Monday, January 27, 2020

The Basic Concepts Behind Data Bases Information Technology Essay

The Basic Concepts Behind Data Bases Information Technology Essay Databases are collection of raw fact and figures or in single word we can say data in digital form, databases are classified on the basis of their content like text document, bibliographic and statistical etc. Databases are managed by software called DBMS (Database Management System), DBMS are responsible of storing, retrieving, accessing, security, backup and querying the data as fast as possible and in most efficient way. One of the most trusted DBMS in market is ORACLE DBMS. ORACLE is the most trusted in market and almost each and every organization uses it. One of the best security features of ORACLE is Secure Database Access.SDA is based on three things which are Under USER MANAGEMENT comes how much space has to be provided to each user, what level of access has to be provided to users, the space and rights of one user does not interfere with other. Under PASSWORD MANAGEMENT come the default passwords of users, defining the password complexity, deciding the password expiry time limit, password lock facility etc. Under RESOURCE LIMTS comes deciding CPU time, logical reads, concurrent session per user, idle time, amount of private SGA for shared sessions. The above mentioned security features comes with any enterprise level operating system for example SUN SOLARIS a UNIX flavored OS has all this security features where there is separate file system for all users, each and every file system and file has access permission defined for the root, the user and others, passwords for each user is there and they are stored in encrypted form and for each and every user the resources are defined. Briefly describe the purpose of firewalls and how they work, including a comparison of at least three principal types. Firewalls are a type of hardware or software which is used to protect the system or network. Firewall acts as fences around the system or network which do not allow anybody who wants unauthorized access or after access tries to do some sort of damage. To protect ones data and network Firewalls employ a number of technologies, of which the first one is simple set of rules means all the ports should be closed initially and as one goes with applications there must be ports defined for them and only those ports are opened for those applications to use, open ports are like holes which any hacker can use to access your system. There are 2 physical types of firewalls software and hardware, software firewalls are mostly used in home environment like the one provided by Nortel and McAfee, they are responsible for protecting you home pc against any sort of external attack. Hardware firewalls are commonly used in business environment, they are dedicated units which have the external world plugged in outside and the trusted network from inside and they are often available as a pair so that failure of one unit does not make the network open for attack. Both type of firewalls use a number of different techniques to keep your system and network safe, the first thing described is a rules based or packet filter system, here all data in and out is scanned to see that is in and out to trusted ports on the system and possibly even trusted IP addresses. Proxy server, this is in between the outside world internet and the trusted inside world network it scans all packets of data and make sure if they meet the packet filter rules before passing data to the machine in the trusted network. This adds a layer of security by never allowing the internet system come in direct contact with the trusted machine, network address translation do not make your internal IP address visible to the internet. A proxy server is great against brute force attacks. What are the differences between public key encryption methods and symmetric key encryption methods? Please provide one example of each category. The cryptographic technique based on two keys a public key available to all and a private/secret key known only to the person intended to have it. An important part to the public key encryption is that the keys are related in such a manner that only the public key can be used in encryption of the messages and only the corresponding private key can be utilized in decryption of messages. By no chance one can get private using the public key. Public-key encryption like Pretty Good Privacy (PGP), are growing in popularity for transferring information through internet. They are highly secure and comparatively simple to use. The one difficulty with public-key encryption is that one need to be aware of the recipients public key so that he/she can encrypt a message. What is required therefore is a global registration of public keys Symmetric key encryption for both encryption and decryption uses a same secret key. Exchange of message requires exchange of keys also among users. Message encrypted with secret key can only be decrypted with same secret key Secret-key algorithm is used in symmetric key encryption. Symmetric key encryption techniques are also called content-encryption algorithms. The big limitation of secret-key algorithm is the requirement for sharing the secret-key. This can be overcome by deriving the same secret key at both ends by using a user supplied text string or we can say password based on password-based encryption algorithm, other way round is to securely exchange the secret-key among themselves. Size of the key defines the strength of the symmetric key encryption used. Consider the following cipher text: EHWWHU EH GHVSLVHG IRU WRR DQALRXV DSSUHKHQVLRQV WKDQ UXLQHG EB WRR FRQILGHQW VHFXULWB (Edmund Burke) a) Decipher the cipher text above using a 26-character Caesar Cipher. Explain your reasoning Explain how you would quickly determine if the above cipher text is the result of a simple substitution or a transposition cipher, also explaining the difference between each. Please justify your answer. The cipher text gets decrypted to BETTER BE DESPISED FOR TOO ANXIOUS APPREHENSIONS, THAN RUINED BY TOO CONFIDENT SECURITY A shift of 3 was used to give the output as the quote mentioned above. The above cipher can be determined as simple substitution cipher as we can list down the two alphabet words in English and shifting each alphabet to certain position gives any one of the word. Substitution cipher is all about replacing one character or alphabet with other and transposition cipher is all about jumbling of the words together instead of replacing characters, transposition cipher changes the order of the characters and can be analyzed by frequency analysis. Unfortunately your computer has been infected by some malicious code and you do not know when this infection happened. Luckily you have performed backups on a weekly basis since you acquired your computer. Your idea is to use the backups starting from the beginning, rebuilding the first backup and so on, applying all changes in order. Discuss the feasibility of this approach offering ways to improve it, if necessary. This is the safest way of rebuilding computer again and would definitely solve the issue as this is the gradual step by step up gradation of the system and would bring the system to state where it was infected but without the problem. What I feel like if we start restoring the system from back rather than doing from start and checking for the stability of the system. This approach saves time and effort as after restoring first only you have the probability of solving the issue or what we can do is not do one by one incremental steps but keep an interval of the backups and do. Please compare and contrast incident response plans and business continuity plans. List heir key elements (what would one expect to see in such a document?) The incident response plan is defined as what make up a security incident and highlight the phases of incident response. The incident response plan document is focused on how information reaches the appropriate personnel, investigation of the incident, bringing down damage and strategy to respond, documentation and evidence preservation. The incident response plan consists of responsibility area and pen down and brings in effect procedures for handing security incidents. The document emphasizes on the considerations required to create an incident response plan. The incident is formulated to safeguard against intrusion to organizational resources. An incident is defined as information confidentiality loss, data integrity compromise, theft or damage of IT assets like computer, printer etc, service denial, misuse of assets or services or data, system infection by malicious software, unauthorized access, system abnormal behavior, alarms for intrusion detection and their responses. The incident response goals are incident occurrence verification, business restoration continuity, minimized incident impact, determine the way of attack, prevention against future attacks, response time of security and incident should be improved, illegal activity prosecution, situation and response has to be made aware to management. The incident response life cycle begins by incident preparation, then comes the discovery of the incident, notification, analysis and assessment, response strategy, containment, re infection prevention, affected system restoration, documentation, preservation of evidence, external agencies notification, update policies and response review. The business continuity planning is required for making an organization safe from internal and external threats and identifies the soft and hard assets to provide effective recovery and prevention of the organization. The following threats are there to an organization as Staff death or injury, building are damaged, loss of communication and IT infrastructure, disruption in transport making staff unavailable, stress and demoralization in staff, other business disruption or closing down on which a company is dependent, reputation damage and business change demands. To cover up the following threats following steps should have been planned sufficient workforce with right expertise and motivation to manage and lead the organization, access to key IT system and records, staff communication should be reliable and clear, ability of paying the staff in case of crisis also, product and services procurement and media demand responses. The steps involved in developing a business continuity plan in systematic way are analysis of business, risk assessment, strategy development, plan development and plans should be rehearsed. One hundred years ago, Louis Brandeis and Samuel Warren warned us that, Numerous mechanical devices threaten to make good the prediction that what is whispered in the closet shall be proclaimed from the housetops.' Cryptography is an enabling technology for self-help privacy. Conversely, cryptography can be used to conceal criminal conspiracies and activities, including espionage. a) How have computers changed the ways in which we have to keep certain information private? b) What new threats do computer systems and networks pose to personal privacy? Conversely, what threats are enabled or enhanced by computer systems and networks? c) How does cryptography help or hinder protection of privacy and public safety? d) What policies are needed and appropriate in a networked world regarding the use of cryptography? e) Consider a public key encryption. Ann wants to send Bill a message. Let Annpriv and Annpub be Anns private and public keys respectively. The same for Bill (Billpriv and Billpub). i) If Ann sends a message to Bill, what encryption should Ann use so that only Bill can decrypt the message (secrecy)? ii) Can Ann encrypt the message so that anyone who receives the message is assured that the message only came from Ann (authenticity)? iii) Is it possible for Ann to devise a method that will allow for both secrecy and authenticity for her message? Please justify your answer. Computers help a lot in keeping private informations secure. With all the security features into the system like firewalls and other security features one can keeps his/her information secure from un authorized access. Initially for keeping the information private one has to classify the physical files or documents having information as classified or confidential and have to be kept in safe custody so that unauthorized access is not there, the initially the information transfer has to be taken through physically under supervision but with computers and secure software systems and various encryptions which are efficient and complex to break, transport of information has become easy without any extra effort. With increasing use of information technology in form of computers has also created new types of threats where hackers who are experts in breaking the system security and network security and get easy access of ones private data. People use the information transfer and other IT mea ns to transfer information which cannot be scanned by authorities for example terrorist organizations uses the networks and other safe methods to transport the information which could not be easily get hold of decrypted by organizations working against them. The biggest advantage of public key cryptography is the secure nature of the private key. In fact, it never needs to be transmitted or revealed to anyone. It enables the use of digital certificates and digital timestamps, which is a very secure technique of signature authorization. We will look at digital timestamps and digital signatures in a moment, but as discussed above cryptography can be used by organizations or individuals involved in wrong activities to transfer data which cannot be caught or decrypted by authorities working against them, hence cryptography can go against world peace. Cryptography use should be mandated for the right purposes. There are few cryptographic policies that have been challenged, both literally and figuratively. In particular export controls, key escrow and government control have been issues argued recently, with final decisions still unresolved. International agreements and foreign decisions regarding these topics have influenced the current U.S. position. Ann should use the public key encryption method to send a message to Bill. Ann can create her digital signature of the message using the private key which can be verified using public key to see message is authentic. Yes Ann can use public key encryption for encrypting the message to maintain the confidentiality or secrecy of message and she can use digital signatures with public key encryption to maintain the authenticity of the message.

Sunday, January 19, 2020

Sexual Harassment in the Workplace Essay -- Quid pro quo harassment, h

Sexual harassment is a crippling reality in the work environment. The effects can be ravaging to an organization, to the individual harassed, fellow employees, and the harasser. Sexual harassment is not necessarily about sex, it is certainly about power. When someone at work uses sexual behavior to control you, whether it is behavioral or physical in nature, that is sexual harassment. The exploration of this issue will include a definition of sexual harassment, the intent and behavior of the harasser, the effects sexual harassment has on the harassed, the negative impact sexual harassment has on an organization, procedures and processes of filing a sexual harassment complaint, and management perspective including preventive measures that should be taken. Sexual harassment is defined as any form of unwelcome physical conduct of a sexual nature. "Unwelcome sexual advances, requests for sexual favors, and other verbal or physical conduct of a sexual nature constitutes sexual harassment when submission to or rejection of this conduct explicitly or implicitly affects an individual?s employment, unreasonable interferes with an individual?s work performance or creates an intimidating, hostile or offensive work environment." (www.eeoc.gov/facts/fs-sex.html). The most extreme form of sexual harassment occurs when an employee loses a job; benefit or other privilege of employment, or is fired because the employee has rejected sexual demands. This is one form of sexual harassment that may occur in the workplace. "This type of sexual harassment of sexual harassment is referred to as quid pro quo which literally means ?this for that?, a specific demand for sexual favors in exchange for job security or job benefits. This type of sexual ... ... A. Mitsubishi settles Workers? Disputes under pressure from NOW. NOW. (Fall 1998) Internet: http://www.now.org/nnt/fall-98/wfw.html 3. Larsen, Shawn. Sexual Harassment-frequencies by gender. (September 1995) Internet: http://www.vix.com/pub/men/harass/studies/larsen.html 4. McCoy-Ullrich,Dawn. Sexual harassment at work. Lifewise: Office Politics. (May 2000) Internet: http://www.acmi.canoe.ca/LifewiseWorkOffice00/0515_dawn.html 5. Myrianthopoulos, Thalia. Supreme Court Restricts Civil Rights Remedies. NOW. (Fall, 1999) Internet: http://www.now.org/nnt/fall-99/spcourt.html 6. http://www.pennellseminars.com/seminars_sexual_harassment.html 7. http://ww.eeoc.gov/facts/fs-sex.html 8.http://www.resourcehr.com/Dealing%20With%2?1%20Harassment%20in%20the%20Workplace.html 9.http://www.flabar.org/newflabar/consumerservices/General/Consumer.Pam/37PAMPH.HTML

Saturday, January 11, 2020

Handmaids Tale †Basic Response Essay

One of the ways in which The Handmaid’s Tale creates opportunities to respond is through its discussion and exploration of a dystopian society. A dystopian society is often characterised as a futuristic setting with oppressive societal control and elements of totalitarianism. The Handmaid’s Tale is set in the futuristic Republic of Gilead and a way in which Atwood has chosen to display a dystopian society is through creating a sense that the citizens of Gilead are under constant surveillance, a characteristic of dystopian literature. This can be shown through the reoccurring motif of â€Å"the eye. † The eye motif symbolises the eternal watchfulness of god and the totalitarian state with its recurrence creating a sense that citizens of Gilead are constantly being surveyed. This is shown as Offred states â€Å"to be seen-to be seen- is to be- her voice trembled-penetrated. † The use of repetition and italicise of the word ‘seen’ is used to highlight the fact that individuals don’t want to be seen, creating an ominous presence of control and threat through the constant watching. Another way The Handmaid’s Tale creates opportunities to respond in relation to its dystopian reading is in its discussion of citizens in fear of the outside world. This fear is shown through the presence of â€Å"The Wall. † The wall serves as a symbolic barrier separating Gilead from the outside world and also emphasising the existence of the totalitarian state and its allusion of a perfect world. This meaning is shown as the wall is described to have â€Å"barbed wire along the bottom and broken glass set in concrete along the top. Visual imagery here is used to create fear of the outside world through the literal and metaphorical barrier the wall represents. It is also important to note that the value of Atwood’s text is evident in the way it is a cautionary novel, designed to provide a reflection and thus provide commentary on the potential for 21st century society to adopt these extremes. Therefore the novels exploration of elements of dystopian society including the perceived surveillance of citizens and fear of the outside world creates opportunities to respond to The Handmaid’s Tale in relation to its comments about dystopian society, making it valuable. Even though the totalitarian regime has been destroyed, Atwood warns us that governments can still exploit woman. In the Historical Notes, it is concerning how Professor Pieixoto states, â€Å"No new system can impose itself upon a previous one without incorporating many of the elements to be found in the latter. † This implies that selected characteristics of the dystopian Gilead Republic will be adopted by a new government. Another way in which The Handmaid’s Tale creates opportunities to respond is through its complex interpretation from a feminist perspective. This is shown within the novel as the Handmaid’s bodies are used for procreation, their sexual freedom has been denied. This is seen through the constant discussion of fertility with Offred often belittling herself and her body to be used, â€Å"we are like containers, it’s only the insides of our bodies that are important. The outside can become hard †¦ like the shell of a nut. † Here a simile is used to continue to degrade and dehumanise Offred through equating her to a simple â€Å"nut,† an empty being, only valued for her fertility. Also the way in which women are used for procreation is shown through the motif of red, â€Å"a nondescript woman in red,† with women here further dehumanised to â€Å"nondescript† beings. The motif of red is used to represent fertility. The way females are often referred to as red throughout the text highlights how the Handmaids’ sole purpose within the society of Gilead is to procreate, demonstrating once again how females within the society are only valued for their bodies. In regards to a feminist interpretation, male dominance is also presented throughout the novel through the discussion of sterile- this is again italicised to emphasise its effect relating to a feminist viewpoint as males don’t go to colonies yet females do highlighting gender inequality. The inclusion of these elements discusses a range of feminist concerns allowing it to be interpreted in a myriad of different ways, increasing its value. The Handmaid’s Tale furthermore creates opportunities to respond through its inclusion of post-modern elements thus making it valuable. The novel can be read from a post-modern perspective as Atwood uses self- reflexivity as a means of questioning what is truth. This is shown when Offred admits, â€Å"This is a reconstruction, all of it is a reconstruction. It’s a reconstruction now, in my head. † The use of repetition, â€Å"reconstruction† creates emphasis and awareness of how the story Offred tells is only fractured pieces of the story, taken apart and put back together. Atwood here is trying to make her reader’s question if what is being said is true; implying that not everything read is necessarily true. This post-modern analysis which believes in the existence of multiple truths can be further seen through Offred’s narration shown as she questions â€Å"you want the best for her. Don’t you? † Here metafiction is used as Offred directly communicates with the audience, presenting an element of post- modern literature. From a post-modern interpretation the truthfulness of Offred’s singular narration is questionable accentuated when she consciously reinstates, â€Å"I don’t want to be telling this story. † This highlights how her narration could be subjected bias rather than truth. Thus The Handmaid’s Tale can be interpreted from a post-modern perspective making it valuable as this is one of the many ways it can be responded to. In conclusion it is through the different ways to respond to Margaret Atwood’s novel, The Handmaid’s Tale that the text possesses value. These responses are generated in relation to dystopian, feminist and post-modern interpretations that the novel discusses. Each of these comments on 21st century society and encourage audiences to respond to their own society in different ways making the text valuable.

Friday, January 3, 2020

The Controversy Regarding The Practice And Effectiveness...

EXECUTIVE SUMMARY This paper is designed to address four major controversies concerning the practice and effectiveness of the current United States education system and discuss potential solutions to these issues. The four controversies we will be addressing are; o Lack of student centered learning o Religion in public schooling o Lack of importance the US government places on higher level education o Need for more focus on thinking 1. The lack of student centered learning is an issue because of the fact that it is not widely known. Student centered learning is a teaching approach that incorporates participating in self-paced learning programs and/or group scenarios, substituting lectures with active learning, leading up to holding the student responsible for his or her own improvements in education. The focus on this kind of learning could greatly improve our education system in America because it makes the students responsible for their success. The teaching of that type of responsibility will make for a more reliable and advanced generation. 2. Religion in public schooling is a major controversy proven by the fact that Americans have been debating the place of God in schools almost repeatedly since public education got its start in the country nearly two hundred years ago. As the United States becomes more religiously diverse, its shared doubt on this issue becomes more prominent. Not even the Supreme Court, with its muddled and unclear ruling on the establishmentShow MoreRelatedEssay on Managed Care1158 Words   |  5 PagesManaged Care To decide on whether or not an issue is considered ethical or moral we need the hard cold facts. Facts expose or explain what is to be decided upon#8212;not what the outcome should be. Decisions regarding health care and mental health issues represent a major portion of ethical and moral choices. As individuals we are not always able to understand the justice, or fairness, behind the decisions supposedly based on hard cold facts. Once upon a time being a therapist was consideredRead MorePill And Bills : Documentary Feature Film Pitch1459 Words   |  6 PagesBills DOCUMENTARY FEATURE FILM PITCH THE PROBLEM Due to the corporate competition between large pharmaceutical companies and their purpose as a business to â€Å"make money,† modern medicine is often characterized by the overuse of chemical drugs. Under current US law, it is perfectly legal to pay doctors to promote drugs. Big Pharma, the collective group of big pharmaceutical companies, continues to pay billions of dollars to doctors promoting and prescribing their drugs. The common assumption when oneRead MoreFunctionalism, Conflict, and Interactionism3181 Words   |  13 PagesChild Left Behind† Act The Effects of â€Å"No Child Left Behind† on Special Education and General Education Collaboration Outcomes: A Qualitative Study The â€Å"No Child Left Behind† Act The Effects of â€Å"No Child Left Behind† on Special Education and General Education Collaboration Outcomes: A Qualitative Study Introduction The primary aim of this research paper will be to determine how NCLB program impacts special education students, general collaboration and educational outcomes. NCLB was introducedRead MoreSex Education With Young Adults Essay2532 Words   |  11 Pagesof America, there has been tension regarding sex education with young adults. During the 1940s, is when the observances of teen pregnancy started to be studied. In 1941, was when the highest peak of teen pregnancy was, and has since then gone down. However, the United States still has the highest teen pregnancy rate in all the industrialized nations. In European education systems, they teach sex education in every way. They not only have comprehensive sex education classes, but they also support safeRead MoreOrgan And Organ Of Organ Transplantation2652 Words   |  11 Pageswaiting for an organ. These events have raised many ethical, moral and societal issues regarding supply, the methods of organ allocation and the use of living donors as volunteers including minors. It has also led to the practice of organ sale by entrepreneurs for financial gains in some parts the world through exploitation of the poor, for the benefit of the wealthy. This paper presents valuable information regarding organ transplantation while supporting the medical definition of the term â€Å"brain death†Read MoreArgumentative Essay : Illegal Immigration2523 Words   |  11 PagesArgumentative Essay on Immigration Illegal immigration has been a problem for the United States for a long time. This phenomena is not new and thousands of illegal immigrants have come into US through either the Mexico border, the Pacific Ocean, or through many other ways. Some people have entered the country legally through a visit visa, but then have stayed illegally and are working in various places. Illegal immigration is a double edged sword; on the one hand it provide the local economy withRead MoreMedical Marijuana And Medical Therapy2626 Words   |  11 PagesSurvey monitors priority health risk behaviors that contribute to the leading causes of death, disability, and social problems among youth and adults in the United States† (Center for Disease Control and Prevention, 2012). The most recent survey conducted on ninth through twelfth grade students in public and private schools throughout the United States indicated that in 2011, a mean of 39.9% of participants reported ever using marijuana one or more times during their lives (Center for Disease Control andRead MoreMillennials Drive For School Choice1894 Words   |  8 PagesMillennials’ Drive for School Choice It is notable that the school system has major flaws where variation in methods has caused success and failure to come from different students; this is partially due to the way types of schools function. The flaws in the school system are highlighted in the chapter â€Å"Better Schools: Investing in our future,† from the book, When Millennials Rule: The Reshaping of America, written by David Jack Cahn. They are trying to bring the millennials’ future actions andRead MoreEssay about Analysis of the Head Start Program2701 Words   |  11 Pagesand political forces that have influenced the development of the program. The essay also seeks to evaluate both the manifest and latent functions of the policy, consider the current debate around Head Start, describe the ideologies and values that have framed the debate around Head Start, and offer recommendations regarding the program. Head Start Program Overview of the Policy The Head Start Program, typically referred to solely as Head Start, is offered by the U.S. Department of Health andRead MoreThe United Nations and Human Rights: Has the United Nations failed in its determination to support and advocate for human rights?3184 Words   |  13 Pageson behalf of human rights has been one of the primary principles of the United Nations. Since its founding in 1945, the United Nations has worked to preserve the basic human rights and fundamental freedoms it believes to be deserved of by every man, woman, and child on the planet. Throughout the near seventy years of the United Nations’ existence, it has been challenged with an array of questions, events, and claims regarding the possible violation of human rights. In order to combat these claims