Tuesday, December 31, 2019

Gertrude Stein By Pablo Picasso And The Toilet Of Venus

This formal art analysis will compare and contrast the line, color, light, and composition of Gertrude Stein by Pablo Picasso and â€Å"The Toilet Of Venus by Francois Boucher. The formal qualities of these paintings provide a classically orientated approach to the individual subject, which provide similar methods of composition and line. However, Picasso tends to chose earthy color tones in contrast to the brightly colored image provided by Boucher of Madame de Pompadour. More so, Boucher provides a much more lighted environment for his subject, which is dissimilar to the muted light of Gertrude stein in an interior setting. In essence, a comparison and contrast to the line, color, composition, and lighting will be formally analyzed in†¦show more content†¦This painting provides an extreme high level of lighting, which was utilizes whites that give off the impression of a heavenly glow. The subject’s skin almost seems to radiate light in Boucher’s style of r ealism, which goes in on contrast to Picasso’s use of extremely muted light on the face of his subject. More so, Picasso tends to present Gertrude Stein in a room with very low lighting, which expands upon the dim nature of this painting. These paintings define the differing nature of lighting in the classical mode, which tends to show the differing styles of application that each painter utilized in differing historical periods. The use of extremely highly it settings was a common practice for Boucher in the 18th century, which defines the contrasting elements of muted light of modernism that Picasso utilizes in his portrait of Gertrude Stein. The use of color in Boucher’s painting is much more intense, in contrast to Picasso’s use of earth tones. Boucher utilizes aquamarine, pinks, whites, and golden colors (on the furniture), which defines the overt of bright coloration in the rococo style. The overt use of flesh tones is also complimented by the use of pink and white to accentuate the classically nature of this piece. In contrast to this bright range of colors, Picasso chooses to use the browns , blacks, and some coloration in the couch that Gertrude Stein is

Monday, December 23, 2019

Feminist Icon Betty Friedan Testified - 1181 Words

On January 29th, 1970, feminist icon Betty Friedan testified before the Senate Judicial committee to protest the appointment of Judge George Harrold Carswell to Supreme Court Justice. With this testimony, Friedan hoped to persuade the committee to reject Carswell’s nomination. In her testimony, Friedan was clear, concise, and effective. Friedan employed many different techniques to provide examples and backings for her assertions. Within the first few sentences of her speech, the activist establishes credibility and states her reason for being there. As president of the National Organization of Women, known informally as N.O.W., Betty Friedan speaks out against the â€Å"discrimination against women in the employment, education, and in all†¦show more content†¦Friedan also uses statistics to remind the court that 4.1 million mothers in the working force have children under the age of six and that they â€Å"comprise 38.9 percent of the nearly 10.6 million mothers in the labor force today† (Friedan). The activist continues to use evidential elements and statistics in her testimony, stating â€Å"for every mother of children who wor ked in 1940, ten mothers are working today, an increase from slightly over 1.5 million to nearly 11 million†(Friedan). Friedan also makes point that a man applying for the same position would not be denied because he was father to pre-school aged children. The use factual evidence makes many of Friedan’s assertions irrefutable and provides solid backing for her case against Carswell. However, Friedan does not just use factual evidence. The activist also appeals to emotions in her testimony, and although this may not be the most effective tool against her targeted audience, it does give her backing beyond the factual. Friedan asks the committee to place themselves in the shoes of those she fights for, and asks for empathy. To paraphrase, Friedan asks them to imagine themselves being denied for reelection, or applying for a job at a company or law firm or university and being told they are ineligible simply because they had a child (Friedan). After painting this picture f or the committee, Friedan hits back with a question, asking â€Å"then how do you feel about appointing to the Supreme Court a man who has saidShow MoreRelatedJohn Rolfe s Impact On America5544 Words   |  23 Pagesthe manuscript until the angel returned the plates back to Smith in September of 1828. Joseph had later found Oliver Cowerdy as a replacement scribe for Harries. In April 6, 1830 Smith had officially opened the church after the Three Witnesses testified saying they had saw the golden plates. Joseph Smith influenced America for being the leader of creating the first religion on American soil. Period 4: Dorothea Dix Dorothea Dix changed America much when she fought for the improvement of the insane

Sunday, December 15, 2019

Persuasive Speech Free Essays

Persuasive Speech Length 4-5 minutes PLEASE! Use Proper Safety Restraints in your Vehicle ?Adult restraints – ?Why are they important ?What happens if you don’t use them NO SEATBELT NO EXCUSE! †¢Let me start by saying that YES there are cases where you are better off NOT wearing a seatbelt but those cases are FAR FAR outweighed by the ones where you are better off wearing it. In the past few weeks there have been more than a few news stories about people being killed in car crashes. It doesn’t matter how safe or careful you are, you can’t always predict what others are going to do and especially here in the south you can’t predict with the animals are going to do. We will write a custom essay sample on Persuasive Speech or any similar topic only for you Order Now According to the CDC, Motor vehicle crashes are the leading cause of death among Americans age 5-34. Adult seat belt use is the most effective way to save lives and reduce injuries during a crash, yet millions of Americans don’t wear seat belts. Motor vehicle crashes are a major public health problem. Young people ages 18-24 have the highest crash related injuries. One in four of you will either be injured or killed in a car wreck this year! †¢What is the impact of seat belt use? Studies have shown that using your seat belt has reduced serious crash-related injuries and deaths by about 50%. †¢You say – you don’t need to wear your seatbelt, your car has airbags†¦ Air bags provide added protection but are not a substitute for seat belts air bags alone tend to do more harm than good. †¢You say you are only going â€Å"down the road† – most accidents happen within 2 miles of your home or work place. You say – â€Å"I’m in the backseat†. It doesn’t matter where in the car you are – people in the back seat can AND DO get hurt just as often as those in the front. †¢Everyone else has their seatbelt on – Even if everyone else in the car has on their seatbelt – it only takes one to severely injury or kill others in the car. †¢I don’t want to wrinkle my outfit – but it’s ok to have it cut off you at the hospital because you were thrown out of your car in a wreck and didn’t have your seatbelt on? I would like to share a short video with you – I found this one on the internet but still think it make help you visualize what really happens when you don’t have your seatbelt on in a crash. I tried to find one that wasn’t very graphic but still got my point across. VIDEO! Now that you have heard and seen what can happen when you get in a car without your seatbelt I sincerely hope that each of you will not only wear YOUR seatbelt but insist that everyone in the car with you wears theirs too! If these things have not convinced you scared you enough to wear your seat belt, remember that it IS the law so CLICK IT OR TICKET! How to cite Persuasive Speech, Essays Persuasive Speech Free Essays â€Å"REFLECTION #3† When John the Baptist baptized Jesus, a beautiful thing happened. God showed to everyone who were present that ‘Jesus’ was ‘the One Who is anointed by God’. That means that Jesus was God the Father’s Chosen One, the One Who God had promised to send to save the people He loved. We will write a custom essay sample on Persuasive Speech or any similar topic only for you Order Now When Jesus was anointed, He was anointed with the Holy Spirit and the power of God. This anointing proved that Jesus was God! The public life of Jesus began with His Baptism on the shore of the Jordan River. It ended with Jesus commanding the Apostles to â€Å"go and make disciples of all, baptizing them in the name of the Father, and the Son and the Holy Spirit, teaching them to observe all that He had commanded them. † These Words of Jesus from the Holy Bible teach the Christians the great importance of the Sacrament of Baptism. These Words of Jesus from the Holy Bible teach the Christians the great importance of the Sacrament of Baptism. This is the most beautiful thing that happens to a person during the Sacrament of Baptism, something that most Christians do not even realize. This transformation is what it means to be reborn. God actually creates a new heart and a new spirit within the convert who is being baptized. The person is truly not the same anymore, part of his creation having been changed. When Jesus commanded the Apostles to go into the entire world and to preach the Gospel to the whole creation, that those who believe be baptized and saved, Jesus made faith an important part of the Sacrament of Baptism along with the forgiveness of sin. A person cannot be baptized unless he sincerely repents of his sinful nature and has faith in Jesus Christ as Savior, the Giver of the Holy Spirit and the new birth. Before receiving the Sacrament of Baptism, the old self, the heart and human spirit, were stained by the original sin and all the other sins that the person had committed before being baptized. During the Sacrament of Baptism, all of this was crucified with Jesus so that the sinful body may be destroyed, the person no longer being a slave to sin. When a person is baptized, the old inclination of his heart and spirit die and are buried with Christ. When a person is baptized, he is devoted to God. He has a responsibility to promote Christianity. Some people choose to become living sacrifices so they can enjoy a greater daily personal relationship with God. This is seen in those who consecrate their lives to God, the priests, the religious brothers and sisters and the missionaries. These Christians are required by their consecration to do missionary work according to the mandate of their religious Orders to which they belong. And Baptism was a means of grace. God’s grace came upon Jesus when He was baptized. God grace comes upon any humans when they are baptized. It is just that if a human is not baptized, a belief in God is most likely going to lead that person to wanting to receive God’s grace. However, it is only God and Jesus that knows the heart of that human. There are certainly unbaptized humans that purely believe in God and Jesus. Let us remember not to judge upon if a person is baptized or not. After all, it is not said those who are unbaptized will perish. It says those that do not believe will parish. How to cite Persuasive Speech, Essays Persuasive Speech Free Essays Slide 1 Why buy an American made vehicles you ask? I’ll tell you why because buying American made vehicles creates American made jobs. Everyone knows that American made vehicle’s make a distinctive sound. Take for instance the Ford mustang and the Chevy corvette. We will write a custom essay sample on Persuasive Speech or any similar topic only for you Order Now Who doesn’t like the sound of these vehicles or design? A few things I will discuss about American made manufactures will be the quality they put forth in designing these vehicles, the job security it helps with in America and how American manufactures have now stepped up to the plate with their new innovated designs for the auto industry. Let’s take it a step further J. D. Power Associates recently released their results of the â€Å"2012 dependability survey†. This survey ranked 37 different automakers based upon how many complaints Vehicle owners reported. To no surprise the survey showed that two of the top four ranking vehicles were held by luxury car makers Lexus, Porsche you can’t argue that. But right behind them followed two American car makers Lincoln and Cadillac that’s 2 out of 4 for America. Slide 2 Here is a graph on how America made Quality vehicles compared to the foreign vehicle makers. Look people it speaks for itself here are the true facts. J. D. Power and Associates study of the quality of American made vehicles shows that American made vehicles have been produced with better quality since the 1999 study. Both foreign and domestic car makers have steadily declined in their quality but still holding strong Domestics are still on top. Slide 3 A U. S. News report showed that Ford and GM have increased their customer satisfaction over the past five years and have been rated the highest of all vehicle manufactures in the past two years in a row. With Ford at 87% and GM at 84. % these studies don’t lie they come from real customers and real vehicle owners. American’s can and do build quality and with quality you get a product that last longer and is more dependable. Slide 4 The Ford focus was voted best small compact car and won the J. D. Power award for 2012. Now why wouldn’t you want to own that? Slide 5 The Ford Mustang won the best midsize car , Come one now people it has been everyone’s dream to own a car like that but that’s not it the Slide 6 Ford fusion Ranked second for the best large size car and won the satisfaction award for large size sedans in 2012 from J. D. Power awards associates. In the latest J. D. Power dependability study Ford has now rivaled Japan in manufacturing of vehicles; GM’s Buick division has now tied with Jaguar for the first time in years. Buick also beat out foreign makers Toyota and Lexus From 8 out of 11 car segment awards the car manufacture GM has climbed to the top with their new models with three first place finishes in best all-around, best designed vehicle, and at something we all like to hear when it comes to purchasing a vehicle lowest pricing, but most reliable. Slide 7 Slide 8 Well let’s talk about what the auto industry does for us Americans. Well for starters Creating American made jobs creates American revenue. Slide 9 That revenue is like the food chain in the animal planet it revolves in equality for the American economy. When we don’t buy American vehicles we are hurting America’s economy, not buying these American made cars hurt the manufactures. The more American made vehicles we sell the better job growth is and the better Americas economy can get. It’s a no brainer people. Slide 10 According to the Congressional Budget office in 2011 over the past decade 100,000 jobs have been lost in America’s auto industry from importing and manufacturing products overseas. GM and Chrysler where both bailed out by the Obama industry we all remember that, while American manufacturer Ford still ran strong, but in doing so they created more jobs, because it was viable to the American people to finally step up and help with the economy. The auto industry is an integral part of our nation. The Detroit car industry is like the aircraft manufactures both private industries’ play an enormous part on are economic growth. When you buy that American made vehicle you help America with job security, lower vehicle cost and create innovated technology for other car manufactures to design, just to try and keep up with today’s trends. Listen people American’s have been asking for this for years now the message we have all asked for has been answered. â€Å"Make a product that suits the needs of the consumer, and we will buy†. This has been fulfilled by the American auto industry of today. So stop waiting and start buying. Innovated design Slide 11 America does make fuel-efficient vehicles. Such as the Chevy volt that gets an estimated 93 to 37 Mpg. Talk about gas miliage people. Now who would have thought that America could keep up with these innovated fuel designs? Oh, but they have and they are not only building these vehicles to keep up, but also staying on the top of the charts as having some of the top Fuel efficient vehicles. Take the Ford Fusion or maybe the Ford Escape or Chevy Malibu to name a few these vehicles rank among the top in fuel economy in today’s industry. These vehicles are not only keeping up with today’s auto manufactures they are staying ahead. The American auto industry is now allowing â€Å"Payment protection plans† on their vehicles like Hyundai and other foreign auto makers. Most foreign products are made very cheap and are imported from poor nations. You ever heard that saying â€Å"Made by the cheapest bidder† Well that’s how some of these foreign vehicles parts are produced. Who wants to own one of these. Slide 12 Slide 13 Did you know that the Ford industry has been rated #1 the last two years in a row for having the best quality and lowest priced vehicle’s basically the best bang for your buck. Slide 14 Slide 15 Well the Ford Fiesta has been ranked #1 by KBB two years running in the small compact car line at just over $12,000 and in second also a Slide 16 domestic vehicle manufacture is the Chevy Aveo yes its ugly but it still serves a purpose and it’s also rated the best bang for your buck vehicle at just over $13,000. Now that you have the knowledge of why to buy an American made vehicle. You should understand that there is no good reason to buy a foreign made vehicle and every reason not to. There are cars built right here in America that are of equal or better quality. Buying an American made car is one way for ordinary individuals to make that small difference in today’s economy and securing jobs for future Americans, the same way environmentalist have been pushing hybrid vehicles America has innovated their vehicle’s designs to not only compare to the foreign auto market, but be rated higher than those foreign vehicle manufactures. So, America stand up and park some patriotism in your drive way. Slide 17 Slide 18 How to cite Persuasive Speech, Essays Persuasive Speech Free Essays Anna Rash November 9, 2009 Persuasive Speech Outline Comm Lab 150 Section 10 Mandatory Physical Education General Purpose: To persuade Speech Goal: I want to persuade my classmates that physical education should be mandatory in grades K-12, yet reforms should be made to make it mandatory. Introduction: I. How many times have you thought about wanting to work out to keep up a â€Å"fit and healthy† lifestyle, but did not know the criteria for a certain workout or even how much you should be doing during a week? Making physical education in grades kindergarten through 12th grade will help teach you these lifelong skills. We will write a custom essay sample on Persuasive Speech or any similar topic only for you Order Now II. Physical education should be mandatory in grades K-12 for the following three reasons: A. Learning how to live a healthy lifestyle B. Avoiding obesity C. Decreasing depression and anxiety Body: I. Children need to learn how to live a healthy lifestyle. A. According to Jessica Barron from an article on Associated Content, â€Å"Physical education is necessary in schools to effectively teach children how to manage their lives in a healthy way. Children are less likely to care about their health if they are not told why health is important than children who are educated about nutrition and exercise. † B. While physical education needs to educate students in the classroom about how to eat better and maintain a healthy lifestyle, they also need to learn how sports can be enjoyable. According to an article written by Jessica Barron on Associated Content, most children do not know that sports can be fun and enjoyable if they are not made to at least try them. Without physical education, these children will never be trying any sports. Sometimes they even miss finding a hidden talent. C. According to the American Heart Association, elementary students should be required to have at least 150 minutes per week, while middle school students should be required to have at least 225 minutes per week, and high school students have to complete a physical education requirement prior to graduation. D. If learning how to live a healthy lifestyle is engrained into your memory, you are more likely to continue doing it when you graduate high school and attend college, which is something we can all find relative. Transition: Along with learning how to live a healthier lifestyle, the risk of obesity as a teenager and adult can be avoided with a better lifestyle. II. Obesity is a continuing problem among children. When children do not learn how to take care of their bodies, it can follow them into their adult life, which increases health risks majorly. A. Nearly 10 million children ages 6-19 are considered overweight. (American Heart Association). B. â€Å"In 1971 only 4% of overweight adolescents made up the population. That number has nearly quadrupled into 17% in 2003† (American Heart Association). C. Physical education needs to begin early and continue all throughout high school (K-12) because nearly two-thirds of Americans are overweight, and one in five four year olds are already obese according to The USA Today. D. Obesity can cause increased risk in certain health issues, including heart disease, stroke, diabetes, cancer, gallbladder disease, and osteoarthritis, cited from the WebMD. Transition: By making physical education mandatory, obesity can be avoided along with decreasing depression and anxiety, which will ultimately help weight as well. III. Physical education can help maintain a positive attitude and decrease depression. This is crucial during teenage years because you are transitioning through different stages and friendships. A. After conducting an experiment in young females, psychologists found that after 5 50-minute light jogging/exercise programs for 8 weeks, depressive states significantly decreased compared to young females who just did daily activities (European Public Health Association). B. â€Å"One recent study found that a good workout could boost your level of serotonin, a brain chemical that is linked to mood,† according to Kate Lee, a consumer health activist. C. Increasing this serotonin is exactly what children need in their lives to decrease signs of depression. D. According to the American Psychological Association, suicide, which is mainly caused by depression, is the third highest death rate among teenagers. Physical exercise being made mandatory in schools can help prevent this. E. This statistic should be widely remembered when certain lobbyists begin advocating against physical education because schools cannot fund it, or because physical education is not in the standard â€Å"academic curriculum. Transition: If physical exercise and education is something that can fight against depression, then why should schools be cutting it out of their curriculums and adding in harder academic classes where the students are concentrating for eight straight hours a day? Conclusion: I. After the points I have given, you should be able to see why physical education must be mandatory in our school systems for grades kindergarten through 12th gra de. II. Maintaining a healthy lifestyle and exercising is key to a happier life and mood day to day. Decreasing anxiety will make you feel better overall, therefore keeping your weight at a healthy level. III. Physical education and proper exercise can do no harm, therefore why should it not be in school systems all over the country? Barron, Jessica. â€Å"Physical Education in Schools. † Associated Content (2006): 1-3. Web. 3 Nov 2009. . â€Å"Day Care next frontier in fighting childhood obesity. † USA Today 13 Oct 2009: n. pag. Web. 3 Nov 2009. . Lee, Kate. â€Å"Can exercise really improve my mood?. † Healthy Me (2009): n. pag. Web. 1 Nov 2009. . Nabkasorn, Channuda, Nobuyuki Miyai, Anek Sootmongkoi, Suwanna Junpraset, and Hiroichi Yamamoto. Effects of physical depression, neuroendocrine stress hormones and physiological fitness in adolescent females with depressive symptoms. † European Public Health Association 16. 2 (2005): 179-184. Web. 3 Nov 2009. . â€Å"Physical Education in Schools. † American Heart Association. 2009. American Heart Associ ation, Web. 28 Oct 2009. . â€Å"Teen and Young Adult Suicide: A National Health Crisis. † American Psychological Association (2001): n. pag. Web. 3 Nov 2009. . â€Å"Weight Loss: health risks associated with obesity. † Web MD. 05 May 2009. WebMD, Web. 3 Nov 2009. . How to cite Persuasive Speech, Essays Persuasive Speech Free Essays Laura Boreen Neilson Intro to Public Speaking 14 November 2010 Persuasive Speech Reduce Landfill Waste by Reduce, Reuse and Recycling and the financial benefits I. Introduction A. Attention Getter: Over half of the waste that ends up in the landfill does not belong there because it could have been recycled or reused. We will write a custom essay sample on Persuasive Speech or any similar topic only for you Order Now B. Credibility Statement: Not only do I religiously practice reducing, reusing, and recycling, but I have done a great deal of research for this speech, also research for a recycling project in my Human Concerns Class. C. Significance/Identification Statement: The survey that I conducted with this class concluded that every one of us acknowledges that recycling is beneficial, yet only 60%, a little over half, of us actually do. D. Thesis Statement: When I am through with this speech you will be convinced that reducing, reusing and recycling will keep unwanted items out of the landfill, can easily be done and while implementing the 3 R’s reduce, reuse, recycle can make and save you money. E. Preview Statement: I will present the current problem of overusing landfills, offer specific ways to implement the 3 R’s: and how the 3 R’s can benefit your financial situation. Connective: First let us look at the landfill. Or as Daniel Pike in the state journal register calls it â€Å"the graveyard of a disposable society. † II. Body A. Consumers are quick to buy and do not think when it comes time to dispose of the waste. 1. According to factmonster. com 62% of municipal waste is dumped in the landfill. A single individual contributes roughly 4 pounds of that waste per day. In that waste you’ll find tons of glass, tons of paper and cardboard; also enormous tons of food residues, yard trimmings, textiles, and plastics currently, there are over 3,000 active landfills in the US. 2. A series on the history channel called â€Å"†life after people† discusses how varies landmarks, the environment, and certain â€Å"stuff† will look like or be like when this earth is no longer inhabited by people. Though I won’t share my views on the particle subject, I did find the episode about waste very empowering. I would like to share that with you. www. history. com/shows/life-after-people/videos/life-after-people-trash Connective: Now let’s look at ways to keep waste out of the landfills. B. The answer to help alleviate the overuse of landfills are reducing, reusing, and recycling of waste. 1. Reducing your waste should be thought of first. If you don’t have the waste to begin with than you don’t have to worry about where it is going to end up. According to Monique Beaudin, who wrote the article â€Å"Putting the first â€Å"R† into action; using the ‘Reduce’ step makes a bigger impact than you would think. † Printed in The Gazette, 2010 â€Å"Reducing is often in the shadow of the easier R-recycling. One specific way that will reduce waste is coming up with the holidays. Giving gifts can produce lots of waste whether it be, packaging of the item and/or the wrapping paper around the packaging. In the same article mentioned above by Monique Beaudin, she encourages holiday shoppers to buy less packaged gifts and give an experience, such as concert tickets for a gift. Therefore saving waste. Something to also consider when being mindful of reducing is buying bulk food items. This will help eliminate packaging waste and will usually be cheaper per ounce. Saving you money. Buying bulk will also help you with food waste. The important thing to remember when you want to save money and eliminate waste by buying bulk is to prepare a meal plan before you buy. A meal plan will encourage you to eat at home reducing the temptation of eating fast food resulting in wrappers that will end up in the trash. When I do my meal planning for the week I will always leave a few lunches and a dinner slot open for leftovers, so that I don’t have the option to throw food away. 2. The second rule regarding the 3R’s is reusing. This can be, but is not limited to reusing your own waste for a different purpose. For example, using a leftover coffee can for loose nails or screws, or even washing and reusing a plastic zip-loc bag instead of throwing it in the garbage. Thrift shopping is a way of reusing someone else’s unwanted goods. As I spoke about in an earlier speech about thrifting, I included many locations and ways to thrift, also the benefits to the shopper and the donator. One place in particular was shopping at the local boys and girls club. I personally shop there, keeping my eyes open for a good deal. For example, the pair of jeans that I am wearing today was purchased from this store just a few months ago. I paid only $8. 0 for this pair of Lucky Jeans and according to buckle. com, a retailer for lucky jeans the retail price is $99. 00 that is a savings to me of $91. 00. I am not the type to worry about name brands, but quality usually does cost more. If I can get a quality pair of jeans at a fraction on the price, I am glad to shop at the thrift store. I am thankful to the person that made the donation of the lucky jeans and they can benefit from that donation. According to the IRS webpage, IRS. Gov it explains that an individual can donate items like clothing, household furniture and furnishings, a car or boat, even taxidermy. The donations are appraised, by the donator, and recorded. At the time of filing taxes if the donation equals at least $500 for the year, the donator may take advantage of the tax benefits. Simply summarized, reusing benefits the consumer and the donator while keeping items out of the landfill. 3. Let’s now look at recycling, the most thought of way to elimate waste in the landfill. According to the Environmental Protection Agency webpage, EPA. gov â€Å"Recycling turns materials that would otherwise become waste into valuable resources. Collecting used bottles, cans, and newspapers and taking them to the curb or to a collection facility is just the first in a series of steps that generates a host of financial, environmental, and social returns. Some of these benefits accrue locally as well as globally. † Our family benefits from recycling so we take it somewhat serious. In terms that we recycle everything that can be. Every month we take our recyclables, all plastic, steel, glass, paper and aluminum cans, to Minnkota, the local recycling center, and except the return in the form of a check. If you would prefer not to take cash, Minnkota has the ability to donate your profit to any local establishments. There are 54 organizations to choose from including, boy scouts, churches and the city pound. Minnkota pays a penny a pound on all material, although aluminum cans yield a higher return, which I recently received . 45 cents per pound. This past month, the check I received, for 1 month’s recycleables for our family of 3 was $7. 45. This may not seem like much, but it will add up. What I do is deposit the checks into our Christmas club savings account. This account yields a rate of . 5 percent. After 12 months of deposits, averaging $7. 45 per month, our account will reflect roughly $89. 00. That is more than we started with and proof that recycling pays and keeps reusable goods out of the landfills. Don’t forget that buying recycled products, such as paper, helps the environment and also is really the main focus of the movement, going green. There would be no need to recycle to begin with, if we are not willing to use the product that is made from the recycled goods. Consumers that buy recycled goods â€Å"closes the loop†, states the University of Arkansas. Connective: Let’s look our own waste and what can be saved from the landfill. DEMO. III. Conclusion A. Closure Statement/Review of Main Point: In closing, we now recognize that landfills are overly used and dumped with valuable materials and have been exposed to ways to reduce, reuse and recycle. In doing so we are turning trash to treasure and waste into money, just in the time of this speech I have benefited your wallet $180! B. Restate Thesis: Reducing, reusing, and recycling keeps valuables out of the landfill, it’s easy to do and when it influences our finances will motivate you. C. Clincher: The change starts with us. This waste has been tossed by students and staff throughout the day. Look at the amount that would not have to be in the landfill. Next time you decide to make a purchase and then ultimately discard it or its waste; reach in your wallet and consider your funds, than ask your self, can this item be donated, reused or recycled. Works Cited Pike, Daniel. â€Å"Garbage Mountain†. State Journal Register   6   May  2005, ProQuest Newsstand,  ProQuest. Web. 3 Dec. 2010. â€Å"http://www. factmonster. com/ce6/. html. † The Columbia Electronic Encyclopedia. 1994, 2000-2006, on Fact Monster. 2000–2007 Pearson Education, publishing as Fact Monster. 05 Dec. 2010 . â€Å"http://www. factmonster. com/ce6/. html. The Columbia Electronic Encyclopedia. 1994, 2000-2006, on Fact Monster. 2000–2007 Pearson Education, publishing as Fact Monster. 05 Dec. 2010 . Intro to Speech classmates. â€Å"recycle survey†. Boreen, Laura. 3. Nov. 2010 â€Å"Trash†. The History Channel website. 2010. 3 Dec. 2010. Beaudin, Monique. †Å"Putting the first ‘R’ into action; Reduce, reuse, recycle. Using the ‘Reduce’ step makes a bigger impact than you might think. †Ã‚  The Gazette   25   Oct. 2010, ProQuest Newsstand,  ProQuest. Web. 7 Nov. 2010. Buckle. 3 Dec. 3 â€Å"Publication 526† Interneal Revenue Service. 3. Dec. 2010 â€Å"Recycling† Enviromental protection Agency. 5 May 2010. 3 Dec. 2010. How to cite Persuasive Speech, Essays

Saturday, December 7, 2019

Business Context of Woolworths Limited †MyAssignmenthelp.com

Question: Discuss about the Business Context of Woolworths Limited. Answer: Introduction Woolworths is an Australian based Supermarket that is possessed by Woolworths Limited. The Company forms a duopoly market in Australia along with its principal competitor Coles. The business of the Company accounts for more than 80 percent of the market share in Australia. The report provides an overview of the business context as well as a background of Woolworths (Cameron et al., 2015). The report also highlights the products and services that Woolworths makes available to its customers. It also provides an overview of the evaluation of the strategy and prospects of the organization. Business context and background The store of Woolworths was first opened in the year 1924 in Sydney as a bargain vault opening. The founders of the company include Stanley Chatterton, George Creed, Percy Christmas as well as Ernest Williams. Percy Christmas established general goods operation in New Zealand in the year 1929. The company belongs to the retail industry and comprises of more than 140,000 retail trades. The retail industry is considered as the largest employer in Australia. The Company is located in the Brisbane city of Australia in Queensland. The business of the company employs more than 1.2 million individuals. It has more than 3,300 stores across New Zealand and Australia and approximately 850 supermarkets in Australia alone. Methner, Hamann Nilsson (2015), stated that the market conditions of Woolworths face market analysis. The market condition of the Company illustrated a difference to its performance in the last year as well as evidence of traditional change inside the retail business that has misplaced its way over the last eight years. An abridged customer-first system has been established by the company that helps to compute the performance of the waiting teams. The company mostly maintained an apparent focus on meeting requirements of the customers by delivering negligible prices as well as enhanced shopping experiences. However, the business of the company is mostly threatened by its principal competitors that include Coles and Aldi (Mortimer, 2015). Comprehensive description of the business Woolworths feel proud of itself to work directly with the farmers as well as growers of Australia to make sure that best commodities are provided to the customers. It sources approximately 96 percent of all fresh vegetables and fruits along with 100 percent fresh meat from farmers as well as growers of Australia. This, in turn, makes Woolworths the Fresh Food People of Australia. The Food Group of Woolworths has initiated a new division known as Woolworths FoodCo. It is mostly responsible for enhancing new goods category, increasing the supply of fresh meat as well as processing facilities (Poelman, Delahunty de Graaf, 2017). It is also accountable for developing strategic sourcing relationships with major industry partners of Woolworths. To deliver first enthusiastic capacity for ultra-fresh ready-to-cook and ready-to-eat meals in Australia, Woolworths has collaborated with high-quality food producer, Beak, and Johnson. According to Hartmann et al., (2016), four interlocking components requires being considered to form a business model. The business model of Woolworths has been analyzed by making the use of these elements. The Company mostly possesses a feasible business model that leads to profitable business. Customer Value Proposition: The CVP illustrates how a company generates value for a particular set of clients. Woolworths meet requirements of the customers by putting low prices on the products. It also enhances shopping experience among the customers across all items. It also makes sure that the business provides consistent, high-quality products to the customers (Morioka, Evans de Carvalho, 2016). Profit Formula: The benefit formula of Woolworths includes negligible prices along with small margin. It also makes sure high velocity of resources as well as high volume. It makes sure cost savings through competent supply chain management. Primary Resources: The major resources of Woolworths include responsible management and human resources. It also includes a broad variety of commodities and commodity innovation skills. It also includes collaboration as well as coalition management. The business model includes a robust relationship with vertically incorporated companies (Gupte Doyle, 2014). Primary Process: The major process includes an insistent advertisement as well as promotional actions. The method also includes the adoption of best practices in functioning. Strategy and prospects The strategy and prospects of Woolworths have been evaluated by making the use of both SWOT and PEST analysis. The SWOT inspection illustrates the strengths, weaknesses, opportunities, and threats of Woolworths. SWOT Analysis: Strengths: The major advantage of Woolworths is that is the market leader in the retail industry of Australia. The leadership position of the Company helps to exploit market probability through its powerful resources mostly technological resources as well as human resources. Weaknesses: The major weakness lies in the impact of the growth strategy that affects the capability to dominate the retail market in Australia. The government of Australia has restricted the move by Woolworths to augment prices. This, in turn, restricts the elevated development levels of the Company (Manzaneque Corona, 2014). Opportunities: The factor such as computerization as well as development in supply chains and lifestyle of the customers acts as the significant opportunity for the Company in Australia. The Company looks positively towards these possibilities to embrace the multi-choice retailing. Threats: The business of the Company faces major threats from its competitors. The intervention by the government also acts as the primary threat for Woolworths that hampers the development of Woolworths within the retail sector of Australia (Worsley, Wang Ridley, 2014). Another important analytical tool that helps to evaluate strategy and prospects of Woolworths is the PEST Analysis. Political: The Australian retail industry has been most affected due to political circumstances. In other words, a competition policy has been presently launched by the Federal Government of Australia. This, in turn, restricts the key independent Supermarkets such as Woolworths and Coles to eradicate competition. Economic: The economic market circumstances in Australia have declined that in turn negatively affected the performance of Woolworths. Besides this, fluctuations in the currency rates of exchange and declining of the Australian dollar have unfavourably distressed the global retail operations of Woolworths (Kew Stredwick, 2017). Social: The retail market has also been affected due to social factors. The organizations that operate across Australia requires accomplishing higher societal as well as community development due to current societal trends. Technological: The role of the technical factor that affects the retail industry and particularly Woolworths is noteworthy as this can be recognized from the reality that Woolworths has reflected on the application of green refrigeration technology. Conclusion It can be concluded that the most imperative aspect of the business model for Woolworths is customer value proposition. As a result, to draw more customers, the Company delivers products at low prices. Woolworths has also launched price-based marketing crusade for a new customer value proposition. It can be finalized that the development of Woolworths is mostly supported by the powerful commitment towards the customers as well as the workers. It has been concluded that the market condition of the Company illustrated a difference to its performance in the last year as well as evidence of traditional change inside the retail business that has misplaced its way over the last eight years. References Cameron, A. J., Sayers, S. J., Sacks, G., Thornton, L. E. (2015). Do the foods advertised in Australian supermarket catalogues reflect national dietary guidelines?. Health promotion international, 32(1), 113-121. Gupte, J., Doyle, J. (2014). Woolworths becomes a'health destination'. AJP: The Australian Journal of Pharmacy, 95(1125), 4. Hartmann, P. M., Hartmann, P. M., Zaki, M., Zaki, M., Feldmann, N., Feldmann, N., ... Neely, A. (2016). Capturing value from big dataa taxonomy of data-driven business models used by start-up firms. International Journal of Operations Production Management, 36(10), 1382-1406. Kew, J., Stredwick, J. (2017). Business environment: managing in a strategic context. Kogan Page Publishers. Manzaneque Corona, E. (2014). Comparison of marketing policies applied by the same company in different countries and analysis of the reasons for the differences. Methner, N., Hamann, R., Nilsson, W. (2015). The Evolution of a Sustainability Leader: The Development of Strategic and Boundary Spanning Organizational Innovation Capabilities in Woolworths. In The Business of Social and Environmental Innovation (pp. 87-104). Springer International Publishing. Morioka, S. N., Evans, S., de Carvalho, M. M. (2016). Sustainable business model innovation: exploring evidences in sustainability reporting. Procedia CIRP, 40, 659-667. Mortimer, G. (2015). Move over Aldi, Lidl may be next for Australian market. The Conversation, (15). Poelman, A. A., Delahunty, C. M., de Graaf, C. (2017). Vegetables and other core food groups: A comparison of key flavour and texture properties. Food Quality and Preference, 56, 1-7. Worsley, A., Wang, W., Ridley, S. (2014). Australian consumers' perceptions of environmental and agricultural threats: the associations of demographic and of psychographic variables. American journal of environmental protection, 3(1), 10-18.

Friday, November 29, 2019

Our journey into the future begins in the past free essay sample

Journey is a very broad topic for everyone. It encompasses all of time and space, everywhere and anywhere. It could be a journey about a growing process; it could be a journey about an exploration. There are tons of topics about a journey; journeys are different for everyone. Our journey into the future begins in the past. Our growing process of us starts when we are born. We grow and learn until death. Our growing process comes with experiences, and experiences help us to gain knowledge. Remember TV came out in the 20s? It was black and white until the early 60s when the colored TV began. TV wasn’t popular until the 60s, but because people could watch the news and movies instead of going to the theatres and listening to radio, they gained more knowledge about many topics. Later on in the 21st century, TV became HD. The growing process doesn’t just come from experiences and knowledge, but also from imagination and popularity. We will write a custom essay sample on Our journey into the future begins in the past or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page However, that’s not all; this is just the beginning! Our inventions lead us to the future. A long running sci-fi series named Star Trek that had many technologies from the James T. Kirk era has now been successfully popularized. Back in the 1960-1980s, Star Trek popularized over 10 technologies such as, personal computers, tablets, remote location finding (GPS), sliding doors, large view screens, communicator, and many others! Without Star Trek, we would not even know how these technologies were used. The inventions continued and some inventions were inspired from movies and TV shows. In Japan, a long running animated detective series known as Detective Conan had a pair of glasses that could be used with GPS to track down a target. A similar or perhaps the same invention by Google, inspired Detective Conan and invented Google Glass. Our inspiration, imagination and inventions won’t end. When we have surpassed rocket technology, our next goal will be invent Star Trek’s starship to many passengers to explore every star, every planet. The most famous quote of Star Trek is, â€Å"Space, the final frontier. These are the voyages of the starship Enterprise. Its mission is to explore strange new worlds, to seek out new life and new civilizations, to boldly go where no man has gone before. † Now, that is when our journey into the future begins in the past.

Monday, November 25, 2019

Cultural Heritage Paper Essays - National Symbols Of The Philippines

Cultural Heritage Paper Essays - National Symbols Of The Philippines Cultural Heritage Paper HUB 500 Cross Cultural Dynamics of Behavior September 1, 2013 The Filipino culture has always been an amazing thing to me, especially with all the information I have never even knew about myself. The first people to ever enter the United States were both my Grandmother and Grandfather. They have come along way back in the day, and the day they finally got to start their new life in the United States was a great blessing. As they came to the Philippines, they tried to get as many of my aunts and uncles into their as quick as they can, but unfortunately only just a few were able to. And one of those few was my father. Growing up, I was left there for about two years until my father came to come get me, along with my mother. But from then on after I was four years old and changing to a different environment and different language was a pretty challenging task for myself even though I dont remember much. Identifying myself as well as my family, I would consider myself as an Ilocono and as I grew up I definitely came to know about it more because I would speak my language so fluently although I wasnt able to learn the main language which was Tagalog. My family entered the United States as immigrants back then but later below, I will explain the significance of the race, skin color and hair play within my group. One of the most dominant religions in the Philippines would have to be Catholicism but they do have other religions. My expectations when I was little was becoming a basketball player because growing up, I would always watched basketball but then realized I was too short and didnt have the determination to become an NBA player. In most Asian countries as well as the Philippines is that individuals seem to have an awfully hard time saying no all because they have a tendency to try and avoid hurting another persons feelings. Basically saying no to a person, can be considered by others as not being so friendly or even disrespectful. Filipinos would rather agree and say yes, even though they really mean to say no. Many Filipinos are dialogue oriented but in some cases it somewhat resembles and has a relation to Spanish. As a sign of respect, they usually do simple things that people tend to find a little strange but they usually address people by their title. After awhile from time to time, as well as a relationship being established, they address business associates by their nickname or title. Knowing the Filipino culture, there are also ways that they communicate. For an example they might have made a gesture, which means something. A smile can easily be understood as an agreement or conformation in a discussion that may have recently occurred. This same exact smiling gesture can also be used to hide an embarrassing disagreement, as well as an aggravation. An eyebrow that is raised and a jerking of the head upward is a nonverbal sign of affirmation. A person could also point their head downward is a gesture for saying no. Another example could also be when an individual says yes including the pointing of their head down can be legitimately certain that they have a negative agreement with what you have been recently discussing about. While in most of the cultures, it is similar and mutual for both women and men to shake hands with each other when they are introduced for the first time as well as being able to greet each other. With that being said, Filipinos are the opposite. For the Filipino culture, any kind of touching is a low for most. When men touch women, that is the case. All across the Philippines there are many dialects, but one interesting thing is that the country is split into different regions. These regions are called Luzon, Visayas and Mindanao. In the Philippines, the Gender roles are mostly found in dating, marriage, school systems, and especially the many families of Filipinos. Their sex is assumed when they are born according to Filipinos. The most respect goes to all males for the most

Friday, November 22, 2019

Compare and Contrast Research Paper Essay Example | Topics and Well Written Essays - 750 words

Compare and Contrast Research Paper - Essay Example This art shows the philosophers gathered together learning from each other and sharing ideas. The great figures in history lived at different times. However, The School of Athens illustrates the great scholars under one roof. Two great thinkers, Aristotle and Plato, are conspicuous in the painting. The duo has played crucial role in shaping the Western thinking. In addition, their philosophical differences have been incorporated into Christianity (Kleinbub 52). However, Aristotle holds his hand down, a clear indication that humanity can only subscribe to the reality that can be seen or experienced by tough as well as sight. This, in essence, is the exact reality that Plato had dismissed. Aristotle holds his famous book (Aristotle’s Ethics) essentially emphasized elements of justice, relationship, government of the human world, and friendship, as well as reasons for the study (Kleinbub 52). Pythagoras is to the lower left of the painting, The School of Athens. Pythagoras held t o the belief that the world as well as the movement of the stars and other planets operated in a manner that was reflective of distinct mathematical laws (Kleinbub 52). Incidentally, the mathematical laws had close connection to the ideas of cosmic and musical harmony. Apotheosis of Homer was a remarkable work by Ingres (1827). ... However, Homer appears to rein above all the great ancient artists and writers in history. Ingres intended to depict the painting to be the sum of aesthetic rules though it barely lived to the expectation. Incidentally, the creation of this painting was a result of the artist (Ingres) combining more than 100 small drawings for the various characters (Kleiner & Helen 782). Each of the assorted characters made the drawing more precise and detailed in equal measure. Apparently, Ingress conducted an extensive study of the paintings and other artistic works of assorted artists. For instance, he studied the paintings of Raphael, Apelles, and Poussin, the playwright, as well as other important figures, including the Roman and Greek gods. Jean- Stylistic Analysis The School of Athens (by Raphael) provides high renaissance perspective with regard philosophers, scientists, mathematicians who held divergent views, conducted researches, and held different perceptions about the universe and other phenomena (Strinati 28). In the art, Plato is seen holding his book called The Timaeus. Plato (on the left) points up which is a clear implication of his philosophy about everything in the universe being merely a shadow of the higher, eternal reality that is not only unchanging but also eternal. These include things such as beauty and goodness (Strinati 28). In essence, he holds to the belief that the other worldly reality is in fact the ultimate reality, and the seat of beauty, justice, wisdom, and truth. However, Aristotle holds his hand down, a clear indication that humanity can only subscribe to the reality that can be seen or experienced by tough as well as sight. Auguste-Dominique Ingres first exhibited the Apotheosis of Homer in 1827 in the yearly Salon. This art

Wednesday, November 20, 2019

The lack of specific statutory legislation to deal with media Essay

The lack of specific statutory legislation to deal with media intrusion can be regarded as a weakness in English law. The Irish Privacy Bill 2006 represents a m - Essay Example In UK there is no specific statutory provision for the protection of privacy. However, because the violation of personal life cannot remain in certain circumstances without punishment, for this reason, the courts use instead the principles of law that are related with Human Rights in general. In this context, Human Rights Act of 1998 is the most common legislative text used by courts in UK in order to provide protection to people that have suffered an intrusion to their personal life by media. It has to be noticed though that English courts deal with the issue only at the level that the relevant freedoms provided by the English law are violated. In accordance with the article 2 of the Human Rights Act of 1998 ‘Everyone’s right to life shall be protected by the law’ (article 2, par.1). Furthermore, Human Rights Act of 1998 include a series of articles that provide protection in many cases when human rights are been threatened. We can indicatively refer to ‘th e right to liberty and security (article 5), the right to a fair trial (article 6), the right to respect for private and family life (article 8), the freedom of thought, conscience and religion (article 9), the freedom of expression (article 10), the freedom of assembly and association (article 11), the right to an effective remedy (article 13)’ and so on. At the European level, the right of privacy is also protected using the European Convention on the Protection of Fundamental Rights and Freedoms of 1948 as it has been amended by a series of protocols (no. 4, 6, 7, 11 and 12). An interesting legislative text in the area of protection of privacy is the Irish Privacy Bill 2006 which covers all possible aspects of personal life that can suffer an intrusion and violation. Generally, it has been stated by Ellis (1993, 85) that ‘British law recognises no statutory right to privacy but The Data Protection Act 1984 was the first Act to address this

Monday, November 18, 2019

Response paper Essay Example | Topics and Well Written Essays - 500 words - 3

Response paper - Essay Example Cat therefore, symbolizes women’s status that at all times strives to conform to the demands of their husband. ‘It isn’t any fun to be a poor kitty out in the rain’ reflects the way of woman’s life who is constantly under the vigil of her husband. The protagonist in the story is first addressed as ‘American wife’ and then as ‘American girl’ that subtly defines the difference between a married girl and girl who can pursue their happiness as they deem within the broader framework of patriarchal society. Married women are denied the basic right for self expression and empowerment of women and have to restrict themselves within the expected behavior as decided by their husband. Indeed, social conditioning significantly impacts marital bond and makes women rebel against the restrictions that make the unequal and less worthy of their counterparts. On the other hand, Hemingway in the story, ‘Hills like White Elephants’ shows human frailty and confused state when confronted with issues that are socially unacceptable. The author has touched the issue of abortion and describes the vacillating views of the two individuals who are trying to justify the decision for abortion. Abortion is highly sensitive issue within the society and refers to deliberate termination of fetus. It has huge moral, religious and legal implications which make it almost a taboo subject. The author’s foray into the subject is highly abstract and touches the subject in various ways to display the personal fear, social stigma and future hope. The inter-related consequences of abortion have wide ramifications and as such, make the decision as most critical aspect of the deed. The characters talk around the subject of abortion and the story slowly reflects how the woman succumbs to the desires of her partner and says ‘Then Ill do it.

Saturday, November 16, 2019

Strengthening Community Action Through Community Development Social Work Essay

Strengthening Community Action Through Community Development Social Work Essay Although the term empowerment is frequently used, the availability of high-quality research which demonstrates its success for improving the wellbeing of communities is fairly minimal (Woodall et al. 2010). There is, however, some evidence that shows that empowerment programs can lead to improve outcomes for participants. For example, in examining the effectiveness of interventions using community development approach, the Migrant Resource Centre of South Australia, which provides programs that targets particular community groups, including women, younger people, has recorded some promising ability to impact the lives of young refugees (MRCSA Annual Report, 2009). In fact, this essay argues that while community development interventions are difficult to measure, the migrant Resource Centre of South Australia has registered significant gains in the area of youth empowerment. This essay will highlight the various intervention programs implemented by the Migrant Resource Centre of South Australia (MRCSA). However, case study will focus on its youth empowerment component and to evaluate the overall effectiveness of community development approach of the organisation. To achieve this task, the essay is partitioned as follows. The first part will examine the definitions of empowerment. The next section will discuss about community development as a strategy and a model of practice by the Migrant Resource Centre of South Australia (MRCSA). The third section discusses the impact and challenges of this intervention. The final part of the essay will evaluate the impact of MRCSAs youth empowerment program among a number of interventions. Background and definition of the Concept of Empowerment In the 1990s the term empowerment began to replace community participation (Rifkin, 2003). Empowerment according to Rifkin has conceptually evolved from the idea of lay participation in technical activities to a broader concern of improving life situations of the poor. This evolution can be traced historically in the areas of policy and in community activities. In the policy area, Rifkin proposes that three theoretical constructs can be identified to trace the changing view of participatory approaches from consensus building to empowerment. These Rafkin stated correspond to the political and political environment of the time. The historical development of the concept of empowerment helps explain why there is no universally accepted definition of empowerment (Rifkin, 2003). However a number of scholars defined it as a process (McArdle, 1989; Laverack, 2005; Werner, 1988; Kilby, 2002). McArdle (1989) defines empowerment as a process whereby decisions are made by the people who will wear the consequences of those decisions. Similarly Werner (1988) and Laverack (2005) describe the concept of empowerment as a process by which people are able to gain or seize power to control over decisions and resources that determine their lives. Moreover, Kilby (2002) describe a process by which disadvantaged people work together to increase control over events that determine their lives. Expansion of individuals choices and actions, primarily in relation to others à ¢Ã¢â€š ¬Ã‚ ¦ fundamentally a shift of power to those who are disempowered. From a public health perspective, empowerment involves acting with communities to achieve their goals (Talbot Verrinder, 2005). This implies working with disadvantaged individuals or groups to challenge structural disadvantaged (on the basis of class, gender, ethnicity or ability) and influence their health in a positive way. The application of the concept into the field of health promotion as outline by Laverack and Labonte (2000) is categorized in two folds; the bottom-up programming and the top-down programming. The former more associated with the concept of community empowerment begins on issues of concern to particular groups or individuals and regards some improvement in their overall power or capacity as the important health outcome. The later more associated with disease prevention efforts begin by seeking to involve particular groups or individuals in issues and activities largely defined by health agencies and regards improvement in particular behaviours as the important h ealth outcome. Laverack and Labonte (2000) thus viewed community empowerment more instrumentally as a means to the end of health behaviour change. They argue that community empowerment which is defined as a shift towards greater equality in the social relations of power is an unavoidable feature of any health promotion efforts. On a much broader scale empowerment promotes participation of people, organisations and communities towards the goals of increased individual and community control, political efficacy, improved quality of community life, and social justice (Wallerstein, 1992). The next section is a case example of how this approach is applied by an agency in dealing with question of social inclusion. Community Development: A case of Migrant Resource Centre of South Australia (MRCSA) By reviewing the previous definitions of empowerment and examining MRCSAs framework, It is clear that the worker in (MRCSA) understand and adopt empowerment concept similar to which all of McArdle (1989); Laverack (2005); Werner (1988); Kilby (2002) and WHO (1986) do understand and adopt where empowerment is a matter of giving people the right and the opportunity to exercise power and control regarding making decisions that affect their health promoting. In addition, in order to empower migrant people and communities, the (MRCSA) provide and still providing number of interventions based on community development model of practice. According to Tesoriero (2010), community development is the use of a set of ongoing structures and processes which enable the community to meet its own needs. Similar to Tesoriero (2010), Community Development is understood and implemented by the (MRCSA) as a multifaceted program of activities that concentrated on supporting the need of new arrivals and their new and emerging communities to understand their rights and obligations, to link into training and employment pathways and to develop networks of support within their local and in the broader community (www.mrcsa.com.au). In fact, The MRCSA has adopted Laverack and Labontes (2000) bottom-up approach in implementing their programs by consult sing and working closely with leaders and key representatives of new and emerging communities, including women and young people, to support them in gaining the knowledge and skills that they need to further their independence as well as their capacity to support and provide assistance to their members. Moreover, beside community development programs, MRCSA is providing number of womens advocacy programs, youth leadership and participation and employment advocacy programs, As well. The programs also include Refugee Mens Talk, an initiative supporting men to adapt to their new social environment. To ensure and facilitate the participation of new and emerging communities in their local areas and in regional areas where they settle, or resettle, the program includes local government and regional initiatives. MRCSA believes that new and emerging communities require a place in which to implement their own activities. The organisation provides these through its own community centres and through linkages with other community facilities. Also, Given that community development as an approach require working across divergent spheres, the Migrant Resource Centre of South Australia (MRCSA) maintain link with a number of stakeholders. These include the Commonwealth Government, the state of South Australia and the NGO community.(www.mrcsa.com.au). At the level of the Commonwealth Government, the links include; Department of Immigration and Citizenship, Centrelink, Employee Advocate, Department of Families, Housing, Community Services and Indigenous Affairs and Australia Council for the Arts. At the level of the State Government the links are; Multicultural SA, Department of Health, Department of Families and Communities, Department of Education and Childrens Services, Skills SA, English Language Services TAFE SA, Arts SA, Office for Women, Womens Information Service, Womens Health State Wide, Local Government Association of SA and Be Active. The links within the Non-Government Sector includes; Settlement Council of Austra lia (SCoA), Refugee Council of Australia, Federation of Ethnic Communities Councils of Australia (FECCA) LM Training Specialists, SA Council of Social Service (SACOSS), Service to Youth Council (SYC), Working Womens Centre, Migrant Womens Support and Accommodation Service, Youth Affairs Council of SA (YACSA), Anglicare SA, African Communities Council (ACCSA), Middle Eastern Communities Council (MECCSA), Volunteering SA and Northern Territory. Analysing this web of networks from Labontes, (1992) community development continuum, the MRCSAs programs deal with individuals which transcend to small groups, community organisations, coalition advocacy and political action. With this wide array of networks, the organization has been facilitated to maintains a huge amount of social capital and through careful co-ordination, it stands a lot to gain in achieving its primary objectives (Butter et al. 1966) The next section will focus on one of its many programs in the area of youth enhancement. Youth Empowerment Program The Migrant Resource Centre of South Australia (MRCSA) works closely with the leadership and key representatives of its client communities, including women and young people to support them in acquiring the knowledge and skills that they need to further their independence and self-determination, as well as their capacity to assist their members with their settlement and participation (www.mrcsa.com.au)). These goals are achieved through a number of programs including ethnic leaders forum, adult migrant education, community management and leadership forum by way of funding and leadership training. This section focuses on its youth empowerment program with emphasis on the Newly Arrived Youth Settlement Services (NAYS). The primary objective of this program as outlined in the MRCSA Annual Report (2008-2009) is to empower young people to develop their own programs and to become advocates for themselves, their families and communities. In partnership with TAFE SA, the MRCSA conducted a number of training programs for young people who were not engaged in school or work. Specific training includes Certificate II in Information Technology, Productively Places Program Certificate II, Volunteering, work experience capacity building, apprentiships and traineeships (MRCSA Annual Report (2008-2009). Through its new arrival humanitarian settlement program, the MRCSA has been an advocate and a voice for the inclusion and participation of young people of refugee background (www.mrcsa.com.au). According to the 2010 MRCSA Youth Empowerment Program Annual Report, the program has since 1998 addressed the needs of young people from new and emerging communities in South Australia through a multi-faceted program. The program provides young people with a range of services that aim to further their resilience, leadership skills and pathways to employment and independence. The MRCSA Youth Empowerment Program for 2008-2009 provided assistance to five hundred and twenty-nine (529) young people of refugee background, most of them recent arrivals to South Australia, to achieve some of their goals (Annual Report 2009-2010). These achievements were based on strong foundations upon which MRCSA operate. The next section will discuss the guiding principles which form the basis of MRCSAs operations. MRCSA Guiding Principles The Migrant Resource Centre of South Australias philosophy and approach in working with young people from refugee backgrounds outline a number of guiding principles (Annual Report, 2008-2009). The principles discussed below indicate that MRCSA operates Laverack and Labontes (2000) bottom-up approach of community development. The guiding principles include the following: Firstly, any youth programs, initiatives or activities are shaped and driven by the young people themselves through consultation with their peers. Secondly, young people are encouraged and supported to speak for themselves to drive their own development; the role of the MRCSA is that of mentor and advisor only. Thirdly, the importance of young peoples connection to family and community is recognized, valued and supported. Fourthly, the ethnic, religious and cultural identity and heritage of young people is affirmed and respected. Fifthly, respect for gender differences and how these impact on the planning and delivery of the youth program. Also, young people are active decision makers. Finally, an action research approach informs continuous service improvement and best practice. These guiding principles are based on the premise that empowerment strategies focus on what people can do to empower themselves and so deflect attention from social issues (Keleher et al. 2007; Keleher, and Murphy, 2004) . However, Labonte (1990) warns that unless national and international trends are taken into account, the decentralization of decision-making may shift from victim blaming of individuals to victimizing powerless communities. In view of such warnings, Wilson et al (1999) suggest that effective primary health care as in the case of public health functions depends on efforts to link local issues to broader social issues. Intersectoral action can be used to promote and achieve shared goals in a number of other areas, for example policy, research, planning, practice and funding. It may be implemented through a myriad of activities including advocacy, legislation, community projects, and policy and programme action. It may take different forms such as cooperative initiativ es, alliances, coalitions or partnerships (Health Canada http://www.hc-sc.gc.ca) What are the Barriers? In achieving their goal of empowering communities, the Migrant Resource Centre of South Australia (MRCSA) faces a number of challenging issues. When young refugees arrive in Australia they face a number of challenges. They need to begin a new life, establish new friends and networks and find pathways that link them into mainstream community (MRCSA Annual Report, 2008-2009). Some young people may also be at risk and need to deal with issues around language, religious identity, grief and loss, the justice system, consumer culture and intergenerational tension (MRCSA Annual Report, 2008-2009). Young people also need ways of dealing with race, racism and their identity (MRCSA Annual Report, 2008-2009). There are fewer opportunities for young women from new and emerging communities to participate in sport due to the barriers they experience from within sporting environments and their own communities (MRCSA Annual Report, 2009). These barriers can be based on cultural, religious, and gender expectations of young women and their roles in their community. The report (MRCSA, 2009) also highlighted other factors affecting young women participation in sports. These include; lack of parental support, perceived fear of racism, lack of knowledge about the structure of sport in Adelaide and high cost of membership and registration fees. On the other hand, community development approach can pose barriers to Public Health Practitioners in a number of ways. Epidemiological, sociological, and psychological evidence of the relationship between influence, control, and health, provide a rationale for a community empowerment approach to health education. For example, studies show an association between powerlessness (or similarly, learned helplessness, alienation, exploitation) and mental and physical health status. Examining the application of community empowerment approach to health education, Israel (1994) identified a number of limitations and barriers to this approach. Firstly, situations where community members past experiences and normative beliefs result in feelings that they do not have influence within the system (powerlessness, quiescence) and hence, they may feel that getting involved in an empowerment intervention would not be worthwhile. Secondly, differences in, for example, social class, race, ethnicity, tha t often exist between community members and health educators that may impede trust, communication, and collaborative work. Thirdly, role-related tensions and differences that may arise between community members and health educators around the issues of values and interests, resources and skills, control, political realities, and rewards. Fourthly, difficulty in assessing/measuring community empowerment and being able to show that change has occurred. Fifthly, the health education profession does not widely understand and value this Approach. Next, risks involved with and potential resistance encountered when challenging the status quo, for the individual, organizations, and community as well as the health educator. Seventhly, the short time-frame expectations of some health educators, their employers, and community members are inconsistent with the sustained effort that this approach requires in terms of long-time commitment of financial and personal resources. Finally, the collecti on and analysis of extensive amounts of both qualitative and quantitative data to be used for action as well as evaluation purposes may be perceived as slowing down the process. Inspire of these barriers, community development is still relevant to Public Health Practitioners. Epidemiological, sociological, and psychological evidence of the relationship between influence, control, and health, provide a rationale for a community development approach to health education (Israel, 1994). For example, studies show an association between powerlessness (or similarly, learned helplessness, alienation, exploitation) and mental and physical health status (Israel, 1994). The challenges posed by community development approach also extend to the wider arena of state level. The demand on government and competition for resources by professionals is a major obstacle. Similarly, Inter-professional distrust and reluctance to share information also remains a major obstacle. The way in which governments fund departments can be an obstacle to collaboration (Baum, 1993). It is therefore argued that Stability of an organisation and its staff is important for interagency agreements and establishing trust (Walker et al. 2000). Walker (2002) further argued that Competition for resources can affect trust and intergroup conflict can occur when there is a lack of adversaries. However, insecurity brought on by political and economic uncertainty can facilitate political coalitions (Weisner, 1983). Overcoming the barriers Overcoming the barriers will require a concerted effort from communities, concerned organisations and government. The Proceedings of 2008 the Conference on Social Inclusion for New and Emerging Communities, outline some of the areas that need urgent interventions are discussed below. Racism and discrimination Identified as a major area of concern, combating discrimination requires coordinated and targeted social inclusion and human right measures. The focus should not be limited to what occurs in a social context (e.g. schoolyard, public places etc.) but also the systemic racism that supports discrimination, the perpetuation of racial stereotypes, and institutional inclusion e.g. within the justice system, the employment sector and in the blocks to the recognition of overseas qualifications and experience as well as the registration and utilization of these. Women and safety Women should have the right to feel safe in their homes as well as the broader community, to access culturally appropriate services for themselves and their families (e.g. health, childcare, education etc ), to learn English without it compromising their chances at finding a job and to undertake training that prepares them for work and improve their employment potential. Empowering young people The voices of the diversity of young people rather than a token representative from new and emerging communities must be listened to and give strong credence in the advance of a national or state framework for social inclusion. Supporting the empowerment and participation of young people as future citizens and leaders of Australia will serve the country culturally, socially and economically. Base on the above discussion in the case of challenges to MRCSA operations, solutions to barriers could be summarized therein; Barriers can be overcome through integrated structures, developing responsibility within structures Support of local leaders, developing leadership skills for negotiation and collaboration. Enhancing Regional networks/structures, established processes and relationships are important for collaboration. Conclusion From the case studies, it was found that the Migrant Resource Centre of South Australia (MRCSA) utilize community mobilization approaches to improve equity of services, reduce institutional barriers within the society, enhance participation in new and emerging communities, strengthen civil society associations and create healthy social policies. The programs demonstrated that opportunities for community voices to be heard had been increased and this had raised community capacity to maximise their needs and create change. This study also found that empowerment can have a positive impact on participants self-efficacy, self-esteem, sense of community and sense of control and, in some cases, empowerment can increase individuals knowledge and awareness and lead to behaviour change. These findings were particularly apparent on youth empowerment approaches and those programmes concerning young women.

Wednesday, November 13, 2019

Abraham Lincoln :: essays research papers

Abraham Lincoln Lincoln, Abraham (1809-65), 16th president of the United States (1861-65), who steered the Union to victory in the American Civil War and abolished slavery. Early Life Lincoln was born on February 12, 1809, near Hodgenville, Kentucky, the son of Nancy Hanks and Thomas Lincoln, pioneer farmers. At the age of two he was taken by his parents to nearby Knob Creek and at eight to Spencer County, Indiana. The following year his mother died. In 1819 his father married Sarah Bush Johnston, a kindly widow, who soon gained the boy's affection. Lincoln grew up a tall, gangling youth, who could hold his own in physical contests and also showed great intellectual promise, although he had little formal education. In 1831, after moving with his family to Macon County, Illinois, he struck out on his own, taking cargo on a flatboat to New Orleans, Louisiana. He then returned to Illinois and settled in New Salem, a short-lived community on the Sangamon River, where he split rails and clerked in a store. He gained the respect of his fellow townspeople, including the so-called Clary Grove boys, who had challenged him to physical combat, and was elected captain of his company in the Black Hawk War (1832). Returning from the war, he began an unsuccessful venture in shopkeeping that ended when his partner died. In 1833 he was appointed postmaster but had to supplement his income with surveying and various other jobs. At the same time he began to study law. That he gradually paid off his and his deceased partner's debts firmly established his reputation for honesty. The story of his romance with Ann Rutledge, a local young woman whom he knew briefly before her untimely death, is unsubstantiated. Illinois Politician and Lawyer Defeated in 1832 in a race for the state legislature, Lincoln was elected on the Whig ticket two years later and served in the lower house from 1834 to 1841. He quickly emerged as one of the leaders of the party and was one of the authors of the removal of the capital to Springfield, where he settled in 1837. After his admission to the bar (1836), he entered into successive partnerships with John T. Stuart, Stephen T. Logan, and William Herndon, and soon won recognition as an effective and resourceful attorney. In 1842 Lincoln married Mary Todd, the daughter of a prominent Kentucky banker, and despite her somewhat difficult disposition, the marriage seems to have been reasonably successful. The Lincolns had four children, only one of whom reached adulthood. His birth in a slave state notwithstanding, Lincoln had long opposed slavery.

Monday, November 11, 2019

Exemplar

INVESTIGATING THE ECOLOGICAL NICHE OF THE CRAB USING A FAIR TEST INTRODUCTION: The ecological niche of the crab Hemigrapsus edwardsi. The crab is a member of the Crustacea phylum and is in the family Grapsidae. This crab species is found only in New Zealand on rocky shores. The rocky shore, where the crabs studied in this investigation were found is quite exposed. There is a large rock platform that provides small crevices and small rocks which help to protect them from wave action and predators. There are also sea lettuce, and other algae growing on parts of the rocks.The crab has many adaptations that allow it to live on the rocky shore including: †¢ grey/black colour for camouflage †¢ food detection structures (antennae on its head and hairs on the mouth parts to sense chemicals in the sea water) †¢ 4 pairs of legs with muscles that allow it to move sideways, as well as forwards and backwards †¢ behavioural adaptations such as scuttling under rocks when the tid e goes out or to avoid predators †¢ freezing when being attacked (we noticed this when we touched some of them on their backs). This might confuse predators. †¢ gills for gas exchange.The rock pools provide a micro-climate where the temperature and salinity of the water will change, depending on the weather. If it was a really hot day, the rock pools will get warmer, more water will evaporate and the salinity will increase. The crab would have to be adapted to cope with these changes in salinity, otherwise, as the concentration of salt in the water around it changes, it will gain or loose mass due to osmosis. Through the process of osmoregulation, the crab is able to maintain a constant water balance in its body, but to do so requires energy and this could be measured by an increase in the respiration rate.This is what I am going to investigate. Aim: To determine whether the respiratory rate of the crab changes in different salinities. Hypothesis: The respiratory rate of t he crab will increase as the salinity changes away from â€Å"normal† salinity. METHOD Thirty crabs of similar size, were collected from the rocky shore. The salinity was varied by diluting the 200% conc. seawater provided in to five different concentrations. The volume of the solutions was 200mL each. The concentrations were 150%, 125%, 100%, 75%, 50% conc. Water with 100% concentration is equivalent to the concentration of normal seawater.Sixty-five mL of the 150% solution was poured into a petri dish. The petri dish had a thin layer of stones in the base to recreate the natural environment of the crabs. One crab was put into this petri dish and left for five minutes to allow them to adjust to the conditions. The petri dishes were floated on a water bath which was set at 180C. The water bath was placed in the room where the light intensity was the same for all petri dishes. An indirect method of estimating respiration was used. This was to count the number of currents seen on the surface of the water.I assumed that a higher number of currents indicated a higher respiration rate. A little bit of carmine red was sprinkled onto the solution in the petri dish in order to see the movement of water more clearly. The crabs were left in the petri dishes for five minutes before counting the respiratory currents. The respiratory currents were counted for 30 seconds. This amount was doubled to give the rate per minute. 5 more trials with different crabs were done at each concentration. Each time a fresh 65 mL of solution was added. The results were recorded and the rates per minute were averaged.This process was repeated for the 4 remaining concentrations and the results for these were averaged. Results: Average respiratory rate of the crab in different concentrations of seawater. | |% concentration of the water (100% = normal sea water) | | |50 |75 |100 |125 |150 | |Average number of respiratory | | | | | | |currents per minute |7. 2 |6. 75 |6. 00 |7. 50 |12. 4 2 | Average respiratory rate of the crab in different seawater concentrations. Statistical analysis of results: The graph of the results suggests that there is a significant relationship between the concentration of the seawater and the respiratory rate of the crabs. This is confirmed by the r2 value of 0. 9642, which indicates that 96% of the variation in the results is explained by the change in seawater concentration. Conclusion:The respiratory rate of the crab, as measured by respiratory currents, increased when the concentration of the seawater either increased or decreased from the 100% conc. (normal seawater). Discussion: This investigation was carried out to determine whether respiratory rates of the crab increased as the salinity was changed from normal levels. The crab is a euryhaline organism that lives on the rocky shore, often in rock pools. Because of the tidal movements of water, the salinity of the crab’s environment fluctuates. To maintain homeostasis, the cr ab osmoregulates.This means it actively controls the salinity levels inside its body. As the seawater concentration increased or decreased from the concentration of normal seawater (100% conc. ) the respiration rate increased. This is because the crab is most comfortable at the concentration of normal seawater. As osmoregulation involves the active transport of ions, it requires energy to adjust to higher or lower seawater concentrations than 100% seawater. As the salinity of the crab’s environment increases or decreases from the salinity of normal seawater it requires more energy in order to osmoregulate.So in order to obtain that energy, it needs more oxygen and its respiration rate increases. This is necessary for the crab as it must deal with a range of salinity as the tidal pools dry out. If the concentration of the water is greater than that of the crab’s internal environment, it will go through osmosis. Although the crab has an exoskeleton, water can still leave its body through the space around its joints and gills. Evaluation: Initially I found that there were several problems with my investigation.The most significant one was that the crabs were out of their natural environment which made them more fidgety. Some of mine even attempted to escape from the petri dishes during the trials. This clearly shows that they were unsettled and perhaps not responding as they usually would. If they decided to stay inside the petri dish, they stayed close to the edge and moved away from the movement of people around them. I moved my investigation to a more secluded position and screened them off with a cover so that were not able to see what was around them.I also lined the petri dish with a thin layer of stones to attempt to somewhat recreate the natural environment. This change made the crabs calmer and produced a more natural response. The counting of actual respiration itself was difficult as it was a humid day and the carmine red seemed to be con gealing before being placed in the water. Perhaps in humid conditions chalk dust or very fine sand would have been more suitable but these were not available where I was carrying out the investigation.Where the crabs were sampled from may have biased the outcome of the results as the position in the tidal zone might influence the levels of salinity that they were accustomed to. Most of my animals appeared to be female, this may also have biased my results. Further investigations would need to be carried out to determine if sex or original location influences crab respiration rate. Despite these limitations my results show that the increase in respiratory rates can be explained by the changing concentration of the seawater. ———————–INTRODUCTION ECOLOGICAL NICHE AIM HYPOTHESIS Explains aspects of the ecological niche that are related to the investigation. Hypothesis linked to ecological niche. VARIABLE INDEPENDENT VARIABLE CONTRO LLED VARIABLE DEPENDENT VARIABLE Controlled variables A valid range of the Independent variable Controlled variables Dependent variables Sufficient data PROCESSED DATA [pic] STATISTICAL ANALYSIS CONCLUSION Sufficient data that is appropriately and accurately processed to show relevant pattern. (raw data is in log book) Workable method outlinedSufficient data that is appropriately and accurately processed to show relevant pattern. (raw data is in log book) Statistical analysis of the validity of the conclusion A valid conclusion that is justified by the data and relates to the hypothesis DISCUSSION EVALUATION Critical evaluation through analysis of the validity of the investigation Critical evaluation – limitations discussed and changes made to the method justified in relation to validity of investigation Discussion of results related to niche Significance of findings in relation to the ecological niche

Saturday, November 9, 2019

Principles of Information Security, 4th Ed. – Michael E. Whitman Chap 01

Licensed to: CengageBrain User Licensed to: CengageBrain User Principles of Information Security, Fourth Edition Michael E. Whitman and Herbert J. Mattord Vice President Editorial, Career Education & Training Solutions: Dave Garza Director of Learning Solutions: Matthew Kane Executive Editor: Steve Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Development Editor: Lynne Raughley Editorial Assistant: Jennifer Wheaton Vice President Marketing, Career Education & Training Solutions: Jennifer Ann Baker Marketing Director: Deborah S.Yarnell Senior Marketing Manager: Erin Coffin Associate Marketing Manager: Shanna Gibbs Production Manager: Andrew Crouth Content Project Manager: Brooke Greenhouse Senior Art Director: Jack Pendleton Manufacturing Coordinator: Amy Rogers Technical Edit/Quality Assurance: Green Pen Quality Assurance  © 2012 Course Technology, Cengage Learning For more information, contact or find us on the World Wide Web at: www. course. com ALL R IGHTS RESERVED.No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher.For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at cengage. com/permissions Further permission questions can be emailed to [email  protected] comLibrary of Congress Control Number: 2010940654 ISBN-13: 978-1-111-13821-9 ISBN-10: 1-111-13821-4 Course Technology 20 Channel Center Boston, MA 02210 USA Cengage Learning is a leading provider of custo mized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: international. cengage. com/region. Cengage Learning products are represented in Canada by Nelson Education, Ltd. For your lifelong learning solutions, visit course. cengage. com Purchase any of our products at your local college store or at our preferred online store www. engagebrain. com. Printed in the United States of America 1 2 3 4 5 6 7 8 9 14 13 12 11 10 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it . Licensed to: CengageBrain User hapter 1 Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. BOOK OF THE FIVE RINGS For Amy, the day began like any other at the Sequential Label and Supply Company (SLS) help desk. Taking calls and helping office workers with computer problems was not glamorous, but she enjoyed the work; it was challenging and paid well. Some of her friends in the industry worked at bigger companies, some at cutting-edge tech companies, but they all agreed that jobs in information technology were a good way to pay the bills.The phone rang, as it did on average about four times an hour and about 28 times a day. The first call of the day, from a worried user hoping Amy could help him out of a jam, seemed typical. The call display on her monitor gave some of the facts: the user’s name, his phone number, the department in which he worked, where his office was on the company campus, and a list of all the calls he’d made in the past. â€Å"Hi, Bob,† she said. â€Å"Did you get that document formatting problem squared away? † â€Å"Sure did, Amy. Hope we can figure out what’s going on this time. † â€Å"We’ll try, Bob. Tell me about it. † â€Å"Well, my PC is acting weird,† Bob said. When I go to the screen that has my e-mail program running, it doesn’t respond to the mouse or the keyboard. † â€Å"Did you try a reboot yet? † 1 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageB rain User Chapter 1 â€Å"Sure did. But the window wouldn’t close, and I had to turn it off. After it restarted, I opened the e-mail program, and it’s just like it was before—no response at all. The other stuff is working OK, but really, really slowly. Even my Internet browser is sluggish. † â€Å"OK, Bob. We’ve tried the usual stuff we can do over the phone. Let me open a case, and I’ll dispatch a tech over as soon as possible. † Amy looked up at the LED tally board on the wall at the end of the room. She saw that there were only two technicians dispatched to deskside support at the moment, and since it was the day shift, there were four available. Shouldn’t be long at all, Bob. † She hung up and typed her notes into ISIS, the company’s Information Status and Issues System. She assigned the newly generated case to the deskside dispatch queue, which would page the roving deskside team with the details in just a few minutes. A moment later, Amy looked up to see Charlie Moody, the senior manager of the server administration team, walking briskly down the hall. He was being trailed by three of his senior technicians as he made a beeline from his office to the door of the server room where the company servers were kept in a controlled environment. They all looked worried.Just then, Amy’s screen beeped to alert her of a new e-mail. She glanced down. It beeped again—and again. It started beeping constantly. She clicked on the envelope icon and, after a short delay, the mail window opened. She had 47 new e-mails in her inbox. She opened one from Davey Martinez, an acquaintance from the Accounting Department. The subject line said, â€Å"Wait till you see this. † The message body read, â€Å"Look what this has to say about our managers’ salaries†¦Ã¢â‚¬  Davey often sent her interesting and funny e-mails, and she failed to notice that the file attachment icon was unu sual before she clicked it.Her PC showed the hourglass pointer icon for a second and then the normal pointer reappeared. Nothing happened. She clicked the next e-mail message in the queue. Nothing happened. Her phone rang again. She clicked the ISIS icon on her computer desktop to activate the call management software and activated her headset. â€Å"Hello, Tech Support, how can I help you? † She couldn’t greet the caller by name because ISIS had not responded. â€Å"Hello, this is Erin Williams in receiving. † Amy glanced down at her screen. Still no ISIS.She glanced up to the tally board and was surprised to see the inbound-call-counter tallying up waiting calls like digits on a stopwatch. Amy had never seen so many calls come in at one time. â€Å"Hi, Erin,† Amy said. â€Å"What’s up? † â€Å"Nothing,† Erin answered. â€Å"That’s the problem. † The rest of the call was a replay of Bob’s, except that Amy had to jot notes down on a legal pad. She couldn’t dispatch the deskside support team either. She looked at the tally board. It had gone dark. No numbers at all. Then she saw Charlie running down the hall from the server room. He didn’t look worried anymore. He looked frantic. Amy picked up the phone again.She wanted to check with her supervisor about what to do now. There was no dial tone. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 3LEARNING OBJECTIVES: Upon completion of this material, you should be able to: †¢ †¢ †¢ †¢ †¢ Define information security Recount the history of computer security, and explain how it evolved into information security Define key terms and critical concepts of information security Enumerate the phases of the security systems development life cycle Describe the information security roles of professionals within an organization 1 Introduction James Anderson, executive consultant at Emagined Security, Inc. , believes information security in an enterprise is a â€Å"well-informed sense of assurance that the information risks and controls are in balance. He is not alone in his perspective. Many information security practitioners recognize that aligning information security needs with business objectives must be the top priority. This chapter’s opening scenario illustrates that the information risks and controls are not in balance at Sequential Label and Supply. Though Amy works in a technical support role and her job is to solve technical problems, it does not occur to her that a malicious software program, like a worm or virus, might be the agent of the company’s current ills.Management also shows signs of confusion and seems to have no idea how to contain this kind of incident. If you were in Amy’s place and were faced with a similar situation, what would you do? How would you react? Would it occur to you that something far more insidious than a technical malfunction was happening at your company? As you explore the chapters of this book and learn more about information security, you will become better able to answer these questions. But before you can begin studying the details of the discipline of information security, you must first know the history and evolution of the field.The History of Information Security The history of information security begins with computer security. The need for computer security—that is, the need to secure physical locations, hardware, and softwa re from threats— arose during World War II when the first mainframes, developed to aid computations for communication code breaking (see Figure 1-1), were put to use. Multiple levels of security were implemented to protect these mainframes and maintain the integrity of their data.Access to sensitive military locations, for example, was controlled by means of badges, keys, and the facial recognition of authorized personnel by security guards. The growing need to maintain national security eventually led to more complex and more technologically sophisticated computer security safeguards. During these early years, information security was a straightforward process composed predominantly of physical security and simple document classification schemes. The primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage.One of the first documented security problems that fell outside these categories occurred in the early 196 0s, when a systems administrator was working on an MOTD Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.Licensed to: CengageBrain User 4 Chapter 1 Earlier versions of the German code machine Enigma were ? rst broken by the Poles in the 1930s. The British and Americans managed to break later, more complex versions during World War II. The increasingly complex versions of the Enigma, especially the submarine or Unterseeboot version of the Enigma, caused considerable anguish to Allied forces before ? nally being cracked. The information gained from decrypted transmissions was used to anticipate the actions of German armed forces. Some ask why, if we were reading the Enigma, we did not win the war earlier. One might ask, instead, when, if ever, we would have won the war if we hadn’t read it. †1 Figure 1-1 The Enigma Source: Courtesy of National Security Agency (message of the day) file, and another administrator was editing the password file. A software glitch mixed the two files, and the entire password file was printed on every output file. 2 The 1960s During the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks.It became necessary to enable these mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers. In response to this need, the Department of Defense’s Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant, networked communications system to support the military’s exchange of information. Larr y Roberts, known as the founder of the Internet, developed the project—which was called ARPANET—from its inception. ARPANET is the predecessor to the Internet (see Figure 1-2 for an excerpt from the ARPANET Program Plan).The 1970s and 80s During the next decade, ARPANET became popular and more widely used, and the potential for its misuse grew. In December of 1973, Robert M. â€Å"Bob† Metcalfe, who is credited Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 5 1 Figure 1-2 Development of the ARPANET Program Plan3 Source: Courtesy of Dr. Lawrence Roberts with the development of Ethernet, one of the most popular networking protocols, identified fundamental problems with ARPANET security. Individual remote sites did not have sufficient controls and safeguards to protect data from unauthorized remote users.Other problems abounded: vulnerability of password structure and formats; lack of safety procedures for dial-up connections; and nonexistent user identification and authorization to the system. Phone numbers were widely distributed and openly publicized on the walls of phone booths, giving hackers easy access to ARPANET. Because of the range and frequency of computer security violations and the explosion in the numbers of hosts and users on ARPANET, network security was referred to as network insecurity. In 1978, a famous study entitled â€Å"Protection Analysis: Final Report† was published. It focused on a project undertaken by ARPA to discover the vulnerabilitie s of operating system security. For a timeline that includes this and other seminal studies of computer security, see Table 1-1. The movement toward security that went beyond protecting physical locations began with a single paper sponsored by the Department of Defense, the Rand Report R-609, which attempted to define the multiple controls and mechanisms necessary for the protection of a multilevel computer system.The document was classified for almost ten years, and is now considered to be the paper that started the study of computer security. The security—or lack thereof—of the systems sharing resources inside the Department of Defense was brought to the attention of researchers in the spring and summer of 1967. At that time, systems were being acquired at a rapid rate and securing them was a pressing concern for both the military and defense contractors. Copyright 2011 Cengage Learning. All Rights Reserved.May not be copied, scanned, or duplicated, in whole or in pa rt. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 6 Chapter 1 Date 1968 1973 1975 1978 Documents Maurice Wilkes discusses password security in Time-Sharing Computer Systems.Schell, Downey, and Popek examine the need for additional security in military systems in â€Å"Preliminary Notes on the Design of Secure Military Computer Systems. †5 The Federal Information Processing Standards (FIPS) examines Digital Encryption Standard (DES) in the Federal Register. Bisbey and Hollingworth publish their study â€Å"Protection Analysis: Final Report,† discussing the Protection Analysis project created by ARPA to better understand the vulnerabilities of opera ting system security and examine the possibility of automated vulnerability detection techniques in existing system software. Morris and Thompson author â€Å"Password Security: A Case History,† published in the Communications of the Association for Computing Machinery (ACM). The paper examines the history of a design for a password security scheme on a remotely accessed, time-sharing system. Dennis Ritchie publishes â€Å"On the Security of UNIX† and â€Å"Protection of Data File Contents,† discussing secure user IDs and secure group IDs, and the problems inherent in the systems. Grampp and Morris write â€Å"UNIX Operating System Security. In this report, the authors examine four â€Å"important handles to computer security†: physical control of premises and computer facilities, management commitment to security objectives, education of employees, and administrative procedures aimed at increased security. 7 Reeds and Weinberger publish â€Å"File Secu rity and the UNIX System Crypt Command. † Their premise was: â€Å"No technique can be secure against wiretapping or its equivalent on the computer. Therefore no technique can be secure against the systems administrator or other privileged users †¦ the naive user has no chance. 8 1979 1979 1984 1984 Table 1-1 Key Dates for Seminal Works in Early Computer Security In June of 1967, the Advanced Research Projects Agency formed a task force to study the process of securing classified information systems. The Task Force was assembled in October of 1967 and met regularly to formulate recommendations, which ultimately became the contents of the Rand Report R-609. 9 The Rand Report R-609 was the first widely recognized published document to identify the role of management and policy issues in computer security.It noted that the wide utilization of networking components in information systems in the military introduced security risks that could not be mitigated by the routine pra ctices then used to secure these systems. 10 This paper signaled a pivotal moment in computer security history—when the scope of computer security expanded significantly from the safety of physical locations and hardware to include the following: Securing the data Limiting random and unauthorized access to that data Involving personnel from multiple levels of the organization in matters pertaining to information securityMULTICS Much of the early research on computer security centered on a system called Multiplexed Information and Computing Service (MULTICS). Although it is now obsolete, MULTICS is noteworthy because it was the first operating system to integrate security into Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 7 its core functions. It was a mainframe, time-sharing operating system developed in the mid1960s by a consortium of General Electric (GE), Bell Labs, and the Massachusetts Institute of Technology (MIT). In mid-1969, not long after the restructuring of the MULTICS project, several of its developers (Ken Thompson, Dennis Ritchie, Rudd Canaday, and Doug McIlro) created a new operating system called UNIX.While the MULTICS system implemented multiple security levels and passwords, the UNIX system did not. Its primary function, text processing, did not require the same level of security as that of its predecessor. In fact, it was not until the early 1970s that even the simplest component of security, the password function, became a component of UNIX. In the late 1970s, the microprocessor brought the personal computer and a new age of computing. The PC became the workhorse of modern computing, thereby moving it out of the data center.This decentralization of data processing systems in the 1980s gave rise to networking—that is, the interconnecting of personal computers and mainframe computers, which enabled the entire computing community to make all their resources work together. 1 The 1990s At the close of the twentieth century, networks of computers became more common, as did the need to connect these networks to each other. This gave rise to the Internet, the first global network of networks. The Internet was made available to the general public in the 1990s, having previously been the domain of government, academia, and dedicated industry professionals.The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area network (LAN). After the Internet was commercialized, the tec hnology became pervasive, reaching almost every corner of the globe with an expanding array of uses. Since its inception as a tool for sharing Defense Department information, the Internet has become an interconnection of millions of networks. At first, these connections were based on de facto standards, because industry standards for interconnection of networks did not exist at that time.These de facto standards did little to ensure the security of information though as these precursor technologies were widely adopted and became industry standards, some degree of security was introduced. However, early Internet deployment treated security as a low priority. In fact, many of the problems that plague e-mail on the Internet today are the result of this early lack of security. At that time, when all Internet and e-mail users were (presumably trustworthy) computer scientists, mail server authentication and e-mail encryption did not seem necessary.Early computing approaches relied on secu rity that was built into the physical environment of the data center that housed the computers. As networked computers became the dominant style of computing, the ability to physically secure a networked computer was lost, and the stored information became more exposed to security threats. 2000 to Present Today, the Internet brings millions of unsecured computer networks into continuous communication with each other. The security of each computer’s stored information is now contingent on the level of security of every other computer to which it is connected.Recent years have seen a growing awareness of the need to improve information security, as well as a realization that information security is important to national defense. The growing threat of Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 8 Chapter 1 cyber attacks have made governments and companies more aware of the need to defend the computer-controlled control systems of utilities and other critical infrastructure. There is also growing concern about nation-states engaging in information warfare, and the possibility that business and personal information systems could become casualties if they are undefended.What Is Security? In general, security is â€Å"the quality or state of being secure—to be free from danger. †11 In other words, protection against adversaries—from those who would do harm, intentionally or otherwise—is the objective. National security, for example, is a multilayered system that protects the sovereignty of a st ate, its assets, its resources, and its people. Achieving the appropriate level of security for an organization also requires a multifaceted system.A successful organization should have the following multiple layers of security in place to protect its operations: Physical security, to protect physical items, objects, or areas from unauthorized access and misuse Personnel security, to protect the individual or group of individuals who are authorized to access the organization and its operations Operations security, to protect the details of a particular operation or series of activities Communications security, to protect communications media, technology, and content Network security, to protect networking components, connections, and contents Information security, to protect the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission. It is achieved via the application of policy, education, training and awareness, and techno logy.The Committee on National Security Systems (CNSS) defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. 12 Figure 1-3 shows that information security includes the broad areas of information security management, computer and data security, and network security. The CNSS model of information security evolved from a concept developed by the computer security industry called the C. I. A. triangle. The C. I. A. triangle has been the industry standard for computer security since the development of the mainframe. It is based on the three characteristics of information that give it value to organizations: confidentiality, integrity, and availability.The security of these three characteristics of information is as important today as it has always been, but the C. I. A. triangle model no longer adequately addresses the constantly changing environment. The threats to the c onfidentiality, integrity, and availability of information have evolved into a vast collection of events, including accidental or intentional damage, destruction, theft, unintended or unauthorized modification, or other misuse from human or nonhuman threats. This new environment of many constantly evolving threats has prompted the development of a more robust model that addresses the complexities of the current information security environment.The expanded model consists of a list of critical characteristics of information, which are described in the next Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 9 1 Information security Figure 1-3 Components of Information SecuritySource: Course Technology/Cengage Learning section. C. I. A. triangle terminology is used in this chapter because of the breadth of material that is based on it. Key Information Security Concepts This book uses a number of terms and concepts that are essential to any discussion of information security. Some of these terms are illustrated in Figure 1-4; all are covered in greater detail in subsequent chapters. Access: A subject or object’s ability to use, manipulate, modify, or affect another subject or object. Authorized users have legal access to a system, whereas hackers have illegal access to a system. Access controls regulate this ability.Asset: The organizational resource that is being protected. An asset can be logical, such as a Web site, information, or data; or an asset can be physical, such as a person, c omputer system, or other tangible object. Assets, and particularly information assets, are the focus of security efforts; they are what those efforts are attempting to protect. Attack: An intentional or unintentional act that can cause damage to or otherwise compromise information and/or the systems that support it. Attacks can be active or passive, intentional or unintentional, and direct or indirect. Someone casually reading sensitive information not intended for his or her use is a passive attack.A hacker attempting to break into an information system is an intentional attack. A lightning strike that causes a fire in a building is an unintentional attack. A direct attack is a hacker using a personal computer to break into a system. An indirect attack is a hacker compromising a system and using it to attack other systems, for example, as part of a botnet (slang for robot network). This group of compromised computers, running software of the attacker’s choosing, can operate autonomously or under the attacker’s direct control to attack systems and steal user information or conduct distributed denial-of-service attacks. Direct attacks originate from the threat itself.Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 10 Chapter 1 Vulnerability: Buffer overflow in online database Web interfaceThreat: Theft Threat agent: Ima Hacker Exploit: Script from MadHackz Web site Attack: Ima Hacker downloads an exploit from MadHackz web site and then accesses buybay’s Web site. Ima then applies the script which runs and compromises buybay's security controls and steals customer data. These actions cause buybay to experience a loss. Asset: buybay’s customer database Figure 1-4 Information Security Terms Source: Course Technology/Cengage Learning Control, safeguard, or countermeasure: Security mechanisms, policies, or procedures that can successfully counter attacks, reduce risk, resolve vulnerabilities, and otherwise improve the security within an organization.The various levels and types of controls are discussed more fully in the following chapters. Exploit: A technique used to compromise a system. This term can be a verb or a noun. Threat agents may attempt to exploit a system or other information asset by using it illegally for their personal gain. Or, an exploit can be a documented process to take advantage of a vulnerability or exposure, usually in software, that is either inherent in the software or is created by the attacker. Exploits make use of existing software tools or custom-made software components. Exposure: A condition or state of being exposed. In information security, exposure exists when a vulnerability known to an attacker is present.Loss: A single instance of an information asset suffering damage or unintended or unauthorized modification or disclosure. When an organization’s information is stolen, it has suffered a loss. Protection profile or security posture: The entire set of controls and safeguards, including policy, education, training and awareness, and technology, that the Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience.Cen gage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 11 organization implements (or fails to implement) to protect the asset. The terms are sometimes used interchangeably with the term security program, although the security program often comprises managerial aspects of security, including planning, personnel, and subordinate programs. Risk: The probability that something unwanted will happen. Organizations must minimize risk to match their risk appetite—the quantity and nature of risk the organization is willing to accept.Subjects and objects: A computer can be either the subject of an attack—an agent entity used to conduct the attack—or the object of an attack—the target entity, as shown in Figure 1-5. A computer can be both the subject and object of an attack, when, for example, it is compromised by an attack (object), and is then used to attack other systems (subject). Threat: A category of objects, persons, or other entities that presents a danger to an asset. Threats are always present and can be purposeful or undirected. For example, hackers purposefully threaten unprotected information systems, while severe storms incidentally threaten buildings and their contents. Threat agent: The specific instance or a component of a threat.For example, all hackers in the world present a collective threat, while Kevin Mitnick, who was convicted for hacking into phone systems, is a specific threat agent. Likewise, a lightning strike, hailstorm, or tornado is a threat agent that is part of the threat of severe storms. Vulnerability: A weaknesses or fault in a system or protection mechanism that opens it to attack or damage. Some examples of vulnerabilities are a flaw in a software package, an unprotected system port, and an unlocked door. Some well-known vulnerabilities have been examined, documented, and pu blished; others remain latent (or undiscovered). 1 Critical Characteristics of InformationThe value of information comes from the characteristics it possesses. When a characteristic of information changes, the value of that information either increases, or, more commonly, decreases. Some characteristics affect information’s value to users more than others do. This can depend on circumstances; for example, timeliness of information can be a critical factor, because information loses much or all of its value when it is delivered too late. Though information security professionals and end users share an understanding of the characteristics of subject object Figure 1-5 Computer as the Subject and Object of an Attack Source: Course Technology/Cengage LearningCopyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Edit orial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 12 Chapter 1 information, tensions can arise when the need to secure the information from threats conflicts with the end users’ need for unhindered access to the information.For instance, end users may perceive a tenth-of-a-second delay in the computation of data to be an unnecessary annoyance. Information security professionals, however, may perceive that tenth of a second as a minor delay that enables an important task, like data encryption. Each critical characteristic of information—that is, the expanded C. I. A. triangle—is defined in the sections below. Availability Availability enables authorized users—persons or computer systems—to access information without interference or obstr uction and to receive it in the required format. Consider, for example, research libraries that require identification before entrance.Librarians protect the contents of the library so that they are available only to authorized patrons. The librarian must accept a patron’s identification before that patron has free access to the book stacks. Once authorized patrons have access to the contents of the stacks, they expect to find the information they need available in a useable format and familiar language, which in this case typically means bound in a book and written in English. Accuracy Information has accuracy when it is free from mistakes or errors and it has the value that the end user expects. If information has been intentionally or unintentionally modified, it is no longer accurate. Consider, for example, a checking account.You assume that the information contained in your checking account is an accurate representation of your finances. Incorrect information in your che cking account can result from external or internal errors. If a bank teller, for instance, mistakenly adds or subtracts too much from your account, the value of the information is changed. Or, you may accidentally enter an incorrect amount into your account register. Either way, an inaccurate bank balance could cause you to make mistakes, such as bouncing a check. Authenticity Authenticity of information is the quality or state of being genuine or original, rather than a reproduction or fabrication.Information is authentic when it is in the same state in which it was created, placed, stored, or transferred. Consider for a moment some common assumptions about e-mail. When you receive e-mail, you assume that a specific individual or group created and transmitted the e-mail—you assume you know the origin of the e-mail. This is not always the case. E-mail spoofing, the act of sending an e-mail message with a modified field, is a problem for many people today, because often the mo dified field is the address of the originator. Spoofing the sender’s address can fool e-mail recipients into thinking that messages are legitimate traffic, thus inducing them to open e-mail they otherwise might not have.Spoofing can also alter data being transmitted across a network, as in the case of user data protocol (UDP) packet spoofing, which can enable the attacker to get access to data stored on computing systems. Another variation on spoofing is phishing, when an attacker attempts to obtain personal or financial information using fraudulent means, most often by posing as another individual or organization. Pretending to be someone you are not is sometimes called pretexting when it is undertaken by law enforcement agents or private investigators. When used in a phishing attack, e-mail spoofing lures victims to a Web server that does not represent the organization it purports to, in an attempt to steal their private data such as account numbers and passwords.The most c ommon variants include posing as a bank or brokerage company, e-commerce organization, or Internet service provider. Even when authorized, pretexting does not always lead to a satisfactory outcome. In 2006, the CEO of Hewlett-Packard Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.Licensed to: CengageBrain User Introduction to Information Security 13 Corporation, Patricia Dunn, authorized contract investigators to use pretexting to â€Å"smokeout† a corporate director suspected of leaking confidential information. The resulting firestorm of negative publicity led to Ms. D unn’s eventual departure from the company. 13 1 Confidentiality Information has confidentiality when it is protected from disclosure or exposure to unauthorized individuals or systems. Confidentiality ensures that only those with the rights and privileges to access information are able to do so. When unauthorized individuals or systems can view information, confidentiality is breached.To protect the confidentiality of information, you can use a number of measures, including the following: Information classification Secure document storage Application of general security policies Education of information custodians and end users Confidentiality, like most of the characteristics of information, is interdependent with other characteristics and is most closely related to the characteristic known as privacy. The relationship between these two characteristics is covered in more detail in Chapter 3, â€Å"Legal and Ethical Issues in Security. † The value of confidentiality of information is especially high when it is personal information about employees, customers, or patients. Individuals who transact with an organization expect that their personal information will remain confidential, whether the organization is a federal agency, such as the Internal Revenue Service, or a business. Problems arise when companies disclose confidential information.Sometimes this disclosure is intentional, but there are times when disclosure of confidential information happens by mistake—for example, when confidential information is mistakenly e-mailed to someone outside the organization rather than to someone inside the organization. Several cases of privacy violation are outlined in Offline: Unintentional Disclosures. Other examples of confidentiality breaches are an employee throwing away a document containing critical information without shredding it, or a hacker who successfully breaks into an internal database of a Web-based organization and steals sensitive information about the clients, such as names, addresses, and credit card numbers.As a consumer, you give up pieces of confidential information in exchange for convenience or value almost daily. By using a â€Å"members only† card at a grocery store, you disclose some of your spending habits. When you fill out an online survey, you exchange pieces of your personal history for access to online privileges. The bits and pieces of your information that you disclose are copied, sold, replicated, distributed, and eventually coalesced into profiles and even complete dossiers of yourself and your life. A similar technique is used in a criminal enterprise called salami theft. A deli worker knows he or she cannot steal an entire salami, but a few slices here or there can be taken home without notice.Eventually the deli worker has stolen a whole salami. In information security, salami theft occurs when an employee steals a few pieces of information at a time, knowing that taking more wou ld be noticed—but eventually the employee gets something complete or useable. Integrity Information has integrity when it is whole, complete, and uncorrupted. The integrity of information is threatened when the information is exposed to corruption, Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 14 Chapter 1 Offline Unintentional Disclosures In February 2005, the data aggregation and brokerage firm ChoicePoint revealed that it had been duped into releasing personal information about 145,000 people to identity thieves during 2004. The perpetr ators used stolen identities to create obstensibly legitimate business entities, which then subscribed to ChoicePoint to acquire the data fraudulently.The company reported that the criminals opened many accounts and recorded personal information on individuals, including names, addresses, and identification numbers. They did so without using any network or computer-based attacks; it was simple fraud. 14 While the the amount of damage has yet to be compiled, the fraud is feared to have allowed the perpetrators to arrange many hundreds of instances of identity theft. The giant pharmaceutical organization Eli Lilly and Co. released the e-mail addresses of 600 patients to one another in 2001. The American Civil Liberties Union (ACLU) denounced this breach of privacy, and information technology industry analysts noted that it was likely to influence the public debate on privacy legislation.The company claimed that the mishap was caused by a programming error that occurred when patients w ho used a specific drug produced by the company signed up for an e-mail service to access support materials provided by the company. About 600 patient addresses were exposed in the mass e-mail. 15 In another incident, the intellectual property of Jerome Stevens Pharmaceuticals, a small prescription drug manufacturer from New York, was compromised when the FDA released documents the company had filed with the agency. It remains unclear whether this was a deliberate act by the FDA or a simple error; but either way, the company’s secrets were posted to a public Web site for several months before being removed. 16 damage, destruction, or other disruption of its authentic state. Corruption can occur while information is being stored or transmitted.Many computer viruses and worms are designed with the explicit purpose of corrupting data. For this reason, a key method for detecting a virus or worm is to look for changes in file integrity as shown by the size of the file. Another key method of assuring information integrity is file hashing, in which a file is read by a special algorithm that uses the value of the bits in the file to compute a single large number called a hash value. The hash value for any combination of bits is unique. If a computer system performs the same hashing algorithm on a file and obtains a different number than the recorded hash value for that file, the file has been compromised and the integrity of the information is lost.Information integrity is the cornerstone of information systems, because information is of no value or use if users cannot verify its integrity. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 15File corruption is not necessarily the result of external forces, such as hackers. Noise in the transmission media, for instance, can also cause data to lose its integrity. Transmitting data on a circuit with a low voltage level can alter and corrupt the data. Redundancy bits and check bits can compensate for internal and external threats to the integrity of information. During each transmission, algorithms, hash values, and the error-correcting codes ensure the integrity of the information. Data whose integrity has been compromised is retransmitted. 1 Utility The utility of information is the quality or state of having value for some purpose or end.Information has value when it can serve a purpose. If information is available, but is not in a format meaningful to the end user, it is not useful. For example, to a private citizen U. S. Census data can quickly become overwhelming and difficult to interpret; however, for a politician, U. S. Census data reveals information about the residents in a district, such as their race, gender, and age. This information can help form a politician’s next campaign strategy. Possession The possession of information is the quality or state of ownership or control. Information is said to be in one’s possession if one obtains it, independent of format or other characteristics.While a breach of confidentiality always results in a breach of possession, a breach of possession does not always result in a breach of confidentiality. For example, assume a company stores its critical customer data using an encrypted file system. An employee who has quit decides to take a copy of the tape backups to sell the customer records to the competition. The removal of the tapes from their secure environment is a breach of possession. But, because the data is encrypted, neither the e mployee nor anyone else can read it without the proper decryption methods; therefore, there is no breach of confidentiality. Today, people caught selling company secrets face increasingly stiff fines with the likelihood of jail time.Also, companies are growing more and more reluctant to hire individuals who have demonstrated dishonesty in their past. CNSS Security Model The definition of information security presented in this text is based in part on the CNSS document called the National Training Standard for Information Systems Security Professionals NSTISSI No. 4011. (See www. cnss. gov/Assets/pdf/nstissi_4011. pdf. Since this document was written, the NSTISSC was renamed the Committee on National Security Systems (CNSS)— see www. cnss. gov. The library of documents is being renamed as the documents are rewritten. ) This document presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.T he model, created by John McCumber in 1991, provides a graphical representation of the architectural approach widely used in computer and information security; it is now known as the McCumber Cube. 17 The McCumber Cube in Figure 1-6, shows three dimensions. If extrapolated, the three dimensions of each axis become a 3 3 3 cube with 27 cells representing areas that must be addressed to secure today’s information systems. To ensure system security, each of the 27 areas must be properly addressed during the security process. For example, the intersection between technology, integrity, and storage requires a control or safeguard that addresses the need to use technology to protect the integrity of information while in storage.One such control might be a system for detecting host intrusion that protects the integrity of Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party co ntent may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 16 Chapter 1 Figure 1-6 The McCumber Cube18 Source: Course Technology/Cengage Learning information by alerting the security administrators to the potential modification of a critical file.What is commonly left out of such a model is the need for guidelines and policies that provide direction for the practices and implementations of technologies. The need for policy is discussed in subsequent chapters of this book. Components of an Information System As shown in Figure 1-7, an information system (IS) is much more than computer hardware; it is the entire set of software, hardware, data, people, procedures, and networks that make possible the use of information r esources in the organization. These six critical components enable information to be input, processed, output, and stored. Each of these IS components has its own strengths and weaknesses, as well as its own characteristics and uses.Each component of the information system also has its own security requirements. Software The software component of the IS comprises applications, operating systems, and assorted command utilities. Software is perhaps the most difficult IS component to secure. The exploitation of errors in software programming accounts for a substantial portion of the attacks on information. The information technology industry is rife with reports warning of holes, bugs, weaknesses, or other fundamental problems in software. In fact, many facets of daily life are affected by buggy software, from smartphones that crash to flawed automotive control computers that lead to recalls.Software carries the lifeblood of information through an organization. Unfortunately, software programs are often created under the constraints of project management, which limit time, cost, and manpower. Information security is all too often implemented as an afterthought, rather than developed as an integral component from the beginning. In this way, software programs become an easy target of accidental or intentional attacks. Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 17 1 Figure 1-7 Components of an Information System Source: Course Technology/Cengage Learning Hardware Hardware is the physical te chnology that houses and executes the software, stores and transports the data, and provides interfaces for the entry and removal of information from the system. Physical security policies deal with hardware as a physical asset and with the protection of physical assets from harm or theft.Applying the traditional tools of physical security, such as locks and keys, restricts access to and interaction with the hardware components of an information system. Securing the physical location of computers and the computers themselves is important because a breach of physical security can result in a loss of information. Unfortunately, most information systems are built on hardware platforms that cannot guarantee any level of information security if unrestricted access to the hardware is possible. Before September 11, 2001, laptop thefts in airports were common. A two-person team worked to steal a computer as its owner passed it through the conveyor scanning devices.The first perpetrator ente red the security area ahead of an unsuspecting target and quickly went through. Then, the second perpetrator waited behind the target until the target placed his/her computer on the baggage scanner. As the computer was whisked through, the second agent slipped ahead of the victim and entered the metal detector with a substantial collection of keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator to grab the computer and disappear in a crowded walkway. While the security response to September 11, 2001 did tighten the security process at airports, hardware can still be stolen in airports and other public places.Although laptops and notebook computers are worth a few thousand dollars, the information contained in them can be worth a great deal more to organizations and individuals. Data Data stored, processed, and transmitted by a computer system must be protected. Data is often the most valuable asset possessed by an organization and it is the main target of intentional attacks. Systems developed in recent years are likely to make use of database Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User 18 Chapter 1 management systems. When done properly, this should improve the security of the data and the application. Unfortunately, many system development projects do not make full use of the database management system’s security capabilities, and in some cases the database is implemented in ways that are less secure than traditional file systems. People Though often overlooked in co mputer security considerations, people have always been a threat to information security.Legend has it that around 200 B. C. a great army threatened the security and stability of the Chinese empire. So ferocious were the invaders that the Chinese emperor commanded the construction of a great wall that would defend against the Hun invaders. Around 1275 A. D. , Kublai Khan finally achieved what the Huns had been trying for thousands of years. Initially, the Khan’s army tried to climb over, dig under, and break through the wall. In the end, the Khan simply bribed the gatekeeper—and the rest is history. Whether this event actually occurred or not, the moral of the story is that people can be the weakest link in an organization’s information security program.And unless policy, education and training, awareness, and technology are properly employed to prevent people from accidentally or intentionally damaging or losing information, they will remain the weakest link. S ocial engineering can prey on the tendency to cut corners and the commonplace nature of human error. It can be used to manipulate the actions of people to obtain access information about a system. This topic is discussed in more detail in Chapter 2, â€Å"The Need for Security. † Procedures Another frequently overlooked component of an IS is procedures. Procedures are written instructions for accomplishing a specific task. When an unauthorized user obtains an organization’s procedures, this poses a threat to the integrity of the information.For example, a consultant to a bank learned how to wire funds by using the computer center’s procedures, which were readily available. By taking advantage of a security weakness (lack of authentication), this bank consultant ordered millions of dollars to be transferred by wire to his own account. Lax security procedures caused the loss of over ten million dollars before the situation was corrected. Most organizations distrib ute procedures to their legitimate employees so they can access the information system, but many of these companies often fail to provide proper education on the protection of the procedures. Educating employees about safeguarding procedures is as important as physically securing the information system.After all, procedures are information in their own right. Therefore, knowledge of procedures, as with all critical information, should be disseminated among members of the organization only on a need-to-know basis. Networks The IS component that created much of the need for increased computer and information security is networking. When information systems are connected to each other to form local area networks (LANs), and these LANs are connected to other networks such as the Internet, new security challenges rapidly emerge. The physical technology that enables network functions is becoming more and more accessible to organizations of every size.Applying the traditional tools of phys ical security, such as locks and keys, to restrict access to and interaction with the hardware components of an information system are still important; but when computer systems are networked, this approach is no longer enough. Steps to provide network Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Licensed to: CengageBrain User Introduction to Information Security 19 security are essential, as is the implementation of alarm and intrusion ystems to make system owners aware of ongoing compromises. 1 Balancing Information Security and Access Even with the best planning and imple mentation, it is impossible to obtain perfect information security. Recall James Anderson