Thursday, October 31, 2019
IBMs Use of Information Management Concepts Essay - 2
IBMs Use of Information Management Concepts - Essay Example The executive leadership comprises a board of directors. The key person is Virginia Rometty, the chairman, president and the CEO. Other key people in leadership include senior vice presidents in various departments including sales and distribution, marketing a and communication, human resources, General counsel and regulatory affairs, transformation and operations, Global technology services as well as research and solutions portfolio (McKnight, 2013). The practical use of key information management concepts that include: information systems guidelines, assessment, vision, the planning team and the strategic information systems planning process, strategic plan and initiative is essential in achieving the organization's goals and objectives (McKnight, 2013). According to reports on IBM performance, effective use of information systems requires the understanding of the management, organization and technology that shapes the systems Alignment of information systems is effective in the development and maintenance of information systems which supports business operations. This is essential for the improved performance of a business. The IBM performance is an evidence of its strategic position and capabilities, disciplined management systems and dedication of the IBM expertise. Embedded in every aspect of an organization, information management concepts play a critical role in initiatives of governance. Data in an organization is the greatest risk and value source. Poor management of data leads to poor decisions and business results. The ability to leverage trusted, clean data can aid organizations in the provision of better service which is driven by customer loyalty and spending of less effort in complying with regulatory policies. The effective leveraging of information, therefore, increases innovation through optimizing processes and people via creative utilization of information. Considering the ability for enhancing the availability, integrity and quality of data, effective governance aids mitigate risk and increasing the value of risks (McKnight, 2013).Ã Ã
Tuesday, October 29, 2019
OPINION LETTER Essay Example | Topics and Well Written Essays - 750 words
OPINION LETTER - Essay Example Employers respond to the employees postings on Facebook with the threat of work termination but they have to evaluate whether they are breaking the law or not by firing a worker because of the utilization of social media. In response, worker who have been fired because of the use of social media have filed complaints with the NLRB arguing that they have been relieved of their jobs due to the utilization of social media especially Facebook. Other workers argue that the organizations have put in place policies that aim to frustrate their personal freedom of expression. The report from NLRB reveals that majority of Facebook users do not consider possible outcomes before they make any inflammatory posting on the site and their remarks about a certain attract much attention than they had expected. Employers on their part are firing workers who post inflammatory statements on Facebook on grounds that they are tarnishing the firmââ¬â¢s name with their irrational remarks or in simple manner, acting unprofessionally on social media sites. However, what they fail to understand is that employees or workers ramblings might be guarded by labor policies. A good case study about Facebook firings is the case concerning the medical technician. Souza Dawnmarie remarked on Facebook in 2010 how she liked how the firm permits a 17 to become a manager. In this case, she was referring to her employer at the head office in Hartford. The company (AMR) though the use of number 17 meant psychiatric patients. The case was in December 2009. The case was Souza v AMR firm. Despite the fact that Souza commented from the confines of her individual computer during after work hours, she was later fired for allegedly making inflammatory remarks about the companyââ¬â¢s boss. She filed the case to NLRB and in February 2011, informed AMR firm that its laws hindering workers from making negative remarks on social
Sunday, October 27, 2019
Global Threat Cyberterrorism
Global Threat Cyberterrorism By inner government policy writers, analysts, and the public. The social and global tactics that terrorist cells use, the countries that support terrorist groups, and the policies and procedures that have been used to counter terrorist actions by the target countries are all becoming unmanageable, billions are being spent in security measures but the whole concept is untraceable and can easily change, it is essential to keep the publics confidence. The information age or the technological era is magnificently shaping the way in which terrorists operate; new technologies mean newer weapons with more destructive powers, more ways to cause death and damage. Not only the types of weapons and targets the terrorists select, but also the ways in which terrorist cells have cemented their internal structure and the operation of their organisations (Zanini and Edwards, 2001, p. 30). According to Zanini and Edwards, terrorist organizations are using information technologies, such as computers, telecommunication devices, software, and the Internet to organize and coordinate activities (2001, p. 30). Criminality and Cybercrimes are now continually originating from new technologies, such as the Internet, wireless communications, military sciences this all in all creates many challenges for law enforcement around the world (Sussmann 2000). Responding to Cyberterrorism and investigating computer-related crimes pose challenges for law enforcement, as well as the legal system. There are many loopholes with the justice system that enables those with malicious intent to evade capture. The internet can be of so much use to terrorists, first of all, the communication that can be done over the internet is endless and alot more harder to trace then conventional ways of communication. Electronic mail has become one of the cheapest, quickest and anonymous as well as effective ways of communication today, to communicate with any part of the world. So overall the terrorists of this world are able to use the internet as a platform to communicate and swap information and messages to further their cause. General information on targets like maps and instructions are widely available, terrorist organisations can make their own WebPages to promote their ideologies, distribute propaganda and recruit sponsors or supporters. As being a platform for propaganda they are able to reach the public directly and make their existence known in international circles. Terrorists can also obtain funds through the internet, using services such as PayPal and western union; people can deposit monies anonymously so it is perfect for terrorist organisations to operate. In recent times after atrocities such as September 11th and Afghanistan you have often seen terrorists put up film footage on the internet to promote their groups, when terrorist cells kidnap any westerners, they will publicise their crimes by recording beheadings and playing them live on news sites for the world to see. According to news reporters from NBC who have been abducted previously by Al-Qaeda, claim that within their fortress of caves they have large banks of computer servers, communications devices and mass storage data discs. Hamas are another group that use advanced technology for their cause; they reportedly use 128 256 bit encryption for their files and communications. The more a country is technologically advanced, the more vulnerable it is to attack against its infrastructure, at the last count the number of computers that the USA have installed is just over 180 million, at least 5 times the number that of Japan, seven times as much as in Germany and twice as many as all of Europe combined. US computers account for 42% of the worlds computing power, whilst China represents only a meagre 1% and Russia 8%. The objective of this paper is to provide a general overview of the research; First of all, we look at the critical concepts of this research. These concepts are terrorism, cybercrime, information warfare, and Cyberterrorism. Definition of the Concepts Terrorism Defining the word terrorism itself constitutes problems. The problems that occur when Defining terrorism is the difficulty to have an agreed upon definition of terrorism. In other Words, there is no consensus in the international arena as to what terrorism comprises. No statement has been made to clarify the concepts under which the terrorism heading falls into. The problem emerges from the fact that terrorism is solely a political issue which means A terrorist for one country could be a freedom fighter for another. Furthermore, as Laqueur claimed in 1977 ââ¬Å"It can be predicted with confidence that disputes about a comprehensive, Detailed definition of terrorism will continue for a long time, that they will not result In consensus and that they will make no noticeable contribution to the understanding of terrorism. ââ¬Å" While the statement seems to be vague in character, the true statement of terrorism is in fact much closer to the truth then imagined. Of course the Human Rights Act and other international agreements set the scene for the standards in terms of human rights; but the non existence of procedures for the use of responding to terrorism creates confusing, irregularity and severe turmoil. On top of this, any such effort that is taken by a country which is targeted by cyber terrorists may not have a desired effect since other countries may not consider that group as a terrorist organisation. In terms of legal stature, by not having any by laws as to what Terrorism constitutes, while country 1 may deem a specific act as terrorism, country 2 may judge the action to be a meaningless computer mistake. Enders and Sandler define terrorism as ââ¬Å"the premeditated use or threatened use -of extra-normal violence or force to gain political objectives through intimidation or fearâ⬠(1993, p. 829). The US Department of State defines terrorism as ââ¬Å"premeditated, politically motivated violence perpetrated against non-combatant targets by sub-national Groups or clandestine agents usually intended to influence an audienceâ⬠(1999). Classes of Information warfare Many authors have written substantial articles on the subject of Cyberterrorism and such activities, the subject itself is deemed to a very grey area with mostly myths and hear say, obviously hackers do exist and they can cause serious and malicious damage to an infrastructure but not all are convinced of their overall threat, many authors publish hard hitting texts to drive the point home that our world is at risk from this ruthless wave of technological storming.In his book, Chaos on the Electronic Superhighway: Information Warfare, Winn Schwartua, talks about the concept of information warfare in comparison to everything around us including politics, economy, power, fear, survival and harmony. He has even led claims that information warfare and information age weaponry will replace bombs and bullets, which are not restricted to the governments of superpowers (Schwartua 1996, p. 16). Schwartua also proposes the classification of information warfare. According to him there are three types of information warfare: Class 1: Personal Information Warfare. This includes attacks against an individuals privacy. Cyber attacks on the personal computer or wireless devices or use of private information about an individual are possible examples of personal information warfare. Class 2: Corporate Information Warfare. This classification involves large corporate companies of magnitude and focuses on the issues of competition between companies, industrial espionage, misinformation, sponsors, shareholders etc Class 3: Global Information Warfare. This type of warfare is ââ¬Å"waged against industriesâ⬠(p. 195). This level of warfare is waged by the most elite individuals through Internet and other computer network systems according to Schwartau (1996). According to Monge and Fulk (1999), the use of new age computing advancement and various wireless communication devices has led to the establishment of networks in three ways: Firstly, the new technologies have enabled terrorist cells to reduce the transmission time of their encrypted messages so that members of the organization can communicate faster. Secondly, new technologies also reduced communication expenses. Obviously before the internet, as the same with all of mankind, sensitive communication was done by either word of mouth or by coded messages. Not only have new advancements in technology visibly reduced the length of transmission time and considerable expense, but have also significantly increased the scope and complexity of the information due to the combined technologies. Terrorist organisations have now gained their own independence, whereas a time once existed where terrorist and fundamentalist groups were once linked with governments due to lack of financing now have the platform to better finance themselves due to the broader scope of the internet. Zanini and Edwards compare the Palestine Liberation Organization (PLO), who are considered to be more politically and hierarchical in contrast to the Palestinian Islamic Jihad (PIJ) and al-Qaeda, these are considered to be more recent forming and less hierarchical groups more intent on bloodshed then political uprising. Dispersed groups find that the advantages of the new technologies eliminate normal problems gained through distance. In particular, using the World Wide Web for communication amongst the cells can not only increase the flexibility of peoples time. In fact, these technologies may enable terrorists to operate from nearly any country in the world (Zanini and Edwards, 2001, p. 38). We are seeing that terrorists gain momentous advantage from new technologies and that the world cannot prevent much, due to the general era that we are in, everyone has access to anything as long as funds are available. The internet provides the best and most effective communication dial-ups between the terrorist organization and its members. Weimann identifies eight different ways that terrorists use the Internet: Psychological Warfare, Publicity and Propaganda, Data Mining, Fundraising, Recruitment and Mobilization, Networking, Sharing Information, Planning and Coordination (2004). Different terrorist organisations have different causes so the web sites they setup can act with a purpose of a communication channel between the various members of the organisation, the supporters and those anonymous sympathisers of the organization, Through this channel, terrorist groups can broadcast their harsh messages to the world stage and have regular updates to their recent campaigning and recent activities. They often use the Web site to justify their violent sadistic murders and killings. These Web sites are a platform to the whole world and can lead to recruitment of potential supporters, and target population or government entities (Weimann 2004). In addition to being a communication method between terrorists and the public, advanced tools, such as; Cryptography Steganography These types of advancements are used by terrorists to convey their messages to the world around them. Here we look at these two tools in more detail; Cryptography Bruce Schneier describes the act of Cryptography as ââ¬Å"the art and Science of securing messagesâ⬠(as cited in Taylor et al., 2004, p. 29). The method is a process of ââ¬Å"extreme strong encryptionâ⬠of the data transmitted between sources to a target. Even though this technology can be useful to those in the private and public sectors it can also be an explosive and damaging weapon to hide information from law enforcement agencies. (Slambrouck, 1998). Denning argues that the threat to law enforcement and government agencies is widespread; she explains four ways that the encrypted data presents danger: 1) It will hinder the intelligence community from getting foreign intelligence critical to national security (Denning, 1997). 2) The intelligence community will have hard time retrieving vital Information about any given investigation, 3) It may avoid the law enforcement from gathering evidence to convict offenders, 4) The law enforcement community may be unable to avoid attacks or any harm. (Denning 1997) Members of the group Al-Qaeda have been using the newly advanced computer technologies to communicate and relay information to sub-coordinates around the globe, it has been heard in social circles that Al-Qaeda love the internet as they are able to keep in real time with all information even though they are based within caves in mountainous regions. According to some research forensics evidence that was collected and compiled after the September 11th attacks shows that terrorist cells often used the internet for their vigorous planning before the attacks. Overall the internet is a source of great value to all those who use it whether it maybe for a student at university or a terrorist with plans to blow up an airliner, information is free and in abundance. Terrorists especially from the Arab continent frequently upload their propaganda and messages via news channels as it is the quickest way to get publicised. Most commonly used is the Jazeera TV network, an example of the use of news channels by terrorists is the final message sent to Mohammed Atta of Al Jazeera by the two senior members of Al- Qaeda 3 weeks before September 11th, 2001 attacks, what was sent was a simple code that showed the four targets the Twin Towers, the Pentagon and Capitol Hill which were referred to as facultiesâ⬠in the message. The communication said, The semester begins in three more weeks. Weve obtained nineteen confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts and the faculty of engineering.â⬠Many other political and terror organisations within Europe and America use an encryption program known as Pretty Good Privacy (PGP), an easily downloadable program that provides basic and stronger encryption to use within coded emails for intelligence sharing. Steganography Steganography is the art of hiding data within objects such as Documents, pictures etc files (Collin, 1997). It is a wide method used by many organisations as a simple way to hide information from those who do not have the clearance to view but it can also be severely exploited by terrorist organisations. This technology relies on ââ¬Å"security-by-obscurity,â⬠basically the person will know that a message is hidden within and once he accesses it he be able to read the hidden information behind the veil. From the exterior appearance, a picture would be entirely perceived as a normal picture, but an encrypted message can be extracted from that picture if the person knows where to look. Obviously there are some major drawbacks to technological advancements, computer memory is very hard to completely erase and often leave a trail for law enforcement agencies to use against criminals, For instance, in Turkey, towards the end of 2000, practically a thousand members of the radical group, Hezbollah, were arrested in a serious of raids and taken into custody, and allegedly about 20,000 pages of documents were recovered from computer archives (Aras Bacik, 2002). Fund Raising and Promotion In todays day and age, terrorists have so much available to them, websites are full of propaganda and due to the advancements in software language barriers are no problem to overcome (Weimann, 2004). The information that the terrorist Web sites usually give is usually about general history, their activities, their ideology and political statements, current news regarding their activities, as well as information about their targets, often they will also give out rogue information on targets which will get the security services into a twist, but this information is designed to mislead. The way in which the Internet is used to raise money by terrorist organisations is a good example as to how information technology can provide new ways to fund their operations. Cost of Cyberterrorism. Between 1993 and 1995, there were 40 threats made directly to banks in the US and Great Britain. It is reported that in January 1999, a investment bank paid roughly ten million pounds after receiving a threat against their computer systems, the hackers reportedly crashed a computer in order to show the seriousness of their intent, the bank gave in and paid them off, knowing that the authorities were helpless to act and if their systems did crash there would be alot more then 10 million pounds worth of losses. It is estimated that in United Kingdom, during the three years between 1993 and 1995, terrorists gained more than 400 million pounds (Statistics on Cyber-terrorism, 2000). The Security Industry Survey carried out in 1999 largely showed that the number of companies that were successfully penetrated went up from 12% in 1997 to 23% in 1998. Malicious code is used by hackers which attack systems is devastating as the code mutates and leaves systems vulnerable to attack. The most costly malicious code attacks were Low Bug in 2000 at $ 8.75 billion and Code Red at $ 2.62 billion (Wiederin, Hoefelmeyer, and Phillips, 2002) The consequences of cyber terrorist attacks are not as devastating as the physical terrorist attacks, at least until now. For example, cyberspace provides opportunities for e-bombs and cracking down a Web site but the ramifications of these acts seem less significant than the effect of a physical bomb killing hundreds of people in a matter of seconds, such as the bomb attack in Nairobi in 1998 and Oklahoma City in 1995. Regarding the potential attacks outlined by Collin, they would be difficult to execute, because of the human factor in these processes. For example, even if it is possible to hack an air traffic control station, there are pilots who have been trained to double-check unusual commands. Cybercrime Cybercrime can be looked on as computer-related activities which are illegal and or destructive, the sole object points at thievery, dishonest means of obtaining cash or leading others to stray by the attacking of infrastructure. Cybercrime can be conducted through global electronic networksâ⬠(Thomas and Loader, 2000, p. 3). Cybercrime can be defined as a crime committed in a cyber environment, including the Internet, computer networks, and wireless communication systems. In other words, cybercrime involves crime committed through use of the personal computer. Cybeterrorism is the word given to acts of malicious intent with the convergence of Cyberspace and Terrorism, networks, servers and computers alongside data storage are constantly at threat from unlawful attacks, for an attack to qualify under the Cyberterrorism heading it should result in violence against persons or property, at the minimum it shouild cause or generate fear. Acts upon infrastructure, economic loss, plane crashes and explosions are all forms of Cyberterrorism. Cyberterrorism and Cybercrime makes the job for law enforcement even harder ,law enforcement and policy makers already struggle under immense pressure to meet targets and maintain the peace proving a safe environment for the public. Due to the nature of cyber-criminals rerouting their trail through international countries, a response to such a malicious threat requires international cooperation involving participation of all concerned parties . However, society today is cased within the technological bubble, everything is controlled by computers and vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents major obstacles toward effective and immediate response to these threats. In all the sheer lack of global peacekeeping in terms of responding to cyberterrorism and cybercrime is the general problem. Pollitt (1997) defines Cyberterrorism as ââ¬Å"the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against non-combatant targets by sub-national groups or clandestine agents.â⬠Terrorists and cyber criminals will spend sometimes months to exploit vulnerabilities in a system, all the time remaining undetected and hitting key sectors including technical, legal, Political, and cultural, as well as defence. Such a broad range of vulnerabilities can be dealt with by Comprehensive cooperation which requires efforts both at the national and international level. Expert opinions suggest that cyberterrorism is split into three general classifications; Disruptive and destructive information attacks, Disruptive and destructive information attacks Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment and Propaganda Terrorist use for the Internet Terrorists use the internet for mainly communication, essentially covert operations and as a means for a new command and control infrastructure. Access to information via the Internet and the world wide net, as well as maps for target locations and applications that will help with encryptions and monitoring. Technical data is widely accessible on the net for weapons and bomb construction. Use of the internet as a platform for distributing propaganda on terrorist groups and causes, and related recruitment of individuals, Examples of Attacks In 1998, what was once known as the first attack by terrorists against a countries computer systems was when Tamil guerrillas jammed the servers located at all Sri Lankan Embassies with 800 emails a day over a 2 weeks period with messages such as ââ¬Å"We are the Internet Black Tigers and we are doing this to disrupt your communicationsâ⬠The statement couldnt have been more true, everything stops, whilst security specialists comb the networks using off the shelve virus removers and other software to get rid of the spam. During the Kosovo conflict in 1999, NATO computer systems were targeted in a huge blitz by several eastern European countries in a protest to object against the bombings. Businesses and public organisations with ties to NATO were targeted and considerable money was lost in the turmoil. More recently Estonia was hit by a spate of terror acts from Russia in what is deemed a Cyberterrorism act of vengeance for the movement of a Soviet-era war memorial commemorating an unknown Russian who died fighting the Nazis. Government websites that normally received 1000 hit a day were getting 2000 hits per second, causing the servers to crash and be shut down for hours, even days and weeks. The public just think that a few guys with nothing better to do sit on their pcs and create viruses and mess around, but there is no actual threat to physical life but this is a myth, the business world and people within are often exposed to grave harm. Another example showing the problems of hackers infiltrating web sites and Web site defacement was between attackers from Pakistan and India. At the time of much unrest between Indian and Pakistani soldiers in Kashmir in 1999, both countries computer geniuses also fought in the cyber world. Pakistans experts hacked the Indian Army Web site www.atmyinkashmir.org and left anti-Indian statements about the Kashmir issue. The Indian Government, in retaliation, cut off all network access to the Web site of the prominent Pakistani newspaper, Dawn (Varma, 1999). Processes of attack Different forms of attack are available to hackers and those who wish to deface or destroy data, they use malicious code attacks: ââ¬Å"Malware.â⬠The term malware represents the combination of ââ¬Å"maliciousâ⬠and ââ¬Å"softwareâ⬠(Furnell, 2000, p. 143). There are different types and processes of malware attacks. The common forms of malware attacks are viruses, worms, Trojan horses and software bombs. These are examined in detail in the following section. Internet worms or Viruses These viruses and worm programs are designed to imbed themselves within the codes of programs and lie dormant till the hacker requires them to destroy or shit down computers; they can hijack the computer and can copy and destroy email lists and address books. Communication devices such as mobiles and PDA are also hot items to target. Viruses: Brunnstein, Fischer-Hubner, and Swimmer define a virus as ââ¬Å"a non-autonomous set of routines that is capable of modifying programs or systems so that they contain executable copies of itselfâ⬠Furnell, 2000, p. 144). Viruses are malicious software that has the ability to replicate themselves, the virus will attach itself to other applications and software and slowly spread as infected files and disks are used by users. With every new host, the malicious virus inserts itself and executes its payload, they are often weird and strange warning messages or look like innocent files when clicked can wipe all the files from the hard drive (Taylor et al., 2004). A brilliant example of how a virus can be very expensive is the much publicised I LOVE YOU virus. ICSA, a computer security company estimated the cost of the I LOVE YOU virus to be up to 1$ billion (Miastkowski, 2000). Worms: Unlike Viruses, worms do not attach themselves to other software programs. They exist entirely as separate programs and they can spread themselves automatically (Stephenson, 2000, p. 37). Trojan Horse Trojan horses: Hackers and attackers will often use Trojan horses to gain access to important and highly sensitive data information, often a Trojan is used where access is restricted and the hacker is lucky enough to find a ââ¬ËBackdoor basically a loop within the code for access, for example, the targets password is captured by the dormant Trojan, it will replicate it, and forward it to the hacker. There are differences between viruses and Trojan horses, firstly the Trojan horses will not replicate or infect any other files on the hard disk. Secondly, the Trojan Horse can stand alone without any attachment to other applications and programs. And finally, the target source may not always be entirely aware of the fact that a maliciously intended Trojan horse was sent to him or her. Basically Trojan horses can be sent with under covert means where the intended target perceives it to be harmless, like an email attachment that looks conspicuous enough and looks safe enough. For example, the attacker may send a message that may be interpreted as friendly information for the receiver, such as a link to a competition etc Phlooding This is a new wave of attack used by hackers and fraudsters to simultaneously launch geographically distributed attacks that targets a businesss authentication or network log-in structure, with the goal of overloading its central authentication server, these attacks have originated from all across the globe, they bombard a wireless Access points (APs) with login requests using multiple password combinations which have the ability to severely slow down logins and critically interfere with broader network operations causing major security breaches. Security specialists reckon businesses with multiple office locations served by a single identity management server could be particularly vulnerable to Phlooding attacks. Malware Programmes such as the ââ¬ËTrojan Horse hides a malicious code within a document that will in turn collect usernames and passwords for email accounts amongst other information, These programs can download programmes without the user knowing and relay attacks against other computers remotely. An infected computer can be controlled by the attacker and directed to carry out functions normally available to the systems owner. Hacking Nowadays increasingly the method of attack most favoured is the art of hacking, to use the knowledge of codes and programming to access systems to find secrets. Government computers in Britain have a network intrusion detection system, which monitors traffic and alerts officials to misuse or anomalous behaviour. Botnets These are compromised networks that the attacker can exploit. Deliberate programming errors in the software can easily remain undetected, Attackers can exploit the errors to their advantage to take full control of the computer remotely. Botnet can be used to steal information from highly encrypted computers or to collect sensitive information such as credit card numbers by ââ¬Ësniffing or logging the keystrokes of the victims keyboard. Software Bombs This software acts like a bomb connected to a detonator, which may contain an execution of a program. The malicious code may be hidden in a program, and once the program is activated, malicious code becomes activated. For example, a sacked employee who feels dissatisfied with the employer who has access to internal software may upload and hide a software bomb in the companys payroll program. In 1992, an employee of the United Kingdoms Chilworth Communications was convicted of planting a logic bomb before his resignation in September 1990. The bomb was triggered in October 1990 and damaged important files that cost the company more than $50,000. (Larry Greenemeier, InformationWeek, June 12, 2006) Keystroke Loggers This is a device that can be fitted to the keyboard or an application that can be installed on the computer that automatically records every key that is typed on the keyboard, obviously all information such as passwords, email, basically anything that is typed on the keyboard will get logged and then accessed by the third party. Denial of service Attacks Overloading a computer system with data so that it can no longer function. This is the method allegedly used by the Russian hackers which targeted the Estonian government computers in May. Phishing and Spoofing This is a system of attack designed to trick an organisations computer user to reveal passwords and confidential data such as card details. Those that use this method impersonate a trusted source such as a bank or a well known service to persuade the victim to hand over the details in complete faith. IP spoofing: After overloading the system, an attacker can pretend to be an authorized system, while blocking the actual systems service. Since the flooded system cannot respond to the inquiries, the unauthorized system will receive all of the legitimate Computers packets (Stephenson, 2000, p. 46). Force Multiplier Effects Different types of Cyberterrorism may also be used to multiply Cyber-terrorists commit acts of terrorism simply for personal gain or sometimes out of boredom. A less known group known as Chaos Computer Club was discovered in 1997. They had created a simple Active X Control for the Internet that could trick the Quicken accounting program into removing money from a users bank account
Friday, October 25, 2019
Veronica - Why Doesnt Veronica Leave For The City? Essay -- essays res
The city is an elegant place to live. It calls to the people from the inferior village life. The well led life followed by the city people offers many opportunities compared to the hopelessness of village surroundings. It offers hope, the chance to be independent, the chance of a job. In the story Veronica by Adewale Maja-Pearce, Okekà © the ever lasting friend of Veronica is drawn by the attraction of the city for the opportunities he sees for himself. Veronica on the other hand does not desire to leave their decomposing village for the city. She decides this for a number of reasons. One of the reasons why Veronica decides not to go to the city is due to her lack of education. She feels that the city has nothing to offer her and her place is the village. She says, 'What will I do when I get there, I have no qualifications not even a standard six' She is aware that she needs qualifications to succeed in the city and without them, she sees no point in going. Another reason associated with this is to do with Veronica's expectations. If Veronica's expectations were not so low, she may have gone to the city with Okekà ©. Veronica says, 'They are my family that is enough' This line is an example of Veronica's low expectations. She feels her family is enough and she needs nothing else. Another example of Veronicas low expectations is when Okekà © comes back after ten years to find Veronica with a child a husband. Another example is, 'God has blessed us with a son. Is that not e...
Thursday, October 24, 2019
The Patient Education Plan Essay
Larry Garcia is a 45years old Hispanic male who was newly diagnosed with hypertension during a work-related physical exam. He has been married for eighteen years and has three children. He has been employed as a sales rep for ten years with the same company. His current position is a high pressured position, but he is performing very well at this present time. His is Catholic but only attends church on holidays. Larry likes to fish in his spare time. His mother has a history of high blood pressure but refuses to take her blood pressure medication, but otherwise she is well. His father has a history of CHF and impaired vision due to macular degeneration. He is an only child who supports his parents financially, assist with their shopping and transportation needs as well. Larry has an associateââ¬â¢s degree in business and wants to further his education, but he is unable to due to his labor and household responsibilities. Larry does state that ââ¬Å"I feel stressed sometimesâ⬠during the exam. He has never smoked and has an occasional drink of alcohol on the weekends. Larry has no known allergies and takes one multivitamin a day. Identified risk factors for hypertension on Larry Garcia Age: Larry is 45 years old; more men than women at age 45 have hypertension. Family: his mother has high blood pressure;his father has CHF. Heredity plays an important role in having essential hypertension. Sedentary lifestyle: Larry is 12 lbs. over his model weight and does not exercise on a regular basis. An inactive lifestyle escalates the risk for hypertension and other serious disorders. Race: Larry is Hispanic. Racial/ethnic disparities exist in blood pressure, awareness, treatment, and control, with Mexican-Americans having a lower awareness and treatment of hypertension, as well as less health-care coverage, compared with blacks and whites (CDC, 2013). Stress: Larry has increased stress from work and also in supporting the need of his parents Describing the disease process Blood pressure is determined by the amount of blood your heart pumps and the amount of resistance to blood flow in your arteries. The more blood your heart pumps and the narrower your arteries, the higher your blood pressureà (Mayo Clinic). High blood pressure is a known and unsafe chronic illness. Hypertension indicates that the pressure of the blood in your blood vessels is greater than it should be. Hypertension is having a blood pressure reading that is greater than 140 over 90 or higher on a consistent basis. If left untreated, having high blood pressure can become a front-runner to many problems such as a heart diseases, stroke, or renal failure. Many factors can contribute to high blood pressure such as the way you live, nutrition, heredities and some other unidentified origin. Helping to lower your blood pressure can assist in avoiding health disasters in the present and near future. Age, ethnic, cultural background, spiritual and developmental issues to the disease Men and women are equally likely to develop HBP during their lifetimes. However, before age 45, men are more likely to have HBP than women. After age 65, the condition is more likely to affect women than men (NIH, 2012). The increased stress from having made his quota at work as a sales representative along with the increased stress of having to support his parents can contribute to his high blood pressure as well. Mr. Garcia is twelve pounds over his ideal weight and does not exercise which is another major risk factor for hypertension. If he were to exercise that could aid in lowering his blood pressure as well. Being Catholic has no significance on high blood pressure. With his mother having a history of high blood pressure, this can genetically have an effect of his current condition. Effect on quality of life Hypertension is a progressive disease that may not have any signs or symptoms, so they patient may feel fine for a long period of time. On the other hand, high blood pressure can change a personââ¬â¢s quality of life for the worse. Heart failure can occur which cause the heart to become larger and weaker over time. Aneurysms can occur as well in major blood vessels which can transport blood away from the heart. Blood vessels in the kidneys can become narrowed which can cause kidney failure. The kidney failure can be acute or chronic, but this can have the patient needing a kidney transplant or end up needing dialysis. Vision can become impaired and blood vessels in the eyes can rupture or bleed due to the increased pressure inà the artery. All of these can affect the quality of life and can change a personââ¬â¢s entire life-style. Educational needs of the patient and how it can be met Larry needs a lot of education on his newly diagnosed chronic disease. Larry needs to be educated about the potential risk factors and complications related to hypertension. The nurse can provide information on hypertension, the causes, risk factors and the lifestyle changes that can help in the control of high blood pressure. The nurse can educate Larry on the need for regular check-ups with his primary care physician. Larryââ¬â¢s last eye exam was eight years ago and he has never had a colonoscopy. Also, his family history of some chronic illnesses such as hypertension, CHF, and macular degeneration should aid in making this discussion be of importance to focus on. Stress management is an educational need as well. The nurse can educate Larry on the significance of decreasing the stress in his life and providing stress relieving technique and support groups. High blood pressure involves long term management and control which can involve life-style and medication adjustments. Larry needs to learn how to monitor and record his blood pressure accurately. He needs to become aware of when to take his medications and what signs to become of aware to notify his physician. Providing information on the medication, side effect and resources to aid in purchasing the medication is of importance as well. He also needs to make a nutritional adjustment which should include a low fat, low to no salt, low cholesterol, low calorie diet. An exercise program needs to be introduced as well to help him maintain his ideal weight and lose the extra pounds he may be carrying around. Patientââ¬â¢s Perceived Challenges Larry has a lot of challenges that he faces due to controlling his high blood pressure. The stress of his position at work along with supporting his parents has been an added stressor in his life. Larry is going to have to find a way to decrease the stress in both of these situations. Decreasing his work load by delegating more responsibilities to others can be of some much needed relief. He has to support his parents financially along with financially supporting his household can be a major challenge. Larry has two teenagers at home that he has to assist in leading and guiding in the right direction. The patient has to deal with his weight as well and is unable to do an exercise program due to his demands at work. Changing his dietary intake can also be challenging since he is always on the go. Larry does not retain verbal information easily and learns best by reading the material. Handouts would mostly likely be the best teaching mechanism for the patient. Helping to break the barrier of these challenges can assist the patient in the control and management of his blood pressure. Plan of care and potential patient outcomes Mr. Garcia needs to start losing weight. Creating an exercise program that can he incorporate into his daily routine is of importance. Seeing if his job has a gym, going to a gym near his job or taking a walk with his family in the evenings can aid in him starting an exercise regimen that can fit into his busy lifestyle. Providing information on a healthy diet that includes a low sodium, low calorie, and low fat is significant as well. An educational tool provided by the National Lung and Blood Institute that can aid in this teaching is the Dietary Approaches to Stop Hypertension (DASH) plan. By changing his diet, he can lower blood pressure and begin to live a healthier life. Encouraging the importance of taking his blood pressures as scheduled should be a focus. Since he doesnââ¬â¢t like verbal teaching and does have an Associateââ¬â¢s degree than written materials such as booklet and pamphlets can assist in this medication educational process. Teaching stress relieving exercises and stress relieving mechanisms can aid in decreasing his stress. His wife is helping his parents and should continue if she can to assist him in the transportation of his parents. Summary Larry Garcia, a 45 year old male who was newly diagnosed with hypertension was the focus of this case study. As the nurse, I was able to identify Larryââ¬â¢s educational requirements to support him in living a fairly good life regardless of him having hypertension. An educational plan was developed to help him in complying with these needed changes in his life. High blood pressure is called the ââ¬Å"silent killerâ⬠because it often has no warning signs or symptoms and many people do not know they have it. Thatââ¬â¢s why it is important to check your blood pressure regularly (CDC, 2015). Race, genetics, age and being overweight are some of the contributing factors ofà hypertension. Although there is no cure for high blood pressure, management can consist of exercise, medication, dietary modifications and weight loss. References Center for Disease Control and Prevention. (2015). High Blood Pressure. Retrieved from http://www.cdc.gov/bloodpressure/ Center for Disease Control and Prevention (2013). Racial/Ethnic Disparities in the Awareness, Treatment, and Control of Hypertension ââ¬â United States, 2003ââ¬â2010. Retrieved from http://www.cdc.gov/mmwr/preview/mmwrhtml/mm6218a2.htm Mayo Clinic. (2014). High Blood Pressure (Hypertension). Retrieved from http://www.mayoclinic.org/diseases-conditions/high-blood-pressure/basics/definition/con-20019580 National Heart, Lung and Blood Institute. (2012). Who is At Risk for High Blood Pressure? Retrieved from http://www.nhlbi.nih.gov/health/health-topics/topics/hbp/atrisk Redman, B.K (2007). The practice of patient education: A case study approach (10th ed.). Retrieved from The University of Phoenix eBook Collection Database. The Dash Diet Eating Plan. (2015). What is the DASH Diet? Retrieved from http://dashdiet.org/what_is_the_dash_diet.asp
Wednesday, October 23, 2019
Holly Bobo
It is not completely known that an actual crime has occurred, there hasnââ¬â¢t been enough evidence to prove that there has been a crime. I would want to interview her 25 years old brother, Clint. He reported seeing her being taken into the woods by a white male with all camouflage clothing. He said he only saw the back of this male and thought it was her boyfriend until he walked outside and saw some blood in front of their house. I would interview Clint because he was the last person that saw Holly and he also saw the man that kidnapped her. I would ask questions about the man who he saw take her. Also, about the path that this man took her. Finally, if he has noticed any weirdness from his sister the past couple of days or weeks. Then, I would want to interview Heather Sullivan, which is a woman in her town, she was approached by a man a couple of months before Hollyââ¬â¢s disappearance, but she was so startled that she dropped the glass lamp that she was holding. When she dropped it got her boyfriends attention and he scared the man off. I would like to get from her details about the man that tried to kidnap her and see if Clint and her details maybe match up. Finally I would like to interview Whitney Duncan, which is her cousin. I would want to find out how close they were and if they talked on a regular basis and if she noticed anything not normal with her. I would obtain criminal records from each of these people and see if theyââ¬â¢ve had any criminal history in the past that might pertain to this case. Also, I would want to obtain phone and text message records from each person. I would want to identify if there were any subspecies phone calls or text messages. I would want to collect the hair that was stuck to the piece of duck tape. This evidence could tell investigators who the hair belongs to and what part of the body it has came from. Also, I would want to collect her cell phone, this can prove to investigators who she made calls to and if there were any strange or threatening text messages. Also, it could have finger prints other than Hollyââ¬â¢s. I would investigate the blood that was found at her home to find out if it belonged to Holly. Finally, I would want to obtain the lunch box that was found in the woods. It could provide investigators with finger prints if their were any other than hers. All the evidence would be carefully placed in the right kind of container or bag. Once it is placed in the right container, it would need to be tagged with the time, location, name of the person that collected it; then it is sent off to the lab to be investigated. Once they are done it is sent off for more investigation and it should be labeled with the names of the person sending it off, the time, and location. The primary scene is Hollyââ¬â¢s home from where she was abducted from. This is the primary because it is the main place as to where the abduction occurred. The secondary scene is the woods. This is because this was the place where she was taken to after being abducted from her home. Then, there is another scene that the public or investigators donââ¬â¢t know about yet because there hasnââ¬â¢t been any other evidence leading to another scene. As for the other persons that would be investigated and records obtained from I would also obtain the phone and text messages records from Holly as well. These records would be important because it would tell investigators if there were any unusual phone calls or text messages sent or received from Holly. Also, I would investigate her Facebook and Myspace to find out if there were any unusual things going on through her social network sites. The locard exchange principle can apply to this case if her body has been found mostly. It is possible that other fibers can be found on the duck tape that the hair is stuck to. Also, some could be on the cell phone near the ear piece if the perpetrator used her cell phone. His DNA can possibly be on the ear piece of the phone. If people that Holly knew were ruled out I would suspect that maybe a neighbor that has been stocking her could be a potential perpetrator. It could be anyone that knew her schedule and her parents schedule. Whoever abducted her had to have known that her parents were gone and that she left for school at a certain time. I would document where all the evidence was found, the times it was found, and who found the evidence. I would document all the details that witnesses know about the perpetrator that abducted her. I would find out if anyone in the neighborhood saw a complete stranger just hanging around. If someone saw that then it could be a potential stalker of Holly. I would have of course TBI because it did happen in Tennessee so they would have to be involved in this case. I would also have FBI involved in this case because it is possible that they have traveled out of the Tennessee area. Of course volunteers they can be a big help in trying to find clues that lead to the end of a crime. I would also keep posting it on TV because some things can jog someoneââ¬â¢s memory and that could lead you to your suspect. One possible motive could be that it was someone that wanted to date her and she didnââ¬â¢t want to date them so they wanted to get at her and her boyfriend and cause harm to her. Another could be that it was an ex-boyfriend and she didnââ¬â¢t want to have any contact with him or they ended on bad terms, which could have set him off and caused him to do this to her. Finally, another motive could have been just some random stranger that had been stalking her and knew that she left at a certain time in the morning for school and knew that her parents were gone and didnââ¬â¢t know her brother was still in the house and he could have just wanted to cause harm to her. I think these are viable motives because really it is only possible that someone that knew her schedule could commit this. A theory could be that her ex-boyfriend wanted to still be with her and he knew that she was with someone else and he didnââ¬â¢t like that she was. So he wanted to get back at her. He knew that she was on her way to school so he parked his car on a road behind the woods and when he saw her at her car went and grabbed her and made her come with him. He could have put the duck tape over her mouth and she ripped it off and thatââ¬â¢s when he made her walk to his car. She had the lunch box still in her hand when they went in the woods and he could have made her drop it and then they drove off and went to another location. Another theory could be that a stalker could have just been planning to kidnap and harm this young lady. So he would watch her a lot and see the times her parents and her left and then the morning of April 13th he walked through the woods and went and grabbed her and made her walk through the woods to a car and he took her to another destination. It is possible that maybe her parents owed someone money for something that they were doing on the side and since they werenââ¬â¢t home and they saw that Holly as leaving the house they decided to abduct her and harm her as well. Finally, it is possible that a coworker could have had some kind of beef with her about something and they wanted to come abduct her and take her away from her family. So they watched her throughout a couple of days and figured out the times nobody was home and when she was on her way to school. And when she went out to her car someone jumped out of the woods and grabbed her and took her with them and they are at another location that investigators havenââ¬â¢t discovered yet.
Tuesday, October 22, 2019
The Great Gatsby Essays - The Great Gatsby, Literature, Free Essays
The Great Gatsby Essays - The Great Gatsby, Literature, Free Essays The Great Gatsby In today society, many people like to follow the current. They want to catch the wave. Which mean, it does not matter if things were good or bad, right or wrong, they just follow and do them without any thinking. Therefore, there are not too many people would like to be a normal, thoughtful nor neutral person. However, in the novel, The Great Gatsby, by Scott Fitzgerald, one of the character name is Nike Carroway, he was the good and neutral narrator. It was because, in the novel, he analyzed all of the things with regard to accuracy of observation. In The Great Gatsby, when Mr.Gatsby told Vick he wanted to return the past over again with his lover- Daisy, Nike Carroway warned him to give it up, because it was impossible. Unforturately, Mr.Gatsby was not believe it. So at the end, Mr.Gatsby's dream still had not came true because Daisy did not break up with Tom and go with him. It can be seen in the last chapter on the novel, when Gatsby was murder, Daisy went to somewhere else with her husband, and did not go to Gatsby's funeray. I called up Daisy half and hour after we found him, called her instinctively and without hersitation. But she and Tom had gone away early that afternoon, and taken baggage with them. Therefore, Nike Carroway's analysis was right by these clear observation. However, Nike Carroway is a good narrator, he sees everything happen and does not trust everybody easily. So during the people discuss about something at a time, he does not believe it is true. After he proves it, he will accept the truth. Moreover, when Nike went to Gatsby's party, there is a drunk lady telling everyone Gatsby killed a man before. Somebody told me they thought he killed a man once. Also, there is one more lady said that Gatsby was a German spy: It is more that he was a German spy during the war. Nike heard it, but when Nike had a chance to have a lunch with Gatsby, he told Nike, he was an Oxford man and show him that fought in World War One. Then Nike knew Gatsby was not a German Spy nor a murderer. Furthermore, at the end of the novel, when Daisy drove Gatsby's car and killed Mrs.Wilson in a car accident, Nike's first though Gatsby killed Mrs.Wilson. But after Gatsby told him all of the things at that moment, then Nike was thinking and discuss between Gatsby and Tom's speaking, and make his own conclusion. Therefore, Nike was a thoughtful man and his is not afraid to face anything around him. By these facts, he had a clear mind and reliable in his observations, so it can make people believe Nike Carroways was a neutral and clear mind narrator of this novel, because this can be seen in Nike's personality. In the novel, Nike was also a neutral narrator too becasue he is the narrator who described everything clearly and accurately. He was trustful because he described everything without any personal point of view; By the way, throughout the whole story, he didn't defenses for any characters nor put any of his self-feeling in it. That's why he is a character who strived for neutrality. On the other hand, when Mr.Gatsby tells Tom that Daisy will leave Tom because she loves Tom no more, it's full of fire's atomsphere and emotion. " I've got something to tell you, old sport- " began Gatsby. But Daisy guessed at his intention. " Please don't!" she interrupted helplessly." Please let's all go home. Why don't we all go home?" " That's a good idea." I got up. " Come on, Tom. Nobody wants a drink." " I want to know what Mr.Gatsby has to tell me." " Your wife doesn't love you," said Gatsby. "She's never loved you. She loves me." At that time, if Nike was not in a neutral position, he must help Gatsby or Tom. But, he did not join in the argument between Gatsby and Tom. He just put himself in a corner, keeping quiet and see whatelse would happened in page 131 to page 135. Therefore, we can see that Nike was a neutral man and
Subscribe to:
Posts (Atom)