Saturday, December 28, 2019

Chinas Three Sovereigns and Five Emperors

Back in the earliest mists of recorded history, over four thousand years ago, China was ruled by its very first dynasties: the mythical Three Sovereigns and Five Emperors. They ruled between about 2852 and 2070 BCE, before the time of the Xia Dynasty.   Legendary Reigns These names and reigns are legendary more than they are strictly historical. For example, the claim that both the Yellow Emperor and Emperor Yao ruled for exactly 100 years immediately raises questions.   Today, these very earliest of rulers are considered demigods, folk heroes, and sages all rolled into one. The Three August Ones The Three Sovereigns, also sometimes called the Three August Ones, are named in Sima Qians Records of the Grand Historian or Shiji from about 109 BC.   According to Sima, they are the Heavenly Sovereign or Fu Xi, the Earthly Sovereign or Nuwa, and the Tai or Human Sovereign, Shennong.   The Heavenly Sovereign had twelve heads and ruled for 18,000 years.  He also had 12 sons who helped him rule the world; they divided humanity into different tribes, to keep them organized. The Earthly Sovereign, who lived for 18,000 years, had eleven heads and caused the sun and moon to move in their proper orbits. He was the king of fire, and also created several famous Chinese mountains. The Human Sovereign had only seven heads, but he had the longest lifespan of all the Three Sovereigns - 45,000 years.   (In some versions of the story, his whole dynasty lasted that long, rather than just his own life.)  He drove a chariot made of clouds and coughed the first rice out from his mouth. The Five Emperors Again according to Sima Qian, the Five Emperors were the Yellow Emperor, Zhuanxu, Emperor Ku, Emperor Yao, and Shun.   The Yellow Emperor, also known as Huangdi, supposedly ruled for an even 100 years, from 2697 to 2597 BCE.   He is considered the originator of Chinese civilization.   Many scholars believe that Huangdi was actually a deity, but was later transformed into a human ruler in Chinese mythology. The second of the Five Emperors was the Yellow Emperors grandson, Zhuanxu, who ruled for a modest 78 years.   During that time, he changed Chinas matriarchal culture to a patriarchy, created a calendar, and composed the first piece of music, which was called The Answer to the Clouds. Emperor Ku, or the White Emperor, was the great-grandson of the Yellow Emperor.   He ruled from 2436 to 2366, just 70 years.   He liked to travel by dragon-back and invented the first musical instruments. The fourth of the Five Emperors, Emperor Yao, is viewed as the wisest sage-king and a paragon of moral perfection.   He and Shun the Great, the fifth emperor, may have been actual historical figures.   Many modern Chinese historians believe that these two mythological emperors represent folk memories of early, powerful warlords from the era just before the Xia Period. More Mythological Than Historical All of these names, dates, and fabulous facts are obviously more mythological than historical.   Nonetheless, it is fascinating to think that China has some sort of historical memory, if not precise records, from about 2850 BCE - almost five thousand years ago. The Three Sovereigns The Heavenly Sovereign (Fuxi)The Earthly Sovereign (Nuwa)The Human Sovereign (Shennong) The Five Emperors Huang-di (The Yellow Emperor), c. 2697 – c. 2597 BCEZhuanxu, c. 2514 – c. 2436 BCEEmperor Ku, c. 2436 – c. 2366 BCEEmperor Yao, c. 2358 – c. 2258 BCEEmperor Shun, c. 2255 – c. 2195 BCE

Friday, December 20, 2019

Love Is Blind Essay - 1006 Words

Do you remember your first kiss? Did you keep your eyes open or closed? I bet you closed your eyes. Isn’t this the essence of â€Å"love is blind?† You kiss them without fear, and without any sense of danger. You do not have to see the one you love to know you love them. You accept love on blind faith. Love is blind and for a moment we use this phrase to justify the obvious flaws we do not recognize in the people. Lovers are oblivious to the truth and therefore unable to be clear-sighted. My perspective is that we are blinded by love and we act carelessly without assessing any of our actions, thus we have regret for any mistakes later on. My latest experience where love is blind has to do with a friend that I know for a little over six†¦show more content†¦After their personal meeting and a very memorable week, I have hoped that somehow their relationship will be better. Much to my surprise, it have gotten worse than I could ever imagined. Sharon is still in te ars and one day she told me that they had a very huge fight. I remember, she once told me that before leaving China, just by the airport when she were about to take off. He told her â€Å"I have to tell you something really important that you deserve to know.† Sharon was confused by his statement. After a year of having a rollercoaster and bittersweet relationship, it has turns out that he is married. He got married at an age of 22 to a girl whom was matched to him by his parents. He decided to go to China for a job but the truth is he went there to fulfill his duty as a husband. He respects his marriage and does not tolerate to divorce. Indeed it is a heartbreaking new to Sharon. Days and nights she cried until her eyes dry out and her heart mourns for him. Each day, he calls Sharon and wants her forgiveness. He says he missed her and wants to spend the rest of his life with her. Sharon says she needs time to assess things. I spoke to her a month ago and she still does not k now what to do. She is not angry at him or does not even feel betrayed of what he has done, rather, she is worried that her parents might come to know about it and they will force her to marry someone else. Sharon claims that he is the love of her life and does not mind that he is married.Show MoreRelatedBlind Love Essay examples474 Words   |  2 PagesBlind love can be a hurtful experience, or one that is misleading. One example of blind love is being in love with someone who will provoke you into doing things you would not normally do. While most people have certain standards which they live by, being in love with someone to the point that they influence you to go against what you believe in is a result of blind love. Being in love can often persuade a person to do anything in order to make the other happy, or to keep from loosing them. ItRead MoreLove Is Blind By William Shakespeare957 Words   |  4 PagesWhenever you are going out with someone you really love, you give your partner the affection and ready to forgive them at any time they are at fault. However, it is because you give too much love, people usually tell you that you are a fool for trusting them. Which correspond to the saying, â€Å"love is blind,† which means, you love someone too much and cannot see their fault even if they are hurting you. In the third person’s perspective, two people are being intimated with each other is seen as lovers;Read MoreEssay on Women in Violent Relationships1012 Words   |  5 PagesWhat is Love? Webster’s dictionary defines love as a strong, deep affection. Many of those who are or have been in love can definitely agree with that. My definition for love is all of earth’ s surroundings that make one feel good or happy; to me, love is not just love towards another, but it is also love towards something beyond. Everyone knows that love is a beautiful thing to experience: it feels like all the happiness in the world is in your hands and you could never be happier. But what happensRead MoreAnalysis Of The Story Cathedral By Raymond Carver1305 Words   |  6 Pagesdeterminers, a and the, that refer to the blind man in the story and its effects to establish the atmosphere of the story. He states that the change in determiner seems subtle, but these subtle changes are significant because the changes show how narrator feel about Robert throughout the story. Nesset studies the sexual polices and the love lives in several Carver’s stories. He discusses how Carver wrote his stories based on less of love and more of love withdrawal. Also Facknitz addresses rediscoveryRead MoreKing Lear by William Shakespeare803 Words   |  3 Pagesforces us to see t hat being blind is a mental flaw just as much as it is a physical flaw. Lear is not only metaphorically blind but is also blind toward nastiness and loyalty . We see Gloucester’s blindness in more literal terms as he is literally blind but he can still see, and Albany has a more common form of blindness, as he is blind to his wife. These characters are only able to see after a tragic loss. However the person in the play that is more significantly blind is King Lear. His role wasRead MoreDifferent Types of Love in Midsummer Night’s Dream1508 Words   |  7 PagesDifferent Types of Love in Midsummer Night’s Dream Love and lovers, both can be described as many different things. William Shakespeare shows us this in his play, A Midsummer Night’s Dream. In this play we see all types of love, from passionate love to foolish love. Along with this we also see different types of lovers and pairs. Examples of these lovers come from pairs like, Hermia and Lysander, Demetrius and Helena, Titana and Bottom, and Oberon and Titana. It seems that in A Midsummer Night’sRead MoreWilliam Shakespeare s A Midsummer Night s Dream1277 Words   |  6 PagesLove and reason will never fit together. Nor will love ever be a controllable compulsion. Maybe we are fools for going into the perilous, eccentric universe of love; yet what fun would life be without it? William Shakespeare s play A Midsummer Night s Dream investigates the unconventional, unreasonable and unpredictable nature of love during his time. Shakespeare conveys this through the main plot of the play, which is composed of the relationships between three couples. The three couples showRead More Shakespeares Presentation of Love in a Midsummer Nights Dream1097 Words   |  5 PagesShakespeares Presentation of Love in a Midsummer Nights Dream A midsummer nights dream was originally supposed to have been performed at a wedding. Therefore the theme of love would have been a suitable theme for the play. In this play, as in many of Shakespeares plays the main theme is love. Shakespeare presents many different aspects of love in the play. He shows how love can affect your vision of reality and make you behave in irrational ways. He presents many waysRead MoreThe, Where Am Calling From `` And What We Talk About Love1256 Words   |  6 Pagesother characters and also the apprehension of death experienced by some characters. In the following stories which will be discussed are as follow: â€Å"Cathedral†, â€Å"Where Am Calling From† And â€Å"What We Talk about When We Talk about Love†. The concept of impermanence of life and love are discussed in these stories. However, in some of the stories alcohol allows these characters to truly express themselves and to speak and perform activities they would have never been able to do. The contrasts and perspectivesRead MoreMiddle Childhood Phase Of My Life875 Words   |  4 PagesRadcliffe College and received a Bachelor of Arts edge and the first deaf-blind person to do so. While she was a student at Radcliffe she was interested in writing and wrote her own biography there which was The Story of My Life which was the first story she ever wrote. Even thoug h Helen graduated with a Bachelor of Arts degree she saw herself as a writer first. Helen wrote a series of books for a person who was deaf and blind. Keller went to become an amazing and world famous author and speaker. One

Thursday, December 12, 2019

A Report on Information Technology Risk Management

Questions: Task1. For this question you are required to make at least two (2) forum postings, arguing either for or against the quantitative method of risk assessment. You will be assessed on what you contribute to the debate in terms of quality not quantity (though your posting should at a minimum be a few sentences long). You may either create new thread or reply to a previous posting. All new threads should contain the subject line Quantitative Debate (I will do the posting, just need 2 arguments with refs to base the posts on please) 2. Study Exhibits 61.1 and 61.2 from Reading 3, and answer the following questions:(a) Explain in your own words what is meant by the terms Sweet Spot and Discretionary Area (see Exhibit 61.1) (b) Explain the significance of a security decision that is located to the right of the Sweet Spot but outside the Discretionary Area (see Exhibit 61.1). (c) Explain the significance of a security decision that is located to the left of the Sweet Spot but still inside the Discretionary Area (see Exhibit 61.1). (d) Explain why you think the Defined Highest Acceptable Risk is located on the Sweet Spot, but the Defined Lowest Acceptable Risk is located to the right of the Sweet Spot (see Exhibit 61.2).3. In Reading 7 for this subject, Ozier states that The [ALE] algorithm cannot distinguish effectively between low frequency/high-impact threats (such as fire) and high-frequency/low impact threats (such as misuse of resources). Explain why this is the case. Give an appropriate example to illustrate your explanation. 4. (Note: Make sure you show ALL your working for this question) The following threat statistics have been gathered by a risk manager. Based on these, calculate the ALE for each threat. 5. (Note: Make sure you show ALL your working for this question) Using the figures you calculated above, determine the relative ROSI (return on security investment) for each of the same threats with the following controls in place. Remember that a single control may affect more than one threat, and you need to take this into account when calculating the ROSI. Based on your calculations, which controls should be purchased? 6. Consider the data in the two tables that appear in questions 4 and 5 above. Sometimes a control may affect the cost per incident and sometimes the occurrence frequency, and sometimes both. Why is this the case? Illustrate your answer with an example drawn from the data provided.7. The year is 1999 and you are the risk manager for a large financial institution. You apply the Jacobsons Window model (Reading 11) to determine your companys preferred response to the impending Y2K bug. According to the model, should you accept, mitigate, or transfer the Y2K risk? Why? Do you agree with the models recommendations? Why or why not? 8. (Note: Make sure you show ALL your working for this question) You want to persuade management to invest in an automated patching system. You estimate the costs and benefits over the next five years as follows: Benefits: Year 1 Year 2 Year 3 Year 4 Year 5 $2,000 $2,500 $4,000 $4,000 $4,000 Costs: Year 1 Year 2 Year 3 Year 4 Year 5 $3000 $2000 $750 $250 $250 C alculate the Net Present Value (NPV) for this investment. Assuming that management has set the Required Rate of Return at 10%, should the investment be made? Why or why not?9. There are a number of qualitative risk assessment models that are available for use, such as FRAAP, OCTAVE, OWASP and CRAMM. Choose one of these models and briefly describe how risk assessment is conducted under this model. Describe an example situation where you could use this selected model. Give your assessment of the validity, or otherwise, of this risk assessment model. Answers: 1. Quantitative Debate Post 1 (Supporting quantitative method of risk assessment) As per a fact, quantitative method under risk assessment refers to a particular technique that quantifies the amount of risk based on the previously-identified level of risk. Utilization of those tools of risk assessment have expanded the extent of intelligibility including that of soundness, and so risk may be easily recognizable. It embraces an expressive matter that is associated to each stage of the specific risk assessment (. ., 2007). To this regard, on reviewing the details of this method it may be identified that by using these sequential steps one may easily point out the different hazards, outcomes of those hazards it they exist at all, probability of the hazards, and attributes of those hazards. Thus, it may be said that quantitative method of assessing risk includes effectual engineering, financial factors, and that of ecological analysis. Post 2 (Supporting quantitative method of risk assessment) On contrary to the quantitative technique of risk evaluation, this approach of quantitative analysis gives a more detailed scenario. The ultimate cause of providing increased focus upon quantitative approach of assessing risk is that to assess the presence of all risks by means of this approach. This is said to incorporate both probability of key hazards as well as their impacts. Hence, this approach makes it easier to specify which risk requires to be taken care of as per its priority. 2. Discussing sub-questions Sweet Spot and Discretionary Area: For reducing the hazards and their occurrence, organization incorporates an effective information security system. For implementing such an effective security system, it is important for the organizations to take up certain amount of expense. Another fact in this regard is that the extent of efficiency of a security system is in fact directly proportional to expense (Adler, Leonard Nordgren, 1999). On the other side, enhanced security system refers to the occurring of risk would reduce, which means risk is inversely proportional to the extent of incurred expense. Now, if a two-dimensional area is considered whereby security is to be measured by means of horizontal axis and that of expense by means of vertical axis, then the point of intersection of cost and that of risk curve, whereby both risks and costs are at equilibrium, the point is known as sweet spot. Also, it is important for every organization requires taking up at least some amount of expense to manage risk, and there are some level of risks that may not be reduced. Thus, if the predefined lowest cost, minimum extent of risk which cannot be reduced and all current practices associated to risk prevention are simultaneously considered, then the space in that dimensional area is called discretionary area. Security decision located towards the right of Sweet Spot and outside of Discretionary Area: As per the given figure, we can say that in such particular context, increasing aspects of security refers to some level of costs that has equivalent impacts upon reduction of risk as the level of risk reduced almost equally as that of the enhancement of security concerns. Discussion: The reason behind this context is the subsequent to that of Sweet Spot, and the proportional risk reduction rate has become lower than the incremental rate of incurred expense. 3. Arguments are raised that algorithm did not succeed to distinguish amidst the high impact/low frequency threats as well as high frequency/low impact threat. For instance, fire is considered to be low frequency high impact threat as well as misuse of resources is low impact high frequency threat(Yokouchi, 2007). The algorithm ALE could not make proper differentiation amidst the two threats. The cause may be explained along with an example. When an organization emphasizes upon the risk loss estimates, Annualized Loss Expectancy may be estimated. For calculation of this, the formula use is: Annualized Loss Expectancy = Asset Value * Exposure factor As per the given formula, it may be identified that on measuring the annualized loss expectancy, generally two factors are considered: asset value as well as exposure factor. On multiplying these two factors, the outcome is single loss exposure. Thus, it just measures the one dimension named risk (Adler, Leonard Nordgren, 1999). Thus, it does not succeed in identifying the frequency as well as impact or emphasis on the outcome. In matter of low frequency/high impact threat, the outcome magnitude may coincide with the outcome of high frequency/low impact threat. Thus, as a matter of fact it may be stated that oversimplification approach of ALE algorithm may be considered key factor associated with failing of drawing distinct difference amidst low frequency/high impact threat and that of high frequency/low impact threat. 4. Threat Cost per incident Occurrence frequency SLE ARO ALE Software piracy $600.00 1 per month 600 52 $31,200.00 Computer virus/ worm $2,000.00 1 per month 2000 12 $24,000.00 Information theft (hacker) $3,500.00 1 per 3 months 3500 4 $14,000.00 Information theft (employee) $6,000.00 1 per 4 months 6000 3 $18,000.00 Denial-of-service attack $11,000.00 1 per 2 years 11000 0.5 $5,500.00 Laptop theft $4,000.00 1 per 5 years 4000 0.2 $800.00 Web defacement $1,500.00 1 per 2 years 1500 0.5 $750.00 Fire $500,000.00 1 per 10 years 500000 0.1 $50,000.00 Flood $300,000.00 1 per 15 years 300000 0.066667 $20,000.00 5. Threat Cost per incident Occurrence frequency SLE ARO ALE Software piracy $500.00 1 per 4 months 500 3 $1,500.00 Computer virus/ worm $1,300.00 1 per 5 months 1300 2.4 $3,120.00 Information theft (hacker) $2,000.00 1 per 6 months 2000 2 $4,000.00 Information theft (employee) $7,000.00 1 per 13 months 7000 0.923076923 $6,461.54 Denial-of-service attack $4,000.00 1 per 10 years 4000 0.1 $400.00 Laptop theft $5,000.00 1 per 10 years 5000 0.1 $500.00 Web defacement $1,500.00 1 per 5 years 1500 0.2 $300.00 Fire $75,000.00 1 per 10 years 75000 0.1 $7,500.00 Flood $50,000.00 1 per 15 years 50000 0.066666667 $3,333.33 Return on Security investment needs to be calculated for every threat in association with the specific control. As per the given table it has been identified that return upon security investment is greater for IDS as well as Insurance. These controls may be bought to combat issues like information hacking or flood(Yokouchi, 2007). 6. On considering the two tables of answer 4 and 5, one may identify that expense per incident as well as frequency of change occurrence based on control. It has been observed that it is control that considerably impacts upon the expense per incident. An instance may be referred to in this scenario to explain the influence of control within the frequency of incident occurrence (Alhawari, Karadsheh, Nehari Talet Mansour, 2012). For combating with system virus, the total expense of the aspect was $2000 and that of occurrence frequency of 1 every month. On introducing control antivirus the expense was $1300 as well as occurrence frequency was 1 every fifth month. The cause is that there are various types of anti-viruses to fight the computer viruses. Their policy of license as well as cost may change with the alterations in the cost of incident as well as occurrence frequency. 7. During the year 1999, being a risk manager of a financial institution, I had applied the Window Model of Jacobson to respond to the T2K bug. This bug means the problem within both digital and non-digital data documentation and storage that is the result of the practice of abbreviation of four digit year to two digits. Thus, the year 2000 as well as 1900 cannot be differentiated. Various approaches were introduced to solve the Y2K bug (Vinaja, 2013). Observation suggests that data re-partitioning, data expansion, windowing, etc can be used to solve the issue. Here in this regard, the Window Model of Jacobson may be used. As per this model, risk may be attributed as per its occurrence frequency and that of the outcome of influence of every occurrence. This model of Jacobson had an assumption that suggests that each of the risks has either high or low occurrence frequency(Prado, 2011). Besides, each risk has high or low influence or outcome. It shows that generally two types of class es are responsible to causing such loss of equal magnitude while indicated in terms of annual rate or annualized loss expectancy. I totally agree with the recommendations of this model that reflects high or low risk requires to be addressed by selecting a proper security measure possessing a positive return upon investment based on the link between implementation cost as well as reduction in ALE. The Jacobsons Window Model suggests that other things remaining constant the security measure must be implemented based on the investment return. 8. Year Benefit Cost Net Cash flow Present Value Factor (@10%) Present Value 1 2000 3000 -1000 0.909090909 -909.091 2 2500 2000 500 0.826446281 413.2231 3 4000 750 3250 0.751314801 2441.773 4 4000 250 3750 0.683013455 2561.3 5 4000 250 3750 0.620921323 2328.455 Net Present Value 6835.661 The given table shows the calculation the net present value (NPV). This value refers to an effective mechanism to assess the investment options. It is identified that NPV of this very investment is quite positive. Within this method, all future cash flows are transformed into present value for estimating the potential of investment. 9. The Operating Critical Threat, Asset and Vulnerability Evaluation (OCTAVE) method was normally introduced to assess the risks of bigger organizations with increased number of employees around more than 300. It needs to be noted that size was considered to be the only factor in this regard. It bigger organizations, several layers as hierarchy can be identified. This technique is usually responsible to maintain the computing infrastructure along with the internal capacity to run the assessment of risk measure. Besides, this is beneficial to interpret the outcomes in regard to critical assets (Benaroch, Jeffery, Kauffman Shah, 2007). This method involves an approach comprising of three phases for scrutinizing the organizational and certain technological aspects by gathering a comprehensive presentation of requirements associated to the organizational information security. This method is comprised of some workshops that may be arranged by the internal analysis team formed by several organizational employees. The approach emphasizes upon the capitalizing information from various organizational levels. Therefore, this focuses on certain critical aspects like identification of key assets, risks, threats, opportunities of the company. Also, this approach focuses on creation of a strategy to provide protection to company. The strategy of protection relies upon the practice, including the plan to mitigate all potential risks for supporting the objectives of the company. This approach may be applied to assess the potential risks related to the information security. This OCTAVE technique may prove increasingly effective to determine the optimum security in various organizations. This may be backed up by an effective example for explaining the utilization of this approach. In context to health care organizations, these need to maintain large database as well as records of patients(Caron Salvatori, 2014). It is utterly important to protect the confidentiality of the records or information. Here, application of OCTAVE may be highly beneficial for maintain security of the database within the health care organizations. The approach emphasizes upon the capitalizing information from various organizational levels (Pappas Panagiotopoulos, 2009). Therefore, this focuses on certain critical aspects like identification of key assets, risks, threats, opportunities of the company. Also, this approach focuses on creation of a strategy to provide protection to comp any. Enhanced security system refers to the occurring of risk would reduce, which means risk is inversely proportional to the extent of incurred expense. Also, it is important for every organization requires taking up at least some amount of expense to manage risk, and there are some level of risks that may not be reduced(Dey Kinch, 2008). Thus, if the predefined lowest cost, minimum extent of risk which cannot be reduced and all current practices associated to risk prevention are simultaneously considered, then the space in that dimensional area is called discretionary area. References ., P., ., R. (2007). Simulating the Potential Effect of Risk Management on Project Scheduling.Information Technology J.,6(1), 8-13. doi:10.3923/itj.2007.8.13 Adler, T., Leonard, J., Nordgren, R. (1999). Improving risk management: moving from risk elimination to risk avoidance.Information And Software Technology,41(1), 29-34. doi:10.1016/s0950-5849(98)00095-0 Alhawari, S., Karadsheh, L., Nehari Talet, A., Mansour, E. (2012). Knowledge-Based Risk Management framework for Information Technology project.International Journal Of Information Management,32(1), 50-65. doi:10.1016/j.ijinfomgt.2011.07.002 Benaroch, M., Jeffery, M., Kauffman, R., Shah, S. (2007). Option-Based Risk Management: A Field Study of Sequential Information Technology Investment Decisions.Journal Of Management Information Systems,24(2), 103-140. doi:10.2753/mis0742-1222240205 Caron, F., Salvatori, F. (2014). Managing Information for a Risk Based Approach to Stakeholder Management.International Journal Of Information Technology Project Management,5(2), 30-43. doi:10.4018/ijitpm.2014040103 Dey, P., Kinch, J. (2008). Risk management in information technology projects.International Journal Of Risk Assessment And Management,9(3), 311. doi:10.1504/ijram.2008.019747 Pappas, A., Panagiotopoulos, P. (2009). Information Technology risk management in e-commerce: classical and catastrophic risk approaches.IJASS,2(3), 250. doi:10.1504/ijass.2009.027663 Prado, E. (2011). Risk analysis in outsourcing of information technology and communication.JISTEM,8(3), 605-618. doi:10.4301/s1807-17752011000300005 Vinaja, R. (2013). IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing.Journal Of Global Information Technology Management,16(3), 82-84. doi:10.1080/1097198x.2013.10845644 Yokouchi, A. (2007). Introduction of Weather Risk Management Technology in Farm Management.Agricultural Information Research,16(4), 226-234. doi:10.3173/air.16.226

Wednesday, December 4, 2019

Migrating Business Critical Applications †Free Samples to Students

Question: Discuss about the Migrating Business Critical Applications. Answer: Introduction As said by the Zhang, Cheng, Boutaba, (2010), Technology is improving being used by the several organizations across the business to improve and enable their organization performance. Krutz, Vines, (2010) suggested that One of the most effective technological innovations that have revolutionized the way business and people work in todays world in cloud computing. Implementation of the cloud computing technologies within the organization can facilities collaborative platforms from learning and research, improved services and flexibility capabilities, high efficiencies, better compliance and security and access to leading technology. As per the evaluation and findings, it is seen that the organization Commonwealth bank is presently suffered from the issues associated with the data handling and security. The observation also shows that organization functions its operations in all overall the world and most of the users are presently accessing the services through mobile devices; there fore, data theft related problems also considered the main problems for the organization. Thereby, the present report is mainly focused upon the effectiveness of the mitigation of the application and data sources into external computing in organization. Moreover the report also empathized on the security policies that could computing technology; uses to secure data or information. Apart from that the findings provides the effective conclusion and recommendation to solve the existence problems. With context to financial services Stakeholders of the organization are mainly investors in business whose actions are determined the result of the organization decisions. The stakeholders of the organizations are governments, customers, employers, investors etc. The main roles and responsibilities of the stakeholders is to make decision regarding the investment and providing the detailed requirements about the financial plan; that helps the organization to sustain in market and achieve set of objective in successful manner (Krutz, Vines, 2010).. Apart from that stakeholder of the organization also committing the necessary resources and determining the issues and risks associated with the organization. As per the findings and evaluation of the organization present scenario it is seen that the organization is not be able to provide effective security to data that hampered the organization performance in upcoming years. Interface between business stakeholders and technologist is done with the help of communication mode such as face to face communication, meeting, telephonic communication, etc. Before the implementation of the technologies within the organization main roles and reponsiblteis of the technologist to provide the all information to stakeholders regarding the project and how it assist the organization to perform effectively. Therefore the interface between the organization stakeholders and technologist is illustrated using stakeholder communication chart that is shown in below table; Stakeholders Impact stake the project what needs to be communicated risks CEO high Procedures and polices owners who find out institutional administrator procedures and policies Benefits of the implementation of the cloud computing technology and costs associated with the project (Takabi, Joshi, Ahn, 2010). Lack of clarity regarding preferred procedures. Financial management high Manage the organization financial system cost associated with the project and all of the devices, benefits in terms of finance associated with the costs Lack of budget planning Admin staffs Operate the organization new system moderate It helps the organization in order to contributes to process design as well as system and testing Worried about the workload increases and what training they will receive. Technical team They mainly helps to develop the system high how the system is developed and how testing is performed lack of knwonelge regarding the project As per the above communication chart it is seen that cost and benefits related to the project is most vital. Moreover, use of the cloud computing technology organization offers its services from anywhere and anytime. Cloud computing technology provides the office anywhere on demand delivery environment that changes the way infrastrure, desktop, LOB and storage applications are delivered to the clients (So, 2011; Chen et al., 2010; Chen, Zhao, 2012). Apart from that use of the cloud computing technology within the organization uses can simply access their data and information from anywhere via internet. The technology offers the cloud storage backup, which means the organization can stored its information in cloud and access them from anywhere at any time. As said by the Catteddu, (2010), Cloud storage and backup also provides simplicity, costs effective, removal of burden in house management and maintenance. The technology is deliver the data storage as services from the cloud provi der with the help of internet as well as billing computed on capability used in certain features. There are several benefits associated with the cloud computing technologies; Therefore, from the analysis and findings it is said that the stakeholders make an effective decision regarding the improvement of the services and incorporation of the cloud computing technology. Apart from that to implement the cloud computing technologies at workplace organization need to implements cloud computing regulatory stock take that provide an overviews of the country existing rules and regulations that implements to cloud services in Australia. The regulations cover the range of the contractual agreements, consumers protection, data protection and primary act. Security postures Security is the most vital elements for the organization and helps them to protect consumers data and information in successful manner. As said by the Catteddu, (2010), in present era most of the organization uses the past data and information to make decision in critical situations. As per the company scenario it is seen that access of the information of the organization done by the users suffering problems from accessing their own information from the organization. Moreover the observation also observed that network security also concerned one of the vital issues of the organization because the organization offers its services and products to users in both national and international market. Apart from that it is seen that the organization is suffered from the data storage issues that means to store huge amount of the data the organization needs to require extra hardware system that create high budget problems in front of the organization. Data breaches is one of the main component and organization security professionals believed that their organizations security measurements to safe data on physical devices i.e. server are low. Evaluating the scenario it is concluded that data breaching issues was more likely to occur for bank that uses the server. Hijacking of account also considered the main security issues of the organization and it is done mainly by attackers (So, 2011). Hackers or attackers continuously monitor the organizations network scenario and use of the malware code they can easily access the organization information and application software. After accessing the organization application software they modify and access the users personal information for his purpose. If the organization suffered from the security issues problems that they lose market confidence and customers satisfaction. Moreover, the analysis shows that if an organization not implements better security policies within the organization then they can hamper their organization performance and lose customers trust. Migrating organization critical application and their associated data source to an eternal cloud computing helps the organization to achieve high security, collaboration and mobility. As said by the Takabi, Joshi, Ahn, (2010), cloud computing technogly offers the organization to provide high level of the security protocol and to make sure data protection. The cloud computing technology implements high security protocols including strong access controls, data encryption technique, security intelligence. Apart from that cloud computing offers the virtualization security to the organization that means it provides the virtual server and application and it is not easy from the attackers or hackers to determine the exact location where data is stored. Apart from that the main security of the cloud computing technology is to enhance security software maintenance and mechanism. According to the Krutz, Vines, (2010), Cloud computing technology has an effectively ability to develop more soph isticated security procedures that helps the organization to secure users personal information and data. Costs associated with the cloud computing technogly are very less as compared to the physical data storage. Moreover, cloud computing technology provide application programming interface that provides organization the opportunities to customize their cloud expense better manner. Implementation of the cloud computing technology at workplace helps the organization to recover data, long term viability, investigated support, lower maintenance costs, redundancy and resilience. As per the evaluation and findings it is seen that the organization must have to implement migrate its application and data store in cloud computing technology because it not only helps them to secure its data but also achieve high users experience. In organization perspective, if they incorporate this technology at workplace then they reduces its extra hardware costs, maintenance problems and data security related problems. Apart from that accessing of the information is also done in easy manner as it provides huge amount of storage capability. Vulnerabilities, threats and consequences Risk assessment plan based on the vulnerabilities, threats and consequence Risk no Vulnerabilities threats consequences Risks summery Recommendation R001 Wet pipe sprinklers System in organization data base or data center Fire All the stored data in the database may be destroyed Fire should be activated causing water damage To check the fire system in regal basis R002 Organization users indentifies identification number no longer removed from the data center Users uses data in own purpose Integrity as well as confidentiality of organization data not authorized uses of not needed user identification could compromise integrity and confidentiality of organization data (Feng et al., 2011) in order to solve this problem in most effective and successful manner organization needs to update its data base in regular basis. On the other hand organization needs to change users password in every days. R003 Organization not updated its firewall system unauthorized users access the data and information Confidentiality and integrity of the data is hampered If the organization not implemented its firewall system in regular manner then attackers easily access the information In order to solve this problems in most effective and successful manner organization needs to implement dual firewall system in the database R004 Organization TCP packets directed at the port 1521 will hamper to stop responding Computer crime using malicious code Data integrity and confidentiality is hampered (Popovi?, Hocenski, 2010) Attackers attacks the computer network using denial of service attacks with the help of sending large amount of the package using port no 1521 could slow down the database In order to solve these problems, organization needs to impalements new updated antivirus system at workplace. R005 Password and user name are in initialization file and scripts Computer crime using malicious code Data integrity and confidentiality is hampered Password exploitation in initialization file and script could result in compromise of integrity and confidentiality of the organization data Update install antivirus system in regular manner R005 sensitive organization data is stored on USB drive Computer crime using malicious code Data integrity and confidentiality is hampered Loss of the data or information theft from USB drives could outcomes in compromise of data confidentiality Organization needs to implement high security password system in database and disable USB seating. Existing industry risk recommendations for the project As per the above risk assessment framework it is seen that risks R001 i.e. Wet pipe sprinklers System in organization data base or data center and risk R005 i.e. sensitive organization data is stored on USB drive might be occurred in the Australian multinational bank. Therefore in order to solve these problems in more effective and successful manner it is recommended that organization needs to update and monitor its security system in regular manner. From the findings it is also recommended that organization needs to implement up to date antivirus system at workplace that would helps them from the attackers attack. Data security The data flows associated with the project Identified rinks, Assess risks policies and risks mitigates Flow of the data from one end to other is shown in above diagram. With the help of cloud computing technology organization effectively send data from one end to others ends. Risks assessment and mitigation is explained in below table; Risks identification risk assessment Risk mitigation Data breach Data breach can be outcomes to loss the information and data of the organization. Implementation of the two factor authentication techniques and critical protection such as prohibiting the sharing account information (Krutz, Vines, 2010). Service or account traffic hijacking Use of this techniques in cloud computing it is too easy for attackers to hack the data and information of users accounts Implement a single sign on, end to end encryption techniques denial of service attacks accessing users information Upgrade system and in house applications Insecure APIs Manipulation of the users information and accounts done easy manner Implement SSL and TLS communication protocols Abuse of cloud services Access organization and users information easy manner (Krutz, Vines, 2010). Scope immediate services and implement dual firewall techniques Conclusion As per the above findings and analysis, it is seen that flexible costs, always on availability, high security, improved performance, improve coloration are the main features associated with the cloud computing that helps the organization to solve its existence issues in better manner (Takabi, Joshi, Ahn, 2010).. The findings shows that cloud computing have an ability to secure computer network and provide data to uses in easy manner at anytime and anywhere. Therefore, use of this techniques at workplace organization not only achieve better customers satisfaction but also reduces the complexity of the existence configuration. Moreover, from the observation it is seen that cloud computing is cost effective; therefore if an organization implement this techniques than they do not spend much amount in maintenance problems. Therefore from the findings and observation it is said that migrating business critical application and their associated data source to an external cloud hosting solut ion is the best approach for the organization. References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2010). A view of cloud computing.Communications of the ACM, 53(4), 50-58. Carlin, S., Curran, K. (2011). Cloud computing security. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011 (pp. 1-9). IEEE. Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for information security. In Web application security (pp. 17-17). Springer, Berlin, Heidelberg. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chen, Y., Paxson, V., Katz, R. H. (2010). Whats new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January, 20(2010), 2010-5. Feng, D. G., Zhang, M., Zhang, Y., Xu, Z. (2011). Study on cloud computing security. Journal of software, 22(1), 71-83. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Li, H., Dai, Y., Tian, L., Yang, H. (2009). Identity-based authentication for cloud computing. Cloud computing, 157-166. Popovi?, K., Hocenski, Ã… ½. (2010, May). Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE. Qian, L., Luo, Z., Du, Y., Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18. commbank. (2017). commbank.. [online] Available at: https://www.commbank.com.au/ [Accessed 26 Sep. 2017].

Thursday, November 28, 2019

Is there a right time to lie

Telling a lie is when an individual tells something which he/she knows is not the truth but intentionally maintains it as the whole truth. There are several types of lies, bad faith lies-lying to oneself, big lies, bluffing, emergency lies, lying to children and white lies among others.Advertising We will write a custom essay sample on Is there a right time to lie? specifically for you for only $16.05 $11/page Learn More An emergency lie is an intentional lie to prevent harm on the third party. For example, when a person is looking for another to cause bodily harm, then one can lie about the whereabouts of the third party. An emergency lie is temporary, and the truth can always be told later. On the other hand, a white lie is a minor lie which is harmless but beneficial. White lies are half truths where one avoids questions so as to achieve a greater good. A lie may be discovered or undiscovered, but the consequences may vary from one case to another. On ce a lie is discovered the integrity of the liar is lowered and causes a change in behavior. The lie may also continue and be an entangled web of lies in the long run. Historically, philosophers such as Aristotle and St. Thomas Aquinas condemned lying, but other philosophers supported lies which were intended to achieve good. Thus, when is the right time to tell a lie? Telling the truth or a lie is a matter of personal honesty. The truth depending on the intention can build or break a relationship. A white lie a few times, is good for creating healthy interpersonal relationships. However, the fundamental foundations of relationships are built on absolute truth and trust in each other. One can tell a lie when the truth may cause pain or insult to a person. There are lies that prevent people from feeling bad about them, for example, ‘I like your dress,’ when in the real sense the dress looks horrible. Personal opinions about how someone looks or what they are wearing ofte n do not contribute to relationships. The truth in this circumstance can be hurtful; hence, one is not obligated to tell the whole truth if they will hurt someone’s feelings in the process. Children’s innocence and imagination need to be protected, therefore, white lies such as the existence of Santa Claus, Easter Bunny and the tooth fairy help to activate a child’s imagination and give them joy. Other small pleasantries like ‘am ok thanks’ when one is indeed not fine at all are white lies, which help to make people relaxed.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Breaking sad news or disappointing news to someone may be difficult, for example, the death of a loved one may require one to tell a lie until one is able to bear the news. Compliments which are exaggerated, for example, ‘this is the best meal I’ve ever had,’ are good and harmle ss in that they help people to get along well. Thus, a white lie is usually told to protect others, and hard lies are told to protect oneself. During grief and difficult times, people who are grieved may not be good company, and are better left alone to deal with the problem, though; it would feel unloving to tell him/her that they are better left alone. Hence, one should be careful when telling the truth so that they do not look as if they are putting their feelings before other people’s feelings. In some instances, people say yes when they mean no or say it is okay when it is not. This happens when one does not want to upset another, so they pretend to enjoy what the other person is doing, for example, watching a movie, a topic of discussion and food. Most people are afraid that the truth will hurt others especially, parents, siblings colleagues and friends. Lies are also told to avoid conflict between people, for example, when talking on the phone to someone they may not b e able to understand so a white lie can be told to avoid a conflict. When the two people meet later the whole issue can be resolved. When someone does not want to be rejected or attacked by his friends and relatives they can lie to be accepted. In the bible, there are times when lying brought good, for example, the Hebrew midwives lied to the Pharaoh resulting in God’s blessing on them(Exodus 1:15-21). Rahab also lied to protect the spies from Israel, however, the bible does not praise these lies even they gave good results. During the times when the Nazi occupied Holland a woman named Corrie ten Boom hid Jews in her home to protect them from the Nazis. When the soldiers asked her where the Jewish men were hiding she lied to protect them from death. In this case, she lied to protect the loss of human life. Lies can be told in desperate and dangerous situations so as to prevent an evil from occurring. These are the few circumstances when telling a lie might be the right thing to do. The bible may make an account of the times when lies were used to give positive results but it does not make it a right thing to do. People should learn to hold the truth firmly and allow the other person to experience the circumstances of the truth. The other person will learn to bear with the truth without blaming others for their feelings.Advertising We will write a custom essay sample on Is there a right time to lie? specifically for you for only $16.05 $11/page Learn More Most people tell lies in order to avoid hurting or annoying the other person, but this is only part of the problem. Dealing with the response of the other person to the truth is also a problem, for example, when one tells someone that the food was not well cooked, they get hurt and that leaves one feeling terrible. Uncaring responses to the truth can cause one to feel lonely and dejected. Therefore, most people are afraid of the uncaring response and loneliness after tellin g the truth. However, when one lies they still feel uncared for, lonely and depressed because of ignoring their feelings. Truthfulness and honesty are extremely important in society so that relationships can last for long. Without trust in a relationship, the quality of the relationship will be weakened. Therefore, telling a lie has never been better than telling the truth. No matter how hurtful the truth may be one has the right to be told the truth. For example, if someone is suffering from a serious disease the family should be told the truth even if it is hurtful. To tell the truth one has to gather a lot of courage to bear the response. By avoiding a person’s anger and hurt it does not substitute to love. When one tries to avoid the anger and hurt of others they create strains in their relationship, which can ruin the relationship. A person’s integrity is more important than any pain, conflict or loneliness that the truth may cause. It is better to lose a person t han to lose one’s integrity. Withholding the truth to protect one from conflict and loneliness makes one to blame and judge themselves later. Hence, a lie leads to misery, loss and judgment. This essay on Is there a right time to lie? was written and submitted by user Cara Green to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Indiscreet and Indiscrete - Commonly Confused Words

Indiscreet and Indiscrete - Commonly Confused Words The homophones indiscreet and indiscrete are not synonyms. Indiscreet is the more common word. Indiscrete is a technical term primarily used in scientific writing. The adjective indiscreet means imprudent, lacking good judgment, or carelessly talkative. The noun forms of indiscreet  are  indiscreetness  and  indiscretion. The adjective indiscrete means not separated into distinct parts. The noun form of indiscrete is indiscreteness. See also: Discreet and Discrete Examples The lawyers indiscreet remarks to the media provoked an angry response from the judge. Dr. John Watson: One word, Sherlock! That is all I would have needed! One word to let me know that you were alive!Sherlock Holmes: Ive nearly been in contact so many times, but I worried that, you know, you might say something indiscreet.Dr. John Watson: What?Sherlock Holmes: Oh, you know, let the cat out of the bag.(Martin Freeman and  Benedict Cumberbatch in The Empty Hearse. Sherlock, 2014) The indiscrete nucleus does not have a nuclear membrane and is therefore not separate from the cytoplasm. Practice(a) Questions are never _____; answers sometimes are.(Oscar Wilde, An  Ideal Husband)(b) Topology aims to formalize some continuous, _____ features of space. Answers to Practice Exercises Glossary of Usage: Index of Commonly Confused Words200 Homonyms, Homophones, and Homographs Answers to Practice Exercises: Indiscreet and Indiscrete (a) Questions are never indiscreet; answers sometimes are.(Oscar Wilde,  An  Ideal Husband)  (b) Topology aims to formalize some continuous, indiscrete features of space. Glossary of Usage: Index of Commonly Confused Words

Thursday, November 21, 2019

Arthistory Paper Essay Example | Topics and Well Written Essays - 500 words

Arthistory Paper - Essay Example Examples of oppositional dressing include punks, zoot suits and clothing that were made of skinheads. In most cases, they did arise where there was oppression and ill-treatment of the masses by the dominant groups. A practical case and instance is the zoot suits which was worn by the servicemen of African-American origin in protest to the white domination and racial discrimination. Similarly, people who lived in similar locality and geographical region had their social destiny bound together. Thus, in any case there was any change and shift from the popular culture, then people in same area moved together in that respect. For instance, when fabrics and puinks hit the ghettos, it was the in thing and every person who wanted to show solidarity with the masses blended with the culture. In retrospect, oppositional dressing relates to subculture in that, it was part of a behavioral or sectoral pattern of behavior within the large cultural spectrum. This is to say that the people who blended with the opposition dress shared similar culture, and the oppositional dress code that they adopted was just a part of the culture in terms of dressing. The term, notion and concept of dandyism refers to a culture where a human being places a lot of attention and weight on the physical and outward appearance. This is to say that the person would take a lot of time and resources to ensure that he or she appears nonchalant at the very least. In most instances and cases, dandyism was a cloud word used to discuss how the men stressed on their masculine principles to try to imitate the aristocrats. This is to say that a man would use refined language, often engage in leisure activities which are conventionally regarded as royal or aristocratic. In the period of the early 19th century, a dandy was a person who was self-made and strived hard to fit into the highest class of the society, (Wilson, 112). This was done regardless of the