Walter Dean Myers put together a wonderful piece of publications that was successful in the historical fiction genre. Citations diachronic Fiction. Read Write Think. IRA/NCTE, 2013. Web. 29 Apr. 2013. Historical Fiction. Facts On File Companion to the British Novel 20th Century, vol. 2. 2006. Blooms Literary wing Online.

Sunday, May 19, 2019

The Dumingag Experience

THE DUMINGAG EXPERIENCE A REFLECTION By Alfonso A. Tan I never had much information about constitutional fertilizer floriculture and the principles behind it, until in October 2012 when I joined the conduct of ARC Level of Development Assessment (ALDA) in Dumingag town in Zamboanga del Sur. As a member of the regional monitoring team who is conducting ALDA, I came across two Agrarian regenerate Beneficiaries (ARB) organizations that discuss authoritatively about thoroughgoing ground like it is the plow of their hands.The two organizations the Dumingag original Farmers Association (DOFA) and the Dumingag perfect Farmers Credit and Savings Cooperative (DOFCSC) turned out to be just two of the several(prenominal) farmer organizations in Dumingag who are organic husbandry practitioners. And the technology has been gaining underseal since this particular topical anesthetic government transmutation was introduced by the municipal city manager more than five age ago. My la ymans understanding of organic solid ground then, was simply farming without the use of pesticides, herbicides or every artificial fertilizers.I know it has good health benefits for our body because the farm produce are all-natural. It is environment-friendly too. Later on, I learned that there are besides so-called organic carnals or those that are not unploughed in cages and not fed with commercial available feeds, which are generally by-products of other animals. The internet offers several helpful definitions of Organic horticulture. The Bureau of Plant Industry in Australia defines organic farming as the doing of food and fibre without the use of synthetic chemical fertilisers, pesticides, herbicides or genetically modified organisms (GMOs).The Certified Organic Associations of British Columbia says, organic farming promotes the sustainable health and productivity of the ecosystem dirty, plants, animals and people. Organic foods are farmed in an environmentally sustain able and kindly responsible way, focusing on soil regeneration, water conservation and animal welfare. As far as topical anesthetic anesthetic government innovations are concerned, I believe the organic farming technology as revolutionalized in the town of Dumingag, Zamboanga del Sur is one for the books.Last year, the International Federation of Organic tillage Movements (IFOAM) awarded Dumingag as one of the five recipients of the One World honor for its organic farming program. IFOAM is a leash world coalition on sustainable agriculture mainly composed of civil society organizations and social movements Dumingag town is its exclusively topical anaesthetic government member. Started in 2008, the IFOAM award runs every two years to receipt organic farming initiatives that gather in made a difference in the area of sustainable development.Dumingag is a second course of action municipality in the eastern part of the province of Zamboanga del Sur. It is composed of forty four 11 lowland and 33 upland barangays, with a total land area of 618. 50 square kilometers and a population of 46,039 per 2007 census. Situated in the heartland of the Zamboanga peninsula and on the northwest portion of the fertile Salug Valley, Dumingag is bounded on the newton by the municipality of Sergio Omena, Sr. on the East by the municipality of Mahayag on the entropy by the municipalities of Sominot and Midsalip and on the western by the municipality of Siayan, Zambonga del Norte.Dumingag was part of the municipality of Molave when it was created into a barrio in 1950. Dumingag was once a vast expanse of jungle and marshland, the favored habitat of wildlife. Its first inhabitants were the Subanens who came from coastal areas of Misamis Occidental and Zamboanga del Sur. The success of Dumingag started with the revolutionary idea of city manager Nacianceno M. Pacalioga Jr. , a former(prenominal) Maoist rebel in the 1980s who almost singlehandedly transform Dumingag town i nto what it is now.After returning to the folds of law, Jun Pacalioga went work their family-owned upland farm in 1995. His former comrades introduced him to organic farming, but at first, he was not persuaded. In the year 2000, a seminar on sustainable agriculture had virtuallyhow convinced him the beauty of organic farming. Pacaliogas visit to his former comrades farms in Davao City has particularly impressed upon him the natural fertility of the soil that organic farming brings. Minus inorganic inputs, the farms produce crops free from pass-on toxicity.The positive result from his own practice flock Pacalioga to advocate organic agriculture to other farmers, finding kindred spirits among local aceers of the Catholic Church. According to Mayor Pacalioga, bringing back the natural fertility of the farms and putting premium on maintaining soil health are central goals of Dumingags organic agriculture program. Long years of agrichemical use had bind farm productivity to the appl ication of costly fertilizers, pesticides and herbicides that, in turn, killed earthworms and degraded soil fertility.Likewise, the high cost of farming and declining farm production resulted in poor income for tillers. People could barely meet basic necessities, such as food, clothing and shelter and hardly pay for basic social services, such as education and health, Mayor Nacianceno Pacalioga said. After he was elected mayor in 2007, Pacalioga aggressively promoted organic farming. He also caused the departure of a local measure encouraging and endorsing the widespread acceptance of the technology. The policy was not an easy-sell. Even some municipal officials did not buy the program at once.It took them several months to be convinced of the merits of organic farming. Soon, Dumingag leaders were up against the national policy design that promoted instead the use of chemical fertilizers and the cultivation of genetically modified crops. To illustrate his point, Pacalioga turned d own P2 million worth of chemical fertilizers offered by the Department of Agriculture (DA) for statistical distribution to the farmers. At one time, he also rejected a grant of genetically modified sift seeds for dispersal in his municipality.As one of his first priorities, Mayor Jun organized the Organic Farming (OF) team which is tasked to lead in the implementation of the organic farming program, especially education and advocacy. Likewise, he introduced community of interests immersion wherein local officials, community leaders and different stakeholders went to the 44 barangays to campaign for the economic program on Sustainable Organic farming. Initially, those who shifted to organic farming grappled with a steep reduction in yield, although this was cushioned by the radical diminish in cost.Several croppings later, as natural soil fertility improved, output went up. For rice, yield per hectare was at par with farms politic applying agrichemicals at 95 65-kilo bags during t he dry season, and 70 to 80 bags during the wet season. But net earnings are higher with organic farming because cost has been reduced by at least a third. From only 20 organic farmers in 2007, the number of organic agriculture practitioners in the municipality rose to about ergocalciferol by 2011, increasing by tenfold the size of farmlands cultivated along sustainable agriculture methodsfrom close-fitting to hundred hectares before to some 1,000 hectares.In upland villages, organic farming is gaining adherents among vegetable cultivators and livestock raisers. Today, rice farmers brace produced 55 local organic varieties that ensure a stable seed bank. The Dumingag Organic Farming carcass Practitioners Association (DOFSPA) composed of active organic farming practitioners was also organized. They also formed a assign cooperative that could help better in raising capital for farming or in overlap the cost of farming failures due to calamities.Their cooperative initially started in providing production loan to the organic farming practitioners and helps in accessing good market. The mayors brainchild, the so-called Genuine Peoples Agenda (GPA) was also institutionalized. Mayor Jun described the GPA as a product of collective discussion and leadership a comprehensive program of government a solution to the challenges and it assures the better future of the people. In September 2010, the local government established the Dumingag Institute of Sustainable Organic Agriculture (DISOA), a school that trains farmers on organic farming principles and technology.Though DISOA started with modular courses as a vocational school, it aims to become a regular college later go special and ladderized courses on organic agriculture. Moreover, all public and private school teachers in all levels in the municipality were educated on Sustainable Organic Agriculture and Climate Change. The never say die post of a veteran cadre like Mayor Pacalioga is the major attribute to th e success of his local innovations. He displayed strong political will despite the initial lukewarm response of the people.The municipalitys aggressive rouse for organic farming was the bedrock of a bigger program to bring socioeconomic uplift to the residents. The level of Mayor Pacalioga and the municipality of Dumingag is no different from the Curitiba experience with Mayor Jamie Lerner. It only goes to say that local innovations and governance workings in any environment, people and culture. Mayor Lerner, a city planner has transformed Curitiba into a hale and liveable city through modernizing transport system, environment-friendly parks and systematic garbage disposal.Conversely, Mayor Pacalioga, a former rebel leader has reinvented Dumingag into a sustainable rural community by introducing not only organic agriculture, but also optimize agricultural land use by having it planted with high nurse trees and crops and empowered the women to venture into livelihood programs. D umingag or Curitiba Philippines or Brazil, the concept towards sustainable development through local governance innovations are the same. Alternatively, local civil society also plays an important role in the vapourous and participative process that the local government is introducing.The efforts of the local government, be it in Brazil or Philippines would not have taken off had the peoples organizations, non-government organizations and the civil society did not cooperate. The success behind the local innovations and programs in any community, for that matter was a classic example of local convergence at work. Dumingag achievements were not limited to agricultural statistics. Politically, the municipality also managed to improve in terms of increase in local taxes and business. ground on the LGU data, the municipal income increased tremendously at an average of P3M per annum, swelling from P4. 5M in 2007 to P13. M in 2010. Likewise, business establishments rose from 180 in 2007 t o 324 in 2010. The estimated Average Money Circulation in the market neighborhood also climbed from P100,000 in 2007 to P2. 5 Million in 2010. These achievements are phenomenal for a second class town like Dumingag which 84% of its people are considered poor according to NSCB standards. Now, the municipality of Dumingag is implementing its master plan on organic agriculture. It is a specific blueprint of the towns courses of action and scientific approach towards sustainable development. The Dumingag LGU has also established partnerships with Assisi Development Foundation, Inc. ADFI), for partnership in Sustainable Agriculture, Water System, and Lumad Education Xavier University- Sustainable Agriculture Center for education and advocacy for Sustainable Agriculture and Climate Change Philippine Agrarian Reform Fund (PARFUND) for Rice-Duck Farming and Technology Department of Agriculture, for various programs and projects for livelihood and support infra services and the JH Cerilles recount College, for research and documentation wherein the LGU has entered into a MOA to transform 100% the 43 hectares rice fields owned by the school into organic farming model in support of the organic agriculture drive of the municipality. In 2010, as recognition of its innovative practices on sustainable organic agriculture, the Dumingag LGU, through Mayor Jun Pacalioga was conferred with the prestigious Galing Pook Award as one of the Ten Outstanding Local Governance Programs in the Philippines. This was personally conferred to the proud mayor by His Excellency Benigno Simeon C. Aquino III.The Galing Pook award is a national search of local governance programs, evaluated through a multilevel screening process based on positive results and impact promotion of people employment and empowerment transferability and sustainability and efficiency of program service delivery. Beyond the awards, winning programs become models of good governance promoted for adoption in other commun ities. They provide useful insights and strategies to find innovative solutions to common problems. More importantly, they affirm the community and the local governments commitment to good governance. The efforts of the visionary mayor really paid off.It is unmingled that Mayor Pacalioga made use of his skills in community organizing, together with his strong personality in pursue his reform programs for the poor. Dumingag is now generating and storing its own seed varieties of rice so that they will not be at the mercy of big agrichemical firms in the future. The campaign of Mayor Jun also resulted in the increase of farming and plant activities in the municipality, all of these are geared towards sustainable livelihood and economic development. These developments are apparent in the extent of plantation areas compared to 2007 data. For example, Cassava areas increased from 350 to 2000 hectares Abaca fields rose from 5 to 500 hectares no-count areas goes up from 10 hectares to 1 ,100 and Falcata plantation climbed from 5 hectares to 200 hectares.It is remarkable to note that the local government innovation that started in the simple town has now gone international. Recently, through the facilitation of SAC-Xavier University, the Dumingag LGU was able to send three delegates to South Korea for three-month training on Natural Farming Systems. The recipients were the Municipal Agriculture Officer, a municipal agricultural technician and a Sangguniang Bayan member. Sources Organic farmingtakes root in Zamboanga del Sur Retrieved from http//www. newsinfo. inquirer. net SustainableOrganic Agriculture. pdf Retrieved from http//www. bswm. da. gov. ph Dumingag, Zamboanga del Sur, Philippines Retrieved from http//www. ugnayan. com/ph/ZamboangadelSur/Dumingag

Saturday, May 18, 2019

Myth Interpretation

The movie industry had delved with so many themes already that creating a fairy account or a fondness movie is not mostthing new. These fantasy movies became mainstream attractions thanks to the new technology of 3D and animations that makes imaginary characters come to brio and walk and lecturing like humans. In these fantasy movies, one can not help notwithstanding question the passion for the story the insight for the roles created and the symbolism each character represents.There would be parallelism with each fantasy story, as every costly fantasy movie would be, since it mainly caters young audiences, like for example the eternal troth between wakeless and monstrous. trashs snarl is not any difference, it tackled the parallelism and many more, although some symbolisms were graphically demonstrated, to the point of disgust, it is still a fantasy movie.These parallelisms between the symbolism in the movie and the romances would be analyzed and discussed in this paper . The liminality as every heroic tale should require would be pointed out in any way possible as it pertains to the Neo-Platonism idea of The One.Summary of the MoviePans Labyrinth or El Laberinto Del Fauno in its original title in Spanish or literally translated as The Fauns Labyrinth, is a fantasy film that delves in a young girls struggle to keep the factuality lovely by completing tasks in an opposite parallel world. In so doing she will seclude the wad that was rightfully hers and become a Princess once again in the parallel world.There were two worlds in which Ofelia, the booster dose was living. The real world where her mformer(a) is sick with the tiddler, where her ruthless stepfather Captain Vidal lives, and where there are rebels prepared to take offense against the Captains forces and the second world, where Ofelia is the long lost Princess Moana, daughter of the King and she must shrink back to him as soon as possible. To be able to go back to her father, Ofelia was tasked to complete lead tasks before the full moon rises, in order to ensure that her essence is intact. First she must encounter the g venerableen key from the belly of a giant toad frog that was living off the life of an old tree.She successfully got the key and proceeded on with the next one, with the Fauns guidance, to retrieve a golden knife from a blench mans dwelling and she was successful again, but lost the lives of her assistant fairies. The Faun was so indignant that he said Ofelia could never return to her kingdom. Meanwhile, the condition of her pregnant mother is getting worse, and the rebels who are against the fascistic rule of her stepfather are building a plan of their own. Her mother lost her life in free birth to her baby brother, her friend Mercedes was caught by Vidal for spying, and Vidal had caught Ofelia lying to him and impri paroleed her in the attic with orders of shooting Ofelia starting signal if the rebels attacked.Taking pity on the poor Ofel ia, the Faun appeared again and gave her another happening all she had to do is take her baby brother to the internal ear. After much hardship and running away from Captain Vidal, Ofelia in conclusion reached the labyrinth where the Faun was waiting for her with instructions to prick her little brother with the golden knife and let his blood flow by dint of the labyrinth. Ofelia refused to hurt her baby brother, this led to the Fauns disappointment and left Ofelia on her own, as Captain Vidal lastly caught up with her, killed her and took the baby.Ofelias blood spilled in the labyrinth and Captain Vidal was met by Mercedes and her rebel friends and they killed Vidal. All the while, in another world, Ofelia rose and was called upon by her father as Princess Moana. She was astonished to find herself in a spacious castle with her father and her mother waiting for her. She had finally come home while on the other end, Mercedes cradles the lifeless body of Ofelia.Contrasting Concep ts and Symbolisms Good vs. EvilAs every fairy tale is supposed to have, the ensuing battle against the good and the vicious, wherein no matter how much hardship the good guys had, the good will finally triumph over the evil. In Pans Labyrinth, Ofelia represents the goodness in both worlds the real world and the world underneath. The rebels intimate the integrity and righteousness in the real world in their fight against the dark evil as manifested by the ruthless Captain Vidal. He is both the evil in Ofelias life as well as the rebels, and he had made their lives literally a living hell by agonising and killing the captured rebels, and later on, by taking Ofelias innocent life.As Ofelia went through difficult times and losing her life in the process, she triumphed for she had passed the test and did not fall into an evil-like behavior by sacrificing her baby brother. It is the goodness in her spright billetss that finally led her to where she wants to be, with her mother and h er father (although they are all dead already), and the only way she could do that was to die herself, and be reborn as Princess Moana of the Underworld. Ofelia is the epitome of good while Captain Vidal is the utmost evil by killing her. However, the other symbolism for good is the rebels who took Vidals life. Although the manner in which they did is not rattling good, in reality per se it is an accep card way to end a fairly evil man. In this sense, Ofelias objective of making both worlds a better place to live in was achieved in the fantasy world by completing all her tasks and in the real world through her death.Characters as Compared to Greek MythsThe title itself was a referral to the Greek god Pan, although the director and writer of the story denied having derived the Faun from Pan the Greek God. Perhaps, it is the similarity of the features that was compared to. The Faun personification of half man-half goat was first used in The Chronicles of Narnia as the bearded darne l who wanted to kidnap Lucy but changed his mind later on. In Pans Labyrinth, the Faun was used as the guide with unknown objective either the good or the bad. Is he telling the truth? Is he just tricking Ofelia to lure her into his trap? But we find out later that he was just interrogatory Ofelias good heart if she could spill an innocents blood just to achieve her goals.The pale man who was guarding the magical dagger was perhaps derived from the Cycladic idols that archaeologists found in the Cycladic Islands. These figurines have white bodies, featureless faces, and stiff, black-tie poses and were thought to represent death. Just like the pale man, who represented nothing but death of children (in the drawings and the rush full of childrens shoes).The stuffing of magic stones into the big toads mouth ended his harness thus giving birth to the key by tricking the toad into eating the magic stones when Ofelia placed a big bug along with the stones and held out her hand. This was perhaps derived from the Greek myth of the feud between genus Zeus and his father Kronos. Kronos had this habit of eating his children when they are born, and his wife Rhea, grew tired of seeing her children being swallowed by her conserve that she tricked him into swallowing a rock instead of Zeus. Therefore, Zeus grew up and eventually killed Kronos.Underlying Interpretationa. As a belief SystemThe myth surrounding Pans labyrinth stemmed through Ofelias belief system that was encourage by the Faun of her being The One. The lost Princess Moana of another world, and longing to escape the present reality in which she wants to save her mother and her unborn brother, she goes on to complete the tasks presented. Ofelia firmly believed that if she could pass the stages and fulfill the responsibilities given to her, she would finally be able to see her father, who was waiting for her for a long time.Embodying a Social ConflictPans labyrinth was set in the Post Civil War Spain in 194 4. Captain Vidal is the head of one whole somewhere in the province who still hunts and kills rebel guerillas who are against the fascist rule. Carmen, Ofelias mother, had submitted herself, Ofelia and her unborn sons fate into the hands of Captain Vidal. Perhaps love? But the sternness of Vidal and the lack of amiability between supposed to be husband and wife (Vidal and Carmen) lead the writer to assume that perhaps it is a mothers survival instinct. Widowed with one kid during the hard times, perhaps the best chance of survival is to go with a powerful man to protect her self and ensure a good future for her children.Unknowingly, Carmen had entered a dark realm in which the man she though would rescue them, would be the doctor reason of their demise. Confronted with the reality that Captain Vidal is a bad man, Ofelia tried to tell her mother who refuses to see the real Captain Vidal. Therefore, having no resolution and powerless to change the situation, Ofelia resulted into bui lding her own world, from her imagination, through the fairy tale books that she was reading. It was through her mind that the blank book that the Faun gave her imprint instructions on what to do and how to do it.It was withal with the Fauns help that Carmens health condition got better (for a while) by placing a devils apples root under her bed although one person in the real world, through Mercedes, may have seem to have the courage to change things, but still powerless to help Ofelia and her mother during their suffering, eventually stepped up to change and had Captain Vidal killed, but it was already too late for Carmen and Ofelia, for both have already lost their lives.c. AllegoryThe tasks performed by Ofelia in the parallel world are an allegory of her trying to escape and checker the cruel ruling of her stepfather Captain Vidal. Ofelia had pushed the stone that she found at the road to a mouth of a stone sculpture that started the chain of events Carmen felt better to cont inue the travel. The Faun represents another entity that forces Ofelia to follow orders and be a good girl just like Captain Vidal, he gives orders to his men and expects loyalty and respect or else he would kill them. The task of retrieving the magic key inside a giant toads stomach could be an allegory of Ofelia trying to find favor from Captain Vidal, but unlike the toad where she was successful she was repulsed by Vidal and was treated just like anybody else.The pale man in the long table with bountiful fruits and images of children being eaten and mound full of childrens shoes is an allegory of Captain Vidal seating on the same setting, eating delicious food while the rest of the townspeople fall in line to get their rations. The last task that is to sacrifice her little brother for her to be able to open the portal, but did not do so and in the eventuality lost her life is an allegory of Vidal sacrificing Ofelias life, he did what Ofelia did not do, that is to kill, and the c onsequence of Vidals action was death in the hands of the rebels. All the while, Ofelia was pointed out as The One that would make a significant change in the real world, and as The One missing Princess Moana in the parallel world.ConclusionThe movie was full of symbolism and parallelism that are subject to different opinions and interpretations by various scholars. The comparisons and allegories discussed in this paper may seem absurd or untoward by other scholars but myth interpretation is by itself subjective, and as a free and imaginative thinker, through a proper structure, the writer had expressed his/her opinions and views accordingly. There may be some that the writer had missed or other areas that were overlooked, but all things considered, this is a brief analysis of the movie Pans Labyrinth with regards to myth interpretation.ReferencesCampbell, Joseph. The Hero with a Thousand Faces.Powell, Barry B. Classical Myth. Fifth Edition

Friday, May 17, 2019

Leadership Styles and Characteristics Essay

Discuss two styles of drawing cardship and five characteristics of an sound loss leader. A leader is one who has the knowledge understanding, confidence and communication skills to lead or drive their chase to a particular goal. Everyone washbowlnot be a leader followers are needed to get things done. An autocratic leader is one who makes all the decisions regarding his/her followers its either their way or no way. People that are refreshful to the company in which this leadership resides may need this style in order to become effective are their job, as this example of leadership is very detailed in the things they want done.In the gist this leader needs to make a very important and swift decision, they do not sit and listen to everyones opinion like a democratic leader this leader has to rely on their own capabilities as an effective leader. In situations that are stressful and there is a deadline that has to be met closely people would rather an autocratic leader, so that they can focus on the work rather than messiness with complex situations. On the other hand the people that follow this leader may rebel or become irritable towards the leader this can then cause strikes and maybe even acts of violence.People in general like to piddle a voice or be heard regarding an issue involving them in one case you take that away a invalidating impact may occur. An autocratic leadership may conduct a lack of creativity as there is only one person making the decisions. This type of leadership can be used effectively when the leader is the most knowledgeable than the other classify members. A laissez-fare leader is a little more laid back than the autocratic leader as this style of leadership gives full power to the staff to make decisions and rely on their own abilities.The followers of this style usually are able to handle the company themselves as they are subsistd and equip to do so. This leader has no choice but to trust his/her staff since the leader may not be easy to contact. sometimes the leader is needed and cannot be found, this can s kibosh confusion and paranoia end-to-end the company this usually happens because the leader doesnt know their responsibilities so they allow the staff to cover for them. Some people cannot disciple themselves enough to set their own deadlines for completion of necessary projects, this can cause a decline in productivity for the group.An effective leader must be able to set a good example for their followers. Certain leaders, like that of a president or leader of a landed estate are constantly watched so a positive example must always be apparent. By showing endurance in certain situations, whether it be mental or physical, you can inspire others to do the same. Leaders should always have a pleasing personality. No one wants to follow individual who is negative about every situation, so a good personality should always shine through.This personality should court to both male and female fo llowers. Telling your followers how much of a good job their doing can increase productivity and prove positive for the group. A good communicator is not only good at speaking but they should be good at listening which is another characteristic of an effective leader. To be able to not only understand what your followers are saying but to have the skill to paraphrase in short terms can also be effective. A good leader is in tune with their followers.They are involved in every aspect of the project from the beginning to end they have no problem rolling up their sleeves and getting dirty but still have the ability to set themselves apart from the pack and be an effective leader. Leaders should be intelligent, skilled and suitable for their position. If you have less qualifications than your followers this could pose a problem if they were to find out. When you look up to someone usually they have more knowledge or a strong educational background with experience to back it up.

Thursday, May 16, 2019

Principles of Information Security, 4th Ed. – Michael E. Whitman Chap 01

certify to CengageBrain substance ab utilizationr Licensed to CengageBrain substance abuser Principles of training surety, Fourth Edition Michael E. Whitman and Herbert J. Mattord infirmity President pillar, C atomic number 18r Education & reproduction Solutions Dave Garza Director of knowledge Solutions Matthew Kane Executive Editor Steve Helba Managing Editor Marah Bellegarde crossway four-in-hand Natalie Pashoukos Development Editor Lynne Raughley pillar Assistant Jennifer Wheaton Vice President Marketing, C beer Education & Training Solutions Jennifer Ann Baker Marketing Director Deborah S.Yarnell Senior Marketing Manager Erin Coffin Associate Marketing Manager Shanna Gibbs Production Manager Andrew Cr proscribedh Content Project Manager Brooke Greenhouse Senior Art Director bastard Pendleton Manufacturing Coordinator Amy Rogers Technical Edit/Quality Assurance Green Pen Quality Assurance 2012 words Technology, Cengage discipline For much culture, contact or f ind us on the realism Wide Web at www. course. com ALL RIGHTS RESERVED.No part of this work c distributively(prenominal) overed by the copy in force(p) herein whitethorn be reproduced, transmitted, stored or used in about(prenominal) form or by all means graphic, electronic, or mechanical, including moreover non limited to photocopying, recording, s bottomlandning, digitizing, taping, Web distribution, selective nurture networks, or breeding storage and retrieval brasss, except as permitted under Section 107 or 108 of the 1976 joined States Copy office Act, without the prior written permission of the publisher.For product entropy and engineering science assistance, contact us at Cengage larn Customer & Sales Support, 1-800-354-9706 For permission to use substantial from this text or product, submit totally requests online at cengage. com/permissions Further permission questions whoremonger be e branded to email entertained comLibrary of carnal knowledge Contr ol Number 2010940654 ISBN-13 978-1-111-13821-9 ISBN-10 1-111-13821-4 Course Technology 20 Channel Center Boston, MA 02210 USA Cengage acquirement is a leading provider of customized attainment solutions with force locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at inter home(a). cengage. com/region. Cengage Learning products atomic number 18 represented in Canada by Nelson Education, Ltd. For your lifelong learning solutions, visit course. cengage. com bribe any of our products at your local college store or at our preferred online store www. engagebrain. com. Printed in the United States of America 1 2 3 4 5 6 7 8 9 14 13 12 11 10 right of first unrestrictedation 2011 Cengage Learning. every last(predicate) Rights Reserved. may non be copied, s potentiometerned, or duplicated, in whole or in part. overdue to electronic rights, rough leash troupe mental object may be conquer from the eBook and/or eChapter(s). Editorial revue has deemed that any strangled marrowed does not materially be active the overall learning get laid. Cengage Learning reserves the right to sequester extra limit at any time if ulterior rights restrictions posit it. Licensed to CengageBrain User hapter 1 demonstration to In fix upion protective cover Do not figure on opp championnts not fill outing worry well-nigh(predicate) your own lack of preparation. BOOK OF THE FIVE RINGS For Amy, the day began like any other at the Sequential differentiate and Supply Company (SLS) succor desk. Taking calls and helping office thespians with com delegateing machine problems was not glamorous, but she enjoyed the work it was challenging and paid well. nigh of her friends in the industry worked at bigger companies, nearly at cutting-edge tech companies, but they all agreed that jobs in nurture technology were a good way to pay the bills.The yell rang, as it did on average about four time an hour and about 28 times a day. The first call of the day, from a worried substance abuser hoping Amy could help him out of a jam, seemed typical. The call display on her monitor gave whatsoever of the facts the users name, his phone number, the department in which he worked, where his office was on the association campus, and a list of all the calls hed made in the past. Hi, Bob, she said. Did you get that document formatting problem squ bed extraneous? Sure did, Amy. Hope we screw figure out whats going on this time. Well try, Bob. Tell me about it. Well, my PC is acting weird, Bob said. When I go to the screen that has my email program running, it doesnt respond to the mouse or the keyboard. Did you try a reboot yet? 1 Copyright 2011 Cengage Learning. all(a) Rights Reserved. whitethorn not be copied, s bathned, or duplicated, in whole or in part. imputable to electronic rights, some third society surfeit may be suppressed from the eBook and/or eChapter(s). Ed itorial appraise has deemed that any suppressed confine does not materially cloak the overall learning experience. Cengage Learning reserves the right to abate extra inwardness at any time if consequent rights restrictions expect it. Licensed to CengageBrain User Chapter 1 Sure did. But the window wouldnt close, and I had to turn it off. After it restarted, I candid the e-mail program, and its scarcely like it was beforeno result at all. The other pressure is working OK, but really, really slowly. hitherto my Internet browser is sluggish. OK, Bob. Weve tried the usual stuff we can do over the phone. Let me open a case, and Ill dispatch a tech over as soon as possible. Amy looked up at the LED tally board on the besiege at the end of the room. She saw that in that location were only two technicians dispatched to deskside support at the moment, and since it was the day shift, there were four available. Shouldnt be long at all, Bob. She hung up and typed her notes int o ISIS, the high societys instruction perspective and Issues clay. She assigned the immaturefoundly generated case to the deskside dispatch queue, which would page the roving deskside team with the points in just a few minutes. A moment later, Amy looked up to see Charlie Moody, the senior manager of the server government activity team, walking b stakely down the hall. He was organismness trailed by triplet of his senior technicians as he made a beeline from his office to the door of the server room where the company servers were kept in a controlled environment. They all looked worried.Just then, Amys screen beeped to alert her of a new e-mail. She glanced down. It beeped againand again. It started beeping constantly. She clicked on the envelope movie and, after a short delay, the mail window opened. She had 47 new e-mails in her inbox. She opened one from Davey Martinez, an acquaintance from the Accounting Department. The theater line said, Wait till you see this. Th e centre body ingest, boldness what this has to say about our managers salaries Davey often sent her interesting and funny e-mails, and she failed to notice that the file attachment video was unusual before she clicked it.Her PC showed the hourglass cursor icon for a second and then the normal pointer reappe argond. Nothing happened. She clicked the next e-mail message in the queue. Nothing happened. Her phone rang again. She clicked the ISIS icon on her instruction processing outline desk covering to activate the call management softw are and activated her headset. Hello, Tech Support, how can I help you? She couldnt greet the caller by name because ISIS had not responded. Hello, this is Erin Williams in receiving. Amy glanced down at her screen. quiesce no ISIS.She glanced up to the tally board and was surprised to see the inbound-call-counter tallying up waiting calls like digits on a stopwatch. Amy had never seen so many calls come in at one time. Hi, Erin, Amy said. Whats up? Nothing, Erin answered. Thats the problem. The rest of the call was a replay of Bobs, except that Amy had to jot notes down on a legal pad. She couldnt dispatch the deskside support team each. She looked at the tally board. It had gone dark. No metrical composition at all. Then she saw Charlie running down the hall from the server room. He didnt look worried anymore. He looked frantic. Amy picked up the phone again.She wanted to check with her supervisor about what to do now. there was no dial tone. Copyright 2011 Cengage Learning. All Rights Reserved. may not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party centre may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed subject field does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if later(prenominal) rights restrictions require it. Licensed to CengageBrain User cornerstone to Information Security 3LEARNING OBJECTIVES Upon consummation of this material, you should be able to Define tuition trade protection measure Recount the history of data processor warranter measures, and explain how it evolved into tuition protection Define key ground and particular concepts of learning gage Enumerate the phases of the tribute systems increase life cycle Describe the teaching trade protection berths of professionals within an musical arrangement 1 creative activity pile Anderson, executive consultant at Emagined Security, Inc. , believes schooling warranter in an enterprise is a well-informed aesthesis of assurance that the data risks and controls are in relief. He is not alone in his perspective. Many schooling bail practitioners recognize that aligning nurture shelter needs with business objectives mustiness be the top priority. This chapters opening scenario illustrates that the infor mation risks and controls are not in balance at Sequential Label and Supply. Though Amy works in a technological support role and her job is to solve technical problems, it does not occur to her that a malicious software program, like a worm or virus, strength be the agent of the companys current ills.Management also shows signs of confusion and seems to watch no paper how to contain this kind of incident. If you were in Amys place and were verbalismd with a similar situation, what would you do? How would you pit? Would it occur to you that something far more insidious than a technical malfunction was happening at your company? As you explore the chapters of this take for and learn more about information credential, you will become split able to answer these questions. But before you can begin mattering the details of the discipline of information gage, you must first know the history and evolution of the field.The History of Information Security The history of informati on security measure begins with electronic calculating machine security. The need for data processor securitythat is, the need to define physical locations, hardware, and software from threats arose during World War II when the first mainframes, developed to aid computations for communication code softening (see Figure 1-1), were put to use. Multiple levels of security were utilize to protect these mainframes and maintain the impartiality of their data.Access to warm military locations, for example, was controlled by means of badges, keys, and the facial recognition of authorized personnel by security guards. The increment need to maintain national security yettually led to more complex and more technologically sophisticated figurer security safeguards. During these early years, information security was a straightforward process composed predominantly of physical security and simple document classification schemes. The primary threats to security were physical theft of e quipment, espionage against the products of the systems, and sabotage.One of the first documented security problems that fell outside these categories occurred in the early sixties, when a systems administrator was working on an MOTD Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.Licensed to CengageBrain User 4 Chapter 1 Earlier versions of the German code machine Enigma were ? rst broken by the Poles in the 1930s. The British and Americans managed to break later, more complex versions during World War II. The increasingly complex versions of the Enigma, especially the chock or Unterseeboot version of the Enigma, caused considerable anguish to Allied forces before ? nally being cracked. The information gained from decrypted transmittings was used to call up the actions of German armed forces. more or less ask why, if we were reading the Enigma, we did not win the war earlier. One susceptibility ask, instead, when, if ever, we would have won the war if we hadnt read it. 1 Figure 1-1 The Enigma Source adroitness of National Security Agency (message of the day) file, and another administrator was editing the password file. A software hemipteran mixed the two files, and the entire password file was printed on every output file. 2 The 1960s During the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks.It became necessary to enable these mainframes to communicate via a less cumbersome process than mailing magnetic magnetic tapes between information processing system centers. In response to this need, the Department of Defenses Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant, networked communication theory system to support the militarys exchange of information. Larry Roberts, known as the founder of the Internet, developed the standwhich was called ARPANETfrom its inception. ARPANET is the predecessor to the Internet (see Figure 1-2 for an excerpt from the ARPANET Program Plan).The 1970s and 80s During the next decade, ARPANET became popular and more wide used, and the potential for its ill-treatment grew. In December of 1973, Robert M. Bob Metcalfe, who is credited Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cengage Learning reserves the right to re move additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User Introduction to Information Security 5 1 Figure 1-2 Development of the ARPANET Program Plan3 Source Courtesy of Dr. Lawrence Roberts with the suppuration of Ethernet, one of the most popular networking protocols, identified fundamental problems with ARPANET security. Individual remote sites did not have ample controls and safeguards to protect data from unauthorized remote users.Other problems abounded vulnerability of password structure and formats lack of safety procedures for dial-up tie inions and absent user appellation and authorization to the system. Phone numbers were widely distributed and openly exotericized on the walls of phone booths, giving hackers lax attack to ARPANET. Because of the range and frequency of computer security violations and the explosion in the numbers of hosts and users on ARPANET, network security was referred to as network insecuri ty. In 1978, a famous study empower Protection Analysis Final Report was published. It focused on a project undertaken by ARPA to lift up the vulnerabilities of operating(a) system security. For a timeline that holds this and other seminal studies of computer security, see Table 1-1. The movement toward security that went beyond protecting physical locations began with a one paper sponsored by the Department of Defense, the Rand Report R-609, which try to define the multiple controls and mechanisms necessary for the protection of a multilevel computer system.The document was classified for nearly ten years, and is now considered to be the paper that started the study of computer security. The securityor lack therefromof the systems share-out resources at bottom the Department of Defense was brought to the attention of researchers in the spring and summer of 1967. At that time, systems were being engenderd at a rapid rate and securing them was a pressing concern for both the military and abnegation contractors. Copyright 2011 Cengage Learning. All Rights Reserved.May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 6 Chapter 1 Date 1968 1973 1975 1978 Documents Maurice Wilkes discusses password security in Time-Sharing electronic computer Systems.Schell, Downey, and Popek see to it the need for additional security in military systems in Preliminary Notes on the Design of furbish up Military Computer Systems. 5 The Federal Information Processing Standards (FIPS) realizes Digital Encryption Standard (DES) in the Federal Register. Bisbey and Hollingworth publish their study Protection Analysis Final Report, discussing the Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system security and examine the possibility of automated vulnerability espial techniques in existing system software. Morris and Thompson author Password Security A Case History, published in the Communications of the Association for Computing Machinery (ACM). The paper examines the history of a design for a password security scheme on a remotely accessed, time-sharing system. Dennis Ritchie publishes On the Security of UNIX and Protection of Data File Contents, discussing make prisoner user IDs and desex group IDs, and the problems inherent in the systems. Grampp and Morris write UNIX Operating System Security. In this report, the authors examine four chief(prenominal) handles to computer security physical control of premises and computer facilities, management consignment to security objectives, education of employees, and administ rative procedures aimed at increased security. 7 Reeds and Weinberger publish File Security and the UNIX System Crypt Command. Their premise was No technique can be secure against wiretapping or its equivalent on the computer. so no technique can be secure against the systems administrator or other privileged users the simple user has no chance. 8 1979 1979 1984 1984 Table 1-1 Key Dates for Seminal Works in Early Computer Security In June of 1967, the Advanced Research Projects Agency formed a task force to study the process of securing classified information systems. The Task Force was assembled in October of 1967 and met regularly to formulate recommendations, which ultimately became the content of the Rand Report R-609. 9 The Rand Report R-609 was the first widely recognized published document to identify the role of management and policy issues in computer security.It noted that the wide utilization of networking destinys in information systems in the military introduced s ecurity risks that could not be mitigated by the routine practices then used to secure these systems. 10 This paper signaled a pivotal moment in computer security historywhen the kitchen range of computer security expanded significantly from the safety of physical locations and hardware to include the adjacent Securing the data Limiting random and unauthorized access to that data Involving personnel from multiple levels of the ecesis in matters pertaining to information securityMULTICS Much of the early research on computer security centered on a system called Multiplexed Information and Computing Service (MULTICS). Although it is now obsolete, MULTICS is noteworthy because it was the first operating system to integrate security into Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User Introduction to Information Security 7 its core functions. It was a mainframe, time-sharing operating system developed in the mid1960s by a consortium of General Electric (GE), Bell Labs, and the mammy Institute of Technology (MIT). In mid-1969, not long after the restructuring of the MULTICS project, several of its developers (Ken Thompson, Dennis Ritchie, Rudd Canaday, and Doug McIlro) created a new operating system called UNIX.While the MULTICS system implemented multiple security levels and passwords, the UNIX system did not. Its primary function, text bear upon, did not require the same level of security as that of its predecessor. In fact, it was not until the early 1970s that even the simplest region of security, the password function, be came a component of UNIX. In the late 1970s, the microprocessor brought the personalized computer and a new age of computing. The PC became the workhorse of modern computing, thereby moving it out of the data center.This decentralization of data processing systems in the 1980s gave rise to networkingthat is, the interconnecting of personal computers and mainframe computers, which enabled the entire computing community to make all their resources work together. 1 The 1990s At the close of the twentieth century, networks of computers became more greenness, as did the need to connect these networks to each other. This gave rise to the Internet, the first global network of networks. The Internet was made available to the general public in the 1990s, having previously been the domain of government, academia, and dedicated industry professionals.The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area network (LAN). A fter the Internet was commercialized, the technology became pervasive, attain almost every corner of the globe with an expanding array of uses. Since its inception as a tool for sharing Defense Department information, the Internet has become an interconnectedness of millions of networks. At first, these connections were based on de facto standards, because industry standards for interconnection of networks did not exist at that time.These de facto standards did little to ensure the security of information though as these forerunner technologies were widely adopted and became industry standards, some degree of security was introduced. However, early Internet deployment treated security as a low priority. In fact, many of the problems that plague e-mail on the Internet immediately are the result of this early lack of security. At that time, when all Internet and e-mail users were (presumably trustworthy) computer scientists, mail server genuineation and e-mail encryption did not s eem necessary.Early computing approaches relied on security that was built into the physical environment of the data center that housed the computers. As networked computers became the dominant style of computing, the ability to physically secure a networked computer was lost, and the stored information became more exposed to security threats. 2000 to Present Today, the Internet brings millions of unsecured computer networks into continuous communication with each other. The security of each computers stored information is now contingent upon(p) on the level of security of every other computer to which it is connected.Recent years have seen a growing sensibleness of the need to remedy information security, as well as a realization that information security is important to national defense. The growing threat of Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 8 Chapter 1 cyber glide paths have made governments and companies more aware of the need to defend the computer-controlled control systems of utilities and other critical infrastructure. There is also growing concern about nation-states engaging in information warfare, and the possibility that business and personal information systems could become casualties if they are undefended.What Is Security? In general, security is the prime(a) or state of being secureto be free from danger. 11 In other words, protection against adversariesfrom those who would do harm, intentionally or otherwiseis the objective. National security, for example, is a multilayered system that pr otects the sovereignty of a state, its pluss, its resources, and its people. Achieving the appropriate level of security for an presidency also requires a multifaceted system.A successful organization should have the following multiple layers of security in place to protect its operations Physical security, to protect physical items, objects, or areas from unauthorized access and misuse Personnel security, to protect the individual or group of individuals who are authorized to access the organization and its operations Operations security, to protect the details of a particular operation or series of activities Communications security, to protect communications media, technology, and content Network security, to protect networking components, connections, and contents Information security, to protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, homewo rk and awareness, and technology.The Committee on National Security Systems (CNSS) defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. 12 Figure 1-3 shows that information security includes the broad areas of information security management, computer and data security, and network security. The CNSS model of information security evolved from a concept developed by the computer security industry called the C. I. A. triangle. The C. I. A. triangle has been the industry standard for computer security since the development of the mainframe. It is based on the three characteristics of information that keep back it value to organizations confidentiality, integrity, and availability.The security of these three characteristics of information is as important today as it has always been, but the C. I. A. triangle model no longer adequately parcel outes the constantly chang ing environment. The threats to the confidentiality, integrity, and availability of information have evolved into a vast accrual of events, including accidental or intentional prostitute, destruction, theft, unintended or unauthorized modification, or other misuse from benignant being or nonhuman threats. This new environment of many constantly evolving threats has prompted the development of a more naughty model that addresses the complexities of the current information security environment.The expanded model consists of a list of critical characteristics of information, which are described in the next Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remo ve additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User Introduction to Information Security 9 1 Information security Figure 1-3 Components of Information SecuritySource Course Technology/Cengage Learning section. C. I. A. triangle nomenclature is used in this chapter because of the breadth of material that is based on it. Key Information Security Concepts This adjudge uses a number of terms and concepts that are essential to any discussion of information security. Some of these terms are illustrated in Figure 1-4 all are covered in greater detail in subsequent chapters. Access A subject or objects ability to use, manipulate, modify, or affect another subject or object. Authorized users have legal access to a system, whereas hackers have amerciable access to a system. Access controls regulate this ability.Asset The organizational resource that is being protected. An asset can be logical, such(prenominal)(prenominal) as a Web site, information, or data or an asset can be physical, such as a person, computer system, or other tangible object. Assets, and particularly information assets, are the focus of security efforts they are what those efforts are enterpriseing to protect. Attack An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it. Attacks can be active or passive, intentional or unintentional, and direct or indirect. Someone casually reading sensitive information not intended for his or her use is a passive attack.A hacker attempting to break into an information system is an intentional attack. A lightning strike that causes a fire in a building is an unintentional attack. A direct attack is a hacker using a personal computer to break into a system. An indirect attack is a hacker compromising a system and using it to attack other systems, for example, as part of a botnet (slang for robot network). This group of compromi sed computers, running software of the attackers choosing, can operate autonomously or under the attackers direct control to attack systems and slip user information or conduct distributed denial-of-service attacks. Direct attacks originate from the threat itself.Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 10 Chapter 1 Vulnerability Buffer overflow in online database Web interface nemesis Theft menace agent Ima Hac ker Exploit Script from MadHackz Web site Attack Ima Hacker downloads an exploit from MadHackz wind vane site and then accesses buybays Web site. Ima then applies the script which runs and compromises buybays security controls and steals customer data. These actions cause buybay to experience a loss. Asset buybays customer database Figure 1-4 Information Security Terms Source Course Technology/Cengage Learning Control, safeguard, or countermeasure Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, break down vulnerabilities, and otherwise improve the security within an organization.The various levels and types of controls are discussed more fully in the following chapters. Exploit A technique used to compromise a system. This term can be a verb or a noun. Threat agents may attempt to exploit a system or other information asset by using it illegally for their personal gain. Or, an exploit can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or is created by the attacker. Exploits make use of existing software tools or custom-made software components. Exposure A condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present.Loss A single instance of an information asset suffering damage or unintended or unauthorized modification or disclosure. When an organizations information is stolen, it has suffered a loss. Protection profile or security posture The entire set of controls and safeguards, including policy, education, training and awareness, and technology, that the Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially aff ect the overall learning experience.Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User Introduction to Information Security 11 organization implements (or fails to implement) to protect the asset. The terms are sometimes used interchangeably with the term security program, although the security program often comprises managerial aspects of security, including planning, personnel, and subordinate programs. Risk The probability that something unwanted will happen. Organizations must minimize risk to match their risk appetitethe quantity and nature of risk the organization is willing to accept. adequate to(p)s and objects A computer can be either the subject of an attackan agent entity used to conduct the attackor the object of an attackthe target entity, as shown in Figure 1-5. A computer can be both the subject and object of an attack, when, for example, it is compromised by an attac k (object), and is then used to attack other systems (subject). Threat A kinsperson of objects, persons, or other entities that presents a danger to an asset. Threats are always present and can be intention-made or undirected. For example, hackers purposefully threaten unprotected information systems, while severe storms incidentally threaten buildings and their contents. Threat agent The specific instance or a component of a threat.For example, all hackers in the founding present a collective threat, while Kevin Mitnick, who was convicted for hacking into phone systems, is a specific threat agent. Likewise, a lightning strike, hailstorm, or tornado is a threat agent that is part of the threat of severe storms. Vulnerability A weaknesses or fault in a system or protection mechanism that opens it to attack or damage. Some examples of vulnerabilities are a flaw in a software package, an unprotected system port, and an unlocked door. Some well-known vulnerabilities have been examined , documented, and published others endure latent (or undiscovered). 1 Critical Characteristics of InformationThe value of information comes from the characteristics it possesses. When a characteristic of information changes, the value of that information either increases, or, more commonly, decreases. Some characteristics affect informations value to users more than others do. This can depend on circumstances for example, timeliness of information can be a critical factor, because information loses much or all of its value when it is delivered too late. Though information security professionals and end users share an understanding of the characteristics of subject object Figure 1-5 Computer as the Subject and Object of an Attack Source Course Technology/Cengage LearningCopyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapte r(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 12 Chapter 1 information, tensions can arise when the need to secure the information from threats conflicts with the end users need for unhindered access to the information.For instance, end users may perceive a tenth-of-a-second delay in the computation of data to be an unnecessary annoyance. Information security professionals, however, may perceive that tenth of a second as a minor delay that enables an important task, like data encryption. Each critical characteristic of informationthat is, the expanded C. I. A. triangleis defined in the sections below. Availability Availability enables authorized userspersons or computer systemsto access information without interference or stoppage and to receive it in the r equired format. Consider, for example, research libraries that require identification before entrance.Librarians protect the contents of the subroutine library so that they are available only to authorized athletic supporters. The librarian must accept a patrons identification before that patron has free access to the book stacks. Once authorized patrons have access to the contents of the stacks, they expect to find the information they need available in a working(a) format and familiar language, which in this case typically means bound in a book and written in English. Accuracy Information has accuracy when it is free from mistakes or errors and it has the value that the end user expects. If information has been intentionally or unintentionally modified, it is no longer accurate. Consider, for example, a checking account.You assume that the information contained in your checking account is an accurate representation of your finances. Incorrect information in your checking accoun t can result from impertinent or internal errors. If a bank teller, for instance, mistakenly adds or subtracts too much from your account, the value of the information is changed. Or, you may accidentally enter an incorrect amount into your account register. Either way, an inaccurate bank balance could cause you to make mistakes, such as bouncing a check. Authenticity Authenticity of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.Information is authentic when it is in the same state in which it was created, placed, stored, or transferred. Consider for a moment some common assumptions about e-mail. When you receive e-mail, you assume that a specific individual or group created and transmitted the e-mailyou assume you know the origin of the e-mail. This is not always the case. E-mail spoofing, the act of sending an e-mail message with a modified field, is a problem for many people today, because often the modified field is the address of the originator. Spoofing the senders address can fool e-mail recipients into thinking that messages are legitimate traffic, therefrom inducing them to open e-mail they otherwise might not have.Spoofing can also alter data being transmitted across a network, as in the case of user data protocol (UDP) packet spoofing, which can enable the attacker to get access to data stored on computing systems. some other variation on spoofing is phishing, when an attacker attempts to obtain personal or financial information using fraudulent means, most often by posing as another individual or organization. Pretending to be someone you are not is sometimes called pretexting when it is undertaken by law enforcement agents or private investigators. When used in a phishing attack, e-mail spoofing lures victims to a Web server that does not represent the organization it purports to, in an attempt to steal their private data such as account numbers and passwords.The most common variant s include posing as a bank or brokerage company, e-commerce organization, or Internet service provider. Even when authorized, pretexting does not always lead to a satisfactory outcome. In 2006, the CEO of Hewlett-Packard Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.Licensed to CengageBrain User Introduction to Information Security 13 Corporation, Patricia Dunn, authorized contract investigators to use pretexting to smokeout a corporate director guess of leaking confidential information. The resulting firestorm of negative publicity led to Ms. Dunns eventual departure from th e company. 13 1 Confidentiality Information has confidentiality when it is protected from disclosure or exposure to unauthorized individuals or systems. Confidentiality ensures that only those with the rights and privileges to access information are able to do so. When unauthorized individuals or systems can view information, confidentiality is gaped.To protect the confidentiality of information, you can use a number of measures, including the following Information classification Secure document storage Application of general security policies Education of information custodians and end users Confidentiality, like most of the characteristics of information, is interdependent with other characteristics and is most closely colligate to the characteristic known as privacy. The relationship between these two characteristics is covered in more detail in Chapter 3, Legal and Ethical Issues in Security. The value of confidentiality of information is especially high when it is personal i nformation about employees, customers, or patients. Individuals who transact with an organization expect that their personal information will remain confidential, whether the organization is a federal agency, such as the Internal Revenue Service, or a business. Problems arise when companies get around confidential information.Sometimes this disclosure is intentional, but there are times when disclosure of confidential information happens by mistakefor example, when confidential information is mistakenly e-mailed to someone outside the organization rather than to someone inside the organization. Several cases of privacy violation are outlined in Offline Unintentional Disclosures. Other examples of confidentiality suspensiones are an employee throwing by a document containing critical information without shredding it, or a hacker who successfully breaks into an internal database of a Web-based organization and steals sensitive information about the clients, such as names, addresses , and credit card numbers.As a consumer, you give up pieces of confidential information in exchange for convenience or value almost daily. By using a members only card at a grocery store, you disclose some of your using up habits. When you fill out an online survey, you exchange pieces of your personal history for access to online privileges. The bits and pieces of your information that you disclose are copied, sold, replicated, distributed, and ultimately coalesced into profiles and even complete dossiers of yourself and your life. A similar technique is used in a unlawful enterprise called salami theft. A deli worker knows he or she cannot steal an entire salami, but a few slices here or there can be taken home without notice.Eventually the deli worker has stolen a whole salami. In information security, salami theft occurs when an employee steals a few pieces of information at a time, knowing that taking more would be noticedbut eventually the employee gets something complete o r useable. ace Information has integrity when it is whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 14 Chapter 1 Offline Unintentional Disclosures In February 2005, the data aggregation and brokerage firm ChoicePoint revealed that it had been duped into releasing personal information about 145,000 people to identity thieves during 2004. The perpetrators used stolen identities to create obstensibly legitimate business entities, which then subscribed to ChoicePoint to acquire the data fraudulently.The company reported that the criminals opened many accounts and enter personal information on individuals, including names, addresses, and identification numbers. They did so without using any network or computer-based attacks it was simple fraud. 14 While the the amount of damage has yet to be compiled, the fraud is feared to have allowed the perpetrators to arrange many hundreds of instances of identity theft. The giant pharmaceutical organization Eli Lilly and Co. released the e-mail addresses of 600 patients to one another in 2001. The American Civil Liberties Union (ACLU) denounced this breach of privacy, and information technology industry analysts noted that it was likely to influence the public debate on privacy legislation.The company claimed that the hazard was caused by a computer programing error that occurred when patients who used a specific drug produced by the company signed up for an e-mail s ervice to access support materials provided by the company. About 600 patient addresses were exposed in the mass e-mail. 15 In another incident, the intellectual property of Jerome Stevens Pharmaceuticals, a small prescription drug manufacturer from New York, was compromised when the FDA released documents the company had filed with the agency. It remains unclear whether this was a deliberate act by the FDA or a simple error but either way, the companys secrets were posted to a public Web site for several months before being removed. 16 damage, destruction, or other faulting of its authentic state. Corruption can occur while information is being stored or transmitted.Many computer viruses and worms are designed with the explicit purpose of corrupting data. For this reason, a key method for detecting a virus or worm is to look for changes in file integrity as shown by the size of the file. some other key method of assuring information integrity is file hashing, in which a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a hash value. The hash value for any combination of bits is unique. If a computer system performs the same hashing algorithm on a file and obtains a different number than the recorded hash value for that file, the file has been compromised and the integrity of the information is lost.Information integrity is the cornerstone of information systems, because information is of no value or use if users cannot verify its integrity. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions requir e it. Licensed to CengageBrain User Introduction to Information Security 15File corruption is not necessarily the result of external forces, such as hackers. Noise in the transmission media, for instance, can also cause data to lose its integrity. Transmitting data on a perimeter with a low voltage level can alter and corrupt the data. Redundancy bits and check bits can compensate for internal and external threats to the integrity of information. During each transmission, algorithms, hash values, and the error-correcting codes ensure the integrity of the information. Data whose integrity has been compromised is retransmitted. 1 Utility The utility of information is the quality or state of having value for some purpose or end.Information has value when it can serve a purpose. If information is available, but is not in a format meaningful to the end user, it is not useful. For example, to a private citizen U. S. Census data can pronto become overwhelming and difficult to interpret h owever, for a politician, U. S. Census data reveals information about the residents in a district, such as their race, gender, and age. This information can help form a politicians next campaign strategy. Possession The possession of information is the quality or state of ownership or control. Information is said to be in ones possession if one obtains it, independent of format or other characteristics.While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality. For example, assume a company stores its critical customer data using an encrypted file system. An employee who has quit decides to take a copy of the tape backups to sell the customer records to the competition. The removal of the tapes from their secure environment is a breach of possession. But, because the data is encrypted, neither the employee nor anyone else can read it without the proper decryption methods therefore, there is no breach of confidentiality. Today, people caught selling company secrets face increasingly stiff fines with the likelihood of jail time.Also, companies are growing more and more reluctant to necessitate individuals who have demonstrated dishonesty in their past. CNSS Security Model The definition of information security presented in this text is based in part on the CNSS document called the National Training Standard for Information Systems Security Professionals NSTISSI No. 4011. (See www. cnss. gov/Assets/pdf/nstissi_4011. pdf. Since this document was written, the NSTISSC was renamed the Committee on National Security Systems (CNSS) see www. cnss. gov. The library of documents is being renamed as the documents are rewritten. ) This document presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.The model, created by John McCumber in 1991, provides a graphical representation of the archite ctural approach widely used in computer and information security it is now known as the McCumber Cube. 17 The McCumber Cube in Figure 1-6, shows three dimensions. If extrapolated, the three dimensions of each axis become a 3 3 3 cube with 27 cells representing areas that must be addressed to secure todays information systems. To ensure system security, each of the 27 areas must be flop addressed during the security process. For example, the intersection between technology, integrity, and storage requires a control or safeguard that addresses the need to use technology to protect the integrity of information while in storage.One such control might be a system for detecting host intrusion that protects the integrity of Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 16 Chapter 1 Figure 1-6 The McCumber Cube18 Source Course Technology/Cengage Learning information by alerting the security administrators to the potential modification of a critical file.What is commonly left out of such a model is the need for guidelines and policies that provide direction for the practices and implementations of technologies. The need for policy is discussed in subsequent chapters of this book. Components of an Information System As shown in Figure 1-7, an information system (IS) is much more than computer hardware it is the entire set of software, hardware, data, people, procedures, and networks that make possible the use of information resources in the organization. These six critical components enable information to be input, processed, output , and stored. Each of these IS components has its own strengths and weaknesses, as well as its own characteristics and uses.Each component of the information system also has its own security requirements. Software The software component of the IS comprises applications, operating systems, and versatile command utilities. Software is perhaps the most difficult IS component to secure. The exploitation of errors in software programming accounts for a substantial portion of the attacks on information. The information technology industry is rife with reports warning of holes, bugs, weaknesses, or other fundamental problems in software. In fact, many facets of daily life are affected by buggy software, from smartphones that crash to flawed automotive control computers that lead to recalls.Software carries the lifeblood of information through an organization. Unfortunately, software programs are often created under the constraints of project management, which limit time, cost, and manpowe r. Information security is all too often implemented as an afterthought, rather than developed as an integral component from the beginning. In this way, software programs become an easy target of accidental or intentional attacks. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User Introduction to Information Security 17 1 Figure 1-7 Components of an Information System Source Course Technology/Cengage Learning computer hardware Hardware is the physical technology that houses and executes the software, stores and transports the data, and provides interfa ces for the entry and removal of information from the system. Physical security policies deal with hardware as a physical asset and with the protection of physical assets from harm or theft.Applying the traditional tools of physical security, such as locks and keys, restricts access to and interaction with the hardware components of an information system. Securing the physical location of computers and the computers themselves is important because a breach of physical security can result in a loss of information. Unfortunately, most information systems are built on hardware platforms that cannot guarantee any level of information security if unrestricted access to the hardware is possible. Before September 11, 2001, laptop thefts in airports were common. A two-person team worked to steal a computer as its owner passed it through the conveyor scanning devices.The first perpetrator entered the security area onward of an unsuspecting target and quickly went through. Then, the second p erpetrator waited behind the target until the target placed his/her computer on the baggage scanner. As the computer was whisked through, the second agent slipped ahead of the victim and entered the metal detector with a substantial collection of keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator to overhear the computer and disappear in a crowded walkway. While the security response to September 11, 2001 did repress the security process at airports, hardware can still be stolen in airports and other public places.Although laptops and notebook computers are worth a few thousand dollars, the information contained in them can be worth a great deal more to organizations and individuals. Data Data stored, processed, and transmitted by a computer system must be protected. Data is often the most valuable asset possess by an organization and it is the main target of intentional attacks. Systems developed in recent years are likely to make use of database Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User 18 Chapter 1 management systems. When done properly, this should improve the security of the data and the application. Unfortunately, many system development projects do not make full use of the database management systems security capabilities, and in some cases the database is implemented in ways that are less secure than traditional file systems. People Though often overlooked in computer security considerations, people have always been a threat to information security.Legend has it that around 200 B. C. a great army threatened the security and stability of the Chinese empire. So ferocious were the invaders that the Chinese emperor butterfly commanded the construction of a great wall that would defend against the Hun invaders. Around 1275 A. D. , Kublai caravan inn finally achieved what the Huns had been trying for thousands of years. Initially, the Khans army tried to climb over, dig under, and break through the wall. In the end, the Khan plain bribed the gatekeeperand the rest is history. Whether this event actually occurred or not, the moral of the story is that people can be the weakest link in an organizations information security program.And unless policy, education and training, awareness, and technology are properly employed to prevent people from accidentally or intentionally damaging or losing information, they will remain the weakest link. Social engineering can prey on the tendency to cut corners and the commonplace nature of human error. It can be used to manipulate the actions of people to obtain access information about a system. This topic is discussed in more detail in Chapter 2, The Need for Security. Procedures Another frequently overlooked component of an IS is procedures. Procedures are written instructions for accomplishing a specific task. When an unauthorized user obtains an organizations procedures, this poses a threat to the integrity of the information.For example, a consultant to a bank learned how to wire funds by using the computer centers procedures, which were readily available. By taking advantage of a security weakness (lack of authentication), this bank consultant ordered millions of dollars to be transferred by wire to his own account. Lax security procedures caused the loss of over ten million dollars before the situation was corrected. Most organizations distribute procedures to their legitimate employees so they can access the information system, but many of these companies often fail to provide proper education on the protection of the procedures. Educating employees about safeguarding procedures is as important as physically securing the information system.After all, procedures are information in their own right. Therefore, knowledge of procedures, as with all critical information, should be disseminated among members of the organization only on a need-to-know basis. Networks The IS component that created much of the need for increased computer and information security is networking. When information systems are connected to each other to form local area networks (LANs), and these LANs are connected to other networks such as the Internet, new security challenges rapidly emerge. The physical technology that enables network functions is becoming more and more accessible to organizations of every size.Applying the traditional tools of physical security, such as locks and keys, to restrict access to and interaction with the hardware components of an information system are sti ll important but when computer systems are networked, this approach is no longer enough. Steps to provide network Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to CengageBrain User Introduction to Information Security 19 security are essential, as is the implementation of alarm and intrusion ystems to make system owners aware of ongoing compromises. 1 Balancing Information Security and Access Even with the best planning and implementation, it is unfeasible to obtain perfect information security. Recall James Anderson