Tuesday, January 21, 2020

Gun Control Controls Nothing Essay examples -- ban on assault rifles

More and more frequently, we are saddened by the news of mass shootings. Whether it takes place in a school or public area, these shootings are both disastrous and mortifying. Families begin to feel anger and sadness, and demand immediate justice. Although these terrible events continue to happen, there have been no significant steps taken towards the reduction in the number of weapons; specifically assault rifles. This leads one to question do we need to ban the right to possess such weapons? If the possession of these weapons is not made illegal, we run the risk of another attack. While there is no questioning the severity of these mass shootings, a ban on assault rifles is not the answer because they are not the cause of such events, and it is a constitutional right to own them. In 1994, Congress passed the Federal Assault Weapons Ban which eliminated the manufacturing of certain assault rifles for private use (Plumer). This bill expired in 2004, though, and was never redrafted. Many mass shootings in the last few years, especially ones at Virginia Tech, a movie theater in Colorado, and Sandy Hook elementary school in Connecticut have stirred up pressure to pass a new bill. Following the shooting at Sandy Hook Elementary School in Newtown, Connecticut last December, California Senator, Dianne Feinstein, drafted a bill to potentially ban the sale, transfer, manufacturing, and importation of assault rifles. This bill includes a ban on semiautomatic rifles, pistols, shotguns, and handguns. Additionally, it bans 157 other specifically-named firearms and certain ammunition feeding devices (Feinstein). Excluded from this ban are registered weapons at the date of the bill’s enactment and assault weapons used by military, law enforc... ...n-one-post/>. Pratt, Erich. "Background Checks Would Not Have Stopped Sandy Hook Shooter." US News. U.S.News & World Report, 18 Jan. 2013. Web. 02 Dec. 2013. . Rosenberg, Jennifer. "Prohibition." 20th Century History. About.com, 2013. Web. 03 Dec. 2013. . "Sandy Hook Elementary Shooting: What Happened?" CNN. Cable News Network, 2013. Web. 02 Dec. 2013. . "The Numbers Count: Mental Disorders in America." National Institute of Mental Health, 2013. Web. 02 Dec. 2013. .

Monday, January 13, 2020

Large-scale energy and metallurgy Essay

Industrialisation (or industrialization) is the period of social and economic change that transforms a human group from an agrarian society into an industrial one. It is a part of a wider modernisation process, where social change and economic development are closely related with technological innovation, particularly with the development of large-scale energy and metallurgy production. It is the extensive organisation of an economy for the purpose of manufacturing.[2] Industrialisation also introduces a form of philosophical change where people obtain a different attitude towards their perception of nature, and a sociological process of ubiquitous rationalisation. There is considerable literature on the factors facilitating industrial modernisation and enterprise development.[3] Key positive factors identified by researchers have ranged from favourable political-legal environments for industry and commerce, through abundant natural resources of various kinds, to plentiful supplies of relatively low-cost, skilled and adaptable labour. As industrial workers’ incomes rise, markets for consumer goods and services of all kinds tend to expand and provide a further stimulus to industrial investment and economic growth. The first country to industrialise was the United Kingdom during the Industrial Revolution, commencing in the 18th century.[4] By the end of the 20th century, East Asia had become one of the most recently industrialised regions of the world.[5] Contents [hide] 1 Description 2 History of industrialisation 2.1 Industrial revolution in Europe 2.2 Early industrialisation in other countries 2.3 The Third World 2.4 Petrol-producing countries 2.5 Industrialisation in Asia 2.6 Newly industrialised countries 3 Social consequences 3.1 Urbanisation 3.2 Exploitation 3.3 Change to family structure 4 Current situation 5 See also 6 References 7 Further reading Description[edit] According to the original sector-classification developed by Jean Fourastià © (1907-1990), an economy consists of: a â€Å"primary sector† of commodity production (farming, livestock breeding, exploitation of mineral resources) a â€Å"secondary sector† of manufacturing and processing (as paid work) a â€Å"tertiary sector† of service industries Historically, the industrialisation process involves the expansion of the secondary sector in an economy originally dominated by primary-sector activities. The first transformation to an industrial economy from an agricultural one, known as the Industrial Revolution, took place from the mid-18th to early 19th century in certain areas in Europe and North America; starting in Great Britain, followed by Belgium, Germany, and France. Later commentators have called this the first industrial revolution.[4][6] The â€Å"Second Industrial Revolution† labels the later changes that came about in the mid-19th century after the refinement of the steam engine, the invention of the internal combustion engine, the harnessing of electricity and the construction of canals, railways and electric-power lines. The invention of the assembly line gave this phase a boost.[7][8][9] The lack of an industrial sector in a country can slow growth in the country’s economy and power, so governments often encourage or enforce industrialisation. On the other hand, the presence of industry in a country does not mean in general that it will bring wealth and prosperity to the people of that country. And third, the presence of an industry in one country can make it more difficult for other countries to develop the same type of industry. This can be seen in the computer software and internet industries. Started from the US around the 1990s these industries seemed to spread over the world. But after a period of monopolisation less than a decade long, the globally-leading companies remain concentrated in the US.[citation needed] Their economic power and capacity to dominate the media work against the developing of the same types of industry in other states. History of industrialisation[edit]

Sunday, January 5, 2020

The Perception Of Violence Within The Public Safety Field

Introduction This learner thinks that once the organization or system can understand the causes and the behavior of violence crime within their neighborhood, then they will be able to add measures, step, or both to prevent this type of behavior within their communities/neighborhood and apply them skillfully. Therefore, this learner will explain the main tenets of the perceptions of violence within a community as it relates to public safety leadership, and explain the reasons behind this learner’s perception, and evaluate the credibility. We will also take a look at what types of challenges the public safety field has when dealing with violence’s. Once that is addressed we will evaluate whether the personal perceptions of violence has changed, or is it reinforced, and try to gain an understanding how one might address ethical implications of perceptions of violence for professional practice in the public safety field which will help us when ethical or unethical matter come up within our organization. That when it does we will have some form of guide to follow to address these issues. Summarize the main principles of the perceptions of violence within communities This first question is rather hard for this learner to answer being that this learner is unemployed, and does not know where here degree will take her, but this learner can answer this section from a person perspective point of view. This learner believes that this course just confirm what she alwaysShow MoreRelatedA Brief Note On Shootings Shooting And The 2012 Aurora Shooting973 Words   |  4 Pagesrepresented through the lens as a public health frame where the issue is seen as focusing on health and safety risks to society. Figure 2 (shown above) illustrates a comprehensive numerical analysis of how articles in three selective years relate to the two frames created by frame alignment with the framing changing in frequency over the span of the twenty-year period. As indicated by the bar graph, as the constitutional frame has been increasing, so has a public health oriented idea of gun controlRead MoreSchool Uniforms Persuasive Essay1127 Words   |  5 Pagesevery day due to a fear of violence and harassment from their peers. Students at many schools, including my own, have become more divided. This division has resulted in bullying especially towards students that stand out from the crowd with the way they look and dress. Along with continuing the anti-bullying programs already in place, public schools should implement a school uniform in order to reduce divisions among students, which should, in turn, reduce bullying and violence among students. A firstRead MoreThe Ludlow Massacre Of 1914 Essay1522 Words   |  7 Pagesof Colorado. Within the book, the operation of Colorado coal companies in capitalizing the coal industry lead to the formation of the mine workscape in which united coal miners underground the mines and above the surface to fight for industrial and political rights. This paper would define the concept of workscape in the definition given by Andrews, and provide evidence of the responsibility of the exploitation of capitalism in forming the mine workscape in the Colorado coal fields between the lateRead MoreCase Study Term 2 Unit 4 Assignment750 Words   |  3 Pagesenforcement, correctional system and legal system are a few of the criminal justice professions that are entrusted by the government with the powers to protect and serve the citizens of the country. Law enforcement officer’s role is public safety, which can officially be broken down in different functions, enforcing the law, keeping the peace and protection of life and property. In carrying out the function law enforcement officer have to exercise discretion. Without law enforcementRead MoreMidterm Essay Exam1637 Words   |  7 Pagesexperiment do that was different from what basic patrol officers do? What was the relationship between the officers in this experiment and other patrol officers? The Kansas City Gun Experiment was a police patrol project that aimed at reducing gun violence, drive-by shootings, and homicides. The purpose of the experiment was to focus on gun crime â€Å"hot spots† through problem-solving policing and directed patrol in high-crime areas. The overall goal was to prove that this style of policing would reduceRead MoreCrime and Forensic Psychology1117 Words   |  5 Pagespopular culture, the public receives a skewed version of crime. The public’s knowledge may be particularly lacking with regard to the entire field of criminology, the differences between blue-collar and white-collar crime, and the general perception of the incidence of crime in the United States. You are asked, as the public relations representative of your police department, to provide an information session on the field of criminology.  The expectation is to make sure the public understands the factsRead MoreDomestic Violence And Its Effects3294 Words   |  14 PagesExecutive Summary As many people know, domestic violence is a criminal act involving victims and offenders who are related to one another. Domestic Violence includes intimidation and simple, aggravated, and sexual assault. What most people may not be aware of is that domestic violence has become a national dilemma, with a crime of this type occurring every 9 seconds. Family members try to ignore what’s happening and neighbors do not want to get involved. The victim is usually helpless to understandRead MoreEssay on Codes of Practice1513 Words   |  7 PagesThis is shown well within the Australian Standards board of advertising which contains seven clauses relating to standards. As shown in Jones (2007, p. 150) Which includes discrimination or vilifying people must not appear in adverts, no presentation using violence, and sensitivity in the treatment of sex, avoid sexuality and nudity, avoidance of alarm or distress to children, avoid strong or obscene language and apply consistency with p revailing community standards on health safety. Consumers oftenRead MoreBenefits Of Homeschooling : Children s Unique Learning Style And Provides A Healthier And Safer Learning Environment978 Words   |  4 Pageshealthier learning environment than a public-school system. The home environment lacks drugs, peer-influence, bullying, and school shootings. Parents spend more time interacting with their children one-on-one which, is nowhere close to the large teacher/student ratio within the public schools. 1. Claim: Homeschooling provide a healthier and safer learning environment. 2. Evidence: Gallup polls from the early 1970s found that the public thought school safety, called â€Å"discipline†, was the numberRead MorePrison Reform : The United States2438 Words   |  10 Pagesreform, and where they come from. To this end, we must explore the American political system, public perception, prisoner rights, disenfranchisement among parolees, the social justice movement, and efforts to lower recidivism among convicted felons. As seen throughout the history of the United States, there has always been a degree of exploitation by politicians in regards to crime that is meant to direct public attention and unease. Over the last four and a half decades the U.S. prison population has

Saturday, December 28, 2019

Chinas Three Sovereigns and Five Emperors

Back in the earliest mists of recorded history, over four thousand years ago, China was ruled by its very first dynasties: the mythical Three Sovereigns and Five Emperors. They ruled between about 2852 and 2070 BCE, before the time of the Xia Dynasty.   Legendary Reigns These names and reigns are legendary more than they are strictly historical. For example, the claim that both the Yellow Emperor and Emperor Yao ruled for exactly 100 years immediately raises questions.   Today, these very earliest of rulers are considered demigods, folk heroes, and sages all rolled into one. The Three August Ones The Three Sovereigns, also sometimes called the Three August Ones, are named in Sima Qians Records of the Grand Historian or Shiji from about 109 BC.   According to Sima, they are the Heavenly Sovereign or Fu Xi, the Earthly Sovereign or Nuwa, and the Tai or Human Sovereign, Shennong.   The Heavenly Sovereign had twelve heads and ruled for 18,000 years.  He also had 12 sons who helped him rule the world; they divided humanity into different tribes, to keep them organized. The Earthly Sovereign, who lived for 18,000 years, had eleven heads and caused the sun and moon to move in their proper orbits. He was the king of fire, and also created several famous Chinese mountains. The Human Sovereign had only seven heads, but he had the longest lifespan of all the Three Sovereigns - 45,000 years.   (In some versions of the story, his whole dynasty lasted that long, rather than just his own life.)  He drove a chariot made of clouds and coughed the first rice out from his mouth. The Five Emperors Again according to Sima Qian, the Five Emperors were the Yellow Emperor, Zhuanxu, Emperor Ku, Emperor Yao, and Shun.   The Yellow Emperor, also known as Huangdi, supposedly ruled for an even 100 years, from 2697 to 2597 BCE.   He is considered the originator of Chinese civilization.   Many scholars believe that Huangdi was actually a deity, but was later transformed into a human ruler in Chinese mythology. The second of the Five Emperors was the Yellow Emperors grandson, Zhuanxu, who ruled for a modest 78 years.   During that time, he changed Chinas matriarchal culture to a patriarchy, created a calendar, and composed the first piece of music, which was called The Answer to the Clouds. Emperor Ku, or the White Emperor, was the great-grandson of the Yellow Emperor.   He ruled from 2436 to 2366, just 70 years.   He liked to travel by dragon-back and invented the first musical instruments. The fourth of the Five Emperors, Emperor Yao, is viewed as the wisest sage-king and a paragon of moral perfection.   He and Shun the Great, the fifth emperor, may have been actual historical figures.   Many modern Chinese historians believe that these two mythological emperors represent folk memories of early, powerful warlords from the era just before the Xia Period. More Mythological Than Historical All of these names, dates, and fabulous facts are obviously more mythological than historical.   Nonetheless, it is fascinating to think that China has some sort of historical memory, if not precise records, from about 2850 BCE - almost five thousand years ago. The Three Sovereigns The Heavenly Sovereign (Fuxi)The Earthly Sovereign (Nuwa)The Human Sovereign (Shennong) The Five Emperors Huang-di (The Yellow Emperor), c. 2697 – c. 2597 BCEZhuanxu, c. 2514 – c. 2436 BCEEmperor Ku, c. 2436 – c. 2366 BCEEmperor Yao, c. 2358 – c. 2258 BCEEmperor Shun, c. 2255 – c. 2195 BCE

Friday, December 20, 2019

Love Is Blind Essay - 1006 Words

Do you remember your first kiss? Did you keep your eyes open or closed? I bet you closed your eyes. Isn’t this the essence of â€Å"love is blind?† You kiss them without fear, and without any sense of danger. You do not have to see the one you love to know you love them. You accept love on blind faith. Love is blind and for a moment we use this phrase to justify the obvious flaws we do not recognize in the people. Lovers are oblivious to the truth and therefore unable to be clear-sighted. My perspective is that we are blinded by love and we act carelessly without assessing any of our actions, thus we have regret for any mistakes later on. My latest experience where love is blind has to do with a friend that I know for a little over six†¦show more content†¦After their personal meeting and a very memorable week, I have hoped that somehow their relationship will be better. Much to my surprise, it have gotten worse than I could ever imagined. Sharon is still in te ars and one day she told me that they had a very huge fight. I remember, she once told me that before leaving China, just by the airport when she were about to take off. He told her â€Å"I have to tell you something really important that you deserve to know.† Sharon was confused by his statement. After a year of having a rollercoaster and bittersweet relationship, it has turns out that he is married. He got married at an age of 22 to a girl whom was matched to him by his parents. He decided to go to China for a job but the truth is he went there to fulfill his duty as a husband. He respects his marriage and does not tolerate to divorce. Indeed it is a heartbreaking new to Sharon. Days and nights she cried until her eyes dry out and her heart mourns for him. Each day, he calls Sharon and wants her forgiveness. He says he missed her and wants to spend the rest of his life with her. Sharon says she needs time to assess things. I spoke to her a month ago and she still does not k now what to do. She is not angry at him or does not even feel betrayed of what he has done, rather, she is worried that her parents might come to know about it and they will force her to marry someone else. Sharon claims that he is the love of her life and does not mind that he is married.Show MoreRelatedBlind Love Essay examples474 Words   |  2 PagesBlind love can be a hurtful experience, or one that is misleading. One example of blind love is being in love with someone who will provoke you into doing things you would not normally do. While most people have certain standards which they live by, being in love with someone to the point that they influence you to go against what you believe in is a result of blind love. Being in love can often persuade a person to do anything in order to make the other happy, or to keep from loosing them. ItRead MoreLove Is Blind By William Shakespeare957 Words   |  4 PagesWhenever you are going out with someone you really love, you give your partner the affection and ready to forgive them at any time they are at fault. However, it is because you give too much love, people usually tell you that you are a fool for trusting them. Which correspond to the saying, â€Å"love is blind,† which means, you love someone too much and cannot see their fault even if they are hurting you. In the third person’s perspective, two people are being intimated with each other is seen as lovers;Read MoreEssay on Women in Violent Relationships1012 Words   |  5 PagesWhat is Love? Webster’s dictionary defines love as a strong, deep affection. Many of those who are or have been in love can definitely agree with that. My definition for love is all of earth’ s surroundings that make one feel good or happy; to me, love is not just love towards another, but it is also love towards something beyond. Everyone knows that love is a beautiful thing to experience: it feels like all the happiness in the world is in your hands and you could never be happier. But what happensRead MoreAnalysis Of The Story Cathedral By Raymond Carver1305 Words   |  6 Pagesdeterminers, a and the, that refer to the blind man in the story and its effects to establish the atmosphere of the story. He states that the change in determiner seems subtle, but these subtle changes are significant because the changes show how narrator feel about Robert throughout the story. Nesset studies the sexual polices and the love lives in several Carver’s stories. He discusses how Carver wrote his stories based on less of love and more of love withdrawal. Also Facknitz addresses rediscoveryRead MoreKing Lear by William Shakespeare803 Words   |  3 Pagesforces us to see t hat being blind is a mental flaw just as much as it is a physical flaw. Lear is not only metaphorically blind but is also blind toward nastiness and loyalty . We see Gloucester’s blindness in more literal terms as he is literally blind but he can still see, and Albany has a more common form of blindness, as he is blind to his wife. These characters are only able to see after a tragic loss. However the person in the play that is more significantly blind is King Lear. His role wasRead MoreDifferent Types of Love in Midsummer Night’s Dream1508 Words   |  7 PagesDifferent Types of Love in Midsummer Night’s Dream Love and lovers, both can be described as many different things. William Shakespeare shows us this in his play, A Midsummer Night’s Dream. In this play we see all types of love, from passionate love to foolish love. Along with this we also see different types of lovers and pairs. Examples of these lovers come from pairs like, Hermia and Lysander, Demetrius and Helena, Titana and Bottom, and Oberon and Titana. It seems that in A Midsummer Night’sRead MoreWilliam Shakespeare s A Midsummer Night s Dream1277 Words   |  6 PagesLove and reason will never fit together. Nor will love ever be a controllable compulsion. Maybe we are fools for going into the perilous, eccentric universe of love; yet what fun would life be without it? William Shakespeare s play A Midsummer Night s Dream investigates the unconventional, unreasonable and unpredictable nature of love during his time. Shakespeare conveys this through the main plot of the play, which is composed of the relationships between three couples. The three couples showRead More Shakespeares Presentation of Love in a Midsummer Nights Dream1097 Words   |  5 PagesShakespeares Presentation of Love in a Midsummer Nights Dream A midsummer nights dream was originally supposed to have been performed at a wedding. Therefore the theme of love would have been a suitable theme for the play. In this play, as in many of Shakespeares plays the main theme is love. Shakespeare presents many different aspects of love in the play. He shows how love can affect your vision of reality and make you behave in irrational ways. He presents many waysRead MoreThe, Where Am Calling From `` And What We Talk About Love1256 Words   |  6 Pagesother characters and also the apprehension of death experienced by some characters. In the following stories which will be discussed are as follow: â€Å"Cathedral†, â€Å"Where Am Calling From† And â€Å"What We Talk about When We Talk about Love†. The concept of impermanence of life and love are discussed in these stories. However, in some of the stories alcohol allows these characters to truly express themselves and to speak and perform activities they would have never been able to do. The contrasts and perspectivesRead MoreMiddle Childhood Phase Of My Life875 Words   |  4 PagesRadcliffe College and received a Bachelor of Arts edge and the first deaf-blind person to do so. While she was a student at Radcliffe she was interested in writing and wrote her own biography there which was The Story of My Life which was the first story she ever wrote. Even thoug h Helen graduated with a Bachelor of Arts degree she saw herself as a writer first. Helen wrote a series of books for a person who was deaf and blind. Keller went to become an amazing and world famous author and speaker. One

Thursday, December 12, 2019

A Report on Information Technology Risk Management

Questions: Task1. For this question you are required to make at least two (2) forum postings, arguing either for or against the quantitative method of risk assessment. You will be assessed on what you contribute to the debate in terms of quality not quantity (though your posting should at a minimum be a few sentences long). You may either create new thread or reply to a previous posting. All new threads should contain the subject line Quantitative Debate (I will do the posting, just need 2 arguments with refs to base the posts on please) 2. Study Exhibits 61.1 and 61.2 from Reading 3, and answer the following questions:(a) Explain in your own words what is meant by the terms Sweet Spot and Discretionary Area (see Exhibit 61.1) (b) Explain the significance of a security decision that is located to the right of the Sweet Spot but outside the Discretionary Area (see Exhibit 61.1). (c) Explain the significance of a security decision that is located to the left of the Sweet Spot but still inside the Discretionary Area (see Exhibit 61.1). (d) Explain why you think the Defined Highest Acceptable Risk is located on the Sweet Spot, but the Defined Lowest Acceptable Risk is located to the right of the Sweet Spot (see Exhibit 61.2).3. In Reading 7 for this subject, Ozier states that The [ALE] algorithm cannot distinguish effectively between low frequency/high-impact threats (such as fire) and high-frequency/low impact threats (such as misuse of resources). Explain why this is the case. Give an appropriate example to illustrate your explanation. 4. (Note: Make sure you show ALL your working for this question) The following threat statistics have been gathered by a risk manager. Based on these, calculate the ALE for each threat. 5. (Note: Make sure you show ALL your working for this question) Using the figures you calculated above, determine the relative ROSI (return on security investment) for each of the same threats with the following controls in place. Remember that a single control may affect more than one threat, and you need to take this into account when calculating the ROSI. Based on your calculations, which controls should be purchased? 6. Consider the data in the two tables that appear in questions 4 and 5 above. Sometimes a control may affect the cost per incident and sometimes the occurrence frequency, and sometimes both. Why is this the case? Illustrate your answer with an example drawn from the data provided.7. The year is 1999 and you are the risk manager for a large financial institution. You apply the Jacobsons Window model (Reading 11) to determine your companys preferred response to the impending Y2K bug. According to the model, should you accept, mitigate, or transfer the Y2K risk? Why? Do you agree with the models recommendations? Why or why not? 8. (Note: Make sure you show ALL your working for this question) You want to persuade management to invest in an automated patching system. You estimate the costs and benefits over the next five years as follows: Benefits: Year 1 Year 2 Year 3 Year 4 Year 5 $2,000 $2,500 $4,000 $4,000 $4,000 Costs: Year 1 Year 2 Year 3 Year 4 Year 5 $3000 $2000 $750 $250 $250 C alculate the Net Present Value (NPV) for this investment. Assuming that management has set the Required Rate of Return at 10%, should the investment be made? Why or why not?9. There are a number of qualitative risk assessment models that are available for use, such as FRAAP, OCTAVE, OWASP and CRAMM. Choose one of these models and briefly describe how risk assessment is conducted under this model. Describe an example situation where you could use this selected model. Give your assessment of the validity, or otherwise, of this risk assessment model. Answers: 1. Quantitative Debate Post 1 (Supporting quantitative method of risk assessment) As per a fact, quantitative method under risk assessment refers to a particular technique that quantifies the amount of risk based on the previously-identified level of risk. Utilization of those tools of risk assessment have expanded the extent of intelligibility including that of soundness, and so risk may be easily recognizable. It embraces an expressive matter that is associated to each stage of the specific risk assessment (. ., 2007). To this regard, on reviewing the details of this method it may be identified that by using these sequential steps one may easily point out the different hazards, outcomes of those hazards it they exist at all, probability of the hazards, and attributes of those hazards. Thus, it may be said that quantitative method of assessing risk includes effectual engineering, financial factors, and that of ecological analysis. Post 2 (Supporting quantitative method of risk assessment) On contrary to the quantitative technique of risk evaluation, this approach of quantitative analysis gives a more detailed scenario. The ultimate cause of providing increased focus upon quantitative approach of assessing risk is that to assess the presence of all risks by means of this approach. This is said to incorporate both probability of key hazards as well as their impacts. Hence, this approach makes it easier to specify which risk requires to be taken care of as per its priority. 2. Discussing sub-questions Sweet Spot and Discretionary Area: For reducing the hazards and their occurrence, organization incorporates an effective information security system. For implementing such an effective security system, it is important for the organizations to take up certain amount of expense. Another fact in this regard is that the extent of efficiency of a security system is in fact directly proportional to expense (Adler, Leonard Nordgren, 1999). On the other side, enhanced security system refers to the occurring of risk would reduce, which means risk is inversely proportional to the extent of incurred expense. Now, if a two-dimensional area is considered whereby security is to be measured by means of horizontal axis and that of expense by means of vertical axis, then the point of intersection of cost and that of risk curve, whereby both risks and costs are at equilibrium, the point is known as sweet spot. Also, it is important for every organization requires taking up at least some amount of expense to manage risk, and there are some level of risks that may not be reduced. Thus, if the predefined lowest cost, minimum extent of risk which cannot be reduced and all current practices associated to risk prevention are simultaneously considered, then the space in that dimensional area is called discretionary area. Security decision located towards the right of Sweet Spot and outside of Discretionary Area: As per the given figure, we can say that in such particular context, increasing aspects of security refers to some level of costs that has equivalent impacts upon reduction of risk as the level of risk reduced almost equally as that of the enhancement of security concerns. Discussion: The reason behind this context is the subsequent to that of Sweet Spot, and the proportional risk reduction rate has become lower than the incremental rate of incurred expense. 3. Arguments are raised that algorithm did not succeed to distinguish amidst the high impact/low frequency threats as well as high frequency/low impact threat. For instance, fire is considered to be low frequency high impact threat as well as misuse of resources is low impact high frequency threat(Yokouchi, 2007). The algorithm ALE could not make proper differentiation amidst the two threats. The cause may be explained along with an example. When an organization emphasizes upon the risk loss estimates, Annualized Loss Expectancy may be estimated. For calculation of this, the formula use is: Annualized Loss Expectancy = Asset Value * Exposure factor As per the given formula, it may be identified that on measuring the annualized loss expectancy, generally two factors are considered: asset value as well as exposure factor. On multiplying these two factors, the outcome is single loss exposure. Thus, it just measures the one dimension named risk (Adler, Leonard Nordgren, 1999). Thus, it does not succeed in identifying the frequency as well as impact or emphasis on the outcome. In matter of low frequency/high impact threat, the outcome magnitude may coincide with the outcome of high frequency/low impact threat. Thus, as a matter of fact it may be stated that oversimplification approach of ALE algorithm may be considered key factor associated with failing of drawing distinct difference amidst low frequency/high impact threat and that of high frequency/low impact threat. 4. Threat Cost per incident Occurrence frequency SLE ARO ALE Software piracy $600.00 1 per month 600 52 $31,200.00 Computer virus/ worm $2,000.00 1 per month 2000 12 $24,000.00 Information theft (hacker) $3,500.00 1 per 3 months 3500 4 $14,000.00 Information theft (employee) $6,000.00 1 per 4 months 6000 3 $18,000.00 Denial-of-service attack $11,000.00 1 per 2 years 11000 0.5 $5,500.00 Laptop theft $4,000.00 1 per 5 years 4000 0.2 $800.00 Web defacement $1,500.00 1 per 2 years 1500 0.5 $750.00 Fire $500,000.00 1 per 10 years 500000 0.1 $50,000.00 Flood $300,000.00 1 per 15 years 300000 0.066667 $20,000.00 5. Threat Cost per incident Occurrence frequency SLE ARO ALE Software piracy $500.00 1 per 4 months 500 3 $1,500.00 Computer virus/ worm $1,300.00 1 per 5 months 1300 2.4 $3,120.00 Information theft (hacker) $2,000.00 1 per 6 months 2000 2 $4,000.00 Information theft (employee) $7,000.00 1 per 13 months 7000 0.923076923 $6,461.54 Denial-of-service attack $4,000.00 1 per 10 years 4000 0.1 $400.00 Laptop theft $5,000.00 1 per 10 years 5000 0.1 $500.00 Web defacement $1,500.00 1 per 5 years 1500 0.2 $300.00 Fire $75,000.00 1 per 10 years 75000 0.1 $7,500.00 Flood $50,000.00 1 per 15 years 50000 0.066666667 $3,333.33 Return on Security investment needs to be calculated for every threat in association with the specific control. As per the given table it has been identified that return upon security investment is greater for IDS as well as Insurance. These controls may be bought to combat issues like information hacking or flood(Yokouchi, 2007). 6. On considering the two tables of answer 4 and 5, one may identify that expense per incident as well as frequency of change occurrence based on control. It has been observed that it is control that considerably impacts upon the expense per incident. An instance may be referred to in this scenario to explain the influence of control within the frequency of incident occurrence (Alhawari, Karadsheh, Nehari Talet Mansour, 2012). For combating with system virus, the total expense of the aspect was $2000 and that of occurrence frequency of 1 every month. On introducing control antivirus the expense was $1300 as well as occurrence frequency was 1 every fifth month. The cause is that there are various types of anti-viruses to fight the computer viruses. Their policy of license as well as cost may change with the alterations in the cost of incident as well as occurrence frequency. 7. During the year 1999, being a risk manager of a financial institution, I had applied the Window Model of Jacobson to respond to the T2K bug. This bug means the problem within both digital and non-digital data documentation and storage that is the result of the practice of abbreviation of four digit year to two digits. Thus, the year 2000 as well as 1900 cannot be differentiated. Various approaches were introduced to solve the Y2K bug (Vinaja, 2013). Observation suggests that data re-partitioning, data expansion, windowing, etc can be used to solve the issue. Here in this regard, the Window Model of Jacobson may be used. As per this model, risk may be attributed as per its occurrence frequency and that of the outcome of influence of every occurrence. This model of Jacobson had an assumption that suggests that each of the risks has either high or low occurrence frequency(Prado, 2011). Besides, each risk has high or low influence or outcome. It shows that generally two types of class es are responsible to causing such loss of equal magnitude while indicated in terms of annual rate or annualized loss expectancy. I totally agree with the recommendations of this model that reflects high or low risk requires to be addressed by selecting a proper security measure possessing a positive return upon investment based on the link between implementation cost as well as reduction in ALE. The Jacobsons Window Model suggests that other things remaining constant the security measure must be implemented based on the investment return. 8. Year Benefit Cost Net Cash flow Present Value Factor (@10%) Present Value 1 2000 3000 -1000 0.909090909 -909.091 2 2500 2000 500 0.826446281 413.2231 3 4000 750 3250 0.751314801 2441.773 4 4000 250 3750 0.683013455 2561.3 5 4000 250 3750 0.620921323 2328.455 Net Present Value 6835.661 The given table shows the calculation the net present value (NPV). This value refers to an effective mechanism to assess the investment options. It is identified that NPV of this very investment is quite positive. Within this method, all future cash flows are transformed into present value for estimating the potential of investment. 9. The Operating Critical Threat, Asset and Vulnerability Evaluation (OCTAVE) method was normally introduced to assess the risks of bigger organizations with increased number of employees around more than 300. It needs to be noted that size was considered to be the only factor in this regard. It bigger organizations, several layers as hierarchy can be identified. This technique is usually responsible to maintain the computing infrastructure along with the internal capacity to run the assessment of risk measure. Besides, this is beneficial to interpret the outcomes in regard to critical assets (Benaroch, Jeffery, Kauffman Shah, 2007). This method involves an approach comprising of three phases for scrutinizing the organizational and certain technological aspects by gathering a comprehensive presentation of requirements associated to the organizational information security. This method is comprised of some workshops that may be arranged by the internal analysis team formed by several organizational employees. The approach emphasizes upon the capitalizing information from various organizational levels. Therefore, this focuses on certain critical aspects like identification of key assets, risks, threats, opportunities of the company. Also, this approach focuses on creation of a strategy to provide protection to company. The strategy of protection relies upon the practice, including the plan to mitigate all potential risks for supporting the objectives of the company. This approach may be applied to assess the potential risks related to the information security. This OCTAVE technique may prove increasingly effective to determine the optimum security in various organizations. This may be backed up by an effective example for explaining the utilization of this approach. In context to health care organizations, these need to maintain large database as well as records of patients(Caron Salvatori, 2014). It is utterly important to protect the confidentiality of the records or information. Here, application of OCTAVE may be highly beneficial for maintain security of the database within the health care organizations. The approach emphasizes upon the capitalizing information from various organizational levels (Pappas Panagiotopoulos, 2009). Therefore, this focuses on certain critical aspects like identification of key assets, risks, threats, opportunities of the company. Also, this approach focuses on creation of a strategy to provide protection to comp any. Enhanced security system refers to the occurring of risk would reduce, which means risk is inversely proportional to the extent of incurred expense. Also, it is important for every organization requires taking up at least some amount of expense to manage risk, and there are some level of risks that may not be reduced(Dey Kinch, 2008). Thus, if the predefined lowest cost, minimum extent of risk which cannot be reduced and all current practices associated to risk prevention are simultaneously considered, then the space in that dimensional area is called discretionary area. References ., P., ., R. (2007). Simulating the Potential Effect of Risk Management on Project Scheduling.Information Technology J.,6(1), 8-13. doi:10.3923/itj.2007.8.13 Adler, T., Leonard, J., Nordgren, R. (1999). Improving risk management: moving from risk elimination to risk avoidance.Information And Software Technology,41(1), 29-34. doi:10.1016/s0950-5849(98)00095-0 Alhawari, S., Karadsheh, L., Nehari Talet, A., Mansour, E. (2012). Knowledge-Based Risk Management framework for Information Technology project.International Journal Of Information Management,32(1), 50-65. doi:10.1016/j.ijinfomgt.2011.07.002 Benaroch, M., Jeffery, M., Kauffman, R., Shah, S. (2007). Option-Based Risk Management: A Field Study of Sequential Information Technology Investment Decisions.Journal Of Management Information Systems,24(2), 103-140. doi:10.2753/mis0742-1222240205 Caron, F., Salvatori, F. (2014). Managing Information for a Risk Based Approach to Stakeholder Management.International Journal Of Information Technology Project Management,5(2), 30-43. doi:10.4018/ijitpm.2014040103 Dey, P., Kinch, J. (2008). Risk management in information technology projects.International Journal Of Risk Assessment And Management,9(3), 311. doi:10.1504/ijram.2008.019747 Pappas, A., Panagiotopoulos, P. (2009). Information Technology risk management in e-commerce: classical and catastrophic risk approaches.IJASS,2(3), 250. doi:10.1504/ijass.2009.027663 Prado, E. (2011). Risk analysis in outsourcing of information technology and communication.JISTEM,8(3), 605-618. doi:10.4301/s1807-17752011000300005 Vinaja, R. (2013). IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing.Journal Of Global Information Technology Management,16(3), 82-84. doi:10.1080/1097198x.2013.10845644 Yokouchi, A. (2007). Introduction of Weather Risk Management Technology in Farm Management.Agricultural Information Research,16(4), 226-234. doi:10.3173/air.16.226

Wednesday, December 4, 2019

Migrating Business Critical Applications †Free Samples to Students

Question: Discuss about the Migrating Business Critical Applications. Answer: Introduction As said by the Zhang, Cheng, Boutaba, (2010), Technology is improving being used by the several organizations across the business to improve and enable their organization performance. Krutz, Vines, (2010) suggested that One of the most effective technological innovations that have revolutionized the way business and people work in todays world in cloud computing. Implementation of the cloud computing technologies within the organization can facilities collaborative platforms from learning and research, improved services and flexibility capabilities, high efficiencies, better compliance and security and access to leading technology. As per the evaluation and findings, it is seen that the organization Commonwealth bank is presently suffered from the issues associated with the data handling and security. The observation also shows that organization functions its operations in all overall the world and most of the users are presently accessing the services through mobile devices; there fore, data theft related problems also considered the main problems for the organization. Thereby, the present report is mainly focused upon the effectiveness of the mitigation of the application and data sources into external computing in organization. Moreover the report also empathized on the security policies that could computing technology; uses to secure data or information. Apart from that the findings provides the effective conclusion and recommendation to solve the existence problems. With context to financial services Stakeholders of the organization are mainly investors in business whose actions are determined the result of the organization decisions. The stakeholders of the organizations are governments, customers, employers, investors etc. The main roles and responsibilities of the stakeholders is to make decision regarding the investment and providing the detailed requirements about the financial plan; that helps the organization to sustain in market and achieve set of objective in successful manner (Krutz, Vines, 2010).. Apart from that stakeholder of the organization also committing the necessary resources and determining the issues and risks associated with the organization. As per the findings and evaluation of the organization present scenario it is seen that the organization is not be able to provide effective security to data that hampered the organization performance in upcoming years. Interface between business stakeholders and technologist is done with the help of communication mode such as face to face communication, meeting, telephonic communication, etc. Before the implementation of the technologies within the organization main roles and reponsiblteis of the technologist to provide the all information to stakeholders regarding the project and how it assist the organization to perform effectively. Therefore the interface between the organization stakeholders and technologist is illustrated using stakeholder communication chart that is shown in below table; Stakeholders Impact stake the project what needs to be communicated risks CEO high Procedures and polices owners who find out institutional administrator procedures and policies Benefits of the implementation of the cloud computing technology and costs associated with the project (Takabi, Joshi, Ahn, 2010). Lack of clarity regarding preferred procedures. Financial management high Manage the organization financial system cost associated with the project and all of the devices, benefits in terms of finance associated with the costs Lack of budget planning Admin staffs Operate the organization new system moderate It helps the organization in order to contributes to process design as well as system and testing Worried about the workload increases and what training they will receive. Technical team They mainly helps to develop the system high how the system is developed and how testing is performed lack of knwonelge regarding the project As per the above communication chart it is seen that cost and benefits related to the project is most vital. Moreover, use of the cloud computing technology organization offers its services from anywhere and anytime. Cloud computing technology provides the office anywhere on demand delivery environment that changes the way infrastrure, desktop, LOB and storage applications are delivered to the clients (So, 2011; Chen et al., 2010; Chen, Zhao, 2012). Apart from that use of the cloud computing technology within the organization uses can simply access their data and information from anywhere via internet. The technology offers the cloud storage backup, which means the organization can stored its information in cloud and access them from anywhere at any time. As said by the Catteddu, (2010), Cloud storage and backup also provides simplicity, costs effective, removal of burden in house management and maintenance. The technology is deliver the data storage as services from the cloud provi der with the help of internet as well as billing computed on capability used in certain features. There are several benefits associated with the cloud computing technologies; Therefore, from the analysis and findings it is said that the stakeholders make an effective decision regarding the improvement of the services and incorporation of the cloud computing technology. Apart from that to implement the cloud computing technologies at workplace organization need to implements cloud computing regulatory stock take that provide an overviews of the country existing rules and regulations that implements to cloud services in Australia. The regulations cover the range of the contractual agreements, consumers protection, data protection and primary act. Security postures Security is the most vital elements for the organization and helps them to protect consumers data and information in successful manner. As said by the Catteddu, (2010), in present era most of the organization uses the past data and information to make decision in critical situations. As per the company scenario it is seen that access of the information of the organization done by the users suffering problems from accessing their own information from the organization. Moreover the observation also observed that network security also concerned one of the vital issues of the organization because the organization offers its services and products to users in both national and international market. Apart from that it is seen that the organization is suffered from the data storage issues that means to store huge amount of the data the organization needs to require extra hardware system that create high budget problems in front of the organization. Data breaches is one of the main component and organization security professionals believed that their organizations security measurements to safe data on physical devices i.e. server are low. Evaluating the scenario it is concluded that data breaching issues was more likely to occur for bank that uses the server. Hijacking of account also considered the main security issues of the organization and it is done mainly by attackers (So, 2011). Hackers or attackers continuously monitor the organizations network scenario and use of the malware code they can easily access the organization information and application software. After accessing the organization application software they modify and access the users personal information for his purpose. If the organization suffered from the security issues problems that they lose market confidence and customers satisfaction. Moreover, the analysis shows that if an organization not implements better security policies within the organization then they can hamper their organization performance and lose customers trust. Migrating organization critical application and their associated data source to an eternal cloud computing helps the organization to achieve high security, collaboration and mobility. As said by the Takabi, Joshi, Ahn, (2010), cloud computing technogly offers the organization to provide high level of the security protocol and to make sure data protection. The cloud computing technology implements high security protocols including strong access controls, data encryption technique, security intelligence. Apart from that cloud computing offers the virtualization security to the organization that means it provides the virtual server and application and it is not easy from the attackers or hackers to determine the exact location where data is stored. Apart from that the main security of the cloud computing technology is to enhance security software maintenance and mechanism. According to the Krutz, Vines, (2010), Cloud computing technology has an effectively ability to develop more soph isticated security procedures that helps the organization to secure users personal information and data. Costs associated with the cloud computing technogly are very less as compared to the physical data storage. Moreover, cloud computing technology provide application programming interface that provides organization the opportunities to customize their cloud expense better manner. Implementation of the cloud computing technology at workplace helps the organization to recover data, long term viability, investigated support, lower maintenance costs, redundancy and resilience. As per the evaluation and findings it is seen that the organization must have to implement migrate its application and data store in cloud computing technology because it not only helps them to secure its data but also achieve high users experience. In organization perspective, if they incorporate this technology at workplace then they reduces its extra hardware costs, maintenance problems and data security related problems. Apart from that accessing of the information is also done in easy manner as it provides huge amount of storage capability. Vulnerabilities, threats and consequences Risk assessment plan based on the vulnerabilities, threats and consequence Risk no Vulnerabilities threats consequences Risks summery Recommendation R001 Wet pipe sprinklers System in organization data base or data center Fire All the stored data in the database may be destroyed Fire should be activated causing water damage To check the fire system in regal basis R002 Organization users indentifies identification number no longer removed from the data center Users uses data in own purpose Integrity as well as confidentiality of organization data not authorized uses of not needed user identification could compromise integrity and confidentiality of organization data (Feng et al., 2011) in order to solve this problem in most effective and successful manner organization needs to update its data base in regular basis. On the other hand organization needs to change users password in every days. R003 Organization not updated its firewall system unauthorized users access the data and information Confidentiality and integrity of the data is hampered If the organization not implemented its firewall system in regular manner then attackers easily access the information In order to solve this problems in most effective and successful manner organization needs to implement dual firewall system in the database R004 Organization TCP packets directed at the port 1521 will hamper to stop responding Computer crime using malicious code Data integrity and confidentiality is hampered (Popovi?, Hocenski, 2010) Attackers attacks the computer network using denial of service attacks with the help of sending large amount of the package using port no 1521 could slow down the database In order to solve these problems, organization needs to impalements new updated antivirus system at workplace. R005 Password and user name are in initialization file and scripts Computer crime using malicious code Data integrity and confidentiality is hampered Password exploitation in initialization file and script could result in compromise of integrity and confidentiality of the organization data Update install antivirus system in regular manner R005 sensitive organization data is stored on USB drive Computer crime using malicious code Data integrity and confidentiality is hampered Loss of the data or information theft from USB drives could outcomes in compromise of data confidentiality Organization needs to implement high security password system in database and disable USB seating. Existing industry risk recommendations for the project As per the above risk assessment framework it is seen that risks R001 i.e. Wet pipe sprinklers System in organization data base or data center and risk R005 i.e. sensitive organization data is stored on USB drive might be occurred in the Australian multinational bank. Therefore in order to solve these problems in more effective and successful manner it is recommended that organization needs to update and monitor its security system in regular manner. From the findings it is also recommended that organization needs to implement up to date antivirus system at workplace that would helps them from the attackers attack. Data security The data flows associated with the project Identified rinks, Assess risks policies and risks mitigates Flow of the data from one end to other is shown in above diagram. With the help of cloud computing technology organization effectively send data from one end to others ends. Risks assessment and mitigation is explained in below table; Risks identification risk assessment Risk mitigation Data breach Data breach can be outcomes to loss the information and data of the organization. Implementation of the two factor authentication techniques and critical protection such as prohibiting the sharing account information (Krutz, Vines, 2010). Service or account traffic hijacking Use of this techniques in cloud computing it is too easy for attackers to hack the data and information of users accounts Implement a single sign on, end to end encryption techniques denial of service attacks accessing users information Upgrade system and in house applications Insecure APIs Manipulation of the users information and accounts done easy manner Implement SSL and TLS communication protocols Abuse of cloud services Access organization and users information easy manner (Krutz, Vines, 2010). Scope immediate services and implement dual firewall techniques Conclusion As per the above findings and analysis, it is seen that flexible costs, always on availability, high security, improved performance, improve coloration are the main features associated with the cloud computing that helps the organization to solve its existence issues in better manner (Takabi, Joshi, Ahn, 2010).. The findings shows that cloud computing have an ability to secure computer network and provide data to uses in easy manner at anytime and anywhere. Therefore, use of this techniques at workplace organization not only achieve better customers satisfaction but also reduces the complexity of the existence configuration. Moreover, from the observation it is seen that cloud computing is cost effective; therefore if an organization implement this techniques than they do not spend much amount in maintenance problems. Therefore from the findings and observation it is said that migrating business critical application and their associated data source to an external cloud hosting solut ion is the best approach for the organization. References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2010). A view of cloud computing.Communications of the ACM, 53(4), 50-58. Carlin, S., Curran, K. (2011). Cloud computing security. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011 (pp. 1-9). IEEE. Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for information security. In Web application security (pp. 17-17). Springer, Berlin, Heidelberg. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chen, Y., Paxson, V., Katz, R. H. (2010). Whats new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January, 20(2010), 2010-5. Feng, D. G., Zhang, M., Zhang, Y., Xu, Z. (2011). Study on cloud computing security. Journal of software, 22(1), 71-83. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Li, H., Dai, Y., Tian, L., Yang, H. (2009). Identity-based authentication for cloud computing. Cloud computing, 157-166. Popovi?, K., Hocenski, Ã… ½. (2010, May). Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE. Qian, L., Luo, Z., Du, Y., Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18. commbank. (2017). commbank.. [online] Available at: https://www.commbank.com.au/ [Accessed 26 Sep. 2017].