Thursday, October 31, 2019

Implementation of Entreprise 2.0 in a Business Research Paper

Implementation of Entreprise 2.0 in a Business - Research Paper Example In addition, there are numerous examples of enterprise 2.0 tools in which Wikis and Blogs are well known communication and collaboration portals. Moreover, social network tools are very helpful for the staff members in finding the target person or group of persons. Thus, enterprise 2.0 has the capability to offer content, data and information and knowledge in an amazingly low-priced and unproblematic way by means of web-based tools (UBM TechWeb, 2011; Miller, 2007). Some people say that enterprise 2.0 is about carrying Web 2.0 into the business; however it is not completely true. In some way, enterprise 2.0 refers to process of bringing the collaborative and social applications and technologies of Web 2.0 into the business setting; however enterprise 2.0 also shows a basic change in the way businesses carry out their operations (Nations, 2011). Additionally, it is a true fact that enterprise 2.0 is a simplified idea that is normally used for technological and business practice that r eleases the required workers from the limitations of inheriting communication tools and productive tools as there is an example of email. Moreover, it’s another major advantages is that it facilitates the business executives to access the precise information when it is required by means of a web of interrelated applications, services and strategies. In this way enterprise 2.0 make easy to get to the combined intellect of many. Hence this aspect results in moving to an enormous competitive gain in the form of improved innovation, efficiency and agility (UBM TechWeb, 2011; Nations, 2011; Miller, 2007). Enterprise 2.0 in a Business The question is that what is enterprise 2.0 and how it is used in business environment? The simple answer to above question is that enterprise 2.0 is the implementation of  Web 2.0  into the workplace and business environment but the defined aspect is not completely precise. In other words, enterprise 2.0 is a process of implementing collective an d collaborative tools of Web 2.0 into the business environment, where enterprise 2.0 also signifies a basic change in how a business is managed (Nations, 2011). As the changes are occurring swiftly in the business environment round the world and in the conventional corporate background, information could easily flow through a sequential path. Consequently, the information is passing down the chain from the peak to the base and proposals made from the base flow toward the peak. It is a true fact that enterprise 2.0 changed this prearranged order and created a controlled chaos. Moreover in Enterprise 2.0 structures, flow of information is in form of up and down. As a result, it easily cuts the chains that grasp collaboration in a customary business environment. And it is one of the major reasons that enterprise 2.0 is considered as a tough sell to an organization. So knowingly unleash disorder runs counter to their intuitions (Nations, 2011). Enterprise 2.0 & Web 2.0 Technologies Whil e we talk about Web 2.0 technological features, we see a lot of Web 2.0 tools and technologies easily available in the market. Additionally, there are numerous online tools, technologies,

Tuesday, October 29, 2019

Symbolism in the swimmer by John Cheever Research Paper

Symbolism in the swimmer by John Cheever - Research Paper Example The real meaning of the story is revealed through the use of symbolic elements. The Story starts with couples gathered near a pool to get rid of the weariness of the cocktail party which they attended the previous night. Neddy Merril is an athlete who wishes to do extraordinary things. The youthfulness in him leads to do adventurous things like reaching his home by swimming in fifteen pools to the south. As he changes pools his total experiences also change. The story begins with realistic note. The energy of the youth, his power etc adds to the initial exhilaration of the story. The pleasant time and mood of the couples symbolizes the optimism, the swimmer has in his mind at the beginning of the journey. â€Å" It was one of those midsummer Sundays when everyone sits around saying â€Å" I drank too much last night â€Å" (Cheever 1) . Thus the story begins with a realistic note. With the paces of the ‘swimmer’, the mood of the story also changes. In the third paragr aph we see the lovely mood again. â€Å"...the day was lovely, and that he lived in a world so generously supplied with water seemed like a clemency , a beneficence. His heart was high and he ran across the grass (Cheever 515). The readers feel the pleasant mood of the writer and also that of Neddy. The’ light green water ‘waiting for such a swimmer symbolizes the freshness of his mind when he started the journey. The swimming pools that Neddy has to go through stand for the journey of life itself. It is essential for him to be adventurous to ‘swim the country ‘. The destiny of man to complete his life journey to reach the end is very effectively symbolized with the phrase â€Å"‘swimming the country’. Neddy expresses the high level of optimism that he considers himself as a legendary figure. Neddy is running from pool to pool. At Graham’s pool he was a guest to whom they want to give drink and share their mind. The image of happiness a nd blissfulness slowly disappears, and Neddy meets emptiness at Welcher’s house.† the pool furniture was folded, stacked, and covered with tarpaulin. The bath house was locked. All the windows of the house were shut , and when we went around to the driveway in front he saw a For Sale sign nailed to a tree† ( (Cheever 518) . The protagonist begins to feel the loss. It is a fact that he is addicted to alcohol and is living in an imaginary world. But now he slowly faces the reality. He sees the board ‘For Sale ‘. Neddy slowly deteriorates. Cheever uses weak dictions to convey the plight of Neddy. Neddy’s arms were lame â€Å". His legs felt rubbery and ached at the joints ( Cheever 520). The slow movement of the time and the resultant transformation occurs to Neddy, is shown in the words. The mind of the readers also moves with Neddy. The weakness in body and mind is the symbol of his social decline. In the words of Hal Blythe and Charlie Sweet; à ¢â‚¬Ëœa montage of Neddy Merrill’s physical and social decline’ is carefully drawn by the writer. Neddy denies the universal fact that disability, both physical and mental, is part of growing old. He is swimming to his own home. But the journey through water symbolizes a kind of escape from the realities he meets in the land. Thus water, in other term alcohol itself, keeps him away from his family and his friends. The different pools he swims across symbolize the

Sunday, October 27, 2019

Security Forensics and Risk Management

Security Forensics and Risk Management Acknowledgement Foremost I would like say thanks to god for all support in all my life and secondly University of Greenwich to give this my life aim to complete my masters. Next my supervisor Professor Kevin Parrott to the supports he gave because without his support I wouldnt be able to complete my project with this quality. Especially the suggestions and appreciation given my supervisor make me feel better and gave positive thinking. Finally need to thank my family and friends for unbelievable supports and encouragements. Abstract As we are in the information era the world is changing to use electronic means for day to day use. The paper documents is gone and most of them are paper free because of so many reasons such as pollution, easy, fast, etc At the same time this digital media has availability, scalability, confidentiality and integrity which are required behaviour for secure communication. The risk is increased with the increase of computer and digital means usage and the single security lack may cause huge losses. There are some surveys says most of the crimes are happening through electronic means and the target is computer or computer peripherals. If the attacker found a single security lack that is enough to start and break the whole system and the security lack could be configuration mistake, firewall issue and basically problems in the protection mechanism. Because of these reasons testing become very important and this process called as Auditing. There are so many types in the auditing and this auditing requires technical knowledge to make these tests perfect and to give an audit report including suggestions. The auditing falls into two main categories such as Automatic and manual. The test will be efficient if it is automated using testing tools which are called as automated or computerised test. Even though there are some tests cannot be automated and need to test manually. This auditing covers network security test, physical or environment security test, computer security test which includes software and hardware tests. The computerised test will carry on with some security tools and the manual will use questioner to minimise human made errors mainly forgetting.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Security audit is the technical assessment of the application or system. The assessment may be manual or systematic or both. In most case the auditing process uses manual and systematic/ automatic methods because there are some tests cannot be automatic such as review of the security policy, asset management, etc   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  This auditing has different types such as internal or external. This type is depends on the company size and the resource availability. Usually big companies have their own security auditor so they will perform the audit internally and the small and medium size companies mostly hire auditor form outside. Both types got pros and cons in security and financial manor. Chapter 1 Introduction This chapter largely contains non-technical information to give the understanding of high level objectives. Also describe the techniques and technologies used in the project and research to accomplish the project Objective Audit The audit is a systematic or manual security assessment of the network, infrastructure, system, etc The complete audit should be the combination of manual and automatic assessment because in every test target there will be some test cannot be automatic. The audit has so many categories and the following paragraph will explain about the categories and the functions or techniques behind that. There are 3 controls in the auditing process which are Preventive control The preventive controls are controls may in the form of software or hardware or ant configuration to prevent the error or vulnerabilities. This is an active type control always monitor the interface for any vulnerabilities and block such vulnerabilities or errors before it enter into the system or infrastructure. This is most effective control mechanism because not allows the vulnerabilities. Detective control The detectives are in placed to monitor the vulnerabilities in the form of software or hardware but the different between preventive and detective is the preventive wont allow the vulnerabilities into the system where detective allows entering everything and correcting the vulnerabilities after enter. The best example is for this control is fire alarm because fire alarm wont prevent the fire before but if any fire it will work. Corrective controls The corrective controls are the controls to correct the error or issue before it make any harm. This is very important control for all places even if they have other controls because there are some issues or vulnerabilities cannot detect by the controls if they will come and attack so there should be some control to correct those before loss occur. Addition to that the controls should up to date such as latest firmware or latest definition. Type of auditors   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There are two basic types of auditors in the information era the internal and external auditors. This selection of the auditor will be done by the management with the use of financial status of the organisation. Size of the organisation and the policies defined in the company. Internal auditors Internal auditors are auditors belong to that particular company which is going to perform the audit. That means the auditor is an employee of the company. So the auditor is always available to do the auditing and data or information will keep within the organisation. This is the main advantage of having the internal auditor and the same time and the employee purposely recruited for auditing then is cost a lot for the company. So it is only possible for the big level companies because they have huge investments and revenue. The disadvantage of the internal auditor is they may be up-to-date and dont have current market or audit status such as new techniques and tools. External auditors The auditor recruited from other auditing firm for the auditing so it is very hard to find professional auditor because of the availability and as the auditor recruited from outside the company information may go out. At the same time the auditor needs some time to get and understand the company process. But the advantage of recruiting the external auditor is their knowledge and it is suitable for middle and small level companies. Types of Audit: Traditional Audit It is just like a manual auditing. It is useful when working with a large amount of data in a large company. Here auditor took some sample data from different place then provide a report. Advantage: Easy Cheaper Disadvantage: Always do not provide correct information. In IT sector it is not useful. Software audit: Software audit is a wide popular for any educational institute or organization. It is just like a review of the software and the system that can find all information of the system such as operating system, application software, processor, drives, controllers, bus adapters, multimedia, virus protection, system model, main circuit board, memory models, local drive volumes, network drives, printers information etc.. There are so many auditing tools in the market such as Belarc Advisor, E-Z audit that are very power full. KW116 is the main Lab for school of computing and mathematical science in University of Greenwich. CMS installed lots of software for students to continue study or research. According to Copy right, Design and Patents Act 1988, all Software must have a valid licences to continue the process. As Lab uses large amount of software and different software expire on different time so it is very difficult for Lab administrator to keep up to date all licence by manually checks. Only auditing by software can possible to give details report to administrator to keep up safe the system. Advantages: Correct Information: Machine always provide the correct information so it has less chance to provide the incorrect information. Save time: Software very quickly provides a report of the system so it saves time. Details description: It provide a details description of system including any warning or licences issues etc Minimise the cost: By implementing the software audit two peoples work may possible with one people so it reduce the extra cost. Disadvantages: Investment Costly: Software is very expensive so university need extra money to buy this software. Risk: Auditor knows the details information of the system. Work flow: Auditor needs part of the lab to check the system. So it discontinues the student workflow. The approach The typical audit has different approach to collect the data. The single audit will use multiple techniques to gather full information and it is necessary to use different technique for different level of people. These are common techniques here. Interview This technique uses to collect the information from outside people or top level people and the number should be limited. During the interview the auditor or interviewer will ask questions from other people and collect the information. So the person will be well prepared for the interview. This is very robust method because it will allow people to express fully and the method also simple as it is talking which is natural way to communicate. Another advantage is this bi directional communication, means both parties allows to ask questions for clarification or gather information. Observation This method uses in the place where real time process monitoring or behavioural change is required. This is a powerful way of do the changes throughout the audit because other techniques exist in currently not possible to get real time information. Inspection The technique required to do some action with collected data to collect audit related information. This is the form of observation with advance criteria expected. This is extended version of observation because if the auditor apply any advance criteria to gather the data which is necessary to the auditing. After collecting the data the next step is to identify the weakness and process it. The identifying is the key work in the audit and after that categorising. The identifying uses some techniques to make that easy, preface and professional. The techniques used here are Root cause analysis General technique for analyse and get the better solution for the vulnerability or weakness. Because this technique drilldowns to the issue and finds the root and fix the weakness. The basic technique behind this is if the root is fixed automatically it will fix all other problems related to that. So simply close all related issues at once. As mention the easy and robust way to stop the issues exist and the issues may come in the future. After root cause analysis the next step is to get the solution for the root of the issue. The important thing here is choosing better and effective solution for the issue. The selection depends on some external and internal restrictions. Organisation policy Cost per benefit Legal restrictions Availability Compatibility Vendor and citification Advantage of having Auditing: Satisfaction: It brings the confidence of the Lab administrator of the University of Greenwich to continue the business process. Owner always thinks is there any lack that breaks down the continuity of the business. Detection and prevention of errors: Human can made error in any times .on one can say there is no error in there company. By auditing people can find the error and suggestion to recover the error. Detection and prevention of fraud: It also just likes errors. Sometimes user intentionally or unintentionally does this thing. So after audit we can find out the fraud. Verification of the Licences: KW116 Lab installs lots of software for student. Here some software for 1 year some software for more than one year and some software has limitation (No. Of user can use) for use. So auditor can find all kind of licence issues. Independent opinion: Audit always done by the independent people .so this report always accepted by everyone. Safety form exploitation: Health and safety always is a big issue for any organization. KW116 Lab got lots of equipment that are connected with electricity. So always chances for short circuit or exploitation. Audit identifies the all lack point and advice for prevention. Disadvantage of having Auditing: It is expensive Sometimes slow or stop the work flow External people know the company information. Encryption Encryption is the simple technique in the different for to send the date securely through shared place like internet. The form of encryption may vary from each other but they all commonly use digital certificate to encrypt and decrypt the data. Encryption use keys to make cipher text from actual message. The cipher text is not readable and it is the encrypted version of the massage using some algorithm. Security roles/user roles The security roles are very important technique to make network administration easy. This is basically creating some groups with different permissions according to the organisation operation or policy. A user or staff can have multiple security roles according to their need. This roles use to authorise the user permission. Security policy Security policy is a document which has all rules and regulations documented and approved by management and align with laws and legislation. This policy is used to define all activities and this is used to make some decision. Business Continuity: There are three things always we have to mind to continue the business Essential: to running the business any customer order cannot be delay more than seven days. Tolerate delay: some application may delay to continue the business such as management pay. It is a midterm i.e. one to four weeks. Discretionary: some application is useful for business but it is not affected to continue the business operation such as management report. It is a long term i.e. 3 to 6 months. Business continuity planning Business continuity planning (BCP) is the most important for any organization to continue the business. BCP engages with only different kind of risk to continue the business process that might occur in the organization and it also creates the policies, plan and procedures to reduce the risk. BCP can continue the business process in disaster situation as well. The main goal of the BCP is to combine together all policies, procedures and process so that any disruptive situation business process can continue or it may impact very little. Here main important function of BCP is Maintaining the business operation Continue the business in emergency situation Reduce the risk If any situation BCP cannot take over then Disaster recovery planning (DRP) takes over. British Auditing Standard BS7799: It is a British standard called as BS7799 that developed by British standard institution where describes the security policy and standard procedures.BS7799 become the ISO IEC 17799 after accepting the ISO IEC technical committee for international use. Now a days information is a valuable asset for organization .So it is very important to protect the information like other corporate asset. Here BS7799 introduces how to protect the information from threats and suggest the three points to secure the information such as Integrity: it is assurance the completeness and accuracy of the information. Confidentiality: Information can only access by the authorise people Availability: Authorise people can access the information when needed. Attacks and prevention for the attacks Errors and Omissions: Errors and Omission is one of the most common and toughest vulnerabilities .It is a human made error because human interact with programming, controlling and enter data for computer. There are no countermeasures to protect the errors and omission. Fraud and theft: It is a one kind of criminal activities that may occur in the KW116 Lab. It includes computer component such as mouse, keyboard, router, switch, cables, CPU box etc. It was observed that security person always not in the access point. So it is harm to secure the lab from fraud and theft. By protecting the access control we can reduce the fraud and theft. Both internal and external people are responsible for that kind of activities. Prevention of Fraud and theft: Regular auditing and monitoring program will help to identify all kind of fraud and theft. Deploy all of the access control. CCTV in proper place. Virus: Virus is a malicious code that has ability to reproduce his code itself and spread one system to another system via e-mail, downloading, storage devices (CD, DVD, memory stick, removal hard drive) and destroy the computer system. It was observed that removal memory stick all most every user are using and it is the most change to spread the virus in the Lab computer system and also observed user are using their own laptop and connected to the university wireless network. If user laptop effected with virus then it also change to spread the lab network that can affect the internal network and attack the server and crash the hard drive. Prevention: Install the latest antivirus software. Regular update the antivirus software. Follow the backup procedures regularly. Scan the device when transfer data. Installing the NIDS (Network Intrusion detection system) and firewall Minimise the download from internet. Download only repudiated site web site. Scan before the download. Care full to open unknown e-mail attach. Scan all incoming file from the remote site. Aware the user about danger of the virus. Trap-doors: It is an undocumented command that might user can create to speed up the work flow. Unfortunately sometimes student might leave these trap-doors. Prevention of Trap-doors: Use latest antivirus software. Give permission to develop the code only authorise people. Check properly all coding before use it. Logic bombs: It work s like time bombs and affect the system in a particular event or day such as program launch, website logon. It changes the data and deletes the data from the system. Here student are accessing the lots software to do the course work or project. So they are strong enough to build the logic bombs. It is normally happen in company if employee leaves the job. Prevention: Audit regularly and monitoring Always back up the necessary file Allow authorise people to develop the code Need record of all modification or changes Trojan Horses: It is a software programming that contains the malicious code. Normally students are interested to download the music, free software from internet. It is the most change to affect the lab computer and destroy the data stored on lab computer system. Prevention: Avoid unwanted software and music download from internet. Aware the user about Trojan Horses. Worm: Warm also is a malicious code that can spread itself without any human involvement from one system to another system .It works only computer network system and does not need any devices to transport. Prevention: Use firewall Use update antivirus software Spyware: It is an unwanted software interface that monitors the activity of the user and transfers the important information like log in details or account details to the remote system that monitor the user activities. Adware: It is also similar to spyware but it does not intent to transfer the user details to a remote system. It works like advertisements on the internet. Some adware monitor the searching behaviour of the user and then redirect the related websites. Prevention of Adware /Spyware: Close the pop up window. Aware about the spyware/adware. Click only reputed link. Social Engineering: Most of the users are getting unknown mail and they are also chatting with unknown people. Social engineering is one of the most popular techniques that attackers use to access the system by sending the mail or chatting with people to know the password. So it is a major risk to the security of the password. Prevention: Not response the unknown mail. Not chatting with unknown people. Dont give any one personal information or login id. Proper training or aware the new user about social engineering. Ping of death: we have only permission to send the largest packet (65,536 bytes) on the server. Attackers know this amount of bytes from ICMP specification. So they try to send the packets more than 65,536 bytes (at least 65,537). If the server does not check the size of the packet and try to process then it hung or crashed the operating system. Dumpster diving: Every day Lab user printing there necessary document but sometimes by mistake they are printing unnecessary document and end of the day through all document in the bin. Hacker is very intelligence. They always look at the bin and find the necessary document to access the network. Prevention: Destroy all documents before put in a bin Natural disasters: If anything happen that is not under control of human it is called natural dusters such as earthquakes, volcano, floods, fires, storms, hurricanes etc It may occur in any time but most risk is the fire for KW116 lab. It may cause from heater, power supply, over heating the power box, short circuit etc. Natural disaster is less chance for lab but it affect is more than any threat .It may destroy the part of the building, loses the all information. Prevention: Follow the health and safety procedures. Clear the fire exit. Aware the user about possible disaster. Man-Made Disasters: If anything happen intentionally to destroy the business process or destroy the part of the business and it is control of human then it is called the Man-Made Disaster such as Fire, Act of Terrorism, Bombings/Explosions, and Power Outages etc. Prevention: Check always ID card Allow only authorise people Use metal detector CCTV Equipment failure: Students are always busy with their course work and other course related work so equipment failure may loss the all data. Prevention: Use extra UPS Back up all data Auditing Stages/Steps Scope and Pre-Audit survey Planning Field work Analysis Reporting Scope and Pre-Auditing The first step or stage of the audit is to understand the purpose of the audit and the areas need to cover during the audit. Understanding the audit purpose is basically get the idea why this audit needs to perform; means any special risk assessment or annual audit. If it is special risk assessment audit this will be more specific and the scope will be narrow and deep otherwise if it is annual audit it will be the general audit to cover as much as possible area. Pre-Auditing survey is to verify the audit areas using risk management techniques and some general techniques such are reading previous audit report, web browsing, background reading, etc This will reduce the chance of failure by correcting the plan by lesson learned. Planning and Preparation In this stage the scope is going to break into small areas to make auditing easier and clear. So the clarity will be more and purpose will be easy to understand. Usually this stage will involve the work breakdown plan and risk control matrix. The risk control matrix is just a check list contains questions to carry out during the audit. Field work Actual auditing will perform during this stage by different techniques or methods. Simply it starts with interviewing staff or students using questioner or oral interview to system or network test by auditing software tools. The result of this stage will be the evidence of the audit to get a conclusion or submit to the management with audit report. So this will be the most important stage in the audit process. This step may use several testing software tools depend on the scope of the audit and the software selection is another key event of the audit process because there are so many fake software applications available in the market. Actually those are virus and the reason of making virus in the form of auditing tools. The reason of spreading the virus in the form of auditing or testing tool is very easy and hart to detect. Analysis Using the evidences or any results collected in the previous stage are the input of this stage. This stage is fully analysis and decision making so it needs a lots of time to investigation and assessment. The most sensitive area of the audit process is analysis because this is the place going to take the decision to submit to the board so that should be perfect otherwise the audit is useless and it will lead to make some wrong decision. Reporting The stage is to present all audit findings in the form of report. This is the document contains all evidences, analysis results, suggestions recommendations, conclusion, etc This document will pass to the management or the higher level people to review approve and take necessary action if necessary. The report should be clearly written and easy to understand because this document need for future also to give some information to start next auditing or to take some strategic decision. Problem Domain Because of the increased use of university of Greenwich KW116 lab the chances of threats or issues are high and this is the responsibility of the student and the staff to make the lab secure in all aspects. The reason of this project based on KW116 is that is the lab used by the students largely and usually network related or any other lab sessions and happening in this lab so if the lab got any security hole or lack that may affect the student and the staffs. Easiest way to ensure the security level of the lab is auditing. This auditing needs to cover all areas from physical security to network security. Then only this will the perfect audit and the audit can use some standard checklist to make more efficient and to eliminate human made errors such as forgotten, typing mistakes, etc There are so many ways to make sure the security level such as penetration testing and vulnerability testing. These are more specific with attacks and threats and for the general purpose security audit is the suitable one as it will cover all areas of the security. According the reasons given above the general security audit is the most suitable technique to verify the security level of the lab. So the auditing will cover most of the areas of the lab with the aid of standard checklist which is approved by British Standard Institute. Test behind the auditing Physical test Network test Software Test Security Policy test Hardware/Peripherals test Access control test Objectives To evaluate the actual level of security that exists at The University of Greenwich Maritime campus KW116 Lab. Activities plan and schedule the audit Auditing with software tools Analysis audit result Deliverable Detailed audit report with suggestions and recommendation This is the main objective of the project and this will carry on with several tools like packet sniffer, port scanner software, etc There are three different tests using these tools to identify internal and external vulnerabilities. To evaluate various methods of implementing the security policy, determine the security weaknesses and implement risk management for the existing security weaknesses. University lab security policy review Analysis Deliverable Detailed security policy analysis report with changes/suggestions/recommendation. The reason of this objective is to stop the holes from policy level because this is the easy way to implement. Learn Audit and Audit process and practice auditing and Research auditing products available in the market and select appropriate. This task is fully learning about audit and audit related stuffs. This objective is the key or starter of this project because if project start without proper knowledge that will mislead to somewhere else not to project aim. To draft a new security policy that addresses the existing weakness to the management. According to the analysis draft a security policy to fix or overcome all existing security holes. Deliverable Draft security policy How the objectives will be achieved Third and fourth objectives will be achieved with books and internet. This objective will give the idea about auditing the outcome of this objective will be a documentation which contains all requirements which need to cover in this project. The research will give the details about tools which requires to perform the auditing the methods/process for the auditing. Internet is the main and basic mean for this research as it is easy to access and with wide range of data. Tools which identified from the research will used to perform the security auditing and this audit result will monitor in real-time and document instantly. Mostly these tools will be freeware and from well-known vendor. The auditing will perform in three different views to make sure the area is secured fully. The views are inside computer local network, outside computer local network, outside computer different network. Audit Methodology This project uses two different methodologies to accomplish the task such as checklist and questioner. The check list is an aid for the auditor to perform the audit and it is a manual to the audit. So the checklist will contains all tests need to perform during the auditing where questioner is to get the opinion or feedback for the staffs and students (generally this will be feedback from stockholders). The analysis also will carry in two different way using questioner and the checklist and finally compare both and get the conclusion. The questioner and checklist covers most of the areas and those are grouped separately to make the auditors life easy and more understandable. The areas coved in the documents are Physical Security/ E Security Forensics and Risk Management Security Forensics and Risk Management Acknowledgement Foremost I would like say thanks to god for all support in all my life and secondly University of Greenwich to give this my life aim to complete my masters. Next my supervisor Professor Kevin Parrott to the supports he gave because without his support I wouldnt be able to complete my project with this quality. Especially the suggestions and appreciation given my supervisor make me feel better and gave positive thinking. Finally need to thank my family and friends for unbelievable supports and encouragements. Abstract As we are in the information era the world is changing to use electronic means for day to day use. The paper documents is gone and most of them are paper free because of so many reasons such as pollution, easy, fast, etc At the same time this digital media has availability, scalability, confidentiality and integrity which are required behaviour for secure communication. The risk is increased with the increase of computer and digital means usage and the single security lack may cause huge losses. There are some surveys says most of the crimes are happening through electronic means and the target is computer or computer peripherals. If the attacker found a single security lack that is enough to start and break the whole system and the security lack could be configuration mistake, firewall issue and basically problems in the protection mechanism. Because of these reasons testing become very important and this process called as Auditing. There are so many types in the auditing and this auditing requires technical knowledge to make these tests perfect and to give an audit report including suggestions. The auditing falls into two main categories such as Automatic and manual. The test will be efficient if it is automated using testing tools which are called as automated or computerised test. Even though there are some tests cannot be automated and need to test manually. This auditing covers network security test, physical or environment security test, computer security test which includes software and hardware tests. The computerised test will carry on with some security tools and the manual will use questioner to minimise human made errors mainly forgetting.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Security audit is the technical assessment of the application or system. The assessment may be manual or systematic or both. In most case the auditing process uses manual and systematic/ automatic methods because there are some tests cannot be automatic such as review of the security policy, asset management, etc   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  This auditing has different types such as internal or external. This type is depends on the company size and the resource availability. Usually big companies have their own security auditor so they will perform the audit internally and the small and medium size companies mostly hire auditor form outside. Both types got pros and cons in security and financial manor. Chapter 1 Introduction This chapter largely contains non-technical information to give the understanding of high level objectives. Also describe the techniques and technologies used in the project and research to accomplish the project Objective Audit The audit is a systematic or manual security assessment of the network, infrastructure, system, etc The complete audit should be the combination of manual and automatic assessment because in every test target there will be some test cannot be automatic. The audit has so many categories and the following paragraph will explain about the categories and the functions or techniques behind that. There are 3 controls in the auditing process which are Preventive control The preventive controls are controls may in the form of software or hardware or ant configuration to prevent the error or vulnerabilities. This is an active type control always monitor the interface for any vulnerabilities and block such vulnerabilities or errors before it enter into the system or infrastructure. This is most effective control mechanism because not allows the vulnerabilities. Detective control The detectives are in placed to monitor the vulnerabilities in the form of software or hardware but the different between preventive and detective is the preventive wont allow the vulnerabilities into the system where detective allows entering everything and correcting the vulnerabilities after enter. The best example is for this control is fire alarm because fire alarm wont prevent the fire before but if any fire it will work. Corrective controls The corrective controls are the controls to correct the error or issue before it make any harm. This is very important control for all places even if they have other controls because there are some issues or vulnerabilities cannot detect by the controls if they will come and attack so there should be some control to correct those before loss occur. Addition to that the controls should up to date such as latest firmware or latest definition. Type of auditors   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  There are two basic types of auditors in the information era the internal and external auditors. This selection of the auditor will be done by the management with the use of financial status of the organisation. Size of the organisation and the policies defined in the company. Internal auditors Internal auditors are auditors belong to that particular company which is going to perform the audit. That means the auditor is an employee of the company. So the auditor is always available to do the auditing and data or information will keep within the organisation. This is the main advantage of having the internal auditor and the same time and the employee purposely recruited for auditing then is cost a lot for the company. So it is only possible for the big level companies because they have huge investments and revenue. The disadvantage of the internal auditor is they may be up-to-date and dont have current market or audit status such as new techniques and tools. External auditors The auditor recruited from other auditing firm for the auditing so it is very hard to find professional auditor because of the availability and as the auditor recruited from outside the company information may go out. At the same time the auditor needs some time to get and understand the company process. But the advantage of recruiting the external auditor is their knowledge and it is suitable for middle and small level companies. Types of Audit: Traditional Audit It is just like a manual auditing. It is useful when working with a large amount of data in a large company. Here auditor took some sample data from different place then provide a report. Advantage: Easy Cheaper Disadvantage: Always do not provide correct information. In IT sector it is not useful. Software audit: Software audit is a wide popular for any educational institute or organization. It is just like a review of the software and the system that can find all information of the system such as operating system, application software, processor, drives, controllers, bus adapters, multimedia, virus protection, system model, main circuit board, memory models, local drive volumes, network drives, printers information etc.. There are so many auditing tools in the market such as Belarc Advisor, E-Z audit that are very power full. KW116 is the main Lab for school of computing and mathematical science in University of Greenwich. CMS installed lots of software for students to continue study or research. According to Copy right, Design and Patents Act 1988, all Software must have a valid licences to continue the process. As Lab uses large amount of software and different software expire on different time so it is very difficult for Lab administrator to keep up to date all licence by manually checks. Only auditing by software can possible to give details report to administrator to keep up safe the system. Advantages: Correct Information: Machine always provide the correct information so it has less chance to provide the incorrect information. Save time: Software very quickly provides a report of the system so it saves time. Details description: It provide a details description of system including any warning or licences issues etc Minimise the cost: By implementing the software audit two peoples work may possible with one people so it reduce the extra cost. Disadvantages: Investment Costly: Software is very expensive so university need extra money to buy this software. Risk: Auditor knows the details information of the system. Work flow: Auditor needs part of the lab to check the system. So it discontinues the student workflow. The approach The typical audit has different approach to collect the data. The single audit will use multiple techniques to gather full information and it is necessary to use different technique for different level of people. These are common techniques here. Interview This technique uses to collect the information from outside people or top level people and the number should be limited. During the interview the auditor or interviewer will ask questions from other people and collect the information. So the person will be well prepared for the interview. This is very robust method because it will allow people to express fully and the method also simple as it is talking which is natural way to communicate. Another advantage is this bi directional communication, means both parties allows to ask questions for clarification or gather information. Observation This method uses in the place where real time process monitoring or behavioural change is required. This is a powerful way of do the changes throughout the audit because other techniques exist in currently not possible to get real time information. Inspection The technique required to do some action with collected data to collect audit related information. This is the form of observation with advance criteria expected. This is extended version of observation because if the auditor apply any advance criteria to gather the data which is necessary to the auditing. After collecting the data the next step is to identify the weakness and process it. The identifying is the key work in the audit and after that categorising. The identifying uses some techniques to make that easy, preface and professional. The techniques used here are Root cause analysis General technique for analyse and get the better solution for the vulnerability or weakness. Because this technique drilldowns to the issue and finds the root and fix the weakness. The basic technique behind this is if the root is fixed automatically it will fix all other problems related to that. So simply close all related issues at once. As mention the easy and robust way to stop the issues exist and the issues may come in the future. After root cause analysis the next step is to get the solution for the root of the issue. The important thing here is choosing better and effective solution for the issue. The selection depends on some external and internal restrictions. Organisation policy Cost per benefit Legal restrictions Availability Compatibility Vendor and citification Advantage of having Auditing: Satisfaction: It brings the confidence of the Lab administrator of the University of Greenwich to continue the business process. Owner always thinks is there any lack that breaks down the continuity of the business. Detection and prevention of errors: Human can made error in any times .on one can say there is no error in there company. By auditing people can find the error and suggestion to recover the error. Detection and prevention of fraud: It also just likes errors. Sometimes user intentionally or unintentionally does this thing. So after audit we can find out the fraud. Verification of the Licences: KW116 Lab installs lots of software for student. Here some software for 1 year some software for more than one year and some software has limitation (No. Of user can use) for use. So auditor can find all kind of licence issues. Independent opinion: Audit always done by the independent people .so this report always accepted by everyone. Safety form exploitation: Health and safety always is a big issue for any organization. KW116 Lab got lots of equipment that are connected with electricity. So always chances for short circuit or exploitation. Audit identifies the all lack point and advice for prevention. Disadvantage of having Auditing: It is expensive Sometimes slow or stop the work flow External people know the company information. Encryption Encryption is the simple technique in the different for to send the date securely through shared place like internet. The form of encryption may vary from each other but they all commonly use digital certificate to encrypt and decrypt the data. Encryption use keys to make cipher text from actual message. The cipher text is not readable and it is the encrypted version of the massage using some algorithm. Security roles/user roles The security roles are very important technique to make network administration easy. This is basically creating some groups with different permissions according to the organisation operation or policy. A user or staff can have multiple security roles according to their need. This roles use to authorise the user permission. Security policy Security policy is a document which has all rules and regulations documented and approved by management and align with laws and legislation. This policy is used to define all activities and this is used to make some decision. Business Continuity: There are three things always we have to mind to continue the business Essential: to running the business any customer order cannot be delay more than seven days. Tolerate delay: some application may delay to continue the business such as management pay. It is a midterm i.e. one to four weeks. Discretionary: some application is useful for business but it is not affected to continue the business operation such as management report. It is a long term i.e. 3 to 6 months. Business continuity planning Business continuity planning (BCP) is the most important for any organization to continue the business. BCP engages with only different kind of risk to continue the business process that might occur in the organization and it also creates the policies, plan and procedures to reduce the risk. BCP can continue the business process in disaster situation as well. The main goal of the BCP is to combine together all policies, procedures and process so that any disruptive situation business process can continue or it may impact very little. Here main important function of BCP is Maintaining the business operation Continue the business in emergency situation Reduce the risk If any situation BCP cannot take over then Disaster recovery planning (DRP) takes over. British Auditing Standard BS7799: It is a British standard called as BS7799 that developed by British standard institution where describes the security policy and standard procedures.BS7799 become the ISO IEC 17799 after accepting the ISO IEC technical committee for international use. Now a days information is a valuable asset for organization .So it is very important to protect the information like other corporate asset. Here BS7799 introduces how to protect the information from threats and suggest the three points to secure the information such as Integrity: it is assurance the completeness and accuracy of the information. Confidentiality: Information can only access by the authorise people Availability: Authorise people can access the information when needed. Attacks and prevention for the attacks Errors and Omissions: Errors and Omission is one of the most common and toughest vulnerabilities .It is a human made error because human interact with programming, controlling and enter data for computer. There are no countermeasures to protect the errors and omission. Fraud and theft: It is a one kind of criminal activities that may occur in the KW116 Lab. It includes computer component such as mouse, keyboard, router, switch, cables, CPU box etc. It was observed that security person always not in the access point. So it is harm to secure the lab from fraud and theft. By protecting the access control we can reduce the fraud and theft. Both internal and external people are responsible for that kind of activities. Prevention of Fraud and theft: Regular auditing and monitoring program will help to identify all kind of fraud and theft. Deploy all of the access control. CCTV in proper place. Virus: Virus is a malicious code that has ability to reproduce his code itself and spread one system to another system via e-mail, downloading, storage devices (CD, DVD, memory stick, removal hard drive) and destroy the computer system. It was observed that removal memory stick all most every user are using and it is the most change to spread the virus in the Lab computer system and also observed user are using their own laptop and connected to the university wireless network. If user laptop effected with virus then it also change to spread the lab network that can affect the internal network and attack the server and crash the hard drive. Prevention: Install the latest antivirus software. Regular update the antivirus software. Follow the backup procedures regularly. Scan the device when transfer data. Installing the NIDS (Network Intrusion detection system) and firewall Minimise the download from internet. Download only repudiated site web site. Scan before the download. Care full to open unknown e-mail attach. Scan all incoming file from the remote site. Aware the user about danger of the virus. Trap-doors: It is an undocumented command that might user can create to speed up the work flow. Unfortunately sometimes student might leave these trap-doors. Prevention of Trap-doors: Use latest antivirus software. Give permission to develop the code only authorise people. Check properly all coding before use it. Logic bombs: It work s like time bombs and affect the system in a particular event or day such as program launch, website logon. It changes the data and deletes the data from the system. Here student are accessing the lots software to do the course work or project. So they are strong enough to build the logic bombs. It is normally happen in company if employee leaves the job. Prevention: Audit regularly and monitoring Always back up the necessary file Allow authorise people to develop the code Need record of all modification or changes Trojan Horses: It is a software programming that contains the malicious code. Normally students are interested to download the music, free software from internet. It is the most change to affect the lab computer and destroy the data stored on lab computer system. Prevention: Avoid unwanted software and music download from internet. Aware the user about Trojan Horses. Worm: Warm also is a malicious code that can spread itself without any human involvement from one system to another system .It works only computer network system and does not need any devices to transport. Prevention: Use firewall Use update antivirus software Spyware: It is an unwanted software interface that monitors the activity of the user and transfers the important information like log in details or account details to the remote system that monitor the user activities. Adware: It is also similar to spyware but it does not intent to transfer the user details to a remote system. It works like advertisements on the internet. Some adware monitor the searching behaviour of the user and then redirect the related websites. Prevention of Adware /Spyware: Close the pop up window. Aware about the spyware/adware. Click only reputed link. Social Engineering: Most of the users are getting unknown mail and they are also chatting with unknown people. Social engineering is one of the most popular techniques that attackers use to access the system by sending the mail or chatting with people to know the password. So it is a major risk to the security of the password. Prevention: Not response the unknown mail. Not chatting with unknown people. Dont give any one personal information or login id. Proper training or aware the new user about social engineering. Ping of death: we have only permission to send the largest packet (65,536 bytes) on the server. Attackers know this amount of bytes from ICMP specification. So they try to send the packets more than 65,536 bytes (at least 65,537). If the server does not check the size of the packet and try to process then it hung or crashed the operating system. Dumpster diving: Every day Lab user printing there necessary document but sometimes by mistake they are printing unnecessary document and end of the day through all document in the bin. Hacker is very intelligence. They always look at the bin and find the necessary document to access the network. Prevention: Destroy all documents before put in a bin Natural disasters: If anything happen that is not under control of human it is called natural dusters such as earthquakes, volcano, floods, fires, storms, hurricanes etc It may occur in any time but most risk is the fire for KW116 lab. It may cause from heater, power supply, over heating the power box, short circuit etc. Natural disaster is less chance for lab but it affect is more than any threat .It may destroy the part of the building, loses the all information. Prevention: Follow the health and safety procedures. Clear the fire exit. Aware the user about possible disaster. Man-Made Disasters: If anything happen intentionally to destroy the business process or destroy the part of the business and it is control of human then it is called the Man-Made Disaster such as Fire, Act of Terrorism, Bombings/Explosions, and Power Outages etc. Prevention: Check always ID card Allow only authorise people Use metal detector CCTV Equipment failure: Students are always busy with their course work and other course related work so equipment failure may loss the all data. Prevention: Use extra UPS Back up all data Auditing Stages/Steps Scope and Pre-Audit survey Planning Field work Analysis Reporting Scope and Pre-Auditing The first step or stage of the audit is to understand the purpose of the audit and the areas need to cover during the audit. Understanding the audit purpose is basically get the idea why this audit needs to perform; means any special risk assessment or annual audit. If it is special risk assessment audit this will be more specific and the scope will be narrow and deep otherwise if it is annual audit it will be the general audit to cover as much as possible area. Pre-Auditing survey is to verify the audit areas using risk management techniques and some general techniques such are reading previous audit report, web browsing, background reading, etc This will reduce the chance of failure by correcting the plan by lesson learned. Planning and Preparation In this stage the scope is going to break into small areas to make auditing easier and clear. So the clarity will be more and purpose will be easy to understand. Usually this stage will involve the work breakdown plan and risk control matrix. The risk control matrix is just a check list contains questions to carry out during the audit. Field work Actual auditing will perform during this stage by different techniques or methods. Simply it starts with interviewing staff or students using questioner or oral interview to system or network test by auditing software tools. The result of this stage will be the evidence of the audit to get a conclusion or submit to the management with audit report. So this will be the most important stage in the audit process. This step may use several testing software tools depend on the scope of the audit and the software selection is another key event of the audit process because there are so many fake software applications available in the market. Actually those are virus and the reason of making virus in the form of auditing tools. The reason of spreading the virus in the form of auditing or testing tool is very easy and hart to detect. Analysis Using the evidences or any results collected in the previous stage are the input of this stage. This stage is fully analysis and decision making so it needs a lots of time to investigation and assessment. The most sensitive area of the audit process is analysis because this is the place going to take the decision to submit to the board so that should be perfect otherwise the audit is useless and it will lead to make some wrong decision. Reporting The stage is to present all audit findings in the form of report. This is the document contains all evidences, analysis results, suggestions recommendations, conclusion, etc This document will pass to the management or the higher level people to review approve and take necessary action if necessary. The report should be clearly written and easy to understand because this document need for future also to give some information to start next auditing or to take some strategic decision. Problem Domain Because of the increased use of university of Greenwich KW116 lab the chances of threats or issues are high and this is the responsibility of the student and the staff to make the lab secure in all aspects. The reason of this project based on KW116 is that is the lab used by the students largely and usually network related or any other lab sessions and happening in this lab so if the lab got any security hole or lack that may affect the student and the staffs. Easiest way to ensure the security level of the lab is auditing. This auditing needs to cover all areas from physical security to network security. Then only this will the perfect audit and the audit can use some standard checklist to make more efficient and to eliminate human made errors such as forgotten, typing mistakes, etc There are so many ways to make sure the security level such as penetration testing and vulnerability testing. These are more specific with attacks and threats and for the general purpose security audit is the suitable one as it will cover all areas of the security. According the reasons given above the general security audit is the most suitable technique to verify the security level of the lab. So the auditing will cover most of the areas of the lab with the aid of standard checklist which is approved by British Standard Institute. Test behind the auditing Physical test Network test Software Test Security Policy test Hardware/Peripherals test Access control test Objectives To evaluate the actual level of security that exists at The University of Greenwich Maritime campus KW116 Lab. Activities plan and schedule the audit Auditing with software tools Analysis audit result Deliverable Detailed audit report with suggestions and recommendation This is the main objective of the project and this will carry on with several tools like packet sniffer, port scanner software, etc There are three different tests using these tools to identify internal and external vulnerabilities. To evaluate various methods of implementing the security policy, determine the security weaknesses and implement risk management for the existing security weaknesses. University lab security policy review Analysis Deliverable Detailed security policy analysis report with changes/suggestions/recommendation. The reason of this objective is to stop the holes from policy level because this is the easy way to implement. Learn Audit and Audit process and practice auditing and Research auditing products available in the market and select appropriate. This task is fully learning about audit and audit related stuffs. This objective is the key or starter of this project because if project start without proper knowledge that will mislead to somewhere else not to project aim. To draft a new security policy that addresses the existing weakness to the management. According to the analysis draft a security policy to fix or overcome all existing security holes. Deliverable Draft security policy How the objectives will be achieved Third and fourth objectives will be achieved with books and internet. This objective will give the idea about auditing the outcome of this objective will be a documentation which contains all requirements which need to cover in this project. The research will give the details about tools which requires to perform the auditing the methods/process for the auditing. Internet is the main and basic mean for this research as it is easy to access and with wide range of data. Tools which identified from the research will used to perform the security auditing and this audit result will monitor in real-time and document instantly. Mostly these tools will be freeware and from well-known vendor. The auditing will perform in three different views to make sure the area is secured fully. The views are inside computer local network, outside computer local network, outside computer different network. Audit Methodology This project uses two different methodologies to accomplish the task such as checklist and questioner. The check list is an aid for the auditor to perform the audit and it is a manual to the audit. So the checklist will contains all tests need to perform during the auditing where questioner is to get the opinion or feedback for the staffs and students (generally this will be feedback from stockholders). The analysis also will carry in two different way using questioner and the checklist and finally compare both and get the conclusion. The questioner and checklist covers most of the areas and those are grouped separately to make the auditors life easy and more understandable. The areas coved in the documents are Physical Security/ E

Friday, October 25, 2019

Essay on Antonio in The Merchant Of Venice -- Merchant Venice Essays

The Character of Antonio in The Merchant Of Venice Antonio is a wealthy merchant in the city of Venice. Although central to the play, Antonio is portrayed by Shakespeare as an 'outcast'. It seems that Antonio is chronically depressed and is not involved in the social atmosphere that is thriving in Venice. "In sooth, I know not why I am so sad: It wearies me; you say it wearies you; But how I caught it. Found it, or came by it, What stuff 'tis made of, whereof it is born, I am to learn:"1 Along with Shylock, both men seem bitter and have difficulty in expressing their emotions. On many occasions friends, such as Salerio and Bassanio have questioned his sadness, trying to find an explanation for their great unhappiness with themselves and with the world. - Salerio: "But tell not me: I know Antonio Is sad to think upon his merchandise.2 Antonio: "Believe me, no: I thank my fortune for it, My ventures are not in one bottom trusted, Nor to one place; nor is my whole estate Upon the fortune of this present year: Therefore, my merchandise makes me not sad."3 Salanio: "Why, then are you in love."4 Antonio: "Fie, fie!"5 The mystery of Antonio's sadness remains, as he dismisses the prospect that his sadness is related to his ships or a lost love. Uninterested in the 'world' of suitors and marriage, Antonio is left without his lifelong companion, Bassanio after he travelled to Belmont to woo Portia.  ... ...rchant he once was when his ships returned from sea laden with goods. However, the only sadness for Antonio is that he has been deprived of the chance to sacrifice himself as a gesture of his true nobility. Notes 1 Merchant Of Venice. Act 1, Scene 1. Lines 1-5 - Antonio. 2 Merchant Of Venice. Act 1, Scene 1. Lines 39-40 - Salerio. 3 Merchant Of Venice. Act 1, Scene 1. Lines 41-45 - Antonio. 4 Merchant Of Venice. Act 1, Scene 1. Line 46 - Salanio. 5 Merchant Of Venice. Act 1, Scene 1. Line 47 - Antonio. 6 Merchant Of Venice. Act 1, Scene 3. Lines 126-133 - Antonio 7 Merchant Of Venice. Act 3, Scene 2. Lines 123-189 - Jessica 8 Merchant Of Venice. Act 4, Scene 1. Lines 280-285 - Bassanio 9 Merchant Of Venice. Act 4, Scene 1. Lines 286-287 - Portia/Doctor of Laws Essay on Antonio in The Merchant Of Venice -- Merchant Venice Essays The Character of Antonio in The Merchant Of Venice Antonio is a wealthy merchant in the city of Venice. Although central to the play, Antonio is portrayed by Shakespeare as an 'outcast'. It seems that Antonio is chronically depressed and is not involved in the social atmosphere that is thriving in Venice. "In sooth, I know not why I am so sad: It wearies me; you say it wearies you; But how I caught it. Found it, or came by it, What stuff 'tis made of, whereof it is born, I am to learn:"1 Along with Shylock, both men seem bitter and have difficulty in expressing their emotions. On many occasions friends, such as Salerio and Bassanio have questioned his sadness, trying to find an explanation for their great unhappiness with themselves and with the world. - Salerio: "But tell not me: I know Antonio Is sad to think upon his merchandise.2 Antonio: "Believe me, no: I thank my fortune for it, My ventures are not in one bottom trusted, Nor to one place; nor is my whole estate Upon the fortune of this present year: Therefore, my merchandise makes me not sad."3 Salanio: "Why, then are you in love."4 Antonio: "Fie, fie!"5 The mystery of Antonio's sadness remains, as he dismisses the prospect that his sadness is related to his ships or a lost love. Uninterested in the 'world' of suitors and marriage, Antonio is left without his lifelong companion, Bassanio after he travelled to Belmont to woo Portia.  ... ...rchant he once was when his ships returned from sea laden with goods. However, the only sadness for Antonio is that he has been deprived of the chance to sacrifice himself as a gesture of his true nobility. Notes 1 Merchant Of Venice. Act 1, Scene 1. Lines 1-5 - Antonio. 2 Merchant Of Venice. Act 1, Scene 1. Lines 39-40 - Salerio. 3 Merchant Of Venice. Act 1, Scene 1. Lines 41-45 - Antonio. 4 Merchant Of Venice. Act 1, Scene 1. Line 46 - Salanio. 5 Merchant Of Venice. Act 1, Scene 1. Line 47 - Antonio. 6 Merchant Of Venice. Act 1, Scene 3. Lines 126-133 - Antonio 7 Merchant Of Venice. Act 3, Scene 2. Lines 123-189 - Jessica 8 Merchant Of Venice. Act 4, Scene 1. Lines 280-285 - Bassanio 9 Merchant Of Venice. Act 4, Scene 1. Lines 286-287 - Portia/Doctor of Laws

Thursday, October 24, 2019

Health Care Communication Methods

Health Care Communication Methods 1 Health Care Communication Methods Edilia Ramos HCS/320 August 27, 2012 Kim Foster Health Care Communication Methods 2A communications coordinator is known as a marketing professional that coordinates organizations both internally and externally. This type of occupation is a key role in an organizations reputation with the employees and within the general public. Communications coordinator may work directly for an organization or for an agency that may specialize in public relations or marketing. Health Care Communication Methods 3There are advantages and disadvantages of using traditional, electronic, and social media for health care communication. Social media these days can raise awareness, and increase knowledge of an issue. Traditional communication and social media may not be able to meet all of the communication goals that are being addressed, or be able to target all of the audience’s needs that are being requested. Due to the recent outbreak of negative side effects that have been reported to the national drug manufacturer there are several ways that I will reach out to the media in reference to the situation at hand.There are traditional, electronic, and social media forms of communication all at each will be provided the proper information as to what has been done to correct the problem that has been brought forward. The modern mass of communication would include the newspaper, radio, television, and telephones which would be the first to be told of the situation and what is going to be done to fix the reports of the negative side effects that have been reported.Traditional communication has come a long way from story-telling, myths, and carvings on monuments to the middle ages in which came the radio, and then onto the internet. Due to the severity of this situation and the importance that needs to be sent out in a timely manner, I am first going to call the television reporting stations within the local are as first seeing that everyone watches their tv’s and that would be the fastest way to get this information out to the public next to the newspaper company, and radio stations that would follow.Health Care Communication Methods 4 The information that was provided to the national drug manufacturer and the effects that have been brought forward are very important to us and the reputation of the company along with the health of the many American’s that take this product. The advantages of traditional, electronic, and social media have enabled us in so many new methods of communicating all in one in which technology has integrated mobile phones with internet, television, email, and text messaging all in one.These are some of the advantages that have derived from the advanced technology in communication, and are of the easiest forms of communication that is able to be seen and viewed by many people all over the world. Electronic communication is also one of the easiest ways to communicate because it lets you combine numerous media text, graphics, sound, and video all into one message. With the internet you are given the ability to transmit and receive large messages of information to and from individuals along with workgroups quickly and in a timely manner.Social media has become world- wide within today’s society and is the most commonly used websites that people are using frequently today and they include twitter, google, myspace, and the infamous facebook that is being used by people of all ages. This new era brings pros and opportunities seeing that in the past you had numbers of or contacts of how people generally got ahold of you, and today with the large part of social media here are many different levels of communication each with a specific purpose. Only you are able to limit the people that know and have your information Health Care Communication Methods 5 and can see what you post on any profile. Therefore social media has made it eas y for the national drug manufacturer to be able to become a social media website and post and information that is needed and wanted by its viewers.In this case this type of communication has many pros in the way it can send out information to people all over, targets a wide audience, effective recruitment tool, facilitates open communication, and you are able to deliver communication to the specific person it is intended for. The disadvantages of electronic, and social media is that it increases the risk online scams that seem real, possibility of hackers committing fraud , and negative comments that can be seen about the company in which they may not be true.It has become more popular to receive a telephone call, or a text message verifying an appointment or a prescription pickup and if a person has changed their telephone number or even their email address someone else is going to receive that information that belongs to another person and that could contain some personal informat ion in which the HIPAA regulation comes into effect.HIPAA also known as the health insurance portability and accountability act went into effect April of 2003 in which the purpose is to protect the patient’s privacy pertaining to their individual health information. HIPAA gives the patient the right to obtain copies of their medical records so that they are able to go over the information on it and correct any errors that they may find. â€Å"All healthcare providers are required to comply with the HIPAA privacy rule. The basic requirement of this rule is that a covered entity may onlyHealth Care Communication Methods 6 use or disclose an individual’s protected health information for treatment, payment, or health care operations or other noted exception’s as permitted or required by the rule. †(www. courseslearningsomething. com/script2) â€Å"HIPAA imposes the following limits on the situations in which employer group health plans may have preexisting c ondition exclusions and the length of time that such exclusions apply†(HIPAA and other laws, chapter 10, pg. 2) A list of pros and cons have been listed and described in the areas of communication related to traditional, electronic, and social media. In any event the privacy of the patient or individuals that may be involved will be kept according to the HIPAA law that prevents such information being given out. Health Care Communication Methods 7 REFERENCES HIPAA and other laws, chapter 10, pg. 12 www. courseslearningsomething. com/script2 Health Care Communication Methods Health Care Communication Methods 1 Health Care Communication Methods Edilia Ramos HCS/320 August 27, 2012 Kim Foster Health Care Communication Methods 2A communications coordinator is known as a marketing professional that coordinates organizations both internally and externally. This type of occupation is a key role in an organizations reputation with the employees and within the general public. Communications coordinator may work directly for an organization or for an agency that may specialize in public relations or marketing. Health Care Communication Methods 3There are advantages and disadvantages of using traditional, electronic, and social media for health care communication. Social media these days can raise awareness, and increase knowledge of an issue. Traditional communication and social media may not be able to meet all of the communication goals that are being addressed, or be able to target all of the audience’s needs that are being requested. Due to the recent outbreak of negative side effects that have been reported to the national drug manufacturer there are several ways that I will reach out to the media in reference to the situation at hand.There are traditional, electronic, and social media forms of communication all at each will be provided the proper information as to what has been done to correct the problem that has been brought forward. The modern mass of communication would include the newspaper, radio, television, and telephones which would be the first to be told of the situation and what is going to be done to fix the reports of the negative side effects that have been reported.Traditional communication has come a long way from story-telling, myths, and carvings on monuments to the middle ages in which came the radio, and then onto the internet. Due to the severity of this situation and the importance that needs to be sent out in a timely manner, I am first going to call the television reporting stations within the local are as first seeing that everyone watches their tv’s and that would be the fastest way to get this information out to the public next to the newspaper company, and radio stations that would follow.Health Care Communication Methods 4 The information that was provided to the national drug manufacturer and the effects that have been brought forward are very important to us and the reputation of the company along with the health of the many American’s that take this product. The advantages of traditional, electronic, and social media have enabled us in so many new methods of communicating all in one in which technology has integrated mobile phones with internet, television, email, and text messaging all in one.These are some of the advantages that have derived from the advanced technology in communication, and are of the easiest forms of communication that is able to be seen and viewed by many people all over the world. Electronic communication is also one of the easiest ways to communicate because it lets you combine numerous media text, graphics, sound, and video all into one message. With the internet you are given the ability to transmit and receive large messages of information to and from individuals along with workgroups quickly and in a timely manner.Social media has become world- wide within today’s society and is the most commonly used websites that people are using frequently today and they include twitter, google, myspace, and the infamous facebook that is being used by people of all ages. This new era brings pros and opportunities seeing that in the past you had numbers of or contacts of how people generally got ahold of you, and today with the large part of social media here are many different levels of communication each with a specific purpose. Only you are able to limit the people that know and have your information Health Care Communication Methods 5 and can see what you post on any profile. Therefore social media has made it eas y for the national drug manufacturer to be able to become a social media website and post and information that is needed and wanted by its viewers.In this case this type of communication has many pros in the way it can send out information to people all over, targets a wide audience, effective recruitment tool, facilitates open communication, and you are able to deliver communication to the specific person it is intended for. The disadvantages of electronic, and social media is that it increases the risk online scams that seem real, possibility of hackers committing fraud , and negative comments that can be seen about the company in which they may not be true.It has become more popular to receive a telephone call, or a text message verifying an appointment or a prescription pickup and if a person has changed their telephone number or even their email address someone else is going to receive that information that belongs to another person and that could contain some personal informat ion in which the HIPAA regulation comes into effect.HIPAA also known as the health insurance portability and accountability act went into effect April of 2003 in which the purpose is to protect the patient’s privacy pertaining to their individual health information. HIPAA gives the patient the right to obtain copies of their medical records so that they are able to go over the information on it and correct any errors that they may find. â€Å"All healthcare providers are required to comply with the HIPAA privacy rule. The basic requirement of this rule is that a covered entity may onlyHealth Care Communication Methods 6 use or disclose an individual’s protected health information for treatment, payment, or health care operations or other noted exception’s as permitted or required by the rule. †(www. courseslearningsomething. com/script2) â€Å"HIPAA imposes the following limits on the situations in which employer group health plans may have preexisting c ondition exclusions and the length of time that such exclusions apply†(HIPAA and other laws, chapter 10, pg. 2) A list of pros and cons have been listed and described in the areas of communication related to traditional, electronic, and social media. In any event the privacy of the patient or individuals that may be involved will be kept according to the HIPAA law that prevents such information being given out. Health Care Communication Methods 7 REFERENCES HIPAA and other laws, chapter 10, pg. 12 www. courseslearningsomething. com/script2

Wednesday, October 23, 2019

Competitive Analysis

Competitive Analysis One of the few advantages Japed has over its competitors is that they are t he most welkin hot dog stand in Vancouver. As they were awarded â€Å"Best of Vance feed' 3 years consecutively. Shops located at the YVES airport, Robinson Street, and Richmond d has proven to be very successful towards the company. These locations provide easy ace usability for potential consumers. The airport provides people from all over the world to g Arab a quick bite before their next flight. What better thing to grab than a cultural fusion hot do g a customer has never tried before?The convenience of Japed makes it easier for busy pep el, and hence why the restaurant location is on Robinson . While providing convenience for cue stokers, Japed also brings a unique taste to the market. This unique taste can be thou ought of as an advantage over other hot dog vendors/ restaurants. This differential advantage in culture can attract many consumers roaming around the area. The North Am erican culture e for comfort food usually consists of hamburgers, fries, and most importantly for Japed; hot dogs.This is one of the main reasons why Japed was able to gain its popularity; an teeth nice, distinct, flavors fusion of one of the most loved snacks in North America. The difference between Japed and other hot dog stands are the unique vary ties that they offer. Such as Spading signature hot dog topped with Tertiary sauce e, mayo and seaweed, these are the kinds of ingredients that makes their products unique . The price range of Japed starts from $5 for a simple hot dog $12 for a full meal inch duding its specialty hot dog, fries and a drink.Japed faces numerous competitors in d owe Anton Vancouver and many other food trucks, but with the increase of Japanese rest rants in the area, Sapwood's business has grown significantly. Japed has become very pop alular as the people of Vancouver have grown a love for Japanese cuisine. Other food trucks provide cuisines such as Mexic an cuisine are slightly more pricey than Japed. The price varies around $7 $14, despite the price, although the quantity that is given is also fulfilling, we have found the reputation, value and the taste oft he product Japed offers is on par with or surpasses other food stand competitors.Alone g with the product, Japed has the highest number of food stands in Vancouver, thus gig vying them a location advantage and easy accessibility over its competitors. The countless mount of flavors is also a major advantage that Japed possess. Currently with 13 SP Cecilia and 7 traditional hot dogs, as well as a separate category of fries, Spading menu pr vides customers an abundance of choices compared to other competitors. The main competitors of Japed are the other neighboring street vendors a ND obviously, other hot dog stands.Other vendors that have their own cultural TA set such as Mexican, Greek, Chinese or Persian are also a threat towards them. Fast food restaurants such as McDonald's, Church's Chicken and Wendy are also great threats to Jaw padded. The rice range for a burger in McDonald's is around 5 dollars and the meal is ABA UT 8 dollars and this is one of the reason why Japed is making less profit comparing to chain deed fast food restaurants. Fasted chains such as McDonald's and Wend's have been established for a longer time. They are very welkin to society and that's the greatest competitive a advantage they have.Established competitors usually take advantage of using television com Americas to advertise their new product or even a special package deal. Since Japed is q tie new compared to bigger fast food chains such as McDonald's, their locations are r stricter to only downtown Vancouver and Richmond Birdhouse strain station. They are no t as exposed as other fast food chains that have been around for a longer time. Spading AC accessibility is strictly towards the people roaming around downtown and Richmond Bright use strain station.Even with the excepti onal taste and popularity of Japed, there will be a few downsides. One of the few is that not all people like hot dogs. This difference I n taste may cause slower sales compared to competitors who do not only have hotdogs, but burgers, wraps, or salads. However, during the Winter Olympics that was held in Vance ever, Japed has experienced their busiest time with nearly 1 00 people lining up at one Tim e for the Japanese style hotdogs everyday, showing how they can provide sales with eve n only the menu selection of hotdogs, fries or drinks.In conclusion, after analyzing Spading competitive advantage we can see that t they are continually a very successful local food vendor comparing to other local of odd vendors, but must take further steps in order to grow internationally. Although there are n onerous factors that they must take carefully into consideration in order to further progress t heir business successfully.