Tuesday, August 6, 2019

Heroic essay Essay Example for Free

Heroic essay Essay â€Å"A mother’s happiness is like a beacon, lighting up the future but reflected also on the  past in the guise of fond memories.† The most important and beautiful person in everyone’s  world is our moms. They are the one who carry us for about 10 months without any sighs or  complaints. Most moms do their best to be a great role model for their children, or even others;  however, some of them can give up so easily that they leave their family scarred for life. My  mom also belongs to one of these strong, compassionate and understanding moms. She is a  inspiring hero in my life because she is supportive for other family members, and is determined  for our family to become the best mother.  My mother illustrated her protection as a best assistance through her life to family  members. Especially for me, I was first-born child for her so that she abetted me anytime and  anywhere I went. For example, when I was in the kindergarten, she left a post-it note on the back  seat of my bicycle every day. She always used to say that â€Å"No matter what bad things happen to  you, I always believe that you can handle it because you are my son. I love you.† My mom wrote  this kind of letter differently every day. It was so shameful at first that I hid it as soon as I  noticed that there is a tiny yellow paper on the seat. I did not understand why she wrote this  especially only for me. After she left our family, I started to realize that how important these  post-it notes were. Although she was not always there for me, and sometimes scolded me, she  supported, encouraged and took cafà © of me anywhere I went, and anything I did. According to  her last post-it which was 26 days before she left, â€Å"I know you have become much mature now,  but I am not really sure about your inside. Don’t you have to run diligently for the future as there  have been some delays in your life? You should know that finding out your goal is always first. I  believe you, and hope you can think and behave more independently.†Ã‚  My mother was the only person I know who did not give up anything she started or  decided, and sacrificed her life for other family members. My mom used to keep doing  something secretly as the way how my grandma did although there was an obstacle ahead. For  instance, she did not tell anyone that she became more illness because she was concerned that  anyone who knew about this would waste of his time worrying about her; she wished that she  did not want to be others’ obstacles. While my mom was staying at Korea to cure her illness, she  once said, â€Å"Do never waste your time tearing because of me. This is my life I chose, and have to  bear. Even though something worse occurs to me, you just have to ignore it and keep moving for  your future.† I could not give up for her as my mom did not give up receiving treatments for  cancer in Korean, although it caused losing her weight a lot, and made her worse, This was a  huge hindrance for my family because if my mom was not able to come to Canada again, we  would not receive our PR, and live here anymore. However, ignoring what her doctor’s saying,  she came back for us to maintain our life in Canada. We all knew that she would not live longer  than at least a year. However, her life was not that long. My mom was determined after she had  morphine in the hospice. She fell asleep so deeply that she could not move and talk. About a few  minutes before she died, my mother tried as hard as she could to open her eyes; at last, she did  not open them, but what only she could at that time was crying. Only my family recognized her  tear and perseverance which probably she desired to show us even until the end. We had to say,  although she was determined, and did not want leave us, â€Å"You can go now. We will not bother  you anymore; we have seen that you do not want to give up even now. You just have to rest in  peace. Thank you for everything you have done so far. You were determined enough to become  the best mother in the world.† After we said this, she started to give up her life as she did not  want to be an obstacle for our family.  . Can all mothers overcome this circumstance and assist others as what my mother did?  Most moms probably are able to be supportive to their family members and perseverance on  what they have to face. My mom was not only a mother to our family but she also became the  best mother as she showed us her encouragement, support to others and determination what she  wished to be done. My mother illustrated how much she could help and believe in me no matter  what happens between us; moreover, my mom did not give up what she started although any  hindrances, which seemed painful, challenging and complicated, occurred to her. Therefore, my  mom is my hero who inspired me as she was abetting and determined.

Specific Injury Treatment Ankle Sprain Health And Social Care Essay

Specific Injury Treatment Ankle Sprain Health And Social Care Essay An injury can be defined as a physical damage or harm on an animal or human being. It affects the structure or function of the body and is caused by force either chemically or physically. Injuries are classified according to their cause like traumatic injury, infection, toxin, metabolic; the location like wound, nerve injury, cell damage, brain injury; and the activity like sports injury, occupational injury. They cause deaths and many of those who survive them incur temporary or permanent disabilities. They can be prevented and if they happen, their consequences can be mitigated (Alan Melvin, 2002). Under the class of location, it can be found on an ankle with an example of sprained ankle. Ankle, being a complex supporting structure, if injured, it causes disability and absence from work. The ligaments in tibio-fibular joint in the foot enable to stabilize the forward motion. Basically, if they are damaged, their treatment will depend on how severe the injury is. This means that ankles are very useful in human body and there are many forms of treatment incase of damage but prevention is always the best. Their complications can cause arthritis, loose body formation and instability. In severe cases, that have to undergo surgery, 85% are successful and showed excellent results (Alan Melvin, 2002). Ankle sprain is very common in sports and normal activities like work. It is the damage of the soft tissues around the ankle especially ligaments which can be torn or partially torn. It is also known as rolled ankle, ankle sprain or ankle ligament injury. It happens when there are abnormal motions like sporting activities, stepping on uneven surfaces, from a jump, falling, running, etc. It can include effects such as pain, swelling, and inability to walk. It can be prevented by wearing good shoes, focusing on the way we walk and run and paying attention to both internal and external warnings (Icon Health Publications 2002). Ankle sprain can be classified in three grades depending on the force involved in causing it. In grade 1, it is a slight stretching which causes damage to the fibers and there is minimal swelling, joint stiffness, and mild pain which can be treated through isometric exercises and weight bearing. In grade 2, there is moderate tenderness, minor bruises, difficulty walking and possible instability which can be treated through therapy (physical). In grade 3, there is instability, ligament rapture, severe swelling and pain and can be treated through long physical therapy, surgery, reconstruction (Alan Melvin, 2002). It consists of inversion which occurs when there is too much inversion of the foot. It is rated to be 90% of all the sprains that happen and the most involved ligament is the anterior talofibular. Pain is more concentrated on the outside than inside of the ankle joint. The second type of sprain is eversion where the foot is twisted outwards hence the deltoid ligament is stretched too far. It causes pain inside the ankle. High ankle sprains an injury of ligaments like tibia and fibula. It occurs due to forced and sudden twisting of the foot (Icon Health Publications 2002). Ankle sprains are associated with sports like soccer, football, volleyball and sprint racing. They both do vigorous exercises involving the ankles and sometimes jumping like in volleyball and basketball. In soccer, there is a chance that at least a player must suffer an injury especially, ankle sprain. According to FIFA ratings (2005-2010), the risk rate is 10% in soccer for an ankle sprain. The rate is not verifiable due to victims in different games; sometimes, 3 players suffer in a game while in other games none suffers. Actually, determining the risk rate at which people suffer may be difficult due to intervals, the severity and there causes. Many players have undergone surgery and others have had to take rest due to the sprains. The conservative measure is most used as players get injured, treated in the field and either get substituted or resume their positions (Alan Melvin, 2002). Some of symptoms of this injury are pain caused by sensitivity of the nerves and severe tenderness. There is warmth caused by increased blood flow and little ability or difficulty in moving the injured leg. Severe bruising and swelling can also be experienced and can be diagnosed through physical exam and x-ray. Physical exam shows laxity of the joint while x-ray shows instability. It can be confused for an ankle fracture which is caused by the same mechanisms. Mostly, in children, growth plates are mistaken for sprains. Over time, ligaments that get damaged as a result of injury heal. This can only be possible to the minor injuries hence whenever there are cases of serious injuries; you should consult the doctor for diagnosis. He/she is to tell on the mode of treatment depending on the examination. Use of physical examination may be painful due to different twists in order to know the state of the ankle. A magnetic resonance imaging can be done to determine the severity of ligament injury, bone chip, fracture, joint surface injury or any other problem. It gives a correct diagnosis and can be done immediately at the point of injury or after swelling and bruising resolves (Icon Health Publications 2002). The recovery is through treatment which aims at minimizing swelling, pain and inflammation while enabling recovery. Use of nonsurgical methods or conservative measures is advisable. If the injury was a grade 1, use of PRICE (takes between 48- 72 hours) is applicable which means Protect, Rest, Ice, Compression and Elevation. Protection is from any more danger or further injury. Rest means not involving the injured ankle in strenuous activities hence one can use crutches incase of making any movement. The recommended rest is between 48-72 hours. Ice, although it can damage the skin if applied for long, helps in decreasing the blood flow to the damaged ligament. It is applied immediately or soonest possible after an injury for 20-30 minutes. It should be wrapped in a plastic bag, before pressing it on the skin else it will cause ice-burn and should not be left on while asleep. The time should not be less than 10 minutes because it will have no effect and not more than 30 minutes because it will damage the skin. Compression is with a bandage to limit swelling and should not be too tight to stop flow of blood. It should not be left on during sleep and should be removed as advised to allow free movement of the joint. Elevation is placing the injured leg at a strategic position, e.g. on cushions while lying on a sofa or on pillow while sleeping on bed to limit and reduce swelling and help recovery (Alan Melvin, 2002). It is also advisable to avoid HARM (takes 72 hours), meaning Heat, Alcohol, Running and Massage. Heat speeds blood flow hence should be avoided as long as there is inflammation after which, it can be used for soothing. Alcohol decreases healing and cause increased bleeding. Running can cause more harm to the injury while massage may increase bleeding. Gentle massage after 72 hours is recommended while running is only advisable after full recovery to strengthen the joint (Icon Health Publications 2002). Doctors also advise on constant gentle movement of the joint by doing exercises every day which help it to regain its normal functions and prevent stiffness. Secondly, physiotherapy helps to improve proprioception which is the ability if the brain in connection to movement and position. In our normal activities, the ankle should be supported with a rigid sort with to help in healing of the damaged ankle. Finally, doctors warn against getting involved in vigorous exercises but encourage on allowing movement of ankle to a certain degree. It gives support to the joint (Icon Health Publications 2002). All of the above can be done even without the help of a doctor but it is always advisable to see one incase the pain is so severe that it restricts movement, a ligament ruptured or on suspicion of a bone breakage. Also, if swelling and symptoms do not settle because in most cases, they take short time to ease and if there were severe bruises suffered. With assess of the doctor and use of x-ray, he /she can recommend the nonsurgical methods of treatment or surgical (Hammer, 2007). Mostly, medicine may not be needed if pain can be tolerated but sometimes, nonsteroidal anti- inflammatory drugs may be used to control inflammation and pain. Some of the pain killers include: Paracetamol and codeine, anti- inflammatory painkillers. Paracetamol is used to relieve pain but incase it does not help, codeine is used which is stronger and can cause drowsiness and constipation. Anti-inflammatory include aspirin and ibuprofen which relieve pain and limit inflammation. Others are rub on which are similar to the tablets. Anti-inflammatory are not very advisable because they have severe side effects especially to people with high blood pressure, kidney failure, heart attack and asthma. We need to consult our doctors or pharmacists before taking these medicines (Alan Melvin, 2002). There are arguments that some inflammation necessitates healing. This is the reason why many doctors do not recommend use of anti-inflammatory painkillers within the first 48 hours of injury, they delay healing. It may only be theoretical because no one has proven this point. Only arguments and contradictions arise hence research is needed to prove it. Rehabilitation helps to decrease swelling and pain and ensure that joint problems do not lead to chronic pain. To help pain and swelling, you can use ultrasound and electrical stimulation. It starts with simple exercises then extremity when and other exercises are added when you are pain free. It aims at improved balance thus proprioception training is important and increase in strength and range of motion. The recovery depends on three phases: Phase 1- resting reducing swelling. Phase2 à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ restoring strength, flexibility and range of motion. Phase 3- doing the less simple activities followed by vigorous and sudden activities. In time course, 1-4 weeks is based on stabilized walking, 4-8 weeks, immobilization of ankles, 8-12 weeks, embrace of high level activities and 12 weeks onward, performance without external mobilization (Lewin, 2008). Wearing of good costume for the purpose like boots during across country hike or when walking on uneven grounds or when rambling mountains would prevent or reduce ankle sprains. This is because they give support to the ankle as compared to other shoes. By visiting a physiotherapist, he/she can advise on the exercises to do so as to build muscles in order to prevent sprains. If it involved surgery, it should be resistant to nonsurgical. Surgical options include arthroscopy where the surgeon tries to figure whether there is any loose cartilage, ligament caught in the joint. The second option is reconstruction where the surgeon by use of stitches and other ligaments to repair the torn ones (Alan Melvin, 2002). Care should be taken on the way we treat or attend to an ankle sprain. This is because even a minor injury can turn chronic if not well dealt with. Most of the treatments of this injury are just conservative than medicinal. We should always seek doctorà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s diagnosis before taking painkillers. We can suffer injuries anytime any place thus we should always try and prevent it if possible and if it happens, we seek for the right recovery and rehabilitation.

Monday, August 5, 2019

Network Security and Vulnerability Threat Table

Network Security and Vulnerability Threat Table LAN Security Is the local area network that access control using the private VLANs and its a networking device within a small geographical area. They are not safe and secure compared to other networks because its easy to access the WLAN security compared to others its more of convenience over security thus it will help business and IT organizations to improve on their network by providing suitable choices for WLAN security for organizations to have a safe WLAN in their working place they must have procedures that outlines forms of double connections that are allowed in the work place for security purposes, also to consider security and its impacts to other networks for instance theWLAN ,to have client devices and APs,also to perform attack and vulnerability monitoring respectively to support this type of network and lastly to carry out a regular assessment about WLAN security in the organization. The wireless system helps devices to connect to the computer minus them being connected to the network,WLAN consists of client devices for examples the laptops and the access points(APs),the APs connect client devices with distributing system(DS) and DS its the only way by which client devices can pass information or communicate with LAN and other networks. Also we have wireless switches that help the WLAN is administrators to manage it. WLAN Architecture It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture, and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming; a microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect Threats of WLAN The following explains the security threats of WLAN that are likely to happen: eavesdropping, spoofing and denial of service A) Eavesdropping Involves attack against the confidentiality of data that is transmitted across the network, eavesdropping is a big threat because the attacker can intercept the transmission over air from a distance that is away from the organization B) Spoofing It is where the attacker could gain access to data and resources in the network by assuming the identity of a valid user this is because some networks do not authenticate the source address thus the attackers may spoof MAC addresses and hijack sessions. C) Denial of service This is where the intruder floods the network with either genuine or fake information affecting the availability of the network resources, WLAN are very vulnerable against denial service attacks due to the nature of the radio transmission. LAN Security Is a wireless networking device within a small locality that access control using the private VLANs. Identity management Is the system discipline whereby the right people access the right and valid information at the right moments and for good particular reasons. Physical security Its the protection of the hardware, software, networks, and data from actions that could cause loss or damage to an organization for instance theft. Personal security Availability Is the quality or state of information or data of being available and easily accessed. Privacy Is the state of a person to seclude himself or herself, or information about him or her, so its the procreation of information or confidentiality of data. Cyberattactks in tabular format Type of attack Effect Malware Its a computer code that a malicious function, used to destroy   or steal private data in a computer. Password attacks They attack on cracking a person or user is password so that the attacker may obtain access to a secured system. Denial of service Focuses on the interruption of a network service when an attacker sends volumes of traffic to the network that is targeted. The following will be employed to mitigate the above types of attacks on the computer: Threat intelligence reports, are documents that describe types of system and information that is on mission or the one being targeted and information important to the organization. We have security alerts that are notifications about the current vulnerabilities and some security concerns. Tool configuration is the recommendations for mechanisms that support the exchange, analyzing, and the use of threat information. Indicators can also be used, they suggest or tell that an attack is imminent or its underway for instance we have the IP. Plan of protections openStego-its a free steganography that has the following functions: Data hiding where it can hide data within a cover file watermarking files with an invisible signature. Quickstego -helps someone to hide text in pictures so that its only users of quickstego who can be able to retrieve and go through those messages. Oursecret -enables the user to hide text files for instance images and videos thus suitable for sending confidential information. Veracrypt -it adds enhanced security to the algorithms used for system and partions encryption making it immune to new developments in brite-force attacks. Axcrypt -it integrates seamlessly with windows to compress, encrypt, decrypt, store, send, and work with individual files. GPG-it enables to encrypt and sign data, communication, as well as access modules for all public directories. Cryptographic mechanisms to organization Cryptographic is writing is in secret code within the context of any application and these are the requirements for it; Authentication, privacy, intergrity, and non-repudiation They include:schannel CNG provider model,ECC cipher suites,AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. Risks associated with these are that they make the problem of general key recovery difficult and expensive and too insecure and expensive for many applications and users as large. File encryption tools Veracrypt, axcyrpt, Bitlocker, GNU Privacy Guard and 7-zip File encryption method We have the following methods; exceptions, syntax, remarks and security Results of the encryption files They provide an overview and pointers to resources on EFS They also point to the implementation strategies and best practices Encryption technologies Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text block coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Description security architecture of the organization It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming a   microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect. the cryptographic means of protecting the assets of the organization Cryptographic is writing is writing in secret code within the context of any application and these are the requirements for it; Authentication,privacy,intergrity and non-repudiation They include: schannel CNG provider model, ECC cipher suites, AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial. important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. the types of known attacks against those types of protections Password attacks-its a third party who tries to get access of information by cracking the password. Malware-codes with malicious intent to steal data or destruction of the computer system. DOS attacks-it majors on or targeting disruption of the network and can be prevented by keeping the system secure. Strong passwords are the only way against this attack. Malware should be avoided by doing away with links to unknown users. How to ward off the attacks Malware-avoid clicking and downloading attachments from unknown users. Phishing-through verification of any requests from organization via email over the business phone. Passwords attacks-use of strong passwords DOS attacks-the system of the organization to be kept secure with software updates. Encryption Technologies Data Hiding Technologies and Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text blocks coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image, or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Network security vulnerability and threat table above Common Access Card Deployment Strategy How identity management can be part of security program and CAC deployment plan Identity management involves telling what the user can do to certain devices at a given time. Identity management can be part of the program because of its reasons well known for instance: increasing security, also production while decreasing the cost and effort. The program tools of identity management need to run as application towards a server because it defines the type of user and devices allowed to work on a certain network this for it to be part of the program, must depend on alerts, reports, policy definition and alarms Thus offering directory integration and connection of the wireless and non wireless users and meeting almost the operational and security requirements. Deployment plan of the common access control Can come for different reasons so as to deploy and enforce the authorization policy for instance: The organization -wide authorization policy   that is driven from compliance level of organizational requirement.also departmental authorization policy where they have some special data handling the requirements that would be passed to various department. Then the specific data management relating to compliance and targeting at the   protection of the right access of information. Email Security Strategy Types of public-private key pairing Public keys may be disseminated widely but private are only known to user owner. This makes two functions-the authentication when public key is used to verify or show a private user sent a message and encryption where the holder of the private key can decrypt the message. Authentication-is when the public key is used to verify that a holder of the paired private key sent the message. Non-repudiation-its an attribute of communication that seeks to prevent the occurrence of the untrue or false denial of involvement by either party because it provides the originator of data with credible evidence showing information was received as it was addressed. Hashing -its used to index and retrieve items in database because it is faster to find an item through the use of shorter hashed key thus hashing being the transformation of a string of characters into a shorter fixed length than the original size. This added security benefit will ensure integrity of messaging by: Speeding being high   this is when the number of entries is large because maximum number of entries can be predicted in advance so that the bucket array can be allocated once also one may reduce the average lookup cost by a careful choice of the hash function and even the internal data   of structures. Pretty Good Policy-its a program that is used to encrypt and decrypt email over the internet as well as to authenticate digital messages with signatures the stored files that are already encrypted. GNU privacy Guard-its an encryption software program since it uses the combination of conventional symmetric-key cryptography for speed. Public key infrastructure -its a cryptography key that enables the distribution and the identification of the public encryption keys thus enabling the devices to exchange data securely over various networks. Digital signature -its an electronic signature that can be used to authenticate the identity of the person sending the message. Mobile device encryption-they help mitigate security risks whereby data must be encrypted while it is in transit and when in storage. How to use smartcard readers tied to computer systems Smartcard are the credit-sized plastic cards that do contain the circuit card that are integrated they can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks. Complexibility of cost and technical of email encryption strategic to security benefits The following elements must be considered: The basics because encryption is a process that is based on the cipher that makes or ensures information is hidden.Aslo choosing what to encrypt because it will be part of the risk management and the planning process of data governance. The three states of data in order for data to be secure from data in motion to data at rest and last data in use. Recommendation Smart card can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks A deployment plan   its a step to step on what need to happen in the last stage in the email security strategy, for a deployment plan to be effective the following must be put into consideration: Layered application that deals with the design management dependencies  Ã‚   between components also the people who structure application layers should not be same again to structure the hardware infrastructure. Reference Atul.kahate, cryptography, and Network security Tata mc Graw.Hill Publishing Company Limited, 2003 E .kranakis primarily and cryptography, Wiley, 1986

Sunday, August 4, 2019

The Importance of Books in Fahrenheit 451 By Ray Bradbury :: essays research papers

One of the themes which happens to be the biggest one is burning books because they conflict with each other and the ideas of society. The firemen don't fight fires, they start them when they find books. Recollections and thoughts, writings and teachings from the greatest minds in history go up in flames because the government doesn't want people to fill their heads with it and develop an individual intelligence. The government is afraid of the books because they stimulate people's minds to think for themselves and away from the main track that the general public was expected to follow. The government covered up the problems of the world that still wore on, like war, and didn't let the people see it or have it affect them. They heard about it and that was all. In general, people's lives became better, but it was of no consequence because they didn't know what it was like to have things not go well and as planned. A candy cane is much sweeter after you think about eating oil. Another reason they burn books is because they don't agree and they aren't real. The government figures that there is no use in people thinking about things that don't exist, especially when each book's ideas conflict. I think that conflicting ideas helps us think for ourselves because we are forced to make decisions. Making a decision is a lot better when you have more food for thought to work with. Also, it would be boring not to have conflicting ideas. So many things that we value and we can be proud of in terms of the accomplishments of the human race went up in flames in the book. Everything from Socrates, Newton, the Bible, Thoreau, Hans Christian Anderson and Shakespeare was wiped out because they didn't go together fluently with

Saturday, August 3, 2019

Affirmative Action Essay -- Affirmative Action

Affirmative Action Affirmative action is a deliberate effort to provide full and equal opportunities in employment, education, and other areas for women, minorities, and individuals belonging to other traditionally disadvantaged groups. As an issue of today's society, affirmative action requires corporations, universities and other organizations to establish programs designed to ensure that all applicants are treated fairly. It also places a burden of proof on the providers of opportunities; to some degree, the providers must be able to demonstrate that their granting of opportunities to white males is not discriminatory. The policy mentioned above was first brought before the Supreme Court in 1978 in the case of University of California v. Bakke. Alan Bakke, a white man, had been denied twice to admission to a University of California medical school. It was even shown that his admission test scores were higher than several minority group students who had been accepted. Bakke sued on the basis of discrimination against white males and claimed that the school had a quota. The Supreme Court ruled in favor of Bakke, but stated that the it was not a violation of affirmative action per se. The Court said that only rigid racial quotas were an impermissible form of affirmative action in determining medical school admissions. The Bakke case was followed by two rulings in favor of affirmative action programs, one of which, Fullilove v. Klutnick, upheld a quota system that required ten percent of federal public works funds to be set aside for minority-owned firms. The view of the Supreme Court was narrowed in the 1980s when new, more conservative justices were appointed. The Court held that preferred tre... ...ica=s ideals on its side, and no resort to logic can persuade either side that the opposing viewpoint should prevail. Affirmative action relates directly to the individual verses society humanity-based theme. For example, the women and minority groups fighting for individual freedoms in the general society. Many individuals have worked and still work for their specific rights and freedoms to be granted. It takes the initiative of individuals to make a difference in the society. Works Cited 1. Hill, John. "Affirmative Action: Roots to Success." http://www.afronet.com/WB/031597-2.html (2 April 1998) 2. Legislative Analyst. "Analysis of Proposition 209." http://Vote96.ss.ca.gov./Vote96/html/BP/209analysis.htm (2 April 1998) 3. "Proposition 209: Text of Proposed Law." http://Vote96.ss.ca.gov/Vote96/html/BP/209text.htm

Friday, August 2, 2019

Zerg vs. Protoss :: essays research papers

Zerg V. Protoss   Ã‚  Ã‚  Ã‚  Ã‚  On planet Char, controlled by the mind controlling warp weapon, the Zergs, a fierce alien race, were at war with the Terren, a human like race. The Zerg were being pushed off their own planet. So Kerrigan, the leader of Zerg, devised a brilliant plan. She was going to genetically engineer a new breed to help destroy the Terren. They would combine part of them and the Terran to create the Protoss, a new alien race. Their plan is a success and their Protoss is powerful enough to push back the Terren. When Terren hears of the new breed, Protoss, they quickly challenges the Zergs to a battle in order to win over the Protoss. During the battle of Gloopinbopper, Zerg pushes on, with the help of the new creation Protoss. After days of battling and heavy losses they easily overruns the Terren and out numbers them ninety-eight thousand seven hundred and thirty four to thirty-seven thousand four hundred and fifty two. The Zerg’s final push to reconquer their home planet and retake the mind controlling warp weapon is once again a success. After the long and strenuous battle the Protoss begin to realize the sheer strength they possess within themselves. They decide that they are tired of being treated as pure slaves and begin to devise a plan to overthrow the Zergs and take over of the mind controlling warp weapon. After months of planning they finally have a devious idea on how to take over. But w hile still in the planning stages the Zerg realizes what they are planning and attack. The Protoss are caught off guard and have no choice but to retreat to the deserted planet of Pigglywigglywump. The Terren hear of what is going on between the Protoss and the Zerg. So they decide to use what little troops they have left to try to take over the weak Zerg and buy the Protoss time. With the time the Protoss gain they build a crystal powered mega bomb that is capable of destroying anything and everything around it, with the exception of the Protoss. In the meantime the Zerg have destroyed the Terran and are planning to continue their attack on the Protoss.

Thursday, August 1, 2019

College Athletes Should Be Paid Essay

Tyus Jones was a basketball player at the University of Minnesota who was extremely talented on and off the court. In just his freshman year he won The University Of Minnesota their first national championship in 94 long years. Despite of Tyus’s on court abilities even with a full ride college scholarship Tyus was not able to afford the basic college life needs. To help out with the expenses Tyus got a job at the nearby Burger King, but after two short weeks he was forced to quit because it was impossible to manage school,basketball, and work. Tyus then realized he would have to get some form of help from the school to help him manage his spending. It should be required for all colleges to pay all their Division I athletes enough money for them to support themselves during the season. Tyus was lucky, he was very talented on the court which gave him some legal extra benefits, but some players are not that lucky. Some players have no options but to accept illegal benefits and can be suspended or even fined. Most athletes are so busy with school and their sport that they are not able to work on the side to earn money. Also college are paid millions and millions of dollars by large network companies like Nbc, Fox, and even Espn when the main reason their college is in the spotlight is because of these talented players who get nothing for making everything happen.