Thursday, October 31, 2019

MPH502 - Introduction to Public Health Module 4 - Case Essay

MPH502 - Introduction to Public Health Module 4 - Case - Essay Example Health indicators involve a careful analysis of mortality and morbidity rates of various groups (ethnic, racial or others), their life expectancy, standards of life, birth rates, records of prevalence of specific diseases, information about the access of a particular group to medical and health facilities, financial backgrounds of groups, educational standards and so on. The health disparities that exist between various groups are mainly the result of genetic variations, environmental factors and specific health behaviors. These are the most influential and useful indicators of health disparities that prevail in the ethnic and racial groups in the US. The causes of these differences also involve the lack of healthcare facilities available to a particular group, discrimination on the basis of gender, race, financial and social grounds etc. inadequate knowledge and educations, environmental differences and other reasons of this type. The diverse population of the United States requires careful attention to be managed properly when it comes to such delicate matters as health and life. In order to improve the health conditions, it is important to eliminate the health disparities that exist. Some ways are to utilize the information of death rates of groups and improve policies in order to eliminate the factors that are causing deaths in that particular group. Moreover, the accessibility to healthcare facilities must be available to all groups regardless of their racial, religious and cultural differences. Education is a must to improve the long term conditions of health for such a diverse population. Hence, educational facilities and their availability with proper guidance to the parents and students is also a factor to consider. There are certain environmental factors which are leading to adverse health outcomes in certain racial and ethnic groups. These environmental issues (both physical and social) are difficul t to be handled

Tuesday, October 29, 2019

The Influence of Society Essay Example for Free

The Influence of Society Essay Without society we don’t have some form of structure to keep us from overcoming selfishness. In the novel Frankenstein, by Mary Shelley and Macbeth by William Shakespeare, the obsession for power and knowledge is well brought forth in the characters of the text. In the beginning Macbeth and Victor Frankenstein are well respected. Then, the two characters remove themselves from society causing their great obsessions to over-power them, in which they lose control. Macbeth and Frankenstein lose their original reputations when they remove themselves from society and their own identities become consumed by an obsession for power. Both Macbeth and Frankenstein are originally well-respected members of their community. Macbeth is a loyal friend to the king and was known for his bravery in fighting. â€Å"Conduct me to mine host. We love him highly/ and shall continue our graces towards him. †(I. V. 30-31). Duncan is saying how he thinks very highly of Macbeth and favors him, proving Macbeth’s honorable reputation. Victor Frankenstein is a well-known man for his knowledge and understanding in the sciences. Curiosity, earnest research to learn the hidden laws of nature, gladness akin to rapture, as they were unfolded to me, are among the earliest sensations I can remember. (Shelley 31). Frankenstein’s reputation was based on his fascination for science and his commitment to it. Macbeth and Victor Frankenstein were both well known in their communities and highly thought of. Soon both Macbeth and Victor lose the connection they have to society by removing themselves from it so they can focus on their individual goals. Macbeth unconsciously slowly starts to remove himself from society when his desire for ultimate power takes over as he decides he will stop at nothing to be in control and become king. â€Å"The prince of Cumberland! That is a step/on which I must fall down, or else oerleap,/for in my way it lies. Stars, hide your fires;/let not light see my black and deep desires. /The eye wink at the hand, yet let that be/Which the eye fears, when it is done, to see. †(I. IV. 50-55). Macbeth is at the point where he starts to remove himself from society and is becoming consumed with his obsession of being king and having power. Frankenstein’s love for science turns into an obsession when he gets to the point where he attempts to play god. After days and nights of incredible labour and fatigue, I succeeded in discovering the cause of generation and life; nay, more, I became myself capable of bestowing animation upon lifeless matter. (Shelley 30). Frankenstein has cut himself out from the world and is consumed in his obsession to give life. Macbeth and Frankenstein seclude themselves from society because of Macbeth’s obsession for power and to have control, and Frankenstein’s obsession to be god and create life to prove his knowledge. Both Macbeth and Frankenstein ev entually lose their identities in society when they give in to their obsessions for power. Macbeth loses his identity after giving into his obsession of being king and killing Duncan and Banquo. â€Å"Prithee, see there! Behold! Look! Lo! How say you? /Why, what care I? If thou canst nod, speak too. /if charnel houses and our graves must send/those that we bury back, our monuments/shall be the maws of kites. †(III. iv. 72-76). Macbeth has officially lost his identity when he sees Banquo’s ghost and starts acting crazy infront of his guests and they are starting to question if Macbeth is guilty for Duncan’s death. Victor Frankenstein has a loss of identity when he becomes a mad scientist and digs up graves for corpse, sew pieces together, and then brought the results to life. )We can see how a person who lives within a society, interacting on a regular basis with others, tends to follow and respect the standards, morals and cultural traditions of their society. When a person removes themselves from society because they have become obsessed with singular or private pursuit, and that obsession is greater than everything and everyone else in their life, they can become very selfish, self-cent ered, self-serving, and in the case of Frankenstein and Macbeth, evil. In the case of Frankenstein, he came from a loving family, who supported him and was a good man until he became obsessed with creating a monster and isolated himself from his family and others as he built his monster. In the end Frankenstein realizes that he has disrupted the balance of nature and confesses to it: â€Å"How dangerous is the acquirement of knowledge and how much happier that man is who believes his native town to be the world, than he who aspires to be greater than his nature will allow. †(Shelley, 87). In the case of Macbeth, he had a pretty good life. He had a good marriage and was good friends with the king, until he became obsessed with being king and ruined his marriage and his life. Macbeth and Frankenstein obsession for power results in the removal from society, which makes them lose their original reputation. The two characters go from having a good reputation in society to being consumed by their obsessions for power of control and power of giving and creating life. This caused Macbeth and Frankenstein to lose their identities.

Sunday, October 27, 2019

Creation And Purpose Of The Articles Of Confederation History Essay

Creation And Purpose Of The Articles Of Confederation History Essay After colonies received their independence from Great Britain, each state was different from each other and had its own form of government. So, it was necessary for a national government to unify them, in case of any disputes that threaten the nation as a whole like the Revolutionary War. Because, the colonies were too unfit to face any problems it faced on as its own independent nation. The Articles of Confederation was able to form a loose confederation of United States and deal with foreign disputes as an entire nation. In essence, it was the first national government for the United States. But, the ideas of having a national government were around a long time ago. Eventually during July 1775, he submitted a brand new call for the Articles of Confederation, however no drafts were written up until 1776. At last, it became ratified by all 13 states in 1781. (146) Weaknesses of and Problems with the Articles of Confederation Although the Articles of Confederation had the ability to bring the states together under one form of government, it later soon was introduced to many problems because of how weak it was. Such as, Congress did not have the power to dish out taxes. A big problem had arisen. There was an inability to raise funds prevented Congress from paying for an army. Threats could possibly be imposed against our nation because Congress could not provide national defense. In addition, there was no way to carry out treaties, which made international affairs painfully suffer since other countries became unsatisfied their treaty wasnt taken in action by the states. Congress couldnt issue trade restrictions or stop states from issuing their own standard form of money, so the country was really able to see where they were economically. It couldnt protect property rights, there was no power over state governments, and was dependent on whether states wanted to be involved. Articles of Confederation proved to be too weak, so it had either to be rewritten Constitution or have a newly thought of Constitution in total.(175) Achievements and Successes Under the Articles of Confederation Although, Articles of Confederation soon proved to be unfit or low in strength, it did have some achievements and ups for training an army to fight. This helped garner international view of the United States as being an independent nation of the world. After the Revolutionary War, one of the most important things of the Articles of Confederation was passing the Northwest Ordinance of 1787. This created a blueprint on how a territory could become an actual state; slavery became banned in the Northwest Territory, and saving land to provide for education. Before it was proved to be too weak, the Articles of Confederation also established an ideal central government for the colonies that was not a dictatorship. Many of the colonists feared a powerful national government, the Articles created a very weak, national government, which permitted each state to become much more independent and makes decisions on its own. In Congress, every state received equal representation, disregarding its population. This prevented one state from receiving more votes than others, so every state received one vote. (172) Shays Rebellion A downfall in the economy had occurred, which was created by the low in security of the Articles of Confederation targeted poor farmers the hardest, causing many poor farmers to lose everything. Unhappy with their unpaid dues and the new taxes imposed on them, a farmer by the name of Daniel Shays led a rebellion of 1,200 farmers to protest in January 1787. This became to be known as Shays Rebellion. Abiding by the Articles of Confederation; the Congress couldnt even build upon to put an end to the protest, because most of the protesters were former soldiers of the military itself. The state army was the only army who could try to put it down. This convinced many government officials that a stronger national government was necessary for a last country and that the Articles of Confederation proved to be too weak. A stronger government was needed not only to be able to put down such protests, however to prevent the national turmoil that slowly led up to the upbringing of this rebellion that happened known as Shays Rebellion. (170) Key Delegates to the Constitutional Convention and their Contributions After Shays Rebellion proved how the weakness of the Articles of Confederation was obviously shown, 55 delegates from all twelve states excluding Rhode Island grouped together in the Philadelphia Convention to revise the Articles of Confederation. However, they made the decision to completely throw out the Articles of Confederation and began forming a new framework for the Constitution. Some of the many key delegates at this convention were James Madison, George Mason, George Washington, Alexander Hamilton, and Benjamin Franklin. Some of the names of lesser known, but just as important delegates were James Wilson, Roger Sherman, William Paterson, Oliver Ellsworth Edmund, etc. Each of these delegates played an important role in forming a new Constitution. George Washington was elected in president of the convention, and James Madison was the main author Constitution and Virginia Plan. William Paterson was the one who thought of and created the idea of the New Jersey Plan and Roger Sherman and Oliver Ellsworth combined the Virginia and New Jersey Plan into forming the Great Compromise. Roger Sherman and James Wilson also created the 3/5ths Compromise. Although the Bill of Rights was not added right away, George Mason is the main author of the Bill of Rights. The contributions of ideas these men made at the Philadelphia Convention played an important role in the formation of the United States, where their ideas are still remain relevant in the Constitution. (223) Purpose of the Constitution In essence, the reason of the Constitution was able to take the place of the nations weak government under the Articles of Confederation with a much stronger, national government that could fix the problems of the entire country caused by the Articles that had an impact on all states. The Constitution gave the national government new powers that it did not have before to keep stability and order in the country. Some of these powers include imposing taxes, funding money, having control over the states, putting treaties into action, controlling commerce, providing defense for the borders of the United States, and guarding rights. All of these powers were nonexistent in the Articles of Confederation, which kept the country remain unified. Under the Constitution, the national government could build upon foreign affairs, fund money through taxes, issue a standard currency, prevent uprisings by having money to pay the army, and restrict a recession by maintaining economic power over the states. This demonstrates how important the Constitution was to the United States development. It solved many problems in the United States that would send the nation into crashing into the ground under the Articles of Confederation, bait it strengthened the nation as a whole. (194) Key Issues and Compromises Regarding the Constitution Numerous important issues taken place during the Constitutional Convention like the Virginia Plan and New Jersey Plan. After long debate, the Great Compromise was created where the House of Reps would be based on proportional representation of each state, and the Senate has equal representation for each state. Another important problem was whether to have slaves count as part of the population for representation. This issue was solved by the Three-Fifths Compromise, which said that every five enslaved persons would count as three free men. This meant that each slave would be counted as three-fifths of a person. These arguments showed to be very important in Americas history, where the Three-Fifths Compromise, where the South supported the idea because they wanted a bigger population .While, the North opposed it. This gave an indication early on of how the country was foreshadowing the beginning to divide itself and its opposing views points. On the contrary, these compromises in this convention showed the countrys willingness to agree on problems at hand so that they could try to find compromises, instead of always fighting stubbornly for what they wanted. They did what was needed for the entire nation. (233) Organization and Structure of the New Government Under the Constitution Under the rule of the Constitution, there was now a national government that the ability to efficiently run the nation. Despite the gain of power, the Constitution also limited federal power by having the three branches of government: legislative, judicial, and executive. Separating the governments power into three branches and creating a system of checks and balances, every branch of government would limit the power of the other branches. With these limits on each other, not one branch could become more powerful than the other. Also, power was divided between the national and state governments because of federalism. This controlled the power of the national government. Therefore, the power of federalism and sep. of powers, many checks were placed on the national government to limit it and prevent it from receiving too much power. The creation of the Constitution was very necessary in the history of America that still did not absorb all the power. (166) Debates about Ratifying the Constitution and how the Constitution was Actually Ratified For the Constitution to take effect, nine out of the thirteen meaning 9/13 states had to agree or ratify the Constitution. At first, this was a hard feat to achieve because the Constitution was not liked by many since different states had things to say.. Even the Federalists said that it wasnt the most perfect form of government, but was the best form of government the delegates could think of. There was a lot of arguing over problems that the delegates were debating themselves at the convention. People were arguing about the three-fifths compromise and ending slave trade, which increased animosity between the North and the South. In addition, they argued that there was no Bill of Rights where the government would protect the rights of the citizens. The Federalists were at last able to gain followers for the Constitution after they said they would follow up with a Bill of Rights right after ratification. After, two thirds of the colonies agreed to it. Finally, all 13 colonies agreed with the Constitution. . The ratification of the Constitution and the arguments for it shows how the American people came up with compromises for their problems. Instead of opposing lane another and being closed minded, they are open to solutions and compromises. (240) Best Form of Government Ultimately, the Constitution is the best form of government over the Articles of Confederation. The Constitution changes the defects of the Articles of Confederation and even goes further to fix it. The ability to tax was extremely important to parotic the nation from recessions and using a national currency. In addition, the Constitution included inalienable rights. Then, there is separation of powers which where power is equally shared among the branches. Meanwhile, the Articles of the Confederation had only the Confederation Congress which has nobody else regulated it. The new system that has been established is much more clear than the Articles of Confederation.. The clarity of the new system makes sure that everything is seen and fair before it is passed. It would take a longer duration of or must go through more judging to pass. However, it isnt as hard as passing a law using the Articles of Confederation where you need to have all of the states unanimously agree. (162)

Friday, October 25, 2019

Pride and Prejudice by Jane Austen Essay -- Jane Austen Pride Prejudic

Pride and Prejudice by Jane Austen In this coursework I will be writing about the different marriage proposal that Elizabeth is offered by two completely different people. From the novel Pride and Prejudice by Jane Austen. The three main people I will be looking at are Mr Collins, Mr Darcy and Elizabeth Bennet. Elizabeth gets a proposal from both Mr Collins and Mr Darcy but the response she will be giving is not quite either men were expecting. I will also have further explanations on how Jane Austen’s use of language is in the proposals. Mr Collins first set eyes on Jane the daughter of Mr and Mrs Bennet to be his lawful wedded wife, but he soon finds out that she is going to be engaged to Mr Bingley. Mr. Collin's attention then changed from Jane to Elizabeth. He found her equal in, 'birth and beauty.' Mr. Collins wanted to settle the argument between his father and Mr. Bennet; he hoped to do this by marrying one of Mrs. Bennet's daughters. Lady Catherine de Bourgh had influenced Mr. Collins into marriage. She told him, 'Mr. Collins, you must marry. A clergyman like you must marry. Choose properly, choose a gentlewomen for my sake; and for your own, let her be an active, useful sort of person, not brought up high, but able to make a small income go a good way.' Mr. Collins thought Lizzy fitted Lady Catherine de Boughs advice, and he thought a marriage would add very greatly to his happiness. Mr. Collins proposed to Lizzy, he was calm and collected. He spoke arrogantly, and what he said seemed well planned and rehearsed. He informed her of all the reasons for marrying her, but not one of them included or implied that he wished to marry her for love. This reason was the most important to Lizzy and ... ...ch other by looks Lydia goes for Wickham because he’s in a soldiers suite, and Wickham for Lydia because she’s a young lady. They ran away and done something which is not expected from people of such high class. It did happen at the time but mainly by working class people, it was not often for it to be seen by people like Lydia and Wickham. This brought shame upon the Bennet family and now Lydia and Wickham has to get married, Lydia being a young and impractical girl does not know what is going on, but Mr. Wickham now regrets getting married to Lydia seeing as how dim-witted she is, likewise Mr. Bennet and Mrs. Bennet. Mr. Bennet is now stuck with her and spends most his time in the library away from Mrs. Bennet and her annoying yelling and screaming. Also Elizabeth and Jane getting a marriage proposal from people like Bingley and Darcy was very unlikely.

Thursday, October 24, 2019

Testbacksecurity

Chapter 2 – Why Security is NeededTRUE/FALSE 1. Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs. ANS:FPTS:1 2. Information security safeguards the technology assets in use at the organization. ANS:TPTS:1 3. A firewall is a mechanism that keeps certain kinds of network traffic out of a private network. ANS:TPTS:1 4. An act of theft performed by a hacker falls into the category of â€Å"theft,† but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of â€Å"forces of nature. ANS:FPTS:1 5. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. ANS:FPTS:1 6. A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws. ANS:TPTS:1 7. A worm requires that another program is running before it can begin functioning. ANS:FPTS:1 8. A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. ANS:TPTS:1 9. Attacks conducted by scripts are usually unpredictable. ANS:FPTS:1 10. Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems. ANS:TPTS:1 11. With the removal of copyright protection, software can be easily distributed and installed. ANS:TPTS:1 12. Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people. ANS:TPTS:1 13.Much human error or failure can be prevented with training and ongoing awareness activities. ANS:TPTS:1 14. Compared to Web site defacement, vandalism within a network is less malicious in intent and more public. ANS:FPTS:1 15. With electronic information is stolen, the crime is readily apparent. ANS:FPTS:1 16. Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords. ANS:TPTS:1 17. DoS attacks cannot be launched against routers. ANS:FPTS:1 18. A mail bomb is a form of DoS. ANS:TPTS:1 19.A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications. ANS:TPTS:1 20. A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms. ANS:TPTS:1 MODIFIED TRUE/FALSE 1. Intellectual property is defined as â€Å"the ownership of ideas and control over the tangible or virtual representation of those ideas. † _________________________ ANS:TPTS:1 2. The macro virus infects the key operating system files located in a computer’s boot sector. ________________________ ANS:F, boot PTS:1 3. Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________ ANS:F virus worm PTS:1 4. A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________ ANS:TPTS:1 5. When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment. ________________________ ANS:F, spike PTS:1 6. The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. _________________________ ANS:F, surfing PTS:1 7. Hackers are â€Å"people who use and create computer software to gain access to information illegally. † _________________________ ANS:TPTS:1 8. Packet kiddies use automated exploits to engage in distributed denial-of-service attacks. _________________________ ANS:F, monkeys PTS:1 9. The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________ ANS:F, cracker PTS:1 10. Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________ ANS:TPTS:1 11. The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________ ANS:TPTS:1 12.The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack. _________________________ ANS:F, force PTS:1 13. One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target. _________________________ ANS:F, bomb PTS:1 14. Sniffers often work on TCP/IP networks, where they’re sometimes called packet sniffers. _________________________ ANS:TPTS:1 15. A(n) cookie can allow an attacker to collect information on how to access password-protected sites. ________________________ ANS:TPTS:1 MULTIPLE CHOICE 1. Which of the following functions does information security perform for an organization?a. Protecting the organization’s ability to function.b. Enabling the safe operation of applications implemented on the organization’s IT systems.c. Protecting the data the organization collects and uses.d. All of the above.ANS:DPTS:1 2. ____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.a. SSLb. PKIc. PKCd. SISANS:BPTS:1 3. ____ are software programs that hide their true nature, and reveal their designed behavior only when activated.a. Virusesb. Wormsc. Spamd. Trojan horsesANS:DPTS:1 4. Which of the following is an example of a Trojan horse program?a. Netskyb. MyDoomc. Klezd. Happy99. exeANS:DPTS:1 5. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____.a. false alarmsb. power faultsc. hoaxesd. urban legendsANS:CPTS:1 6. Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.a. SSLb. SLAc. MSLd. MINANS:BPTS:1 7. Complete loss of power for a moment is known as a ____.a. sagb. faultc. brownoutd. blackoutANS:BPTS:1 8. Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.a. bypassb. naturec. trespassd. securityANS:CPTS:1 9. There are generally two skill levels among hackers: expert and ____.a. noviceb. journeymanc. packet monkeyd. professionalANS:APTS:1 10.One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.a. hacktivistb. phvistc. hackcyberd. cyberhackANS:APTS:1 11. According to Mark Pollitt, ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.a. infoterrorismb. cyberterrorismc. hackingd. crackingANS:BPTS:1 12. ___ is any technology that aids in gathering information about a person or organization without their knowledge.a. A botb. Spywarec. Trojand. WormANS:BPTS:1 13. The ____ data file contains the hashed representation of the user’s password.a. SLAb. SNMPc. FBId. SAMANS:DPTS:1 14. In a ____ attack, the attacker sends a large number of connection or information requests to a target.a. denial-of-serviceb. distributed denial-of-servicec. virusd. spamANS:APTS:1 15. A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.a. denial-of-serviceb. distributed denial-of-servicec. virusd. spamANS:BPTS:1 16. ____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.a. Dronesb. Helpersc. Zombiesd. ServantsANS:CPTS:1 17. In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.a. zombie-in-the-middleb. sniff-in-the-middlec. server-in-the-middled. man-in-the-middleANS:DPTS:1 18.The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.a. WWWb. TCPc. FTPd. HTTPANS:BPTS:1 19. â€Å"4-1-9† fraud is an example of a ____ attack.a. social engineeringb. virusc. wormd. spamANS:APTS:1 20. Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4. 0, the browser will crash.a. 64b. 128c. 256d. 512ANS:CPTS:1 COMPLETION 1. A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset. ANS:threat PTS:1 2. Duplication of software-based intellectual property is more commonly known as software ____________________. ANS:piracy PTS:1 3. A computer virus consists of segments of code that perform ____________________ actions. ANS:malicious PTS:1 4. A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment. ANS:worm PTS:1 5. A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.ANS:back PTS:1 6. A momentary low voltage is called a(n) ____________________. ANS:sag PTS:1 7. Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________. ANS:intelligence PTS:1 8. When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial ____________________. ANS:espionage PTS:1 9. The expert hacker sometimes is called ____________________ hacker. ANS:elite PTS:1 10.Script ____________________ are hackers of limited skill who use expertly written software to attack a system. ANS:kiddies PTS:1 11. A(n) ____________________ hacks the public telephone network to make free calls or disrupt services. ANS:phreaker PTS:1 12. ESD means electrostatic ____________________. ANS:discharge PTS:1 13. A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system. ANS:attack PTS:1 14. A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective. ANS:vulnerability PTS:1 15. Attempting to reverse-calculate a password is called ____________________. ANS:cracking PTS:1 16. ____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host. ANS:Spoofing PTS:1 17. ____________________ is unsolicited commercial e-mail. ANS:Spam PTS:1 18. In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.ANS:social engineering PTS:1 19. The timing attack explores the contents of a Web browser’s ____________________. ANS:cache PTS:1 20. A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle. ANS: buffer overrun buffer overflow PTS:1 ESSAY 1. List at least six general categories of threat. ANS: Compromises to intellectual property : piracy, copyright infringement Software attacks : viruses, worms macros, denial of service Deviations in quality of service : ISP, power, or wan service issues from service providers Espionage or trespass : unauthorized access and /or data collection Sabotage or vandalism : destruction of system or information Forces of nature Human error or failure Information extortion Missing, inadequate, or incomplete Missing, inadequate, or incomplete controls Theft Technical hardware failures or errors Technical software failures or errors Technological obsolescence PTS:1 2. Describe viruses and worms. ANS: A computer virus consists of segments of code that perform malicious actions. The code attaches itself to the existing program and takes control of that program’s access to the targeted computer. The virus-controlled target program then carries out the virus’s plan, by replicating itself into additional targeted systems. A worm is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. PTS:1 3. Describe the capabilities of a sniffer. ANS:A sniffer is a program or device that can monitor data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. Unauthorized sniffers can be extremely dangerous to a network’s security, because they are virtually impossible to detect and can be inserted almost anywhere. Sniffers often work on TCP/IP networks, where they’re sometimes called packet sniffers. A sniffer program shows all the data going by, including passwords, the data inside files and screens full of sensitive data from applications. PTS:1

Tuesday, October 22, 2019

Knocking on Heaven’s Door

The movie tells us the story of two men who have heard bad news: they have to live a little, just a week and hardly one day more. For them, this is certainly a shock as they are still so young, but it is already the time for them to go to heaven. Of course they want to continue their lives, but unfortunately it is too late to change things. Trying to drown the sorrow with tequila, one of the main characters, demure Rudy realized that he has never been at the sea. On what second man lad Martin replies with a grin that on heaven all talks are about the sea as it the most remarkable and surprising phenomenon in the world. That's how it all begins †¦ It would be wrong to say that the story is only about the thirst for life and the man’s fear of not having enough time to do something important. Partly it is, but this film examines many valuable things and events in our lives that we perceive as a given, but still they are no less valuable. For example, the love of parents, real friendship, a desire to help and bring to the world something good. Every shot means something and teaches something, inspires and makes you think of. For example there is a scene in which Martin gives a Cuban cigar to a little girl who accidentally met him on the road from the bank. He wants to make random people happy, but what to give to a child? Candy? He hasn’t got any. Money? Children don’t really need them. There is only remaining a cigar, which he gave to her as an ice cream on a stick. The scene is funny and very touching. Generally, the film is about life with all its oddities, fortunate events, disappointments and of course loves. In some ways, the film looks like a zebra. White band, then black and white again and again the black. Everything goes well with the disappointing events, the opportunity to live in grand style at least slightly overlaps with the pursuit and arrest †¦ Everything is exactly how it is happens in the world †¦ This movie consists of small particular things. Martin calls the stolen car sky blue colored Mercedes, not blue, it was heavenly blue. How Rudy complains about the cheap suit for 2000 dollars. Of course because they have found a million of dollars in the trunk of stolen car. And many other significant moments from which the content of this film constructed. The duet of main actors is incomparable. Their heroes are complete opposites of each other. Perhaps in real life they would not even said hello, they are so diverse – desperate daredevil Martin and calm and quiet Rudy. But facing a total disaster, they rallied and become friends. Even for such a short period. They affect each other. Rudy gets Martins quality – lack of fear and a desire to taste more and more freedom. And Martin gets Rudy’s – caring for loved ones and the thought of the generous assistance. And yet they managed to do this, give their selves and their loved ones a little bit, but true happiness †¦ All this happened only because they had a goal. One goal! To do in one week everything that they failed to do in whole life!