Thursday, January 30, 2020

Intro to Security Final Project Essay Example for Free

Intro to Security Final Project Essay Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. The objective of the Security Policy is to provide the basis of a secure information system within the Bloom Design Group. This policy will protect the information system from threats that exist in nature as well as disasters that exist from humans. The policy will also give consideration to the privacy, reputation, intellectual property and productivity of Bloom Design Group. The efficient operation of this company is dependent on being able to access and use resources within the building and being able to remote access with security. Each employees responsibility must be considered and appropriate access will be given to ensure that information is shared only with those who have the authority to have it. This policy will ensure the adherence to the Bloom Design Group policies but also with any government regulations. By limiting the access to certain groups of users, the security policy will guard against misuse of data and information. All processes that are within the system will be aligned with the policy and executed automatically to ensure that the policy is effectively protecting the information and resources in a continuous manner. Any disruptions or security risks will be dealt with immediately and automatically by means of the system software that has been established and configured for these purposes. 3. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 3. 1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Bloom Design Group is an interior design business that offers services to clients globally. There is a corporate office in New York and a secondary office located in Los Angeles. The group’s website allows clients a virtual decorating tool, where they are able to get an idea of the design and color scheme they would like to see and how it may look after the design is completed. This is a great tool to aid the client in making decisions, backed up by consultation by experienced interior designers as well. The designers are able to access their client files and style guides utilized by the company. The designers will also be able to process orders for materials and furniture when accessing the website. Access is gained by a secure login and password. The employees and designers of this company conduct most of their business remotely and access the network via a secure VPN. 3. 2. Security policy overview Of the different types of security policies—program-level, program-framework, issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. For The Bloom Design Group, a program-framework policy would be appropriate. The corporate office would set the security policy as it pertains to network usage. The program-framework policy would cover the WAN, the entire organization would be covered by it and all decisions related to how data is accessed by the workforce. This would require an acceptable use policy, which pertains to all areas of access including remote access, authorized data retrieval and retention, and connections within the WAN. 3. 3. Security policy goals As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy. 3. 3. 1. Confidentiality Briefly explain how the policy will protect information. Using the program-framework policy will help in making it possible that only those with authorized access to the company’s data will be the ones doing so. VPN technology will be utilized for these individuals and devices only. These will continue their privileges as long as the policy is complied with. The VPN will be maintained so as to minimize risk of unauthorized access, keep user and data confidentiality as much as possible over the internet, ensure the reliability of the company’s system as well as those systems of the authorized users of the network. 3. 3. 2. Integrity Give a brief overview of how the policy will provide rules for authentication and verification. Include a description of formal methods and system transactions. The program-framework policy will maintain the data and keep it secure, reliable, and free from corruption. The policy will keep unauthorized users from gaining, retaining, modifying, or deleting data of the company by means of firewalls, encryptions, and anti-spyware or anti malware tools. The VPN will be secured with using a tool that provides encryption and user authentication. Intrusion detection tools will also help protect the VPN. 3. 3. 3. Availability Briefly describe how the policy will address system back-up and recovery, access control, and quality of service. The program framework policy will maintain that authorized individuals, users, and systems will have access to information in its original format and at all times. The IT department will keep the business continuity plan up to date and and secure it in such case that there is a need for it due to emergencies. The company will create a business impact analysis which will evaluate risks to the company’s data and systems will be ready to be used for recovery of data if needed. A disaster recovery plan will also be created with step by step implementation to ensure recovery and continuation of business operations in the event recovery is needed due to loss. A risk analysis will be created to further identify and take steps to secure the company’s data. Full cooperation from each department and the administration of the company is needed for these plans to be effective. Training will be conducted in order to ensure that all are compliant to the plan. (Merkow Breithaupt, 2006). 4. Disaster Recovery Plan Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP. 4. 1. Risk Assessment 4. 1. 1. Critical business processes List the mission-critical business systems and services that must be protected by the DRP. The Bloom Design Group has the need of protecting their general support systems. These are the mission-critical systems and services to be concerned with. They are related to network connectivity, access to the internet and various resources through applications that will rest on the network that will aid in the daily productivity of the company. The following list of systems is includes the assets that must be protected by this plan.

Wednesday, January 22, 2020

Examine Miller’s presentation of John Proctor :: English Literature

Examine Miller’s presentation of John Proctor and the Circumstances which lead to his choosing to be executed. Although the events of the play are based on events that took place in Salem, Massachusetts in 1692, Miller was liberal in his fictionalisation. For example, the affair between farmer, husband, and father John Proctor, and the Minister’s teenage niece, Abigail Williams, drive many of the accusations of witchcraft in the play – in fact at the time of the Witch Trials, Williams would only have been around eleven and Proctor would have been in his sixties. The play, written in 1953, was in response to Senator McCarthy and the ‘House Un-American Activities Committee's’ crusade against supposed communist sympathisers, in which Miller became embroiled. When he testified in front of a congressional committee in 1956 he refused to reveal any names and so was held in contempt. The decision was overturned two years later. One of Miller's most powerful devices in the play is his use of irony: dramatic, verbal, and situational irony. Verbal irony is a figure of speech in which the speaker intends to be understood as meaning something that contrasts with the literal or usual meaning of what he says. One example of this is when John Proctor says ‘Good. Then her saintliness is done with’, mentioning Abigail. However, Proctor does not actually believe that Abigail is a saint. The affair makes her a sinner, because he is married to Elizabeth. However, he says this line because the rest of the town, and most importantly, the courts believe that she is believable and truthful. In effect, he tries to convince the court and the people of her â€Å"unsaintliness†, by bringing to their attention her sins, but to no avail; this is one of the most important circumstances which lead to his choosing to be executed. Another example has Proctor telling his wife ‘It’s winter in here yet.’ However, it is actually spring, as in the same dialogue he asks her to go walking in the field with him so that they may pick flowers and bring them into their home. Proctor really means to tell his wife that their home is cold, that there is no sign of love. He believes that when his wife fills the home with warmth and love, he is forgiven for his sin of lechery, and only then can he continue normally with his life. By using this type of irony, Miller’s characters indirectly bring something to our attention, which could not otherwise be done. Situational irony is a discrepancy between what we expect and what occurs. This is the second type of irony used in the play.

Tuesday, January 14, 2020

The feasibility and profitability of a wind farm, proposed to supply the island town of Lowton with electricity

The following report investigates the feasibility and profitability of a wind farm, proposed to supply the island town of Lowton with electricity. Using cost-benefit analysis techniques including spreadsheets formulated using Microsoft Excel the validity of the potential construction (15 turbines) was established. The Results (including equations formulated) are available in table format in the ‘Presentation Of Results' section (p 7). Other factors, including the difficulties involved in the environmental decision-making process are discussed, for example the difficulties surrounding applying a monetary value to natural resources, pollution levels and visual intrusion. The strengths and weaknesses of the decision making process are highlighted. Environmental concerns and the importance of developing alternative energy sources are discussed. The report concludes that the construction of the proposed wind farm should go ahead, and that it could be a profitable enterprise. Introduction This report is to investigate and appraise the environmental impact of a potential wind farm for the small island town of Lowton, while assessing the profitability and feasibility of this. The island is inhabited by 1000 residents and currently has power supplied by a conventional power plant on the mainland, which owns a 650 watt electrical power station. The wind farm in question would be small (about 15 turbines) which would be expected to service the town for 20 years each. The immediate cost of constructing and installing the turbines would be à ¯Ã‚ ¿Ã‚ ½1 million per mega watt (MW) and the potential output should be reached by the end of the second year. The cost of the fuel replaced by the wind power creates a saving of à ¯Ã‚ ¿Ã‚ ½25 per MW hour. Due to the fact wind is an uncontrollable phenomenon it is not available 100% of the time. The potential availability is estimated at 50% A spreadsheet shall be devised using Microsoft excel in order to determine the financial benefits/losses. The possible environmental impacts shall also be discussed and weighed up, using moral and financial arguments. Aims & Objectives The aims and objectives of this report are to assess the profitability and feasibility of the construction of the proposed wind farm. Economic modelling skills shall be used to create and explain a discounted cash flow model. A brief environmental impact assessment shall be created along with a discussion of environmental valuation techniques. Background To Study The town of Lowton lies on a small island in two miles into the English Channel. It is not densely populated; having only 1000 residents- therefore does not have a high demand for power. The current situation sees the electricity being supplied by a local power company on the mainland via undersea cables. The company in question have a 650 MW conventional power station. The cost of constructing and implementing the 5MW wind farm would be à ¯Ã‚ ¿Ã‚ ½1 million per MW at the start (year 1) and would be subject to later discounts due to the low maintenance costs of the turbines. The cost of the wind power would save à ¯Ã‚ ¿Ã‚ ½25 on coal per hour. Methodology The primary supplied data was entered into a Microsoft excel spreadsheet (capital cost, capacity in MW, wind efficiency levels, capital repayments, discount rate, MW per hour of turbines, compared with the cost per MW hour of turbines and conventional generators. The NPV function, found in ‘f'- financial section- was used and the appropriate formulas were input. (Supplied on spreadsheets) In addition to the above information sheets issued by the Department of Trade & Industry were studies for further information. The spreadsheet was then altered to demonstrate the way in which a variation in wind efficiency may affect the NPV, should the turbines be less effective than anticipated. Presentation Of Results Discussion & Analysis Of Results The results show the potential wind farm to be a profitable project. The discount rate is used in long term projects to reflect the fact things are worth more in the present than in the future so it is the opposite of compounding. 30% was decided to be the efficiency rate in the sensitivity analysis, as it is possible that a wind farm that operates on full speed 50% of the time to have an annual output of 30% efficiency. People are impatient and would rather be instantly rewarded for something than wait to be rewarded in the future, even when this means sacrificing potentially larger gains for smaller immediate ones. This is basically human nature as the future is uncertain. A person may die for example, or shares/projects may collapse before the maximum potential is obtained. The cost of long-term investment also means a persons financial resources are tied up so unavailable for other purposes. Discounting can also be accused of belittling future benefits and the way it asks people to make personal decisions based on their own values about public goods closes off public debate. Cost benefit analysis (CBA) should also be used for determining the worth of a project. It should not merely be a financial decision when hard to value resources/phenomenon's (e.g. habitat) are involved. This raises moral and ethical questions. It is incredibly hard to attempt to put a value on human life. One way in which economists do this is by paying wages at levels which reflect the risk of the job involved e.g. soldiers earn more than teachers due to the extremely high risks associated with being sent into battle. Rather than place a value on the individual it is considered more sensitive to see it in terms of altering the morbidity rate e.g. discovering how much a household will pay to cut pollution levels, which would save lives each year. Studies have shown that by cutting pollution levels by 26.570 GWH may reduce deaths by as many as 80. Many other factors are almost impossible to put a price on, e.g. visual intrusion, noise levels. CBA does offer the opportunity to bring the costs and benefits of potential developments into the decision-making framework (as the name would suggest) and provide a ‘precident'- a way to approach environmental problems from a solid standpoint. It also allows sensitivity analysis to be conducted to establish variations in assumptions. It is a transparent process that allows outsiders the chance to see how a decision has been made. The downsides of CBA, however, include the fact that it has to assign a cash value to a natural/environmental phenomenon. There is a possibility the process may be miss-used to promote a political decision as opposed to promoting a neutral investigative /objective standpoint, as the results of the ‘Pevensey Levels' exercise in Sussex illustrated. Cost & Value Of Wind Energy The cost of wind energy is dependant on the initial cost and productivity of the turbines. In this case it is à ¯Ã‚ ¿Ã‚ ½25 per MW hour. Installation costs may be covered relatively quickly in a successful case due to the low maintenance costs and 20-year lifespan of each turbine. The annual output of the turbines, however, is dependant on the position and mean wind speed of their erection site, which directly affects the cost of electricity per unit. Despite the fact the proposed site is expected to reach its full potential 50% of the time (meaning the annual output may be the equivalent of working on full power 25-30% of the time) the supply tends to peak with demand, e.g. in the dark windy winter months when there is more demand for heating and lighting. Although typical wind farms produce 2-3 times less power than conventional plants they are environmentally friendly, sustainable and low maintenance in comparison. The government is currently trying to encourage the switch from conventional power plants to alternatives. It established the NFFO (Non-Fossil Fuel Order) in 1991-1998 that is now being succeeded by NFFO2- the aim of which is to subsidise and popularise the use of sustainable resources until they are in a position to compete with conventional and more traditional ones. The success of this scheme depends largely on the ever-volatile energy market. THE PRICE OF PROGRESSION? Due to the fact many benefits of sustainable power sources are long term it can be hard to interest investors. It is also hard to put a monetary value on factors such as pollution reduction, human life or the loss of wilderness land/habitat. PUBLIC SAFETY: Any man made product has a risk of malfunction but the risk from a wind turbine is considerably less than that of a plane or car engine etc. Coupled with the fact they are usually situated far from housing/roads the chance of receiving physical injury from a turbine is minimal. Despite the fact it is possible for a rotary blade to become detached in high winds nobody has ever been injured by one, and it is unlikely a person would be nearby in such bad weather conditions. Environmental Impacts RISK TO WILDLIFE: There is little risk to wildlife posed by wind farms. They produce little noise, and studies do not show them to disturb wild animals. Farmers can even graze livestock up to the base of the turbines Birds may be slightly at risk of flying into the turbines, but they are no more likely to do this than they are likely to fly into conventional power pylons or be hit by aircraft/road vehicles. Local wildlife is indeed likely to benefit from the construction of a wind farm, through the cuts in pollution levels and subsequent rise in air quality. LOSS OF WILDERNESS LAND: A method known as the ‘Clawson Method' is used to assess the monetary value of a wilderness area. It is also called the ‘Travel-Cost Analysis'. Visitors to a site in question will be interviewed to establish how far they have travelled to reach the area, from five graded zones surrounding the site. Figures are then derived from each 1000 visitors and the travel cost is considered to be the cost of their visit. This method however fails to look at the land as a future resource or take account of habitat/rare species living there. All the above factors need to be addressed along with our need to cut toxic emissions and pollutants from industry, plus preserve fossil fuels. Despite the fact that developing alternative energy sources in the short term is unlikely to be immensely profitable it is another step towards a sustainable national grid. Consumer Objections: A BLOT ON THE LANDSCAPE? Some people consider wind farms to be intrusive, and complain about the sights/sounds emitted. This depends greatly on the location in question-most ‘farms' are built far from urbanised land or other developments, sights of national beauty or very popular recreational ground. There is little that can be done at present to alter the appearance of the turbines. Very little noise is produced, so little even livestock appear unconcerned. Manufacturers are nevertheless working to make them even quieter. PUBLIC BIAS? It is possible that public ignorance and bias is at the root of many complains. A lack of awareness may encourage low tolerance levels, especially amongst those who are unfamiliar with modern technology and pollution problems. NIMBY Syndrome (Not In MY Back Yard) may also contribute to peoples dissatisfaction, especially those who live downwind. Conclusion: The spreadsheet analysis of the potential wind farm indicates it would be a profitable enterprise, due to the high Net Present Value produced. This is however only deducted from a model that is only as good as the person who designed it and the assumptions it is based on. It is therefore subject to any number of unforeseen crises, and should merely be viewed as a hypothesis. The Cost-Benefit Analysis also indicates that switching to environmentally friendly sources of power would be advantageous to both present and future generations. Discounting affects future generations as the higher the discount rate, the quicker the non-sustainable resources are likely to be exhausted. The approach may backfire if the benefits are not obtainable for a prolonged period as investment will be virtually impossible to find. It is therefore hard to protect slow-replenishing resources like tropical hardwoods. Discounting can even help to accrue worse future damage-however devastating the effects-if the future damage will not be felt for several generations. There is no real alternative to CBA despite of its faults, so it should be refined rather than disregarded as a source of decision-making. Environmental decision-making is a sensitive issue. The only possible other way is to use a citizens jury. Where this has been tried however the members failed to fully understand what was expected of them , or how to place prices on abstract phenomenon. Most educated individuals recognise the benefits to society gained from switching to ‘green' (sustainable) energy sources. The development of these sources are still in the early stages and are not going to affect the conventional production of power in the short term, it is still important to develop and popularise such alternatives today. This is the only way in which they will win social and scientific approval and eventually overcome fossil fuel consuming plants as a source of power.

Monday, January 6, 2020

Understanding Computer Security Features - 517 Words

There are a lot of features on a computer system that people never stopped to look for. Many of the features could mean the destruction of your computer or be important to the upkeep of your computer. Also, some of these features could help in an investigation when a computer has to be taken in for evidence. The computer I am using is an Intel Celeron processor 2995U @ 1.40 GHz. It is a 64 bit operating system, with 4.0 of RAM, and 3.50 of MB. There is no specific Security software set up, however there are many other protection factors located in the control panel of the computer. According to the event log there have been 1,100 Administrative application events, 1,433 Administrative security events, 88 Operational setup events, 5,365 Administrative system events, and no Forwarded events. The form of security I did see that was active on this computer is Firewalls. I found this information within the control panel. Firewalls can be let down temporarily by opening a port. The only problem with opening a port is that once it is open it stays open. If someone finds themselves engrossed in other activities while using this computer, viruses would have an easy way in, if the port is no closed immediately after it has served its purpose. The recommendation for this security threat is to only make a port through a firewall when absolutely necessary, and to remember to close the port. Also, I recommend that a person add a program only from a list of the allowed programs forShow MoreRelatedComputer Maintenance892 Words   |  4 PagesMaintenance And System Information Maintaining your computer can be very tedious, but with the proper knowledge you can simplify this process by automating many features so they run and function with minimal or no user input. Turning on Window’s automatic updater will help keep your system up to-date. You can set the updater to check at set times with Microsoft to see if there are any new updates available. Knowing vital information about your system is an important step in keeping yourRead MoreSystem Administration, Security, Backup And Security1170 Words   |  5 PagesSystem Administration, Security, Backup and Security Cyber Cafà © Management was created for management of systems. All cyber cafes basically have the same needs, renting computer systems to their customers and charging them on regular and timely basis. A Cyber Cafà © have computers that customers will used for a certain amount of time and start time will be noted. For security reasons, it is a must to have some details about the customers to protect the business as well as other customers. When theRead MoreTop Highest Pay Jobs For Information Technology Grads Essay1074 Words   |  5 Pagesthe Bureau of Labor Statistics (BLS), employment opportunities in the information technology field have been continually expanding for the last 20 years. The BLS stages that the fasted growing and highest paying information technology jobs include computer programmers, systems analysts, software developers and support specialists. The field of information technology offers the best career flexibility, so graduates may find themselves working in jobs related to business, science, market research, mediaRead MoreMonitor The Network Of Home And Office Essay1266 Words   |  6 Pagesup and power down features for specific device. This also helps in monitoring the selected network devices along with speed uptime. In addition, this project also scans and provides the actual number of active computers in a network. Following are the project objectives 1. To publish network monitoring speed when a certain threshold is reached. 2. To know the status and the uptime. 3. To scan all the active computers in a network. 4. To power up/power down the personal computers remotely. 5. To giveRead MoreThe Basic Parts That Make Up A Computer1337 Words   |  6 PagesLawson City Since you are looking to upgrade or purchase a new set of computers, I would like to discuss the basic parts that make up a computer. It is important for everyone to have a basic understanding of what makes a computer. As technology advances, it’s important that you be able to make an educated decision on whether to upgrade or to replace your current systems. The difference can be a good deal of your hard earned money. Therefore, I will be detailing the Operating System, Processor, MemoryRead MoreThe Role Of Computer Technician On The Healthcare Industry949 Words   |  4 PagesIn this day and age computers play a key role in our daily activities and lives overall. Computers are especially critical to the success of large, medium, and small businesses. For example, in the Healthcare industry computers are used daily to track patient care. In order to gain a better understanding of how computers are used in the Healthcare industry, an interview was conducted with an IT Profe ssional working for a Contract Research Organization (CRO) focusing on Clinical Research. DuringRead MoreThe Mobile Operating System And How It Is Different From Desktop Operating Systems Essay1444 Words   |  6 PagesApple Inc. to support Apple devices such as iPhone, iPad, and iPod. iOS provides various features including security and inbuilt iCloud. In this research paper, we are going to study the overview of the mobile operating system and how it is different from desktop operating system. Then, we are going to explore iOS operating system on various bases such as different layers of iOS, iDevices, its features, security and its limitations. Introduction An operating system is the core of any system softwareRead MoreJava In Browsers Research Paper1061 Words   |  5 Pagesbring app-like features to web browsers. At the time, this seemed like a nice feature to have and it changed the look of web browsers forever. However, there are vulnerabilities with the technology that have never been fixed, even once taken over by Oracle. These issues affect the security of the plugins and have contributed to its decline and lack of support. While Java is still favored by developers for use in stand-alone programs, and users need it for some things on their computer, its wide useRead MoreMetasploit : An Advanced Open Source Software Platform1057 Words   |  5 Pages(#1)   Ã‚   Metasploit Metasploit took control of the computer world in 2004, after its original release. Metasploit is an advanced open-source software platform used for testing and exploiting computer networks and the resources connected to them. Not only is the open-source code used for penetrating and hacking, because of its advanced features, it is also used extensively for research purposes. Out of the box, figuratively speaking, Metasploit organically comes with hundreds of exploits loadedRead MoreMy Statement of Purpose: Computer Security787 Words   |  3 PagesIntroduction As global security continues to grow exponentially in response to threats of cyber terrorism, the field of computer security continues to proliferate into many adjacent socioeconomic and technologically-based areas of society. Gartner Group, a leading market research in the enterprise IT industry, has stated that the worldwide market for security software will reach $21B in 2011, rising to $15.8B in 2015 (Karjalainen, Siponen, 2011). This rapid growth of computer security is also driving the