Tuesday, January 28, 2020

Security Domains and Strategies Essay Example for Free

Security Domains and Strategies Essay Part 1: Multi-Layered Security Plan Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network. We can start with the Application layer. The Application layer provides the interface to the user. First the end user should be subjected to a background check to ensure against any potential malicious or questionable acts in the users past. Then the end user should be properly trained in the use of the computer and the proper protocols to access the network. Updates should be made frequently to keep the user up to date. When the user is in the network, make sure that any unnecessary devices, USB ports and any back doors are disabled. You also want to make sure that all files and emails and downloadable attachments are all thoroughly scanned prior to downloading. Finally, be sure to ensure content filtering, and restrict the end user to only what pertains to their primary function. The Presentation layer is responsible for encoding and decoding data that is passed from the application layer to another station on the internetwork. You must first ensure that all USB ports are disabled, as well as CD and DVD. This helps to prevent any unauthorized uploads or downloads Make sure that any devices that are not pertinent to the user are disabled as well. To prevent any downloads, use filtering and antivirus scanning. Make sure that any external devices are not used unless proper authorization is obtained. Update all software regularly and enable password protection and screen lock out when the computer is inactive. The session layer is responsible for creating, managing and terminating sessions that are used by entities at the presentation layer. First you must secure the physical part by making sure that your closets are secure under lock and key and video monitored as well. Make sure that you have an access list of personnel authorized into the closet and keep a log of all who access the closets. Use the highest key possible for all wireless access points. Finally, make sure that all the work stations are individually encrypted as well. You could use two forms of authorization at the users work station. The Transport layer implements reliable internetwork data transport services that are transparent to upper-layer protocols. First you want to disable ping, probing and port scanning on all the IP devices in the LAN to WAN, this helps prevent phishing and trolling for open ports or any vulnerabilities in the network. you also need to make sure you disable all IP port numbers and monitor with intrusion detection and intrusion prevention systems. You would also like to monitor all of the inbound traffic for any questionable items and apply file transfer monitoring, scanning, and alarming for unknown files. Finally, you should continuously check for vulnerabilities and fix them when they are found, and ensure domain name content filtering is used to keep users on task. The Network layer defines routing services that allow multiple data links to be combined into an internetwork. You should first restrict using the internet for private communications, set permissions to deny any social or streaming web sites or pages. Then put firewalls in place and apply Acceptable Use Policy in accordance to the RFC 1087: Ethics and the internet. Then get your ISP to put the proper filters on its IP router interfaces. Finally, you should back up all data in an offline, and of site location. Be sure to scan all email attachments for possible threats to the network. The Data Link layer provides reliable transit of data across a physical network link. The Data Link layer also defines the physical network-addressing scheme, such as the MAC Address on network interface cards in a workstation connected to a LAN. First you should encrypt all confidential data transmissions through the service provider. You should also make sure that your access control lists are enabled and implement continuous SNMP alarms and security monitoring. The Physical layer defines the parameters necessary to build, maintain, and break the physical link connections. First set automatic blocking for attempted logon retries, this will help against dictionary attacks. You could also apply first-level and secondary level security for remote access to sensitive systems. Be sure to encrypt all private data within the database or hard drive. Finally apply real-time lockout procedures if a token is lost or device is compromised. Part 2: Student SSCP Domain Research Paper This is a multi-layered security plan. First, Assign people that are fully trained and/or provide the training that makes it possible to do the job. To prevent malicious software and etc. in the 7 domains of an IT infrastructure, you can isolate and install preventions for each domain. The domains are as follows: User Domain, Workstation Domain, LAN Domain, and LAN to WAN Domain, Remote Access Domain, WAN Domain, and the System/Application Domain. The first part of the IT infrastructure is the User Domain. It is the weakest link in the IT infrastructure and this is where the users connect to the system. You can make the user aware to the risks and threats that they are susceptible to by holding an Awareness Training session. The system is password protected however; you should change passwords every few months to prevent an attack. Also, log the users as they enter and exit the system to make sure there’s no unauthorized access. While it’s the company’s choice to allow employees to bring in USB/Removable drives, you have a threat to someone obtaining the wrong information, or getting malicious software into the system. If you allow the USB/Removable drives, have a virus scan every time someone inserts one into a company computer. In a Workstation Domain, you need to make sure virus protection is set up. You are protecting administrative, workstations, laptops, departmental workstations and servers, network and operating system software. You can enable password protection and auto screen lockout for inactive times, use workstation antivirus and malicious code policies, use content filtering and antivirus scanning at internet entry and exit, and update application software and security patches according to the policies and standards. You need to also make sure that the laptops are up to date on the anitivirus software. The LAN domain will have all the protocols for the users to make sure that they are authorized to access those areas. Make sure that the server rooms are locked and wireless access points are password protected. A LAN to WAN domain is where the IT infrastructure links to a wide area network and the internet. To prevent any problems make sure you apply strict security monitoring controls for intrusion detection, apply file transfer monitoring, and disable ping, probing and port scanning on all exterior IP devices within this domain and have an alert system when someone plugs in a removable media disk(since they are not allowed). If a problem occurs, fix it fully to make sure it doesn’t happen again. In a WAN Domain, make sure to implement encryption and acceptable use policies. Scan all email attachments and prohibit the internet for private communication (if possible). Make sure security policies are being followed and every employee is in compliance and signs an acceptable use policy. You can allow only access to the mainframe from the job site or on an acceptable laptop. For the Remote Access Domain, you need to focus on password attempts and encryption. First, you need to apply a user id and password. Then, limit the number of times that a user can enter his or her password before it locks out. Also, apply time lockout procedures on confidential data and make sure you encrypt also. Make sure you have qualified people doing their jobs correctly since they will have remote access to other people’s computers. In a System/Application Domain, it holds all the mission critical systems, such as, operating system software, applications, and data. To prevent any virus, malware, or unauthorized access into your system, apply a code of ethics, and implement daily backups. Also, apply polices, standards, and guidelines for all employees who enter and exit the building, make sure all server rooms are secure and that only the people that have access to them are entering them. In conclusion, encryption is a big part of domain security, along with firewalls and doing virus and malware scans. As long as you cover the major aspects and security measures listed in this document, that will be a big plus for your company.

Monday, January 20, 2020

Oliver Twist Analysis Essay -- essays research papers

Oliver Twist Oliver Twist, a poor, innocent orphan boy, stands out in this story as the main character, but it is the supporting characters that allow this novel to develop a much more satisfying and believable theme. With "Good V.S. Evil" as one of the major conflicts, in such categories are the secondary characters found as well. Three supporting characters of Oliver Twist aid the elaboration of the story; these significant characters are Mr. Brownlow representing purity, integrity and goodness, Nancy as partially righteous, partially villain and lastly on the other extreme of the scale: Fagin, the symbol of evil, corruption and manipulation. Throughout the story we are introduced to each of these characters through an omniscient point of view, and are able to categorize them according to their personalities, thoughts and actions. With their differing levels of honesty and social status, each of them play a crucial role in the development of the story's theme. As most of the author's characters, Mr. Brownlow too, is brought out with an indirect presentation but it is not long after introducing him that his wholesome goodness is revealed to us. Though at first he accuses Oliver of stealing, his concern over Oliver's welfare on the street is a direct hint of his innocence which successfully helps him convince Oliver to board at his house. A generous and trusting man he was, perhaps too good a man to be true; but with all the malicious characters in the story, a pure persona was needed to ensure a happy ending. With honesty and great wealth as his prime qualities, he assists Oliver in his times of need and demonstrates to society with an exemplary touch, the attributes of a perfect citizen. As the positive extreme in both social status and benevolence, Mr. Brownlow is a definite aid in the development of the theme throughout the novel. Nancy, for us, must be the weakest character. Trapped between wanting to help Oliver evade Fagin's exploitat ion and her dedicated love for Sikes; she fails to survive to the end as she is convicted and ironically murdered by her own husband: Sikes, a brutal and abusive man. But there is a great need for this secondary character in the story, she serves not only as a tie between the scenes at the different house holds but as well she is the only hope of salvation for Oliver. Without her, Oliver may have never had... ...ty in the midst of England's nineteenth century. As revealed throughout the tale, England's nineteenth century was an period of much poverty and great social problems which resulted in a society of two opposing classes: the wealthy and the poor. Within these two classes lay two other opposing forces: the good and the bad. In the same way that good and bad exist within all classes in the novel, the same thing can be said about real life. What the theme of this story says about reality is that in today’s society, it doesn't matter whether you are rich or poor, educated or not, most competent human beings possess the ability to judge right from wrong and are therefore free to make whatever choices in their lives they wish to make, provided though, that they can live with the consequences of their decisions. In Oliver's case, even just as a very young boy, he too was able to judge right from wrong and ends up choosing not to steal. As a result of his decision, young Oliver is given a happy home and a promising future. On the other hand, Fagin's judgment is not so proficient, and concluding, he remains with nothing but insanity and a solemn life in jail until his last day comes about.

Sunday, January 12, 2020

An Abuse of Power Essay

Abigail is the most prominent example of power and manipulation, with far worse repercussions, fooling the court and pretending to be God’s voice to get what she wants. Hale declares before the court that â€Å"private vengeance is working through this testimony,† (105) when Proctor attempts to show the court Abigail’s machinations. She recognizes the Puritan’s fear of God, and their fear of witches, to manipulate those in power, gaining her own strength in the court and causing mass hysteria to turn in her favor. Her rise to power begins even before the hysteria, starting with the group of girls from the forest, but her tactics are no different: manipulate others to save herself. They fear being caught, and she plays to their terror, telling them if they â€Å"breathe a word, or the edge of a word, about the other things, [then she] will come to [them] in the black of some terrible night and [she] will bring a pointy reckoning that will shudder [them]† (19). This threat crafts her iron grip on the girls, allowing her to lead them against the town, lying and condemning folk to save themselves from strife over their actions. Abigail’s hold remains on the girls all through the play, forcing even the most honest to turn from truth and continue their lies â€Å"when people accused of witchery confronted [them] in court, [they] would faint, saying their spirits came out of their bodies and choked [them]† (98). This is evident in the scene where Mary confesses their lies, admitting they â€Å"never saw no spirits† and â€Å"were never threatened or afflicted by any manifest of the Devil or the Devil’s agents† (98). Abigail manipulates the court, using the power she’s gained to say she does God’s work, and Mary falls back to her, carrying out Abigail’s wishes by condemning John Proctor. This is similar to how Abigail got rid of Elizabeth by accusing her in her newfound place of power, so she could be with John, a fact that he addresses, refusing to â€Å"give [his] wife to vengeance† (73) when they come to arrest her. Abigail’s attitude of controlling the girls by vicious fear of witchery is easily comparable to that of the boy Jack in Golding’s Lord of the Flies. Jack recognizes the weakness in the group of boys, using their gnawing fear of â€Å"the beast† to turn them to his side, against Ralph. Though much more direct, Jack uses his power to threaten the boys on Ralph’s side, such as Samneric, to hail to savagery and chaos, much like Abigail did to Mary. He dominates the island, getting what he wants, and eliminating those such as Piggy and Ralph, who stand in his way. Abigail’s tactic of lying, manipulating fear and abusing her power in court grants her the same reward of getting her way, and pushing aside enemies like Elisabeth. The only difference is that Abigail’s actions come with far bigger consequences, more than Parris, Putnam or Danforth, fleshed out on a larger scale of victims who fell in the face of her machinations. In the end, Arthur Miller’s Crucible is a fine study of manipulation and abuse of power, shown in various forms, through vicious antagonists, always exploiting Salem’s fear to achieve their own selfish goals and further themselves on the social food chain. What Miller is perhaps attempting to demonstrate through this play is that those in positions of power will always abuse it, especially when faith is involved, because of the â€Å"manipulation of that faith to create fear and control† (Bardem), as have done Danforth, Parris, Putnam and Abigail.

Saturday, January 4, 2020

The Lottery, by Shirley Jackson Essay - 2025 Words

â€Å"The Lottery†, by Shirley Jackson is a short story about a disturbing social practice in a village. Besides, there were about three hundred citizens in the small village where the setting took place. The introduction of â€Å"the lottery† is about an event that takes place every year on 27th in the month of June, where the community members of this tradition organize a lottery. Everyone in the village including small children to adults is expected to participate. Besides, when this story was introduced at the very first in 1948 by Shirley Jackson, many people were upset. This is because this story was so strange to undertake in modern enlightened times. Furthermore, understanding the fact†¦show more content†¦Besides, Jackson mentions â€Å"the children assembled first, of course. School was recently over for the summer and the feeling of liberty at uneasily on most of them.† (pg. 194). Here Jackson was arg uing that how the lottery was very barbaric ritual and the traditions beliefs has become a normal thing among the villagers. Further, the children even know what the lottery is about. This therefore proves how barbaric this village. In addition, modern societies today do not allow their children to participate in such events of violence and murderous acts. Comparing the time period of those days to today, many of the traditions and rituals that took place in the lottery has almost been demolished. Besides, there are traditions today that practice stoning a person to death in public. One of them is the Islamic religion. In some Muslim countries governed by shari’ah law, stoning is practiced. Among of them are Saudi Arabia, Nigeria, and United Arab Emirates (UAE). Furthermore, beginning of year 2002, announced were four stoning verdicts against women in Islamic states. One in Pakistan and Sudan and two were in Nigeria. This punishment of stoning was charged for adulte ry. According to Azlan Reza, recently Nigeria has practiced this punishment for crimes of sodomy and adultery. However, according to Emam Malek, stoning punishment has been a long tradition in Islamic religion. Besides, when it comes to the practice of stoning adulterers,Show MoreRelatedThe Lottery, By Shirley Jackson1195 Words   |  5 PagesOn the surface, Shirley Jackson’s short story, â€Å"The Lottery,† reads as a work of horror. There is a village that holds an annual lottery where the winner is stoned to death so the village and its people could prosper. Some underlying themes include: the idea that faith and tradition are often followed blindly, and those who veer away from tradition are met with punishment, as well as the idea of a herd mentality and bystander apathy. What the author manages to do successfully is that she actuallyRead MoreThe Lottery by Shirley Jackson757 Words   |  4 Pagessucceed but many fail just like the main character Tessie Hutchins on in Shirley Jackson’s short story â€Å"The Lottery†. When someone hears the word â€Å"lottery†, he or she may think that someone will be rewarded with prize. But â€Å"The Lottery† By Shirley Jackson is different than what one thinks. In the story, a lottery is going to be conducted not like Mega Million or Powerball one play here. In the story, the person who wins the lottery is stoned to death instead of being rewarded with the prize. TessieRead MoreThe Lottery By Shirley Jackson931 Words   |  4 PagesIn 1948 Shirley Jackson composed the controversial short story â€Å"The Lottery.† Generally speaking, a title such as â€Å"The Lottery† is usually affiliated with an optimistic outlook. However, Jackson’s approach is quite unorthodox and will surely leave readers contemplating the intent of her content. The story exposes a crude, senseless lottery system in which random villagers are murdered amongst their peers. Essentially, the lottery system counteracts as a form of population control, but negatives easilyRead MoreThe Lottery By Shirley Jackson1504 Words   |  7 Pagesâ€Å"The Lottery† by Shirley Jackson In The Lottery Shirley Jackson fills her story with many literary elements to mask the evil. The story demonstrates how it is in human nature to blindly follow traditions. Even though some people have no idea why they follow these traditions. The title of the story plays a role in how Shirley Jackson used some literary elements to help mask the evils and develop the story. The title â€Å"The Lottery† serves as an allegory. When people think of the lottery majorityRead More`` The Lottery `` By Shirley Jackson894 Words   |  4 Pagesshort story â€Å"The Lottery†, author Shirley Jackson demonstrates Zimbardo’s concepts in three different areas: Authority figures, Tradition and Superstition, and Loyalty. The first concept Jackson portrays in â€Å"The Lottery† is the authority figures. Jackson indicates that the lottery is being held in the town center by one authority figure, Mr. Summers, annually on June 27th. Every June 27th, without fail, townspeople gather in the town square to participate in the annually lottery even though mostRead MoreThe Lottery, By Shirley Jackson1510 Words   |  7 PagesShirley Jackson’s â€Å"The Lottery† illustrates several aspects of the darker side of human nature. The townspeople in Jackson’s â€Å"The Lottery† unquestioningly adhere to a tradition which seems to have lost its relevance in their lives. The ritual that is the lottery shows how easily and willingly people will give up their free will and suspend their consciences to conform to tradition and people in authority. The same mindless complacency and obedience shown by the villagers in Jackson’s story are seenRead MoreThe Lottery By Shirley Jackson8 11 Words   |  4 Pagesâ€Å"The Lottery† was published by Shirley Jackson. The story was true expression of Jackson’s genuine thoughts about human beings and their heinous competence in an annual village event for corn harvest . First, her used to word symbolized main point of the story. Second, Jackson was inspired by few historical events happened in the past and a life incident in her life. Lastly, She was able to accomplish the connection between historical and biographical with the story. Therefore, Shirley Jackson’sRead MoreThe Lottery By Shirley Jackson934 Words   |  4 Pagesâ€Å"The Lottery† by Shirley Jackson signifies the physical connection between the villagers and their unwillingness to give up their tradition. â€Å"The Lottery† is very unpredictable and quite misleading. The black box has no functionality, except every June 27th. Shirley Jackson depicts the black box as an important and traditional tool. Although the villagers in â€Å"The Lottery† are terrified of the goal of the lottery and the black box, they are unwilling to let go of the tradition. Shirley Jackson portraysRead MoreThe Lottery by Shirley Jackson799 Words   |  4 Pagesthe mood and to foreshadow of things to come. The Lottery by Shirley Jackson is a story in which the setting sets up the reader to think of positive outcomes. However, this description of the setting foreshadows exactly the opposite of what is to come. In addition, the theme that we learn of at the end leads us to think of where the sanity of some human beings lies. The story begins with the establishment of the setting. To begin, Shirley Jackson tells the reader what time of day and what time ofRead MoreThe Lottery by Shirley Jackson1764 Words   |  7 Pagesfilled with excitement and eeriness, leaving the reader speechless. The Lottery , a short story written by famous writer Shirley Jackson, created an uproar on June 26, 1948, when it was published in the magazine The New Yorker (Ball). The gothic thriller, set in an unknown time and place, shares the tradition of a small town, a little larger than three hundred people, in which a drawing is held once a year. In this â€Å"Lottery,† each family’s husband draws a slip of paper from a black box. The husband