Saturday, September 7, 2019

Investment Report Essay Example | Topics and Well Written Essays - 3000 words

Investment Report - Essay Example Apple has a very minimal control over its external relations with other countries due to America’s indulgence in war on terrorism (Strategic planning13, 2014). A majority of Apple’s products are manufactured outside of the US. The list of countries includes names such as, China, Ireland and Korea. Political disagreements with these countries may impact the company’s operations severely (Slideee, 2014; Johnson, Whittington and Scholes, 2011). The economic downturn may have a severe impact on the company’s sales and improvements that could be made within the operations. Apple’s products are perceived as luxury segment products by some, which is why individuals have started heavily spending on them. Moreover, due to higher rate of inflation, income is low and unemployment rate is high. As a result, Apple could risk a severe reduction in the level of sales. Due to such volatile economic situations, the value of US dollar keeps fluctuating. Even so, to shield the company from such exposure, considerable amount of foreign currencies is purchased (Strategic planning13, 2014; Slideee, 2014). Possession of Apple products is considered as a demonstrator of status symbol in many societies. This factor has amplified the level of sales for many Apple Inc products. Given the fact that the purchasing power of common people have increased in various markets across the world, purchase of luxury products has amplified as well. As the world cannot be envisaged without gadgets, the products manufactured by Apple have gained worldwide appreciation (Strategic planning13, 2014; Slideee, 2014; Frynas and Mellahi, 2011). The technological environment that surrounds Apple Inc has evolved considerably over past few years. Most importantly, computers and phones have become a popular commodity. Apple Inc is placed at the topmost position in the market for manufacturing innovative products and most relevant aspect of the products offered is that

Friday, September 6, 2019

Social Educational Theories Essay Example for Free

Social Educational Theories Essay Education plays a major role in any society. But the specifics involved in this role are still subject to debate. That is, the methods of teaching, the strategies of handling students, the style of managing schools, and the goals and standards of the educational system have been the subject of deliberation and reflection among educators, psychologists and social theorists. Educational systems have also changed numerous times throughout history and such changes are often the results of the emergence of social theories that influence the decisions of policy makers. In this research paper, four social theories will be examined: functionalism, Marxism, interpretivism, and post-modernism. These four social theories will be compared and their strengths and weaknesses will be discussed. In doing so, this paper will to what extent do these social theories explain the function of education in American society and how do these theories compare with the realist theory. What is functionalism? Functionalism is believed to have been developed by several philosophers in the nineteenth century but it was only during the early part of the twentieth century, the 1930s, did this social theory take official form in the United States through the work of Talcott Parsons. Unlike the earlier social theories that treat society as one vaguely defined system, functionalism boasts of focusing on the parts of the system and how these parts interact and influence each other. The parts have needs that the other parts can meet and this is why the parts exist in a state of cooperation. The system is then considered to be in equilibrium. However, the functionalists also recognize the changing nature of this system and that the parts adjust to these changes towards a new equilibrium (Parsons, 1951). Strengths and weaknesses. In the field of education, the major strengths of functionalism lies on the emphasis of interdependence and a path of evolutionary change that is not dramatic or chaotic. This is because the functionalists shun conflict and believed that any conflict can be avoided because each individual is influenced by the society’s norms. If an individual scorns these norms, there would be consequences such as social disapproval or even imprisonment. Unfortunately, despite the discouraging presence of these consequences, and based on the history of the world, the history of the American society, and of American education, conflict seemed to be significantly present. This made the tenets of functionalism naive and incomplete. Within the classroom, a functionalist teacher may induce the students to behave in an equilibrium-producing manner by emphasizing the classroom norms and the consequences that are given if such norms are ignored. Some of the consequences might be time-out, lower grades, suspension, and other sanctions. Again, similar to the greater society, the classroom society may have a few students who are not deterred by the consequences. This is not because the student intends to create conflict but because there might be some needs of the students that were not met. In the same way, there would be dissent and revolutions if social problems, such as poverty and tyranny, persist and come to a point when they become unbearable (Ballantine, 1997). Functionalism and education in an American society. Within the American society, functionalism might propose that the whole education system is entrusted with the responsibility of meeting one particular need of the society – to produce responsible and productive citizens. From one perspective, this functionalist role of the educational system may explain the function of education in America. This is because one of the purposes of the current NCLB or No Child Left Behind Act is to produce highly skilled citizens, who will be competitive in the global market (U.  S. Department of Education, 2004). Another perspective of functionalist that can describe the changes in the educational system in America is the concept of equilibrium. For example, the American society realizes that it needed to have better teachers and better students. The educational system responds by establishing standards and a more extensive evaluation procedure for school performance. Unfortunately, these two perspectives seem to be the only obvious connection between functionalism and education in a modern American society. Functionalism and realism. In the same manner, the aims of functionalist education doe not agree with the educational aims of realism, which is to produce perfection in an individual. Despite this difference in stated goals, functionalism and realism indirectly agree on some aspects of pedagogical methodology, such as the use of positive rewards. Functionalists espouse negative consequences for misbehavior while realists applaud positive rewards for admirable behavior (Merton, 1968). What is Marxism? Marxism is essentially a critical theory, which means that it seeks to reveal the negative and detrimental characteristics of an existing system. In this case, Marxism critiques capitalism. The major criticism is the way capitalist societies prey on the people who are stricken by poverty or possess vulnerabilities (Kellner, 1989). For example, capitalists praise the industrial revolution, which brought about rapid economic progress. The Marxists reveal the other side of industrial revolution that is unpleasant, which is the exploitation of children. Children, who may be as young as three years old, are allowed to work in factories (Cody, 2002). Strengths and weaknesses. In the field of education, the major strength of Marxism is the emphasis on teaching methods that encourage critical thinking. Marxists teacher engage in teaching approaches that develop collaboration and independence. Marxists teachers are critical of methods that only demand emulation and passive listening. Thus, some of the preferred methods of the Marxist approach to education are hands-on activities, cooperative learning, and constructivist methods (Kellner, 1989). However the social theory developed by Karl Marx often deludes clear understanding among philosophers, psychologists, and educators. This is because the terms used by Marxists are interpreted in a different way by the largely dominant capitalist society. And here lies the major weakness of Marxism. It cannot be completely understood and its tenets are viewed negatively by the society. Marxism and education in an American society. Politically, the American society is primarily against Marxism. It might be because America is a capitalist country or because Marxism is vaguely understood. In the area of education, however, the aim of Marxism to have students who are capable of thinking independently and critically agrees with the aim of many American teachers. There is a campaign towards the creation of questions that encourage critical and creative thinking. There is also an emphasis towards the creation of activities that encourage collaboration. But, the other Marxist educational aim, which is to produce individuals who will lead radical changes in the society, does not agree with the function of education in the modern American society. The American society may welcome critical-thinking individuals but these individuals must conform to well-established norms. Marxism and realism. Some aspects of Marxism agree with realism – especially about the view on knowledge. One of the pillars of realism, Francis Bacon, cautioned people to be aware of factors that prevent the acquisition of truth, such as limited experience, popularity, religion, and prejudice. Being cautious about these conditions equates to thinking critically. Another tenet of realism, which is espoused by Russell, states that education must lead towards the solutions of the ills that the society has. This can be translated into the radical changes that Marxists wanted. Unfortunately, Marxism is too radical for many realists and these two schools of thoughts are difficult to merge (Grabb, 1990). What is interpretivism? Interpretivism is one of the lesser-known social theories that emphasize the convergence of truth and perception. That is, the truth is similar to what is perceived. Since there might be different perceptions among individuals, these individuals must agree to one level of perception that is unanimously accepted. Once accepted, the common perception becomes a reality. Essentially, the reality that interpretivists create is based on the perceptions of the individuals. Due to this nature of reality, interpretivism can be perceived as a process rather than a theory. That is, in the field of social research, a society’s reality is obtained through interpretivism. And in the field of law, individuals must agree upon the interpretation of practices, statutes, and legal duties (Brink, 2001). These individuals, therefore, must have another basis for their agreement on interpretations. The basis is the set of norms and values of the society. Stated in this way, interpretivism can be deemed similar to functionalism, in which individuals or the parts of the society must conform to norms. And with regards to norms, both interpretivism and functionalism are opposed to Marxism. Strengths and weaknesses. In the field of education, the major strength of interpretivism is that it attempts to develop creativity in the learners, teachers, and education researchers. An object does not remain a simple object but takes on other forms. For example, a chair is no longer a simple chair but a place of rest, a symbol of sentimental moments, or a private corner. All these and more can be the forms of the chair. In this manner, the students not only develop creativity but a degree of open mindedness that will be useful in a global community (Vrasidas, 2001). Unfortunately, interpretivism lacks the structure that many educators wanted. This lack of structure is probably due to the history of interpretivism – which is a critical theory of positivism. Thus, Marxism and interpretivism have one thing in common – both are critical theories that offer a contradiction to an existing and dominant theory. Interpretivism and education in an American society. In the modern American society, interpretivism has been limited to the area of research. Due to this, it cannot be reliably utilized to explain the function of education in the American society. Except for the goal of producing creative thinkers, the interpretivists do not offer much detail or position regarding the teaching and learning processes. At the same time, there are tenets of interpretivism that contradicts the present educational system. For example, Interpretivists, due to their interpretation of reality, may not agree to the presence of standards and curriculum. They may also want to change the predominant methods of evaluation. Interpretivism and realism. The concept of reality between interpretivism and realism are conflicting. The reality of interpretivism is based on the perceptions of people whereas the reality of realism exists even without the presence of any person who can perceive such reality. Due to the opposing nature of reality, there would also be opposing perceptions about the nature of knowledge, which leads to differences in curriculum (Shinn, 2004). What is post-modernism? Similar to Marxism and interpretivism, post-modernism rose at the heels of a dominant existing theory. In this case, that theory was modernism. But, unlike the two previously described social theories, post-modernism adopts many of the tenets of modernism, which are futuristic in nature. Both modernism and post-modernism see a world that is not categorized by labels but fused. For example, in literature, there are no genres that separate poems and stories. But, there is no existing and recognized unity because both modernists and post-modernist realize the fragmented nature of the world. The difference between modernism and post-modernism is the attitude that the proponents and followers have towards this fragmentation and ambiguity. The modernists are saddened by it while the post-modernist embrace it. For example, post-modernist artists display their delight and fascination with chaos and disorganization (Heartfield, 2002). Strengths and weaknesses. In the field of education, the major strength of post-modernism is its ability to embrace and utilize the rapidly changing, chip-driven world. The teachers who are influenced by post-modernism will have the needed flexibility and adaptability to maintain and create direction for the students. For example, the meteoric rise of computers and other electronic gadgets might drag a teacher from his comfort zone and make him less effective. The post-modernist teacher would embrace the changes and will become computer savvy, along with his students. However, the post-modernist approach to education might endanger other aspects of the teaching and learning process. This is because the learning process needed structure and order – a concept that is not respected by post-modernist (Klages, 2007). Post-modernism and education in an American society. The theory of post-modernism might be used to explain the function of education in a modern American society, which is to help the learners adapt to their changing world. Obviously, the world perceived by the learner will change constantly and continuously. But, many of the educators and policy-makers in the American society will have second thoughts regarding this eager attitude towards change. Embracing the change might not be the best action to take. However, post-modernism wanted the students to think less of subject but more of purpose (Sarup, 1993). For example, the student must first determine his reasons why he must get a college degree. In this manner, post-modernism is aligned with the other social theories. However, post-modernism, at this moment, could not be utilized to fully explain the function of education in American society. Post-modernism and realism. Post-modernism, in the field of education, is not compatible with realism. This is because realism values the influence of science whereas post-modernism shins the importance of science. However, post-modernism embraces technological advances. These technological advances will not be possible without science. This attitude might lead to some compromise with the attitude of realists towards science. Realists believe that science will influence philosophies and post-modernists recognize the influence of changes. The function of education in the contemporary American society cannot be described fully by using only one social theory. A composite of these social theories must be used because the present American society has an eclectic view of the function of education.

Thursday, September 5, 2019

Different Types Of Network Devices

Different Types Of Network Devices Infrastructure security depends on the correct use of the network components. Network components are an essential aspect of the computing environment to improve the performance and security. The network components such as routers, switches and cables connect to the firewalls and gateways that manage communication from the network design to the protocols employed. If security fails then the availability of the system fails. Security failures can occur in two ways as follows: 1. Sometimes unauthorised users access the resources and data, which they are not authorised to use. 2. Security failure prevents the user from accessing the resources and data, the user is authorised to use. Both these security failures are serious. Hence, primary goal of network infrastructure security is to allow all authorised usage and deny all unauthorised usage of resources. 8.2 Devices Todays business environment consists of not only clients and servers but also network devices that are required to connect them. These network devices are called communication devices. These devices are hubs, switches, routers, LAN cards, gateway, modem, hardware firewall and so on. This also includes wireless access points, special-purpose devices such as Virtual Private Network (VPN) devices. Each of these devices has a specific network functions and plays an important role in maintaining network infrastructure security. 8.2.1 Workstations The workstations are client computers in the client-server architecture. This device is used to send and receive e-mail, to create spreadsheets, to write report in a word processing program and to play game. Many threats to information security can start at a workstation when it is connected to a network. Workstation security can be maintained by following basic steps as follows: Remove all share point that is not required. Rename the administrator account and secured it with a strong password. Remove unnecessary user accounts. Install an antivirus program and keep it updated. Disable USB ports in CMOS settings to restrict data transfer through USB devices. Install firewall between the machine and the Internet. Install latest patch for the operating system (OS) and keep the OS up to date. 8.2.2 Servers Servers are the computers in a network that host applications and data for users to share. Servers are available in many sizes, from small single CPU systems to multiple CPU systems such as mainframe computers. Servers use operating system such as Windows Server, Linux, UNIX and other mainframe operating systems. Server OS is more robust than the workstation OS and is designed to service multiple users over a network at the same time. Workstation security basic steps are applicable to server as well. 8.2.3 Network Interface Cards Network Interface Card (NIC) is a hardware device used to connect a server or workstation to a network. A NIC is used for particular type of network connection, either ethernet or token ring. In local area networks, ethernet protocol is the most common network type in use and RJ-45 is most common connector. A NIC is the physical connection between a computer and the network. NICs are available as single-port and multiport NIC. Workstation use single-port NIC, as only a single network connection is required. Whereas, server use multiport NIC to increase the number of network connections that increases the data throughput to and from the network. Every NIC has a 48-bit unique number, referred to as a Media Access Control (MAC) address which is stored in Read Only Memory (ROM). MAC address is used in the addressing and delivery of network packets to the correct system. 8.2.4 Hubs Hub is a central connecting device in a computer network. It connects multiple machines together in a star configuration with the hub as the centre. Hub broadcasts all data packets that are received, to all LAN cards in a network. The intended recipient picks the data and all other computers discard the data packets. Hub has five, eight, sixteen and more ports. One of the ports is called uplink port and this port is used to connect with the next hub. 8.2.5 Bridges Bridges operate at the data link layer of the OSI model. Bridges check the incoming traffic and decide whether to forward or discard it. 8.2.6 Switches Switches are a type of networking device similar to hubs, which connect network equipment together. In todays high-performance network environment switches have replaced both hubs and bridges. Switches operate at the data link layer of the OSI model. It uses MAC address of network cards to route packets to the correct port. Switches are intelligent network devices and are therefore can get hijacked by hackers. Switches are administered using the Simple Network Management Protocol (SNMP) and telnet protocol. Both the protocols have a serious weakness. These two protocols send passwords across the networks in clear text. In such instances hacker can capture the administrative password. The major problem with the switch is that it ship with default passwords. If user does not change this password during setup, hacker can easily access it. Caution: To secure a switch, disable all access protocols other than a secure protocol such as Secure Shell (SSH). Use only secure methods to access switch will limit the exposure to hackers and malicious users. 8.2.7 Routers Router connects two or more computer networks and then exchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same network, or if the data packet must be transferred from one network to another. Routers operate at the network layer of the OSI model. It has two or more network interfaces through which network traffic is forwarded or blocked. They are used to segment networks into smaller subnets or to link multiple networks together. The router decides how and when to forward packets between the networks based on an internal routing table. Routing table tells the router which packets to forward. Routers allow technicians to explicitly deny some packets the ability to be forwarded between segments. For example, internal security features of some routers can prevent users on the internal network from using telnet to access external system. Telnet is always a security risk as the passwords and all communications are transmitted in clear text. Hence, do not create telnet sessions between the internal network and an external network. Router has the ability to block spoofed packets. Spoofed packets are packets that contain an IP address in the header which is not the actual IP address of the source computer. Hackers used this technique to fool the systems showing that the packet came from an authorised system whereas, it actually came from the hackers system. Router has the ability to drop such packets. Routers are available in various sizes, small and big and from different vendors. Small router is used with cable modem and DSL service. (Figure). Larger routers handle traffic of up to tens of gigabytes per second per channel, using fibre optic cables and moving tens of thousands of concurrent Internet connections across the network. 8.2.8 Firewalls A firewall is hardware or a software program that is used to protect an internal network from outside intruders. It is much like a wall with a window. The wall keeps things out, except those permitted through the window. (Figure.). Network security policies act like a glass in the window. Security policies define what traffic is permissible and what traffic is to be blocked or denied. For example, Web server connected to the Internet may be configured to allow traffic only on port 80 for HTTP and have all other ports blocked. Firewall allows only the necessary access for a function, and block or denies all unnecessary functions. 8.2.9 Wireless In wireless device, radio waves or infrared carry data, that allows anyone within range access to the data. Placing a wireless device behind the firewall does not serve, as firewall stops only physically connected traffic from reaching the device. The devices associated with wireless networking are wireless access points. The wireless network cards are used to communicate with the access points. (Figure). Wireless access points have a limited range within which they can communicate with the client systems. When planning a wireless implementation within a new construction, make sure that the external walls contain metal studs that are grounded. Create wireless shield by using thin layers of aluminium under the drywall. This will block radio transmission into and out of the building. This will also interfere with pager and cellular phone usage. Note: Applying secure transmission protocols and configuring the wireless access point to only accept authorised connections will help in securing a network. 8.2.10 Modems Modulator and Demodulator (Modem) converts analogue signals to digital and vice versa. Modems are slow method of remote connection that is used to connect client computers to remote services over standard telephone lines. Modems are becoming less necessary, but many corporate systems still have modems installed for remote access. In corporate network, modems are located in Remote Access Service (RAS) servers and fax servers. Corporate users remotely access their system configuring modem in their PC. This is done when no other remote access solution is available or the existing remote access solution is inconvenient. These types of situations can provide an intruder the entry point to a network. The best solution to avoid this is to implement a security policy to control the installation of modems on corporate systems. Also verify that systems which need modems are properly secure. 8.2.11 Telecom/PBX In the IT security field Telecommunication (Telecom) is often overlooked. Most small companies use a small number of dedicated telephone lines for both incoming and outgoing calls. However, in larger companies having dedicated lines for thousands of employees is both inefficient and expensive. Hence, to overcome these problems install a Private Branch eXchange (PBX). A PBX is a device that handles routing of internal and external telephone lines. This allows a company to have limited number of external lines and an unlimited number of internal lines. PBX systems are cost beneficial to large companies but they also have their own vulnerabilities. PBX s is designed to be maintained by an offsite vendor and therefore have remote access available. The remote access can be through a modem or through a LAN. Hence, disable these remote access methods to limit the susceptibility to direct remote access attacks until the vendor is notified that they need to perform maintenance or prepare an update. 8.2.12 RAS Remote Access Service (RAS) connects the client and server through a dial-up telephone connection. It is slower than cable and Digital subscriber line (DSL) connection. When a user dials into the computer system, authentication and authorisation are performed through a remote access protocols. RAS servers offer security feature such as mandatory callback. This allows server to call back to the client at a set of telephone number for the data exchange. For more information on remote access protocols refer chapter 9, Authentication and Remote Access 8.2.13 VPN VPN allows users to create a secure tunnel through an unsecured network to connect to their corporate network. In large environments, VPNs are less expensive to implement and maintain than RAS servers, because there is no incoming telephone line or modem. In addition, a higher level of security can be implemented as communications are encrypted to create a secure tunnel. 8.2.14 Intrusion Detection Systems Intrusion Detection Systems (IDS) is a device designed to monitor network or system activities for malicious activities or policy violations. They are an essential part of network security. There are two main types of IDS that are used: network-based IDS and host-based IDS. For more information on intrusion detection systems refer chapter 11, Intrusion Detection Systems 8.2.15 Network Access Control Network Access Control is a method of network security that restricts the availability of network resources to endpoint devices as defined in the security policy. There are two main competing methodologies exist: Network Access Protection (NAP) and Network Admission Control (NAC). NAP is a Microsoft technology that controls network access of a computer host whereas, NAC is Ciscos technology that controls network admission. 8.2.16 Network Monitoring or Diagnostic The computer network needs continuous monitoring or diagnostic routine to keep administrators aware of the status of the network and allow them to take corrective actions to potential problems. This can be done through monitoring software or dedicated devices located on the network. Network monitoring or diagnostic equipment that is remotely accessible uses strong password and encrypted sessions to handle security vulnerabilities. 8.2.17 Mobile Devices Mobile phones and Personal Digital Assistants (PDAs) are the latest devices used to send and receive e-mail, connect to remote network applications, browsing the Web and so on. Many of the devices have word processor and spreadsheet applications and the ability to store limited amounts of data. Since these devices can be connected to the Internet, they are remotely accessible to potential attackers. Hence, use data encryption which is available in newer mobile devices built into their OS or use third-party software. 8.3 Media Media is used for transmitting data to and from network devices. The media can be either in the form of wire, fibre or radio frequency waves. There are four common methods used to connect devices at the physical layer as follows: Coaxial Cable Twisted-pair Cable Fibre Optics Wireless Coaxial Cable Coaxial cables are used for cabling televisions, radio sets and computer networks. The cable is referred to as coaxial because both the centre wire and the braided metal shield share a common axis. It is less susceptible to interference. Today, coaxial cable is replaced by faster and cheaper twisted-pair cable. UTP/STP Twisted pair cables replaced coaxial cables in ethernet networks. Single pairs of twisted cables reduce electrical crosstalk and electromagnetic interference. Multiple groups of twisted pairs are then bundled together and easily wired between devices. Twisted pairs are of two types: Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP). STP has a foil shield around the pairs to provide extra shielding from electromagnetic interference. Whereas, in UTP twist itself eliminates interference. Depending upon the data transmission, twisted pair cables are classified into three different categories as follows: Category 3 (Cat 3) It is used for data and voice transmission and for 10Mbps Ethernet. Category 5 (Cat 5/ Cat 5e) It is used for 100 Mbps fast ethernet. Cat 5e is an enhanced version of the Cat 5 specification to address far end crosstalk. Category 6 (Cat 6) It is used for gigabit ethernet. Fibre Fibre is a very thin piece of glass or plastic that has been stretched out and enclosed in a sheath. Fibre optic cable uses beams of laser light to connect devices. It transfers data over long distances and at higher speeds. Since it does not contain any metal part to conduct current, it is not vulnerable to electromagnetic interference. This also protects it from lightening strikes. Two major drawbacks using these cables are their high cost. Other drawback is the connection has to be optically perfect or performance will be downgraded or the cable may not work. Figure: Unguided Media Unguided media does not use any physical connector between the two devices for communication. The data transmission and reception is through the air or antenna and is referred to as wireless. The three types of wireless media are as follows: Radio waves Microwaves Infrared waves 8.4 Transmission Media Security 8.5 Removable Media Removable media is a type of storage device that can be removed from a computer while the system is running. These media introduces virus when they are attached back to the network. Theft or loss of organisation secret information stored on a media can be severe financial problem or it will effect on organisations reputation. These issues can be rectified by using security policies and software. The removable media are of three types: magnetic, optical and flash memory. Magnetic Media Magnetic media devices are hard drives, floppy disks, zip disks and magnetic tape. Each device is sensitive to external magnetic field. These devices are also affected by the high temperatures and by exposure to water. For the security concern about the critical and important organisational data, do not allow users to bring floppy disk inside the organisation, as they could contain viruses or other malicious programs. Another security policy can be applied by removing floppy disk drive from users computers. Encrypting the contents of a hard drive and tape ensures the security of data. Optical Media Optical media such as CD, DVD, blu-ray and optical jukebox hold the data in digital form. The data on the physical media is read and write by laser. Optical disks are not vulnerable to magnets hence, they are more reliable and durable than the magnetic tape. CDs are very vulnerable to being scratched. If the plastic disk from the media is scratched too much, the laser will be unable to reflect through the plastic and the data will not be readable. For security of data, do not allow personal CDs inside office premises. Only authorised users should have the access to these devices and for other users these devices should be disabled or physically removed from the computers. Electronic Media The electronic media uses integrated circuit technology to store the data hence they are more stable. Since these devices are small and portable, they can be used to store limited amounts of data when portability or reliability are key necessities. Smart cards, flash cards, memory sticks and CompactFlash devices are examples of electronic media. These devices are commonly used in digital cameras, mobile phones, MP3 player, video game consoles and so on. These devices are also used to transfer data between computers. Hence, they can easily carry the virus and worms with data. For security purpose run the antivirus software before transferring any data. 8.6 Security Topologies Multiple hardware devices are connected within a network and a key characteristics of a network is its layout or topology. Security topology is implemented in such a way that it provides the internal security and public access. For example, to place an online order the organisation will require Web servers which can be accessed by the users. Then the Web servers will require access to internal database servers and internal users will require access to different servers and Internet. 8.6.1 Security Zones Modern secure network have different layers of protection with outermost layer provides basic protection and the innermost layer provides the highest level of protection. Trade-offs between access and security are handled through zones with successive zones guarded by firewalls. The outmost zone is the Internet is guarded by the firewall. The internal secure corporate network and the Internet is an area where computers are considered at risk. This zone is called as Demilitarised Zone (DMZ). DMZ DMZ acts as a buffer zone between the Internet and organisations internal secure network. To differentiate the zones, a firewall is placed at both sides of the DMZ. The firewalls are placed in such a way that the Internet users cannot directly access the organisations secure data (Refer to Figure ). Web servers, remote access server and external e-mail servers are fall in DMZ area. Domain name servers and database servers which has organisation important data should not be accessible to the Internet users. As well as application servers, file servers and print servers of trusted network zone should be placed behind both the firewalls. The main idea behind using the DMZ topology is to force an outside user to get across DMZ before user can access information inside the trusted network zone. Internet The Internet is a worldwide connection of networks. It is used to transfer e-mail, Web pages, files, financial records between networks. It is an untrusted network as it is not possible to apply security policies. Hence a firewall should be present between organisations trusted network and the Internet. Intranet Intranet resides inside the trusted area of a network and network administrators can manage its security. Intranet Web servers contents are not available to the Internet users. The organisation data can be published to outside users with two methods as follows: 1. Information can be duplicated onto computers in the DMZ so that untrusted users can access it 2. Extranets can be used to publish data to trusted users. Extranet Extranet allows outside users such as companys partners, vendors, customers and resellers to share some of the business information with authentication and authorization. Extranet allows to access data available on the intranet mainly in the DMZ. To provide security and privacy of the information, extranet requires firewall server management or digital certificates or user authentication, encryption of messages. To protect it from unauthorised access use the VPN. VLAN Virtual LAN (VLAN) is network of computers and these computers are connected to the same broadcast domain, even though they are physically located on different location. VLAN s are configured through software hence they are more flexible. When system is physically moved to different location, without any hardware reconfiguration the system stay on the same VLAN. Increased network performance, easy manageability, less configurations and higher security is the advantages of VLAN.   Note: A broadcast domain is a network (or portion of a network) that will receive a broadcast packet from any node located within that network. NAT Network Address Translation (NAT) is developed by Cisco. It is commonly used in TCP/IP network. It works at OSI layer 3 which is network layer. It uses two sets of IP addresses, one set for internal use and other for external use.   NAT is a feature of firewalls, proxies and routing capable systems. It has ability to hide the IP address and the internal network from the Internet users. This feature of NAT reduces the risk of strangers to collect important information about the network such as structure of a network, the network layout, the names and IP address of systems, and so on. Hence, they cannot gain access of the network. NAT enables internal users within an organisation to use nonroutable IP addresses which means that these IP addresses will not be routed across the Internet. These IP address is called private IP address. The private address ranges are as follows: Class A 10.0.0.0 10.255.255.255 Class B 172.16.0.0-172.31.255.255 Class C 192.168.0.0- 192.168.255.255 After NAT configuration, external malicious users can access only the IP address of the NAT host that is directly connected to the Internet. The users are not able to access any of the internal systems that go through the NAT host to access the Internet. When NAT is used to hide internal IP addresses (Refer to Figure), it is called a NAT firewall. Internal users communicate with outside networks through the NAT device such as NAT router (Refer to Figure). This NAT router has a routing table. This table keeps track of all connection requests that have come from internal network. Each outgoing request proceeds through NAT and replaces the internal users IP address with its own IP address. This IP address then forwards to the final destination. Returned packets look up in the routing table and forward the information to the correct internal user.   8.7 Chapter Review Questions 1. Which layer of the OSI model switches operate? (A) Physical layer (C) Network layer (B) Data link layer (D) Transport layer Ans: B 2. Which layer of the OSI model router operates? (A) Physical layer (C) Network layer (B) Data link layer (D) Transport layer Ans: C 3. DSL stands for ________. (A) Domain Subscriber Line (C) Digital Specific Line (B) Domain Specific Line (D) Digital Subscriber Line Ans: D 4. What should you do to secure data on the hard drive if the drive is removed from the site? (A) Encrypt the data (C) Archive the data (B) Compress the data (D) Keep strong password to log into all computers at the site Ans: A 5. Which is the most secure cable for implementing a secure network infrastructure? (A) Coaxial cable (C) Fibre cable (B) Twisted-pair cable (D) None of these Ans: C 6. What network topology area will contain public Web servers? (A) VPN (C) Firewall (B) VLAN (D) DMZ Ans: D 7. What network topology area will contain critical servers such as private Web servers, domain controllers or SQL servers? (A) Intranet (C) Internet (B) Extranet (D) DMZ Ans: A 8. What network topology area will allow business partners, customers to access the owners intranet? (A) Intranet (C) Internet (B) Extranet (D) DMZ Ans: B 9. Network access control is associated with which of the following? (A) NAT (C) IPv6 (B) IPsec (D) NAP Ans: D 10. The purpose of twisting the cables in twisted-pair circuits is to _____. (A) reduce crosstalk (C) increase bandwidth (B) increase speed (D) None of these Ans: A 8.7.1 Answers 1. B 2. C 3. D 4. A 5. C 6. D 7. A 8. B 9. D 10. A Summary In the chapter, Infrastructure Security, you learnt about Different types network devices such as Workstations, Servers, NIC, Hubs, Bridges, Switches, Routers, Firewalls, Wireless, Modems, Telecom/PBX, RAS, VPN, IDS, Network Access Control, Network Monitoring and Diagnostic and Mobile Devices. Different types of communication media between the devices such as Coaxial Cable, UTP/STP Cable, Fibre Cable and Unguided Media. Different types of removable media such as Magnetic Media, Optical Media and Electronic Media. Different types of security topologies such as DMZ, Internet, Intranet, Extranet, VLAN and NAT.

Wednesday, September 4, 2019

The Consequences Of Melting Polar Ice Caps Environmental Sciences Essay

The Consequences Of Melting Polar Ice Caps Environmental Sciences Essay The polar ice caps that we see today have taken centuries to form and they ve been melting from time to time in order to form lakes and rivers that are essential not only for animal and plant life, but for humans as well all over the world. Furthermore, as precipitation takes its toll the ice caps that melt gets replaced by fresh snow that is later on over time converted to ice. Thus it is safe to say that the melting of the polar ice caps is a normal occurrence, however it becomes a problem when the ice caps melt at a fast rate and turning into water faster and in more quantity than the fresh snow replacing it. This is the current situation of most of today s polar ice caps all over the world. As they reduce in size, stability, and strength they eventually break off and melt away thereby increasing sea levels among other things. The major consequences of melting polar ice caps can be said in the following order below: 1. Global Warming. We are currently experiencing warmer temperatures all over the world today as temperatures have gone high, and global warming is becoming more alarming day by day. This rise in temperature helps polar ice caps melt faster than it should be. Ice caps have even disappeared in certain parts of the world due to this. The melting of the polar ice caps increases global warming because ice glaciers deflects or bounces off about 80% heat from the sun and retain or absorb about 20% of it. However, when sunlight falls on earth, only 20% of the heat is deflected and 80% is absorbed. This in turn increases sea water temperatures, melting ice faster causing the earth to get warmer. 2. Shortage of Fresh Water. Earth looks sort of enveloped and covered with water when seen from space which causes people to think that we are self-sufficient with water. However, this is just the opposite as most of the water that we can see from space in pictures is just salt water that is not good for human use and only 2% of it is considered as freshwater good enough for human use in which 70% of it comes from ice caps and glaciers. People in certain parts of the world depend on this fresh source of water for not only drinking but for agricultural purposes as well. There are certain areas around the Himalayas that are currently in crisis due to this especially in dry months as populations rise. 3. Reduced Agricultural Output. To begin with, for the areas where agriculture mainly depends on rain, they won t be effected by melting of the ice caps. However these areas are few around the world. Areas that are affected are those that depend on fresh water coming from ice caps and glaciers. When ice caps keep on melting there will be lesser fresh water for agriculture which will make the lands dry and not suitable for agriculture thus reduce the total output leading to a shortage in harvest. 4. Excessive Flooding. There are ice caps all over the world and it should be understood that the difference between polar ice caps and ice caps is that the later are present also on lands. Melting of these ice caps causes excessive flooding which is very dangerous for the people and animals that are living in those areas as it would destroy homes, habitats, and lives. Furthermore, polar ice caps and ice glaciers on higher altitudes melt faster which form new lakes and raise river water levels as well causing floods. This is also a cause of concern as when these river water levels rise and lakes burst, they lead to major disasters destroying everything crossing its path. 5. Rise In Sea Level. As the polar ice caps melt at a faster rate, the more the sea levels rise. The consequences of this will be of dire magnitude and people living in coastal regions all over the world will have to relocate and live somewhere else, thereby decreasing amount of living space, due to soil erosion, flooding, and their fresh water being contaminated with salt water of the sea. It has been estimated that the sea level rising 1mm to 2mm per year. It has also been estimated that in the U.S there will be a 3-foot rise in sea level in the Gulf coast which will lead to the deluge of more tha 22,000 square miles of land. 6. Habitat Loss. There are plenty of animals, birds, and even fishes that depend on the polar ice caps and its temperatures for their survival. There are fishes depend on food such as phytoplankton and sea-plants that are underwater near the ice caps and there are birds such as snow owls that depend on these fishes near the ice caps and animals and humans who depend on certain birds for food. They are all connected. As sea water temperatures get warmer and sea levels rise, the sea plants in which these fishes feed off n live on will eventually die out n disappear and this in turn will lead to the increase in the death toll of fishes and birds will reduce due to lack of fishes to feed on, making survival for birds very difficult. Thus disturbing the whole ecosystem. Furhtermore the reduction of fishes has an impact on the polar bear as they have much less to feed on forcing them to take long journeys away from their habitat which also forces to eat what they don t normally eat. This journey is a risky one as some of the polar bear don t make it alive an die on the way as there are many threats as starvation and threats underwater such as killer whales and sharks. Seals, whales, and walruses are also adapting to this change to migrating patters which makes hunting for them by natives very difficult thus leaving the natives without food as well. In addition to the melting of the ice caps, blocks of ice are breaking off forcing seals to give bith underwater which causes many of the pups to die by drowning. Also separation occurs due to breaking of the ice at young ages leading to higher mortality rates. 7. Coral Reefs Will Vanish. Coral reefs need sunlight for photosynthesis not only for their own survival but also for the survival of the various types of fishes that depend on it. As sea levels rise higher making waters deeper, the presence of sunlight under water becomes lesser as the sunlight becomes harder to reach the coral reefs. This in turn corrupts the quality of corals and may even kill them. Certain fishes won t survive as they depend on the reefs for food and this will later have an impact on people who depend on fish for survival. 8. Recontamination Of Earth. Most people today have never even heard DDT and such pesticides as they were banned all over the world years ago. These substances were airborne and eventually wounded up in cooler areas near the ice caps and polar ice caps. Unfortunately the story doesn t end there as most of these harmful airborne chemicals got trapped inside the polar ice caps and glaciers, which later chunks of ice melt and break off, the chemicals, are then released back into the environment in seas, rivers, and lakes containing glaciers. 9. Melting Of The Polar Ice Caps Affects The Whole World. The melting of the polar ice caps is not only limited to specific parts of the world. The rapid melting of the ice is a global concern and its consequences affect the whole world in every continent, especially when it comes to global warming. Conclusion In conclusion, the consequences of the melting polar ice caps are not only limited to specific areas of the world but rather are a global consequence and one that has many concerns and should be dealt with immediately because the polar ice caps are still melting and sea levels are rising, effecting us all over the world as mentioned above. Unfortunately nothing can be done about the rapid melting of the polar ice caps at the moment but global warming is a major factor in the rapid decrease of the ice caps and everyone should contribute to reduce global warming as a first step.

Singapore Essay example -- Singapore Politics, Government

How might the Singapore society differ were it not for these technologies – would the society be more or less heavily regulated? Lee recommends analysing politics and society by addressing how power struggles and relations were played out in the pre-Internet era, namely the maintenance of political control via public support (2005: 74). Foucault defines ‘governmentality’ as the point of contact where the technologies of power interact with the governed. This spurs Lee to postulate that, in order to retain power in the Internet era, 'governments need to be actively involved in shaping the design as well as the societal, cultural and regulatory environment in which the Internet and other new media technologies operate' (2005: 75). One example of how the Singapore government has used technology to instil greater trust, and reinstate wavering public confidence is its online tax-filing system. The e-Filing system has been described as one of most definitive e-government projects, introduced by the Inland Revenue Authority of Singapore (IRAS) as a trust-building mechanism (Tan et al., 2005: 2). The e-filing system has been a conspicuous success for e-government. The success of the e-Filing system was unprecedented in terms of compliance, and succeeded in reversing negative public opinion at a phenomenal rate (Tan et al., 2005: 2). Srivastava and Teo explored how the Singapore government utilised their ‘citizen trust on the technology’ initiatives to promote and maintain ‘trust for e-Government’ (2005: 721). According to them, this was largely achieved by fostering measures to build institutional trust via transparency and soliciting of feedback from citizens. They attributed the huge success of Singapore’s e-government programmes... ...s, which keep track of the users’ digital footprints and activities. Physical surveillance, in the form of trawling the Internet and hacking computers is technically feasible but fiscally unfeasible. Such measure also compromise privacy and democracy. Conversely, employing legislation to regulate and/or control the Internet has a number of advantages in terms of the ease of execution, the feasibility, and the transparency of the judicial processes (Johal, 2004: 4). However, legislature is purposely vague and the language ambiguous, allowing for flexibility of interpretation in the event of new developments (Endeshaw, 1996: 210). For example, the Internet Code of Practice that states that '(p)rohibited material is material that is objectionable on the grounds of public interest, public morality, public order, public security, national harmony' (in Johal, 2004: 5).

Tuesday, September 3, 2019

William Shakespeare Essay -- essays research papers fc

William Shakespeare Ask anyone who Shakespeare was, and he or she will immediately rattle off at least three different plays that were required readings in English, not to mention a few blockbuster movies bearing his name. Many revere the works of Shakespeare as paramount in the world of literature, dedicating entire books, classes and festivals to the study and celebration of his work. Although the ancient language is a common stumbling block for even the most seasoned readers, his varied tales of love, hate, fear, betrayal, laughter, defeat and victory are just as fitting today as they were four hundred years ago. He is amazingly timeless. Yet, while we might know what Shakespeare is, will we ever really know who Shakespeare was? Ah, there’s the rub! Much about the Bard is a mystery to even the most scholarly enthusiasts. The hard facts that are actually known about him could fill one neatly handwritten page, but what is speculated and complete legend could fill volumes of books. So, what is fact and what is fiction? According to the little documentation that chronicles his life, Shakespeare was not even a true ‘Shakespeare’ at all; he was born in April 1596 and entered in the baptismal record as â€Å"Gulielmus filius Johannis Shakspere.† Even his actual date of birth is somewhat of a mystery. While we do know that he was baptized on April 26th, 1564, there is no existing record of his birth date. We can assume that he was born on April 23rd judging by the customary three-day period that most families waited before baptizing their children, but this is only speculation. Since the records of the Stratford grammar school have not survived, we cannot prove that Shakespeare attended school. In all actuality, we have no evidence that he was even literate. His father had no educational training, so it is quite possible that he also lacked in schooling, but that’s only guesswork. The next piece of hard information that we come across in our search is a register entry showing a Wm. Shaxpere being granted a license to marry Anne Whateley on November 27, 1582. The very next day this same register records a marriage bond issued to William Shagspere and Anne Hathwey. Six months later Anne gave birth to their first child, daughter Susanna Shakspere, and then in February 1585 she gave birth to twins, Hamnet and Judith. It is presumed that Shakespeare made it to London ar... ...peare’s literature will probably never be laid to rest, it will always contribute to the enjoyment of studying his work. Students of the subject are compelled to read and re-read the plays and sonnets in an attempt to gain a better understanding of who was holding the pen. Debates involving fact and fiction keep the name Shakespeare in constant movement, reminding us that we have not outgrown him, not even after four hundred years. The writing of Shakespeare, whomever Shakespeare is, is a gift for us to continue unwrapping, and pass down to our children to appreciate as well. One must hope that the mystery will never be solved, so that it may never lose it’s magic. WORKS CITED Charters, Ann. The Story and Its Writer. 5th ed. Boston: Bedford/ St. Martin’s, 1999. Mowat, Barbara A. and Werstine, Paul, ed. A Midsummer Night’s Dream The New Folger Library. New York: Washington Square Press, 1993. Shakespeare Oxford Society. 27 Jun. 2001. Van Duyn, Barbara. Edward de Vere, 17th Earl of Oxford. 5 Aug. 2000. http://www.calvin.edu/academic/engl/346/proj/barb/ All Shakespeare. Allstudyguides.com.

Monday, September 2, 2019

Iceland Crisis

Background Information In three year period of 2008-2011 Iceland suffered one of the worst financial crisis in history. It Is bewildering how a country with population of only 320,000 could gather massive sums of money per capital, lose It all In such a short time period, and then manage an incredibly quick recovery since. Let's start by shedding some light on the situation leading to the crash. Iceland has always been affiliated with nature and fishermen. Fishing was the most prevalent occupation in Iceland, and a major backbone of their economy for years.Things turned direction in the ass following the liberalizing of Icelandic banks. Deregulation of banks added a whole new dimension to Icelandic economy and money was flowing more than ever. Glitter, Gapingly. And Landsman were Iceland's three most notable commercial banks who were enjoying a great time. High savings interest rate offered by Icelandic banks attracted plenty of foreign investors . Fishermen slowly turned into financ ial advisers to manage the capital inflow from outside, particularly from Germany and the I-J and create more wealth for Icelandic economy in the long-term.As with every great financial crash, greed and carelessness played a part. Banks, having believed the hype and buzz, were careless handing out big mortgages to loads of under-qualified applicants on low interest and made under-thought Investments abroad, particularly in the US. Iceland's banking sector was pride of the country which had transformed Iceland into one of the richest countries in Europe in a couple of decades. What Went Wrong The banks were accountable for themselves. There was no precise rules set for them.They had to go out there and produce. Their capabilities was the most important hinging and all else was secondary. If the banks didn't have to give ethical answers to the government, then they could be capable of many unthinkable things, especially in the banking world of the ass's and early asses. The prime mini ster of Iceland in that period (1991-2004), DavidГÂ ¶ Dodson, was no fan of government owned banks in Iceland, so none of the banks In Iceland had to answer directly to governmental authority. Reliant on external financing.They used mass wholesale funding to finance their way into the local mortgage market and obtain foreign financial firms mostly in the UK and Scandinavia. The banks were following the international ambitions of a new generation of Icelandic entrepreneurs who set to form global empires in industries from retailing to food production to pharmaceuticals. By the end of 2006, the total assets of the three main banks were $150 billion, eight times the country's GAPS. Low interest rate offered by Icelandic banks had allowed financing for rapid and pre- mature expansion of various companies in various industries perhaps beyond the nation's capacity.In half a decade, Icelandic banks experienced a mass transformation from being pretty much entirely domestic lenders to b ecoming major international financial intermediaries. The shift and growth was almost too good to be true. This is where things started to go south. As wholesale funding markets seized up (e. G. Lehmann Brothers' bankruptcy in September 2008), Icelandic banks were shaken and started to collapse under a mountain of foreign debt. The Crash and Its Consequences On October 8th 2008, Suppurating was placed into administration. The government had to intervene. Iceland was on verge of national bankruptcy.Foreign investors were seeking their money from Icelandic banks and threatened to sue. Everything was a sees. The Icelandic government nationalized Glinting. The control of Lambskin and Glinting were given to representatives of FM (Financial Supervisory Authority). Prime minister, Geri Heard, believed those actions taken by the government prevented the country from national bankruptcy. The impacts of the crash were severe on Icelandic economy, however. At end of second quarter of 2008, Ice land's external debt rose to close to Ð ²?50 billions), more than 80% of which was held by the banking sector.The national currency (Icelandic Akron) fell sharply in value. Foreign currency orientations were basically suspended for weeks. The Icelandic stock exchange fell by more than 90% and as a result Iceland officially bid hello to a period of economic recession. Recovery Icelandic economy continued to suffer for two years, but the signs since late 2010 have been very positive. Islanders have taken the right steps and have shown urgency in their efforts to get their economy back on track and it has paid dividends. The government's priority was to minimize the impact of financial crisis on the country.They placed Iceland ahead of foreign investors. As a result, an emergency isolation was passed, allowing the Financial Supervisory Authority to take over the domestic operations of Iceland's three major banks. The state intervened by protecting domestic creditors and depositors, no t allowing the taxpayers to take the burden of a bailouts. Instead of bailing out the banks (e. G. I-J, Ireland, etc), Iceland opted for defaults of the banks. This fumed foreign depositors, but Icelandic quick recovery was devaluation of Icelandic currency and implementing measures of capital control. The Corona's value halved making Icelandic exports (e. . Fish) and ours cheaper and more attractive to foreigners. These two sectors flourished as a result and played a significant role in growing the Icelandic economy again. Iceland have worked hard in restoring macroeconomic stability and rebuilding the financial sector. They put the money they received from MIFF ($10 Billion) in use to a 3-year restructuring programmer. The results are impressive as since then, the GAP has grown 2. 5% in two consecutive years. Now that the Icelandic economy is doing better, the government is making settlements to gradually pay the foreign investors back.The unemployment rates have fallen in half an d those accountable for the crash, even the former prime minister, were persecuted at the courts. Iceland did the opposite of Europe and the US to the situation and it has proved effective. Of course, it's a different situation managing 320,000 people as opposed to millions. It's not all rosy yet, however, as other economic sectors, notably private and household must catch up to fishing and tourism sector to take the momentum to next level and fully take Iceland out of what could have been a fatal blow. Conclusion 2008 Financial crash shook the world.The impact in Iceland was more incredible than most places as it nearly brought depression to the country. Deregulated Icelandic banks bit more than they could chew and ambition turned into greed and gamble. Series of factors gave hands to each other and took Iceland on verge of national bankruptcy. What happened after, is perhaps a lesson for all other nations who are struggling with their economies. Icelandic government prioritize its own nation above anyone else, and allowed its banks to default, protecting its people. They have since taken the right measures to increase spending and business in the entry.