Saturday, January 25, 2020

Communications Sector Infrastructure

Communications Sector Infrastructure Communication exchange system has become a crucial component in our lives today. Many businesses have thrived in connection with a viable communication system. This is a way in which a marketer has seen his firm optimize and maximize profits as a real interaction between him, and the consumer is enabled by the availability of communication system. Apart from that communication sector prevails in areas such as security department, finance department, transport department and many other critical sectors (Lewis, 2014). The finance department requires communication infrastructure in conjunction with other junior departments in harmonizing financial records as well as monetary gains from the business. Transportation department currently is being controlled using communication infrastructure in setting arrival and departure time for various journeys (DHS, 2015). Communication connections are mostly run by the private sector in the presence of Continuity Guidance Circular (CGC) which offers directions to the Non-Federal Governments (NFGs) on how to ensure the effectiveness of the program (FEMA, 2013). This circular encompasses all forms of organizations from tribal, local government, territorial and other non-governmental forms. All forms of communication are integrated into one unit and fed into the system using the internet (FEMA, 2013). This communication platform has evolved in proportional to cyber-attack. This is a threat lagging private sector behind in dissemination of quality services to its members. It is no doubt that many firms do not consider to carry out research on how well to protect their communication systems in case of an attack. All that they concentrate on is the profits to be collected (Etzioni, 2011). This is one of the many weaknesses many firms face and the issue needs to be addressed. Still, the transitions in the co mmunication technology platform have positively yielded success on the part of hackers who are in the frontline of innovations progress (DHS, 2015). Due to increased cases of hacking, the private sectors are left with no idea in which to discharge their responsibilities properly. Interconnection of computers to perform a central task has proved unworthy irrespective of many experts put in place to control the system (Raed Keating, 2014). This implies that consumers do not get their ordered products on time or else they lack information concerning a new product which might have been introduced in the market by their respective firms. This form of cyber-attack may come in as a result of competition for market domination by various antagonistic investors (Etzioni, 2011). Program Goals United States retains two guiding programs Continuity of Government (COG) and Continuity of Operations (COOP) which lay a foundation upon which every goal and vision of a given organizations are determined (DHS, 2015). This also ensures that citizens are offered only those services essential to them. In this case, all objectives, goals, and visions of the firm need to be reviewed. The private sector cannot solve the problem of cyber theft if the entire member companies do not comprehend the driving force to their business venture (Stergiopoulos et al., 2017). In 2008, George W. Bush signed Comprehensive National Cyber Security Initiative (CNCI) to secure communication attack for current and future economy. He urged all the stakeholders to focus on one goal, and that is cyber threats reduction (Hennig Rollins, 2009). Also, the agreement was cemented on the grounds of how the member firms and federal governments shared benefits. All goals of a business are met by satisfying the consum er needs. This assessment is important to the stakeholders in sending the right information to the government for the arrangement of support provision. It also indicates how many objectives the firm has been able to achieve during the operation period (Hennig Rollins, 2009). Discharge of Duties and Monitoring of Staff National Institute of Standard and Technology (NIST) department to set peculiar critical standards upon which communication infrastructure would be conducted (DHS, 2015). The key issue is how leadership is done and closes monitoring of the staff. Todays private sector should incorporate all the necessary information concerning the best infrastructure platform which would otherwise cope with cyber-attack menace (Knapp Langill, 2014). This is possible through the in-depth search of information the hackers might be using in lagging the economy behind. Once this information is collected, a firm background in collaboration with the government should be laid. This could only be achieved by enhancing a new database with new security coding system that could easily be manned from a central point (Knapp Langill, 2014). The databases should be enabled with data tracking mechanisms to detect all the specifications and the identity of any intruder into the system (Kotzanikolaou et al., 2013). The operating staff and their information should be easily monitored; should there be information leakage, tracing of the culprit will be easy. The government in line with the private sector should impose harsh rules that will apply to anyone who tries the cyber attack on all grounds (DHS, 2015). Again the consumers should be included in decision-making to ensure that the implementation of new communication system doesnt throw them out of business on the grounds of its operation and the guidelines. Communication Technology Assessment In every aspect of business operation, the introduction of a new mechanism of services is bound to yield setbacks which in this case are referred as risks. One of the greatest risks a private sector should be aware of is the ability to lose some of the stakeholders (Yan et al., 2013). This comes with new principles that would guide the operations of the system in securing a given department. For instance, change in the systems in the security department may imply that some of the operators have to be axed since the new system is capable of operating various sections that were earlier performed by different personnel. This is a significant threat since the fired individuals might be containing critical information that would interfere with the safety of department in case they decide to retaliate. Risk Evaluation The magnitude of a threat to the new system should be evaluated. In the security department, for instance, the axing of various departments and their operation staff should be closely reviewed. Because these experts still contain many secrets of the entire security staff, the option to send them home is utterly inappropriate. This is supported by the argument that in situations of retaliation by this group. In the government sector, a threat may impact severe consequences due to its broadness in management level and corruption scenario which remains to be a significant threat to success. Risk assessment can still be determined by the loss a firm will incur regarding devotion and money. Risk Management This is another area that requires attention in determining how the cyber-attacks can be managed. Application of approaches that lead to quality progress and effectiveness of the program should be the guiding principle of the government (FEMA, 2013). Registering, scanning and monitoring every step the operating team undertakes is another important measure to mitigate cyber theft. Still, on that ground, security department should strictly observe the person entitled to run the system (May Koski, 2013 The mission to improve the communication system targeting their counterparts will probably be aborted mainly through leaking of information. The system should be designed in a manner that it wont access any codes from outside the base. Just in case the hackers succeed in collapsing the system, the whole system should be set in a manner which destroys everything. This will assist in controlling cyber attacks in many fields of operation. Assessment of Programs Readiness The success of the whole operation should be measured by looking at how the business is running. In the case of improved profit margins and customer satisfaction, the operation of the system should prove applicable. This is contributed by strong leadership originating from senior positions at the junior level (Younis Kifayat, 2013). On the other hand, if the system runs in a reverse manner, it implies that the cases of cyber threat were not controlled. The firm and the government should work on adding more knowledge and pooling resources together to curb losses which would deteriorate the economy. It is crucial for business and security firms to move with technological advancements that are changing on a daily basis. It is a wise decision to do away with out of date technologies that are prone to cyber-attacks and embrace those which are secured against such threats. Communication infrastructure forms an integral part of any company and has a direct impact on performance. As such, maintaining the integrity of the infrastructure is critical. The Continuity Guidance Circular (CGC) offers directions to Non-Federal Governments (NFGs) on how to ensure the effectiveness of the program. The CGC provides a guideline on the dissemination of duties, continuous assessment of the infrastructure, risk management, and evaluation and also the assessment of the programs readiness (FEMA, 2013). References Department of Homeland Security, (2015). Communications Sector-Specific Plan an Annex to the NIPP 2013. Retrieved from https://www.dhs.gov/sites/default/files/publications/nipp-ssp-communications-2015-508.pdf Etzioni, A., (2011). Cybersecurity in the Private Sector. Issues in Science and Technology. Retrieved from http://issues.org/28-1/etzioni-2/ Federal Emergency Management Agency, (2013). Continuity Guidance Circular 1 (CGC 1) Continuity Guidance for Non-Federal Governments (States, Territories, Tribes, and Local Government Jurisdictions). Retrieved from https://www.fema.gov/media-library-data/1386609058803-b084a7230663249ab1d6da4b6472e691/CGC-1-Signed-July-2013.pdf Hennig, A Rollins, J., (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/natsec/R40427.pdf Knapp, E. D., Langill, J. T. (2014). Industrial Network Security: Securing Critical Infrastructure networks for the smart grid, SCADA, and other Industrial Control Systems. Syngress. Retrieved from http://library.books24x7.com.ezproxy2.apus.edu/toc.aspx?bookid=77754 Kotzanikolaou, P., Theoharidou, M., Gritzalis, D. (2013). Assessing n-order dependencies between critical infrastructures. International Journal of Critical Infrastructures 6, 9(1-2), 93-110 Lewis, T. G. (2014). Critical Infrastructure Protection in Homeland Security. Somerset: John Wiley Sons, Incorporated. Retrieved from http://ebookcentral.proquest.com.ezproxy2.apus.edu/lib/apus/detail.action?docID=1813343 May, P. J., Koski, C. (2013). Addressing public risks: Extreme events and critical infrastructures. Review of Policy Research, 30(2), 139-159. Retrieved from http://onlinelibrary.wiley.com.ezproxy2.apus.edu/doi/10.1111/ropr.12012/full Raed, M. J., Keating, C. B. (2014). The fragility of oil as a critical infrastructure problem. International Journal of Critical Infrastructure Protection, 7(2), 86-99. Retrieved from https://pdfs.semanticscholar.org/745d/aa0b70a3e6ced165add2435036ab903bc999.pdf Stergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D. (2017). Risk Mitigation for Critical Infrastructures: AUEB INFOSEC Lab Initiatives. Retrieved from https://infosec.aueb.gr/Publications/Risk-Tea%202017A%20CIP.pdf Yan, Y., Qian, Y., Sharif, H., Tipper, D. (2013). A survey on smart grid communication infrastructures: Motivations, requirements, and challenges. IEEE Communications Surveys Tutorials, 15(1), 5-20. doi:10.1109/SURV.2012.021312.00034 Younis, M. Y. A., Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep. Retrieved from https://www.researchgate.net/profile/Younis_A_Younis/publication/262817790_Secure_Cloud_Computing_for_Critical_Infrastructure_A_Survey/links/5465ed3e0cf2f5eb180130d5.pdf

Friday, January 17, 2020

Explore Shakespeare’s dramatic presentation of Macbeth in Act 1 Essay

Explore Shakespeare’s dramatic presentation of Macbeth in Act 1 discussing how audiences have responded then and now Macbeth, written by William Shakespeare between 1603 and 1606, features a Scottish warrior called Macbeth, whose life is totally changed by the prophecies of three witches. It shows how a hardened warrior such as Macbeth, who can nearly win battles on his own, can be mentally destroyed by a series of events which happen over a few days. The play starts gloomily and with a sinister feeling about it; there is thunder and lightning which in Shakespeare’s play mean there is going to be trouble ahead, and things will not be as they seem to be, giving and immediate warning to the audience, while the three witches begin to cast their spells. Shakespeare opens with the witches to show their domination over the events which are forthcoming to the play. In everything that the witches say, they deliberately confuse and talk in riddles: ‘When the battle is lost and won’ and ‘Fair is foul’ and ‘Foul is fair’ which sets the scene for what happens later in the play. The language creates a cloud over events, leaving the audience confused and puzzled over what is to happen to Macbeth and the other characters in the rest of the play. It leaves a dilemma in the audience mind as they make up their own minds on Macbeth’s character as he is linked with their evil since they intend to meet him. Shakespeare fixes the historical setting in scene 2, which is set in camp near the battlefield; it reveals that there was unrest in Scotland at that time, as the Kings army are fighting a group of rebels led by the then Thane of Cawdor. This scene again gives information about Macbeth, but this time it tells the audience that Macbeth is a hardened warrior who will kill for the honour of his King and country. The captain describes how both Macbeth and Banquo fought on regardlessly even though tired, against the villainous low life rebels, giving the historical context. The captain describes how they destroyed and slaughtered the enemy and how they should have been killed because they were so outnumbered, which leads Duncan to praise the two warriors, practically calling them Supermen: ‘noble’ and ‘valiant’. The audience has now seen the two sides of Macbeth: good and bad, it is up to them to decide whether or not he is good, valiant and honourable, or evil, murderous and possessed. It is only Scene 3 when the audience finally sees Macbeth, speaking to the witches, when they start to make prophecies about Macbeth, initially calling him: ‘Thane of Glamis’ which he inherited from his father. Next they say: ‘All hail Macbeth, hail to thee, Thane of Cawdor’ and then: ‘All hail Macbeth, that shalt be King hereafter’. This describes the past: Thane of Glamis, which he already is; the present: Thane of Cawdor, because he becomes it later in this scene; and the future with the prophecy of him becoming King. Macbeth is obviously extremely interested, but Banquo is more hesitant. He sees these words as just things they say to build up Macbeth’s confidence and are not the truth. ‘Instruments of Darkness’. Scene 4 begins with Macbeth saying ‘The service and loyalty I owe,’ which makes him seem honourable, he then goes on to flatter Duncan by saying. In doing it pays itself. Your Highness’ part is to receive our duties, and our duties are to your throne and state, children and servants, which do but what they should be doing everything safe toward your love and honour.’ All this is an attempt to win over Duncan, as he has already won a battle for him and flattery he hopes the prophecy of his becoming King will become a truth. Duncan is clearly flattered and replies ‘I have begun to plant thee and will labour to make thee full of growing.’ Since Duncan wants to give him more rewards, this will definitely raise the hope of Macbeth that he will become heir to the throne. However, Macbeth’s dreams are shattered by what Duncan is to say next: ‘Our eldest, Malcolm, whom we name hereafter The Prince of Cumberland’, meaning that Malcolm, not Macbeth, is to be the next King. The audience is as shocked by Macbeth at this sudden event after the earlier build up and would sympathise with Macbeth whose balloon has been popped and is crashing to the ground. He is extremely angry and distraught at Duncan as after everything he has done for him. It was his greatest desire to become King of Scotland, a dream shattered by Duncan, who surely must pay for what he has done- or will Macbeth carry on being loyal to his King in hope of future rewards? Will the wait for the third prophecy come true? This is a difficult decision for the audience to make as Macbeth has been associated with evil earlier in the act, but also has, done good deeds for his King. The audience ponders on which way he will turn-towards good, or evil-and will anyone influence his decision? In the next scene Shakespeare begins to answer the audiences questions as scene 5 is set in Macbeth’s castle, where Lady Macbeth is reading a letter from Macbeth describing the events. Macbeth describes his success saying that he knows more than ‘mortal knowledge’, adding that witches predicted he will be King, but does not tell her that he was not made Prince of Cumberland. He says that she must think about the news because he knows she is greedy and he is tempting her by telling her what happened. The audience will see that the only reason Macbeth wrote it was because he was angry and distraught. Lady Macbeth is definitely tempted by this, determined that Macbeth will be King and she will be Queen. Yet she recognises that Macbeth is too ‘nice’ to go about it the quickest way and that he will want to do it the ‘right’ way. Her main plan is to win Macbeth over, so that he will kill Duncan and whoever else he must do to gain the crown, intending to manipulate and ‘nag’ M

Thursday, January 9, 2020

Annotated Bibliography On Digital Forensics - 1257 Words

Digital forensics is a fairly new science involving the collection and analysis of data from digital devices. However, the evolution of technology into smaller, mobile devices has made it necessary for the creation of mobile forensics. Mobile forensics is a subset of digital forensics, which is focused on the preservation, acquisition, examination, analysis, and reporting of digital evidence from mobile devices. Even though the digital forensics process can be utilized for mobile devices, the model is not perfected. Gonzalez and Hung (2011) attribute this issue to the young age of mobile devices and the different operating systems, communications protocols, and storage methods utilized. To comprehend the challenges involved in conducting†¦show more content†¦Smartphones Smartphones are a mobile technology that utilizes an advanced operating system in portable devices. Currently, the advanced operating systems employed on smartphones are IOS and Android. IOS was developed by Apple and is exclusive to its mobile devices only. However, Android is an open source operating system that is utilized by various smartphones on the market. Nevertheless, current smartphones employing either operating system encompasses the capabilities of a cell phone, camera, computer, mp3 player, external hard drive, GPS, and internet connection. This collection of technology on one device makes it very advantageous for businesses and convenient for individuals. According to Smith (2015), this is supported by the fact that 64% of American adults have a smartphone for various tasks. Tablets Tablets are another mobile technology that uses an advanced operating system. Additionally, they employ the same major operating systems (iOS and Android) as the smartphones. As well as, offering the same technologies of a smartphone, but in a larger size. However, these mobile devices have found greater employment by organizations to become more efficient, increase productivity, and save time and money. Murphy (2012) provides various methods of how businesses can employ tablets in its organization; for example, for a board meeting, in warehouses, or for sales. Strengths Mobile technology has several

Wednesday, January 1, 2020

How Divorce Affects A Child s Development Essay - 888 Words

Judith Osiughwu Kean University Introduction In today s society, divorce or remarriage rate has been growing rapidly. Divorces is a legal action between married people that is on longer together. Over the last twenty-five years, several studies has indicated that divorce process may affect family characteristics and most especially children s cognitive performance. Divorce changes children s lives through parental emotion and behavior. Divorce may also increase the risk of negative outcomes for younger and older children. Children from infant and toddler are less likely to be affected by divorce because is an early development stage (Leon, 2003). The purpose of this study is to better understand how parental divorces affects a child s development, how children transition from living with both parent or divorces single parent and also. Studies, how divorce could influence a child s behavior, emotions, a child academic and their future relationships. Between young children and older children who react or adjust more to parental divorce. My hypothesis is to see divorce effect a child s cognitive, emotional and psychological aspect class or at home. Parent who are divorce is also categorized in two, divorce single-parent living with children, while a divorce in which the children is living with neither of their parents or family. Overall no matter where the child is living, divorce still has a negative influence in the childShow MoreRelatedHow Divorce Affects A Child s Development Essay887 Words   |  4 Pages Introduction In today s society, divorce or remarriage rate has been growing rapidly. Divorces is a legal action between married people that is on longer together. Over the last twenty-five years, several studies has indicated that divorce process may affect family characteristics and most especially children s cognitive performance. Divorce changes children s lives through parental emotion and behavior. Divorce may also increase the risk of negative outcomes forRead MoreEssay about The Impact of Divorce on Children1401 Words   |  6 PagesThe Impact of Divorce on Children Divorce is the dissolution of a marriage that affects numerous people around the world. Divorce can be a heartbreaking process that affects not just the couple but their children also. I am going to be comparing the impact of divorce on children in context to Bronfenbrenner’s ecological theory. Individual The individual in this context is the child that is affected by the divorce of their parents. Studies show that divorce can affect a child’s social skills (KimRead MoreEffects Of Parental Divorce On Children s Development1019 Words   |  5 Pageschildren s development. The researches of Divorce and the impact on a child s development. Some of the e journals will explore and help us identify some the effects that harm children as they encounter their parental divorce. Numerous researchers have found that parental divorce is associated with a range of negative outcomes in young children. We will focus on prospective Analysis and explore the study more detailed. The effects of a person’s early relationship on their development through lifeRead MoreWhat Are The Positive And Negative Consequences Of Divorce On Child Development?1626 Words   |  7 PagesSometimes it’s better to say goodbye†: What are the positive and negative consequences of divorce on chi ld development? Introduction In this 21st century the family concept is continuiously changing dynamic, there can be two males or two females as parents. Parents that are going through divorce or an increase in marital dissolution are often concerned about the effect that it will have on their children. They wonder if they are sacrificing their childrens health and happiness for their own selfishRead MoreThe Effects of Divorce on Children Essay768 Words   |  4 Pageswill experience the divorce of their parents before they reach age eighteen (D. Matthews). Research suggests that divorce creates harm to children and affects development of children in a variety of ways. Research also suggests that divorce also has both short-term and long term effects on children. This paper will focus on the history of divorce in our society and current statistics, how divorce affects the level of trust in familial and social relationships, and how divorce creates an unhealthyRead MoreEffects Of Divorce On Children s Life1736 Words   |  7 PagesSantiago The Effects of Divorce in Children So you re living the american dream , you have a perfect house , a perfect car , two perfect children and then like the majority of americans the trend of divorce hits your family . Divorce is a daunting word ,it causes heartbreaking change and pain to everyone involved . Many would agree its a child nightmare seeing their two parents separate . Who could think that one single event could carry such importance on a child s life .Children of divorcedRead MoreChildren Should Be Too Great For Their Parents886 Words   |  4 Pages†¢ In most cases, the child has to change the geographical settings, schools, friends, teachers and fellow students. †¢ They are unable to deal with the emotional trauma that is brought about by the divorce, and they do not know whom to turn to because of the divorce, which makes them angry, depressed, and at times develop an aggressive nature (Brown, 2010). Research shows that children suffer emotional trauma in the event that there parents’ divorce. According to Steven Earll who is a licensed counselorRead MoreThe Effects Of Divorce On Family Members1706 Words   |  7 PagesDivorce affects family members in many different ways, both positive and negative. While many children can foster healthy relationships post-divorce, some may experience challenges maintaining future relationships after dealing with their parents divorce. How can parent do this to their child? One of the most important thing is to teach your child about building a relationship so they can be positive and can have positive thinking about getting married to have a family on their and work thingsRead MoreHow Does Divorce Affect Children?1693 Words   |  7 PagesHow does divorce affect children? Married couples represent fifty one percent of Americans, many of which end in divorce spawning over eleven million single parent families. According to the American Psychological Association forty to fifty percent of marriages in the United States will end in divorce. This marriage dissolution rate results in fifty percent of our children witnessing the divorce of their parents, forty percent of which are being raised without fathers in the home. Divorce and singleRead MoreEssay on Effects of Divorce on a Child1464 Words   |  6 PagesDivorce is a very common word in todays society. According to the American Heritage Dictionary, divorce is the legal dissolution of a marriage or a complete or radical severance of closely connected things(Pickett, 2000). This dissolution of marriage has increased very rapidly in the past fifty years. In 1950 the ratio of divorce to marriage was one in every four; in 1977 that statistic became one in two. Currently one in every two first marriag es results in divorce. In second marriages that