Tuesday, January 28, 2020

Digital Security And Privacy Information Technology Essay

Digital Security And Privacy Information Technology Essay In this essay i will look at the basic fundamentals of security and privacy for users and businesses in the 21st century and what i think the security risks are for them and what the impact the security problems have on our privacy laws, does this controversal access to everybit of information about people actually make system more secure e.g prevent system attacks. I will go indept into what i believe are the main security risks for users and businesses when browsing the internet or shopping and using online banking and also discuse briefly what it would be like to have no privacy. I will also discuses how when a user goes on a scoial networking site or search engine they might be at risk of sharing information unwillingly with the providers. And another topic i will be discussing in this is how humans fail in there bit for security and how to prevent this from happening. Digital security in the 21st century is now more important than ever before, there are many different types of security threats to the average person, business or even government. This is because everything we do on a daily basis can have a security risk, whether it be from online shopping or checking your email. If a users computer has been hacked or has some spyware or malware and they are using it for online shopping, then the attacker may be able to gain access to the users sensitive data which can then be used for fraud or theft or sold on to a third party for marketing data. Shopping in a store using your debit card can also be a risk as debit cards can be cloned by staff and pin numbers stolen using a device that looks the same as the card machine but has been designed or modified to remember pin codes and clone users debit cards/credit card details. Laptops and Mobile phones being stolen can have personal information on them, even losing your universal serial bus storage device or USB pen drive as they are know as for short which can contain all sorts of information because people, businesses and governments all use these devises to move or store data. And if the data is not encrypted then there is always the chance that someone can gain access to it. Security is the main issue when it comes to a persons personal information whether it be from browsing the Internet to online banking there will always be people who want to steal information for an entire range of reasons (eg: phishing and fraud) ! Another thing to be wary of is the topic of Liberty; are security laws infringing on our basic human rights to privacy and our security by allowing corporations and even governments to spy on our Internet communications for what they call  ¿Ã‚ ½anti-piracy ¿Ã‚ ½ or National Security such as the PATRIOT Act in the United Sates of America, and this brings me to conclude, why should the rights of the many suffer because of the actions of a few. And this is being debated everyday of every week by civil rights activists to our own government deciding what they can do and cannot do. Too much information available about anyone to anyone can be dangerous and this topic should be taken extremely seriously. One major impact on privacy is the development of social networking sites and search engine providers that sell the users information to third parties. The quote Privacy is a fundamental human right. It underpins human dignity and other values such as freedom of association and freedom of speech. It has become one of the most important human rights of the modern age. by Marc Rotenberg, Protecting Human Dignity in the Digital Age (UNESCO 2000) 1. And i think that we are heading into a society that does not care about the fundamental human rights we have and how we attained them. For example anti-utopian, dystopian novels of the 20th century, depicted societies where privacy was non existant and an intrusive, oppressive regime denied this fundamental human right as a matter of course. In Yevgeny Zamyatins novel  ¿Ã‚ ½We ¿Ã‚ ½ 2the population lived in buildings constructed of glass, which allowed everyone and anyone to snoop on anyone whom they wished. Opposition is impossible in a society where privacy is non-existant. George Orwells 1984  ¿Ã‚ ½Big Brother ¿Ã‚ ½ and tele-screen are frighteningly similar to todays move towards a 21stcentury society where the Government and corporations have full access to every bit of any citizens digital life. The 19thcentury black champion of civil rights, Frederick Douglass protested that any rights and liberties won by any people were awarded after contesting the power structures of society. He said in 1857 that  ¿Ã‚ ½Power concedes nothing without a demand, it never did and it never will. Find out just what any people will quietly submit to, and you have found out the exact measure of injustice and wrong that will be imposed upon them. ¿Ã‚ ½ 3 Frederick Douglass, speaking on the emancipation of the West Indies, 1857  ¿Ã‚ ½Men may not get all they pay for in this world, but they must certainly pay for all they get. ¿Ã‚ ½ 3 also has meaning to that you can use a search engine for free and also a social networking site, but be careful of your information as they might sell it on to third parties. In the book; The Art of Deception: Controlling the Human Element of Security 4, the authors Kevin D. Mitnick William L. Simon na ¿Ã‚ ½blame the Human individual as the weakest link, the individual is relegated to a position below the security system in question. Page 3, titled in big black letters  ¿Ã‚ ½Securitys Weakest Link ¿Ã‚ ½ states  ¿Ã‚ ½the humanfactor is truly securitys weakest link. ¿Ã‚ ½ In the Computer Security Handbook, John Wiley Sons (2002) 5which some of the top security specialists in the world have contributed to. Donn B. Parker, a retired (1997) senior management consultant at RedSiren Technologies in Menlo Park, Ca, who has specialised in information security for 35 of his 50 years in the computer field and who Information Security Magazinehas identified as one of the five top Infosecurity Pioneers (1998) writes in  ¿Ã‚ ½5.1.3 Functions of Information Security Computer Security Handbook ¿Ã‚ ½ that the complete opposite to the previous paragraph is true, that the current three function security model, (prevention, detection, and recovery) are completely insufficient and that an 11 function model is needed to eliminate or mitigate the security risks in question, which include avoidance, deterrence, detection, prevention, mitigation, transference, investigation, sanctions rewards, recovery, correction, finally; education 5. It is easy to jump to conclusions and intuitively blame the people whom personify  ¿Ã‚ ½hackers ¿Ã‚ ½ or adversaries to computer security professionals, but history shows us that nothing should be taken for granted concerning security. No system will be inherently perfect, and new technologies are continually being created and updated, and most will likely become more secure as time goes on. Human nature on the other hand is a constant and no man or woman should ever denigrate humanity to a role below that of a firewall, for any reason. If a computer security system is vulnerable, patch the system or come up with innovative methods to secure it from outside access, improve on the imperfect and take comfort knowing that you have executed your job successfully, thus without sacrificing your morality. Types of attack  ¿Ã‚ ½ Once a malicious program has been installed on a person or business or governments bodys computer, it can cause harm in many different ways. And the most typical mechanisms for attacks by hackers is:  ¿Ã‚ ½ taking control of a users access and pretending to be that legitimate user. This can be very bad if a hacker gains access to any information as the user might not realise in time for it to be stopped being used eg. bank account or credit card information being stolen.  ¿Ã‚ ½ Stealing or copying secret or confidential data for corporate espionage or other purposes.  ¿Ã‚ ½ Destroying corporate data to do financial damage to a business or government body  ¿Ã‚ ½  ¿Ã‚ ½ Causing network and system shortages to paralyze a company ¿Ã‚ ½s operations eg. Denial of service attack (D.O.S) or Distributed denial of service attack (D.D.O.S). Risks to an Organisation: Security vulnerabilites coming from within an organisation are on the increase in todays businesses and are increasingly the operational risks of any business in todays world, and in a time of recession this is not good because it brings the running costs of the business up and costs to the average person may go up also . so this can lead to a loss of reputation in the regard to customers or partnership in a company or even the share holders of the company. There may also be a risk to the business by interruption to the company and lead to the violation of legal and government reulation requirements to protect sensitive customer information E.G OFCOM if the attack works, some examples are:  ¿Ã‚ ½ Unauthorized access to any information where the access includes disclosure, modification and destruction of any data.  ¿Ã‚ ½ Unauthorized users or hackers, i.e. a person who have not been given the rights by the owner/user to access the system. How do people fail in the line of security? Social Engineering Manipulation: con-artists are being used to acquire confidential information by manipulating genuine users into telling them. It is a new type of insider attack that is on the up trend similar to an attack that is knowm as  ¿Ã‚ ½phishing ¿Ã‚ ½ in which a malicious or hackeris able toget internal access with access to company sensitive information in turn which can lead to other users/customers into providing access to forbiddon information. These con-artists rely and work on the basis that people are kind hearted and not aware of the valuble information they know and are careless about protecting it because they think its irrelevant. These con-artists will search bins or skips or take advantage of people ¿Ã‚ ½s natural ability to choose passwords that are based on what is considered to bemeaningful to the user such as relative ¿Ã‚ ½s, date of birth or pets name etc but can be easily guessed if the hacker learns persoanl information about them. the name they now give the method these con-artists employ is called  ¿Ã‚ ½Social engineering ¿Ã‚ ½ and will always a threat to any security system. More internal threats may be: if there is aloss of data or data is corrupted, and backups fail this will lead to business having a losses of revenu and this in turn may affect the clients and loss of money to a business. There may also be misuse and theft of Call Records and information and also tele-communication center in which, internal breaches my accure by users who sometimes bypass the usage record from billing someone or a subscribers and then bydeleting the call record information from a database or by manipulating a program to overlook simple things to user subscribers. Identity theft: Identity theft of a customer ¿Ã‚ ½s valuable information such as address, security passwords credit card information, and date of birth or in a business ¿Ã‚ ½s sense, ID cards, Access codes . Identity fraud is a term that is used to refer to any type of crime in which any person or business wrongfully gets hold of and uses another person ¿Ã‚ ½s personal data in anyway way that may involves fraud or deception, typically for capital gains eg. giving the business an upper-hand from a competitor. Information used in scanning of biometrics for example of soem (face image scanner, palm print scanner, hand scanner ,handwriting of a person, fingerprints,voice recognition software, iris/retina scaners ) are each unique to every person and cannot be given to another human for their use, but can be faked, well some of them. However, personal data, especially a credit card account or debit card number, and other valuable personal information can be taken advantage of and maybe used by the wrong person for fraudulent purposes and sold to third parties at the cost to the average users. The not so innocent: Browsing the Web and using e-mails can seem a normal exercise in layman terms but may seem na ¿Ã‚ ½ve to the advanced users whom understand the security risks. For the average user however, all their activities can upset business. Some viruses that can do this are ( Worms/trojons/malware/spyware or Choke viruses) that are design and aimed at Instant Messaging systems that people use such as a social networking site and windows live messenger (MSN), the users may use these softwares or websites to talk to their friends online or send information from and each pose their own unique security threats. Anti-virus softwares and other tools may not detect malicious code opening through the font-system 6 or Instant Messaging system, so infected files can infect the desktop and then into the network or a business. If a company ¿Ã‚ ½s usb stick or security cards or notebooks are lost or stolen, important information may be at risk such as id names and Unique Identifier numbers. Outside threats to an organisation: External threats are mixed threats that combine many different ways such as worms, viruss, spam and distributed denial of service (DDOS). Every day, hundreds of new ways are discovered to attack software and security breaches by intruders, hackers and security professionals. There are more than 30k hacking-based Web sites on the internet now so it no longer needs a computer savy person to hack a site, just someone with time and patience. How to keep your computer safe with Virus Counter Measures. Regular Updating of a users Anti-Virus and Anti Spyware Software: This is to protect the user against viruses and malware/spyware and this is why antivirus software should be installed. All user email attachment files should be scanned: This is because computer viruses are most likely to be in an email attachment. just because emails come from your best friends does not mean it is still not important to scan there emails which may contain attachments before opening them as they may contain anything. Key points for handling email attachments:  ¿Ã‚ ½ Be careful when opening email attachments from unknown recipients.  ¿Ã‚ ½  ¿Ã‚ ½ Do not be fooled by the appearance of attachment files always check the extension to make sure its not a .exe, .com or any other  ¿Ã‚ ½executable ¿Ã‚ ½ extension for a word document or image file.  ¿Ã‚ ½  ¿Ã‚ ½ Do not send a plain text that can be included in the body of an email message as an attachment file eg. Encrypt your messages.  ¿Ã‚ ½  ¿Ã‚ ½ Learn about how email attachments are handled by different email programs.  ¿Ã‚ ½  ¿Ã‚ ½ Every file that is should be scanned with a users anti-virus and anti-spyware scanner before opening, because the user will never fully know whats inside.  ¿Ã‚ ½  ¿Ã‚ ½ A lot of files such as image files, .MP3,.MP4 and .avi videos are downloaded from the Internet, but some are notwhat we expect and contain malicious programs embedded in them or in the code of these files to hurt or dammage our computers, and a way to avoid this is to be sure to scan downloaded files before using them or opening them. An example is the font system vulnerability of Windows XP. 6  ¿Ã‚ ½  ¿Ã‚ ½ Take full advantage of the security functions/ settings supplied with any application software  ¿Ã‚ ½  ¿Ã‚ ½ Regulary updates of Security Patches Should be installed: All recent viruses attempt to exploit bug in a software or security holes that a programmer mite not have known about when creating the software to gain access to the operating systems and application software that a current user might be using.  ¿Ã‚ ½  ¿Ã‚ ½ If there is any weakness in your computer it can be and most likely will be infected with viruses or have corporate malware on them and the only way to combat this is by previewing emails or accessing the Internet when all security updates have been applied and clearing your Internet cookies after every session. causes of Virus Infection must not be overlooked. If you have encountered symptoms that you think are a virus you should do a scan, a users computer may have been infected with any sort of virus . so it is very important to watch out for this as it can be a major security flaw and scan your computer for viruses regularly to avoid disapointment. If a users computer system or an application freezes, or the system does not start. Files may be deltes or just become hidden. Unknown icons apear. some programs may make attempts to access the Internet without any notification to the user, this is why a firewall is needed. Emails are sent without the user ¿Ã‚ ½s consent. Scan intuitively to make sure there is no virus or spyware on a users PC. All a users data should backup data regulary in case of of system failure: Data corrupted by a system or hardware failure cannot always be restored by using software. Make the habit of getting use to backing up. Conclusion

Monday, January 20, 2020

Muslim Girls :: essays research papers

The central Bosnian village Dolina is located in a valley north of the Bosnian-Hercegovinian capital, Sarejevo. From a very early age Muslim girls are taught that their role as a female is to assist their mother with household chores and to serve the men. While her male siblings, who spend most of their time playing and walking around the village, are not expected to work around the house (Bringa 106). Muslim boys were given privileges because they were male. Muslim women usually did not leave the household for employment because they maintained the household agriculture, however they could sew and knit for other villagers. Women’s work mainly consisted of tending to the garden where they grew the vegetables for household consumption. The women also did the milking and the processing of cheese (Bringa 52-4). The busiest part of a Muslim woman’s day was in the morning when she did the cooking and the cleaning. A women’s daily routine, which includes social calls t o her neighbors, know as â€Å"coffee visits†, revolves around both her children and husband’s schedule. A woman was expected to be home whenever her husband was home (Bringa 87-8). The daily interaction between neighboring households occurs mainly through the women’s â€Å"coffee visits.† During the â€Å"coffee visits† the women are expected to uphold Muslim community values so as not to damage the reputation of their household (Bringa 91). Tone Bringa wrote: â€Å"as a wife a woman’s behavior was judged in relation to her behavior within the neighborhood and village, and in terms of her critical role as representative of the moral standing of her household on a daily basis†(105). Women determine and maintain the environment that exists within the household while the men are the providers of material substance (Bringa 86). The men spend most of their time working outside the village in nearby market towns or in the industrial suburb s of Sarajevo. Some of the most common jobs include bricklayer, welder, carpenter, electrician, car mechanic, warden, and lorry driver (Bringa 51). Fontana del Re is a poverty stricken neighborhood in Naples, Itlay. Just like in the Bosnian village of Dolina, the women of Fontana del Re, Naples tend to stay close to home while the men leave the area to find work. Life in Naples is focused on the mother. Thomas Belmonte wrote, the mother â€Å"is at the center because she controls and distributes the twin sources of human vitality, food and love† (89).

Sunday, January 12, 2020

China’s Reform and Opening-Up Policy Essay

Deng Xiaoping in the eyes of all the Chinese people are very familiar with, because he proposed the reform and opening up policy, China has undergone enormous changes, China not only in the economic, political, cultural, social and other fields, various aspects have made great progress. I will divide my speech into three parts, the first part of the economy, the primary stage of socialism, the basic economic system has been established. Adjust and improve the ownership structure, changes in the ownership structure of public ownership as the main body, and a variety of forms of ownership develop the basic economic system. The reform of state-owned enterprises made ​significant progress. 30 years as the central link of the economic reform, the management system and operation mechanism reform of state-owned enterprises continued to deepen. Most of the restructuring of state-owned enterprises as diverse shareholders corporate enterprises, state-owned economy and structural adjustm ent progresses, greatly stimulate the vitality of enterprises, enhance the control and influence of the state-owned economy. The new macro-control system gradually perfected. Break the traditional highly centralized planning and management system, and gradually establish a macro-control system to adapt to the requirements of the socialist market economy, the transformation of government functions, planning, investment, finance and taxation, finance, foreign exchange, the price system reform has achieved significant progress in the formation of national planning and fiscal , monetary policy and the coordination of macro-control system. The second part, resource allocation, income distribution system is undergoing a fundamental change. Established distribution according to work is dominant and a variety of modes of distribution coexist distribution system, the establishment of the production factors of labor, capital, technology and management system of distribution according to contribution. Emphasis on the treatment of the relationship between the initial distribution and redistribution in the efficiency and fairness, give full play to the enthusiasm. The third part, social security, social security system of Chinese characteristics basically formed. Establishing and continuously improving the urban basic old-age insurance system, the formation of the urban and rural basic medical insurance system, and constantly improve the unemployment insurance, industrial injury insurance and maternity insurance system, generally establish minimum living security system for urban and rural residents, and gradually improve the social assistance system.

Friday, January 3, 2020

The Depiction Of Western Culture - 1416 Words

Image and Perception According to Said, Orientalism is the imitation or depiction of Eastern cultures in the West. Western civilization has the view that western culture is superior to all. Edward Said explains how the West views the Orient and oriental cultures and literature as irrational, depraved, and often they are misrepresented. These false representations of the East have been a result of one’s point of view – the West’s. Arab women in particular have been subjected to these stereotypes, as they are perceived to be the weaker force. Often in literature authors, particularly western men, are criticized for inaccurately portraying or writing women. The portrayals of Arab women are often characterized as weak, dependent, and submissive. This perception is derive from western culture. However, writers like Inaam Kachachi, Alifa Rifaat, and Nawal El Saadawi display Arab women in their writings like no Arab men can truly describe women’s inner desire. These writers give a ne w positive identity and representation of Arab women, while an author like Alaa Al Aswany portrays women as they are viewed in society – negatively. Despite the stereotypes and differences, Arab women share the same fear all of mankind experiences. The story â€Å"Women in fear† by Inaam Kachachi talks about the many different fears seven sisters are having. It is about seven Iraqi sisters who are fearful due to the oppressive society around them. Atika fears death, Ifaf is frightened of her husband,Show MoreRelatedAmerica Wild West1317 Words   |  6 PagesCivil War, many Americans chose to settle west of the Mississippi river and shaped a distinct culture in this region. Generations later, this fascinating culture was transformed into the Wild West, a romanticized version of the lifestyle, to entertain the masses. The romanticized perception of the Wild West differs extensively from the reality of western settlement, but in some aspects mirrors the true western lifestyle in the post-Civil War period. Native Americans and cowboys, for instance, are portrayedRead MoreIndians in Unexpected Places Essay902 Words   |  4 PagesDeloria, with his analytical survey, Indians in Unexpected Places, recounts the synthesis of western white expectations, and American Indians. The book takes its title from the general thesis, which explores not only the relationship between Indians and their introduction into an alien culture, but also the expectations that we have of Indians and how they â€Å"should† interact with our white western culture. According to Deloria, the common notion is that, â€Å"Indian people, corralled on isolated and impoverishedRead MoreWomen And Gender Roles During The Maghreb Come From Narratives That Depict Cultural Norms1005 Words   |  5 PagesThis gender role forms an identity that most women conform to in order to avoid conflict. Some women break free of these roles and cultural norms but usually encounter struggles. Some narratives that highlight situations like these and demonstrate depictions of women and gender roles are The Arabian Nights and In the Country of Men. Th ese narratives expose the reality of gender roles through identity and Orientalism to highlight the cause for submissive females in the Maghreb. These gender roles createRead More Children’s Literature through an Americanized Scope1232 Words   |  5 PagesSusan Louise Stewart addresses non-western depictions by westerners in Gloria Whelan’s Homeless Bird and Deborah Ellis’s Parvana’s Journey in her article â€Å"Beyond Borders: Reading ‘Other’ Places in Children’s Literature.† Stewart claims that multicultural texts are significant, and that diverse perspectives in conjunction with western existence and beliefs are poignant to a young student’s education. But multicultural literature is dismal, in regards to works about other places and experiences byRead MoreThe Invention Of The Modern World820 Words   |  4 Pagesinstrumentation has almost subsumed the individual scientist within historical narrative. It is impossib le to imagine classic depictions of the great myth of Galileo without the obligatory appearance of at least one of his telescopes3, or a sketch of Newton without his refracting prism. Celebration of material apparatus has been an enduring theme, particularly in more poplar depictions of the â€Å"process† of scientific progress. Today, the seemingly incomprehensibly complex microscope or (now orbital) telescopeRead MorePostcolonial Literature (Persepolis Things Fall Apart)1504 Words   |  7 Pages‘Persepolis’ by Marjane Satrapi follow a postcolonial critical approach. Both books take place in a country considered politically inferior through western perspective and both texts, even though reinforce colonialists’ oppressive ideology, don’t stand completely against the colonialists and fault their own culture. They present the themes of dislocation on how western influences changes, religious, social and economical aspects in the Igbo and the Ira nian society. ‘Things fall Apart’ presents an AfricanRead MoreThe By Roger Bonair Agard And Gloria Anzaldua Essay1608 Words   |  7 Pagesalphabeti method† and â€Å"El sonavabitche†, respectively. Though the two poets wrote on vastly different subjects, both authors employed literature as a medium for their call for activism in society and expressed discontent with the dominance of western culture over minority groups. Through their utilization of formal elements including imagery, diction, and narrator, both poets call for action to change the mindset that the imposition that American society holds over other groups of people. DespiteRead MoreAnalysis of the ending of Things fall apart, by Chinua Achebe843 Words   |  4 Pagespassage serves as closure for the novel, as the traditions of the past die along with Okonkwo. Achebe uses this specific scene in the novel to express both his views on the inevitable death of Igbo culture in the lower Niger (specifically Umuofia), as well as his perception of the portrayal of its people in western literature. In addition, Achebe continues to use this scene to drive the idea of cultural difference between both the inhabitants of Umuofia, and the missionaries that inhabited the land. TheRead MoreA Marvelous Journey of Return in The Kingdom of This World by Alejo Carpentier 1224 Words   |  5 Pageswhich I think several are very noteworthy. First is Carpentier’s reflection of his own identity search in the novel, second is his application of magic realism in the writing that shows the juxtaposition between fiction and history and lastly, his depiction of a repeating cycle of the Haitian history in those stories, all of which contributes to the explosion and expansion of Latin American literature that follows Carpentier’s initiation in the field. As a Cuban writer, Carpentier has an in-depth understandingRead MoreThe Morality Of Slave Labor Versus Free Market Capitalism1095 Words   |  5 Pagesmeant all slaves would be treated well and fed by their masters, at least on average. This also seemed to be true until the years coming up to the Civil War. American slaves were treated fairly well, although that isn’t saying much. The depiction of â€Å"Lowell Offering† shows a Lowell mill girl seeming well dressed and fairly content with life. These girls were part of the free market system, far different from the system of labor in the South. They engaged in competition for wages and for work