Сustom research paper
Tuesday, August 25, 2020
The Role Of Energy In Human Development Environmental Sciences Essay Free Essays
In November, 2009 the UN Development Program ( UNDP ) office noticed that 1.5 Billion individuals of the universe, around one-fourth of flow universe populace are still without power ( EIA World examination, 2009 ) . They are generally in provincial creating universe. We will compose a custom exposition test on The Role Of Energy In Human Development Environmental Sciences Essay or then again any comparative theme just for you Request Now The UNDP other than featured the squeezing requests to ensure that the vitality requests of creating states are cardinal to any new clime change understanding. The greater part of them who live in obscurity are at all evolved states ( LDCs ) of South Asia and sub-Saharan Africa, fitting to the examination ( The Energy Access Situation in Developing States: A Review Focusing on the Least Developed Counties and Sub-Saharan Africa. ) Mr. Olav Kjorven, UNDP Assistant Administrator and Director of the Bureau for Development Policy, told newsmans in New York at the dispatch of the examination: ââ¬Å" Expanding vitality dish is essential to embrace planetary poverty. It needs to go on at the least expense and in the cleanest way conceivable to help creating states set up a low-carbon way to improvement, â⬠He other than noted: ââ¬Å" Almost 50% of the mankind is entirely detached from the contention on the most proficient method to drive human headway with less spreads and greener vitality in light of the fact that their reality is substantially more fundamental than that. They convey overwhelming tonss of H2O and supplement on their dorsums since they do nââ¬â¢t hold transport ; they cook over wood fires that amendss their wellbeing, non with power, gas or oil, â⬠ââ¬Å" We should ensure that vitality requests of these individuals are cardinal to another clime understanding, â⬠he included, referencing to the settlement to control nursery gas transmissions that states are trusting to achieve when they meet in the Danish capital in December, 2009 Kjorven noticed that 2,000,000 individuals kick the bucket each twelvemonth from causes related with introduction to smoke from cooking with biomass and coal and 99 percent of those expires happen in the advancement states. In L DCs and Sub-Saharan Africa, half of all expires from pneumonia in kids under five mature ages, interminable lung illness and lung harmful neoplastic malady in adults are ascribed to the use of strong fuel, contrasted and 38 percent in creating states by and large. Curiously, a large portion of these individuals live in a section where there is plentifulness of daylight ( see Figure 1.1 and 1.2 ) , and it is no ââ¬Å" shot logical control â⬠that daylight can be changed over to power. The Photo-voltaic ( PV ) designing that changes over the daylight to power has been known since 1950s, and the offices to hive away PV power when the Sun is reflecting and do it accessible when it is dull has been applied for mature ages. Besides, power produced as such is nearby and dispersed. It very well may be utilized where it is required, and in this manner wo nââ¬â¢t require transmittal of power from a cardinal bring forthing station to remote provincial nations, and consequently would stifle all power transmittal related issues or costs which would be Millions of dollars so as to pass on the power framework to these inaccessible country nations of the universe. Among the various vitality usages, run intoing illuming requests reasonably and dependably is much of the time the fundamental requests for human life, and the hidden key to any financial turn of events, and riddance of human destitution. Lighting assists individuals with increasing additional clasp for working, perusing in the eventide, lolling more noteworthy security and more solace. The nature of obvious radiation from an electric start is ordinarily better when contrasted and kerosine lights or tightens, and is less hazardous to wellbeing, and safe. Contrasted with the noticeable radiation gave by power that the individuals in the created universe use, the obvious radiation from a kerosine light is truly curbed. So as to peruse under this light 1 has about set the books on the right track over the light. In add-on, being at so close propinquity with these lights, the children will undoubtedly breathe in the depletes from these lights which are poisonous and undesirable. Along th ese lines, the nonattendance of present day noticeable radiation as gave by the power obstructs non only the dissecting capacity of these hapless children however close to it makes genuine wellbeing occupations. Pode ( Pode, 2008 ) noted ââ¬Å" In footings of costs, noticeable radiation from kerosine is definitely more costly than gave by electric obvious radiations. The expense of utile light vitality ( $/Lumen Hour of obvious radiation ) for kerosine is in excess of multiple times higher than the wasteful glowing bulbs, is in excess of multiple times higher than a Compact Fluorescent noticeable radiation bulb and in excess of multiple times higher than a LED â⬠. The International Finance Corporation ( IFC ) gauges that $ 38 Billion is spent yearly, predominantly by the hapless, on fuel-based lighting ( World Bank Group Progress on Renewable Energy and Energy Efficiency Projects in Fiscal Year 2006: Bettering Lifes ) . An adjustment to electric noticeable radiations ( CFL and LED based ) would be under 1/2000 of this enormous expenses for illuming, an economy of mammoth extent. 2.1 Introduction Each twenty-four hours around 122 PW of daylight arrives at the Earth ââ¬Ës surface. This is copious contrasted with the 13 TW of whole vitality devoured by universes. Sunlight based vitality ( power ) is made by the daylight. At the point when the daylight strikes a PV cell, a stuff produced using Si or sand that is like the stuff utilized in doing registering machine memory french friess, the vitality contained in the daylight ( the photons ) energizes the iota inside the semiconducting material stuff, and movement of these free particles makes electromotive power ( direct flow electromotive power ) and electric flow. In this manner each piece long as there is Sun, and the daylight hits a PV cell at that spot will be PV power. This is feasible and is abundant. 2.0 System Installation Issues Final result of sun oriented PV board can change altogether with its siting-area each piece great as its attitude ( tilt edge ) connection to place of the Sun. Since the PV power is created by the Sun, the total of daylight hitting the PV cell will discover how much sun oriented power can be gotten from a PV cell at an area. The attitude of the Sun with respect to the PV cell is of import as it would arrange the total of Sun ââ¬Ës vitality that would hit the outside of the PV personnel, and its continuation. Accordingly, a sun oriented PV board that can follow the Sun as it moves from E to west during the twenty-four hours can deliver the most total of sun powered power at an area. Where such trailing sunlight based PV is non executable, the sun based board ought to be mounted at a point with the goal that it hits the Sun sheer for the greater part of the clasp and gets the daylight during the vast majority of the twenty-four hours, Similarly, shadowing will affect the whole of Su n got on the PV board and will affect the aggregate of finished results. A Solar Pathfinder ( hypertext move convention:/www.solarpathfinder.com ) or comparative instrument ought to be utilized to locate the ideal area of the workforce, and topographic point it. The UNDP has proposed that ââ¬Å" The most essential requests for human improvement are to take long and sound lives, to be knowing, to hold course to the assets required for a pleasant basis of life and to have the option to participate in the life of the network. Without these, numerous picks are just non accessible, and numerous odds in life stay unaccessible â⬠( hypertext move convention:/hdr.undp.org/en/measurements/records/hdi/, got to 5/1/2010 ) . Since 1970s global Keynesiasm featured the planetary commonality with two significant nations of concerns: another worldwide financial request ( NIEO ) and transportation of assets to the hapless populace of the universe ( the third universe states, 3W ) to run into the essential requests being developed ( Preston, P.W. , ( 1996 ) , Development Theory, ISBN 0-631-19554-8 ) . See figure beneath. The capacity of vitality in human improvement was preeminent featured in an UN Report, arranged by the Brundtland Commission ( Brundtland Report, ( 1987 ) , United Nations World Commission on Environment and Development ( WCED ) , 1987, hypertext move convention:/en.wikipedia.org/wiki/Brundtland_Commission, got to June, 2010 ) . Absence of course to reasonable vitality was other than noted as one of the significant reasons for need and lack of human turn of events. The inconsistencies in vitality use between the created universe and the immature universe was other than noted, with a recommendation that the created universe take a more extensive capacity in taking this tremendous difference. The authoritiess of the First universe states and the cardinal foundations of the post-second universe war expansive industrialist frameworks, the IMF, the World Banks, the NGOs understood that they should suit to constrain per unit regions of change, and pay taking care of this NIEO by transporta tion of assets to the hapless states to run into their essential requests, and turn toing the vitality need was on the agenda. ( Preston, P.W. , ( 1996 ) , Development Theory, ISBN 0-631-19554-8 ) . We will talk how this improvement assault for the full universe uncommonly for the vitality hapless states was tended to under this NIEO ( see Figure I.1 ) . Current vitality as gave by power gives numerous odds to human turn of events. It decreases the clasp expected to execute essential family employments. The clasp in this way spared could be utilized for money coevals, expanded cultural exercises and instructive aim. It has been resolved that vitality ingestion has significant correlativity with GDP each piece great as HDI. An examination distributed by IEA shows that the states with high ingestion level of per capita power, accomplish upper position of both eco
Saturday, August 22, 2020
Flaws with utilitarianism Essay Example For Students
Imperfections with utilitarianism Essay Among the most glaring issues that I see with Utilitarianism is its incorporation of creatures under the umbrella that covers this hypothesis. It appears to be unquestionable that there exists an over the top number of situations where the result that is against the wellbeing of a creature is positive for people, yet that directing activity is one that has been persistently taken and excused by the overall population. This is a major test, as the Utilitarian way of thinking orders that the delight and agony experienced by all people, including creatures, has equivalent worth and must be viewed as while deciding the net advantage of an activities outcomes. The most exceptional and predominant of models that one could give to outline this inconsistency would be the act of utilizing creatures to give food. It can't be contended that it is to the greatest advantage of a dairy animals, a chicken, or another creature to be butchered to serve the dietary needs of humankind. Appropriately, Utilitarian thinking proposes, contrary to the instinct of mankind, that it is ethically impermissible to murder the creatures. While an Utilitarian thinker may give the counter-contention that such is characteristic request of the world that there exist a progressive food tree. Further they would demand that more noteworthy's benefit is that people be supported and accommodated by the meat, for our pleasure is better in quality than that of the brute. This thinking, nonetheless, is defective in two different ways. At first, the strategy by which meat discovers its approach to markets for our buy and inevitable utilization isn't one administered by the meth ods of nature, but instead is one built for proficiency by people. Creatures are bread coercively, at that point fed with explicit aim of overseeing fat substance, meat flavor, and constitution, every one of which limits the Utilitarian case that nature makes our flesh eating strategies morally passable. Also, and maybe more on a very basic level, such a case is in direct logical inconsistency to the Utilitarian principle that every individual has equivalent worth paying little heed to character or height. Since people could be adequately sustained without the executing of creatures, it can't be contended that the result of making demise a creature is identical or less considerable than that of taking care of a man. Then again, there exist similarly the same number of difficulties to raise had the ethicist taken the other position that creatures have equivalent worth and in like manner that their pleasure is impermissibly encroached upon when they are slaughtered for human intrigue. Contentions could be introduced for a group of activities taken regularly by society in general. One may address the way that utilizing creature testing for the headway of medication has benefits that exceed the torments. Also, while the advancement of land successfully slaughters the beforehand creature occupants, it is an acknowledged outcome that society has shown it is eager to ignore. In every one of these cases, most of society supports such conduct, as confirm by their reality as normal open practice. While it is obvious that restriction to every conduct exists, the size of this obstruction is far exceeded by those in finding the drawn out advantages deserving of the negative outcomes. At long last, it develop s obvious that while it might be important to think about the interests of creatures while ascertaining the net advantage of a given activity, neither their pleasure nor their torment ought to be likened to our own. Such a standard has been presented through the moral psychological test The Dilemma of the Swine. Resultantly, human presence establishes higher joy that does that of a creature and we are frequently better served by making such a qualification through natural investigation as opposed to applying Hedonistic Calculus. The way that Utilitarianism can be constrained into logical inconsistencies paying little mind to the position they pick makes the incorporation of creatures under their moral umbrella a huge issue.
Monday, August 10, 2020
Shelbys Amazing CPW Adventure
Shelbyâs Amazing CPW Adventure This past weekend was the legendary Campus Preview Weekend at MIT and I was extremely stoked to finally visit. Not only was it my first time visiting campus, but it was also my first time in Boston/Cambridge. Here is a photo of me outside of 77 Mass Ave. (So this is where my application went.) I was instantly stunned by the campus and the intriguing architecture. I was especially awed by Simmons Hall, aka The Sponge. After getting settled in my hosts dorm at New House 2, I was pumped and ready to attend some fun events and classes. Before my escapade, my host and I took time to chat in the Office of Minority education, where I was able to get the scoop on MIT from other current students. The more I learned about MIT, the more I was certain that MIT is the perfect fit for me. This only made me more excited to be on campus. My CPW weekend was off to a great start. The entire weekend was action-packed and downtime was nonexistent. I could probably write a book about my CPW experience, but rather, I will highlight some of my favorite events of the weekend! The Stata Center. Another mind-boggling architectural masterpiece at MIT. On Friday I went on a UROP (Undergraduate Research Opportunity Program) tour at the Whitehead Institute for Biomedical Research to learn about current cancer research headed by Dr. Robert Weinberg. It was interesting to know that our tour guide had an active role in this significant research, and the fact that I would have the opportunity to partake in research at MIT was exciting. I toured the actual laboratory, how cool is that? I even got all of my inquires answered. When the tour was over, I couldnt help but ponder upon when I will participate in research at MITby this point (Day 2 of CPW, mind you) I was already convinced that MIT is where I would be next year. Between Friday and Saturday, I attended three fairs: the academics fair, the athletics fair, and the activities fair. I collected all sorts of brochures and packets from everything that I was interested in. Just envision a fully-loaded, on-the-verge-of-exploding, drawstring bag and youll have a comparable image of what my bag was like after these three fairs. I walked table to table at these fairs and discovered so many, perhaps too many, clubs, sports, and academic opportunities that I found thrilling. The opportunities seemed endless, and for that, I knew at this point that MIT was where I would go to college. MIT will allow me to explore and develop all of my interests. I know that next year as a freshman, in addition to my classes, I may try water polo, play in the MIT Symphony Orchestra, and make time for the literary club. On Saturday I toured WMBR, MITs student-run radio station that broadcasts all over Boston. They showed me their music library, complete with innumerable CDs and records. I felt like a kid in a candy store, and the first bookshelf I rushed to was the one designated to artists that start with L to see which Led Zeppelin albums they had. In fact, the radio crew let me pick a Led Zeppelin song, introduce it on air, and play it. And that was my radio debut (there will be more of me on air next year at MIT, just a heads up). In case you Zeppelin fans out there are wondering, I picked Immigrant Song to play on air. Remember, I have only touched upon a few of the events because, as I said earlier, I could write a book about my CPW experience (and maybe I will, who knows). Attending CPW confirmed that MIT was the perfect place for me.
Saturday, May 23, 2020
The Prophet Muhammad Was A Great Woman - 850 Words
Zainab bint Muhammad was a great woman. She was the eldest daughter of the Prophet Muhammad (pbuh) and Khadija (rah). She was born 599AD. Her story begins in Makkah when one day her cousin, Abu al-As ibn al-Rabi, ask her head in marriage. The prophet asked Zaynab if she wanted to marry him, and she blushed out of bashfulness and smiled. They had two children named Ali (died during childhood) and Umma. One day when, Abu al-As ibn al-Rabi returned to Makkah from a trip, Zainab announced that her father had become the prophet of Islam and that she and most her family had be come Muslims. The quraysh told Abu al-As ibn al-Rabi to divorce Zainab and that they would bring him a better woman. He refused and stayed with Zainab, but he refused toâ⬠¦show more contentâ⬠¦During the immigration Zainab got permission from her father to stay with her husband in Makkah. Thatââ¬â¢s when tragedy struck. Since Zainabââ¬â¢s husband was not Muslim, he was going to fight in the battle of Bad r against the Muslims. That meant that he would have to fight her father. She was very scared. She feared for her husband and her father. She prayed saying ââ¬Å"O Allah, I fear one day the sun may rise and my children become orphans or I lose my fatherâ⬠. So the battle started, and ended in victory for the Muslims. In the end the Muslims won and Abu al-As ibn al-Rabi was captured. When this news reached Makkah, Zainab was over come with relief and thanked Allah that her father was all right and that the Muslims had won. There was a problem though. Her husband was captured. She did not have much so she gave her necklace as a payment. When the prophet was checking the payments and releasing captives, he saw Zainabââ¬â¢s necklace. He began to sob because it was Khadijaââ¬â¢s necklace and he had loved her dearly. He released Abu al-As ibn al-Rabi for the time being and told him to give the necklace to Zainab and tell her to never give it away. Then the prophet created a rul e. A Muslim woman cannot be married to a disbeliver. Therefore, when Abu al-As ibn al-Rabi came back to Makkah he told Zainab that she had to go and stay with her father in Madina and leave him. She asked him for millionth time if he would become Muslim and stay with
Tuesday, May 12, 2020
My Experience At The Holland Inventory Assignment - 875 Words
While doing the Holland Inventory Assignment I found myself confronted with questions which varied in difficulty for me to answer. Some required me to look deeper at myself and what I truly enjoy doing and helped me explore more about my interests than I have done already. After finishing the set of questions I chose to take the optional 20 picture/painting survey as well. The optional survey was used to get a more accurate read of my personality, and also contributed to my final results. I received the code ISA at the end of the activity which is created from three groups; Investigative, Social, and Artistic. When I looked over my results I found it to be quite accurate of how I already perceived myself, and was nice to be given extra reassurance of myself from the test result. The Investigative part I found related to me because I view myself as a person who asks a lot of questions and is very interested in how things work or come to be. I enjoy going into depth with research about things that I find appealing or interesting, and gain knowledge about that subject. The social reading from the test fits me as well because I love being around people. doing so gives me more energy and makes me feel more comfortable a lot of the time. I have a passion about helping people and find it easy for people to come to me about problems or for just good company. Creating things and expressing oneself is something I find important personally and throughout society as a whole. I haveShow MoreRelatedJohn Holland Theory Of Personality2069 Words à |à 9 PagesAssignment 1: Theory Selection Career and work have varying meaning for most individuals. Some view their careers as part of their identity and status. For others, work is a means to support themselves and enable them to pursue other interests. Still others seek careers that are satisfying and provide them with an opportunity to express their personalities and values. People change careers often for a variety of reasons in todayââ¬â¢s society. Some transitions are due to job displacement while othersRead MoreCareer Intervention Program For High School Students2131 Words à |à 9 Pagesproviding high school students with a program that encourages college and career readiness this can be accomplished. An overall comprehensive developmental guidance and counseling program for high school students offers developmental opportunities and experiences that address three student-development areas: learning to live (personal/social), learning to learn (academic), and learning to work (career). This offers activities intended to address the needs of all students by helping them to gain competenceRead More Crew Personalities on the Mission to Mars Essay3505 Words à |à 15 Pagesfifteen timeslipped minutes away at best, and Michel talked to him but he couldnââ¬â¢t helpâ⬠¦.While Michel was a doctor in a hospice in a prison in hell; and the doctor was sick. (Robinson 215) His personality influences the onset of depression he experiences, as the novel explains ââ¬Å"he [Michel] hadnââ¬â¢t been able to adapt. People were different in that regard, it was a matter of temperament.â⬠(Robinson 215) The difference between him and many of the other members of the crew is that he is a typical introvert;Read MoreAdjusting Entries14033 Words à |à 57 Pages we still have some of those original units in inventory, right?ââ¬â¢Ã¢â¬â¢ ââ¬Ëââ¬ËOnly a few dozen, I believe. Is that a problem?ââ¬â¢Ã¢â¬â¢ ââ¬Ëââ¬ËIt is since we still have those units recorded at their original historical cost. Now that we have a new model, the value of those old machines has probably dropped signiï ¬ cantly.ââ¬â¢Ã¢â¬â¢ Elsa nodded. ââ¬Ëââ¬ËThatââ¬â¢s a good point. Who would buy the old version now that a newer version is available? We probably need to write down that inventory.ââ¬â¢Ã¢â¬â¢ John sighed. ââ¬Ëââ¬ËOkay, but to do the calculationsRead MoreSports Direct Financial Situation Analysis and Their New Project Investment in Morocco5386 Words à |à 22 Pagesevaluation: 20 2.1. NPV: 20 2.2. Sensitivity analysis: 21 3. Quarterly report: 22 3.1. Introduction: 22 3.2. Comparison: 22 3.3. Risk and uncertainty: 23 4. Conclusion: 24 | INTRODUCTION: Long ago, when I used to go with my father to the supermarket, I was always asking him to buy me a ball or these fake guns to play with. Sometimes he did buy them for me but sometimes not. I was happy when I had them but when he refused I heard the same reason every time ââ¬Å"we do not haveRead MoreStudent Academic Code Of Conduct And This Assignment Complies With The Code6050 Words à |à 25 Pages 24 August, 2015 Student Name: Paul Thomas Student ID: 577052772 Section: 71 ââ¬Å"I have read the Student Academic Code of Conduct and this assignment complies with the Codeâ⬠Table of Contents for the Project Page 1. Consulting Service Description-----------------------------------------------------------------3 2. Target Market ProRead MoreTraining and Development at Cadbury India Ltd, Delhi15402 Words à |à 62 Pagesall the characteristics that enable full delicious taste to be enjoyed by the consumers. By todayââ¬â¢s standards the first chocolate for eating would have been considered quite unpalatable. It was the introduction of the Van Houten cocoa press from Holland that was the major break through in the chocolate production as it provided extra cocoa butter needed to make a smooth glossy chocolate. Cadburyââ¬â¢s Milk Tray ââ¬â 1915 Milk Tray has maintained its popularity in the changing world since the milk chocolateRead MoreGes Two-Decade Transformation Jack Welchs Lea11469 Words à |à 46 Pagessuggestions in a room where they had carefully arranged the seating so his boss was behind him. ââ¬Å"I was wringing wet within half an hour,â⬠he said. ââ¬Å"They had 108 proposals; I had about a minute to say yes or no to each one. And I couldnââ¬â¢t make eye contact with my boss without turning around, which would show everyone in the room I was chickenshit.â⬠In total, Lauzon supported all but eight of the 108 proposals. 1 Interestingly, Welchââ¬â¢s first attempts at articulating and communicating GEââ¬â¢s new cultural valuesRead MoreDeveloping Management Skills404131 Words à |à 1617 PagesSelf-Disclosure 89 Through the Looking Glass 89 Diagnosing Managerial Characteristics 90 An Exercise for Identifying Aspects of Personal Culture: A Learning Plan and Autobiography 92 SKILL APPLICATION 95 Activities for Developing Self-Awareness 95 Suggested Assignments 95 Application Plan and Evaluation 95 SCORING KEYS AND COMPARISON DATA 97 Self-Awareness Assessment 97 Scoring Key 97 Comparison Data 97 Emotional Intelligence Assessment 97 Scoring Key 97 Comparison Data 99 The Defining Issues Test 99 The EscapedRead MoreStrategic Human Resource Management View.Pdf Uploaded Successfully133347 Words à |à 534 Pagespart of the costs of general training, the firm also will be reluctant to lay off workers who have received this training.) Like general training, specific training can be obtained through forma l programs. It also can be obtained through on-the-job experience, as much of what employees learn on the job tends to be of a specific nature. Employees who receive specific training from an employer receive a lower wage after training than their productivity would warrant because no other employers have use
Wednesday, May 6, 2020
School Finance Article Analysis Free Essays
After the Second World War, there has been a dramatic increase on school finance in the United States. Through the article, Guthrie explains some of the critical incidents that contributed the considerable increase of the per-pupil expenditures in public elementary and secondary learning institutions. Upon reading the article, one should have an understanding on how do certain events affect per student spending in America. We will write a custom essay sample on School Finance Article Analysis or any similar topic only for you Order Now Some of the factors cited by Guthrie are the constant expansions regarding the services offered by schools, more pricey specialized classes on high school students, and special education programs. Also, Guthrie includes that grants for students from disadvantaged backgrounds and those with disabilities make a contribution to increased costs. In the article, Guthrie suggests that it is very likely that the increasing expenditure on school finance continues. With this, the author offers some solutions to be considered to put a halt or, at the least, control its growth rate. Some of these are privatization and contracting. Just like the article states about the increasing per student expenditure, school finance in Massachusetts is also affected by the factors stated earlier. Thus, one can say that Massachusetts is on its way on a much higher education budget. In the event that the education status in Massachusetts will continue (that is, its schoolââ¬â¢s productivity is increased), there can be a possibility that the trend will snap, thus making the funds for public elementary and secondary schools could be minimized. How to cite School Finance Article Analysis, Papers
Saturday, May 2, 2020
Hypothesis Testing and Changepoint Detection â⬠MyAssignmenthelp.com
Question: Discuss about the Hypothesis Testing and Changepoint Detection. Answer: Introduction: Cryptography is a process using which information can be converted into a format that cannot be read normally. The purpose of cryptography is to conceal any secret message from any unwanted viewer and only the intended recipient will be provided with the method to convert it to readable text (Stallings Tahiliani, 2014).A data that can be read and understood without the involvement of any special technique is known as plaintext. The method of masking a plaintext with the intention to hide its contents is called encryption.Encryption of a plaintext results in an unreadable format known as ciphertext.Symmetric key encryption is a type of cryptography method that involves the sharing of a secret key to encrypt and decrypt the data (Agrawal Mishra, 2012). Symmetric encryption algorithms have high efficiency in processing large amounts of information and computationally less intensive compared to the process of asymmetric encryption algorithm.Stream ciphers and block ciphers are the two types of symmetric key encryption algorithm that provides bit-by-bit and block encryption respectively. Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption Standard (AES) management and BLOWFISH are examples of various symmetric key algorithms (Surya Diviya, 2012). Public Key Encryption also known as Asymmetric Encryption is a type of Cryptography that employs two keys for the process of encrypting and decrypting a data.One key is used for the encryption of a data; however, it cannot be used for decrypting the encrypted data. Similarly, another key is used for decrypting the data, which cannot be used for encrypting the same (Wee, 2012). The two keys are public key and private key. Public key is used for encrypting the data and is in possession of both the sender and the recipient while the private key is possessed only by the receiver of the message. To decrypt an encrypted message the recipient will require using both the public and private key.The public key is open to all however, it alone cannot be used to decrypt the coded message (Hofheinz Jager, 2012). Therefore, the encryption is secure. Both the public and private keys are based on very lengthy prime numbers. There is almost infinite amount of prime numbers available, which creates a n infinite amount of possibility for creating such keys. This enhances the security of the system extremely.An example can be cited in support of the topic mentioned above. Suppose a person A sends an encrypted data to person B. A encrypts the data with a public key and sends the data to B with the key (Hsu, Yang Hwang, 2013). B already has the private key to decode the data in possession and after receiving the package decodes the data using both the public and private key. Any intermediate viewer can see the package however; will be unable to decode the data, as they do not possess both the public as well as the private key (Jeeva, Palanisamy Kanagaram, 2012). The term hashing typically means the process of reducing any object from its original dimension. In technological perspective, hashing signifies the conversion of a string characters into a smaller value or key of fixed length that represents the original string.The purpose of hashing is to summarise and retrieve items in a database, as it is a quicker process to locate the object using the shorter key than to find it using the original value. Hashing finds its utility in many encryption algorithms as well (Park et al., 2012). All the techniques mentioned above are encryption techniques that are used for maintaining confidentiality and authentication. However, the public key encryption method is best suited to maintain confidentiality and authentication as it has two encryption keys involved in the process of encryption and decryption that uses a long set of prime numbers. This method increases the complexity level of encryption thereby enhancing the security of the confidential data. Denial-of-Service or DoS is a form of cyberattack that is carried out on any personal or organisational network management. The purpose of this type of attack generally is not to expose or retrieve any type of confidential information from the network; rather it is used to cause a great deal of issue for the users in a network. A DoS attack uses the technique of flooding a network with requests that increases the traffic of the network. This results in slow network connection and websites failing to load properly (Gunasekhar et al., 2014). In an organisation, a DoS attack can clod the network because of which, the employees in the organisation will be unable to access any web services to perform organisational operation. The DoS is effective in rendering the services of an organisation offline that can cause loss in business and negative publicity of the same. A DoS attack is almost impossible to stop occurring in an organisation, especially the advanced DDoS (Distributed Denial of S ervice) attack that is botnet-driven. It is almost impossible to identify an infected request from a legitimate request as these requests often use the same protocols or ports and may have resemblance to a legitimate request in respect to its content.However, some precautions can be taken to prevent DoS attacks in an organisation (Durcekova, Schwartz Shahmehri, 2012). The organisation can purchase a lot of bandwidth. It is an expensive process though but is the simplest process as well. Implementing a lot of bandwidth, the organisation will create a situation where the attacker will face difficulties in carrying out a successful DoS attack. This is because the more bandwidth a network has the more the attacker must clog by flooding with requests (Malekzadeh, Ghani Subramaniam, 2012). Another method of precaution is using DoS attack identification and detection techniques like wavelet-based signal analysis, activity profiling and change-point detection that will help to recognise a malicious traffic from a legitimate one. In such process, the first task is to determine the accurate moment of the attack. This is possible by using activity-profiling technique that helps to calculate the average rate of traffic and marks significant increase in the traffic rate.An organization that can detect a DoS attack can also determine the type of DoS attack that is going to be carried out on the organization (Fachkha et al., 2012). Another robust mechanism for the detection of a DoS attack is Change-Point Detection or Change-Point Monitoring (CPM) system.A CPM uses the inbuilt protocol behaviours for detecting a DoS attack. CPM is not dependent on traffic flow rates or specific applications as the protocol behaviours are identified exclusively by the specifications of the proto col and the service models of Internet applications (Tartakovsky, Polunchenko Sokolov, 2013). CPM is not sensitive to traffic patterns and sites as it relies on the non-parametric CUSUM method, thus resulting in a robust CPM, making it much more generally applicable and an easier deployment.CPM plays a dual role in detection of DoS attacks, the first mile CPM and the last mile CPM. As the first mile CPM has proximity to the sources of flooding, it alarms about the ongoing DoS attack and helps to reveal the source from which the flooding is being originated. The simplicity of CPM is due to its low computation overhead and statelessness (Tartakovsky, Nikiforov Basseville, 2014). The last and the most obvious method of precaution from DoS attacks is implementing strong and sophisticated firewall in the network along with other Network Security Software that may be able to detect or warn before the occurrence of a DoS attack in the organisation (Raiyn, 2014). Some rules are required to be followed while working in secure areas as the protection and privacy of the area should be of the utmost priority. The following is a list of some rules that is necessary to be followed: The organisation shall manage the activities of every individual who enter an important area such as computer rooms, control centres, data storage rooms and important server locations (Peltier, 2016). The organisation must prohibit access of any media that uses an external interface connection within a secret area without a prior legitimate approval provided by the accreditation authority (Peltier, 2016). The organisation should prohibit the access of any media that uses an external interface connection in a top-secret area without in possession of a written authorisation from the accreditation authority (Peltier, 2016). The areas that have special sensitive sectors should be designated with proper symbols and have tight security deployed in all entry and exit points that leads to the secure area (Peltier, 2016). The behaviour of the personnel on premises of restricted areas should be governed by formal policies or guidelines that should include prohibition of eating, drinking and smoking; rules regarding usage of devices that generate radio frequency such as cell phones near sensitive equipment and when can storage devices be used (Peltier, 2016). Methodologies regarding working in secure areas shall be properly designed and applied (Peltier, 2016). Secure working areas must have physical protection. Possible measures include facilitating the personnel with the knowledge of the operations inside a secure facility on a need-to-know basis; the operations in secure sectors should be supervised and vacant secure areas should be locked as well as checked periodically (Peltier, 2016). Only those personnel who have legitimate authorisation should be permitted access to places that stores sensitive information such as a computer room or a data storage room (Peltier, 2016). The computerised operations should be kept by the organisation in a secure area with access restriction. Unauthorised personnel must be denied access by the organisation with the use of restricted areas, security rooms and locked doors (Peltier, 2016). Restricted areas may be created for the protection of sensitive and confidential information in open areas during working shifts. The restricted areas must be clearly marked and any unauthorised access to these locations must be promptly challenged by the personnel who are working in the restricted area (Peltier, 2016). The organisation must limit controlled area access to only authorised personnel during criminal justice information processing times (Peltier, 2016). The organisations personnel policies should be obtained and reviewed to analyse and assess the methods and controls over recruiting new employees (Peltier, 2016). A procedure must be implemented that specifies about who can authorise personnel work in locations where ePHI might be accessed (Peltier, 2016). The trash bins that are used in an organisation can transform to a valuable information centre for industrial spies seeking company secrets to utilise them for benefits. Industrial competitors are always on the look-out for sensitive information of their rivals, which may drop in their lap in the form of a crumpled paper thrown away carelessly by an employee of the rival company into a trash bin that is rummaged and retrieved by an industrial spy in disguise of a sweeper (Benny, 2013). There are many instances of such incidents where an employee of an organisation threw away a paper containing sensitive company data carelessly into the wastebasket of the office that caused heavy loss to the company. Due to recent security conditions, every organisation is spending a fortune in cranking up the security measures. However, all the efforts are going to trash due to such insensitive acts. There is however, some procedure that can protect a trash bin of one company from becoming the winnin g trophy of its rival (Bhatti Alymenko, 2017). Paper Shredders are machines that can be used to destroy company documents completely that are not needed by the company instead of discarding them to the bin.This is a very effective process that will protect a company from losing any of its documents to the world even if it is not required by the company. There are some organisations like the Data Destruction Services Inc. in Boston run by Dick Hannon, who takes orders from organisations who wishes to destroy some of their documents and deploy vans equipped with paper shredder machines at their location to destroy the documents management (Bhatti Alymenko, 2017). To reduce the risk of desktop PC theft, individual desktop PCs in organisations can be securely locked onto their desktops with a cable, if there is something on the desk to wrap the cable around. In addition, each PC should have a login screen that requires a complex passcode and a screensaver so that an intruder can be restricted from unauthorised access and use to the system (Bhatti Alymenko, 2017). Intrusion Detection System of a firewall uses two types of filtering namely Deep Packet Inspection and Packet Stream Analysis. Deep Packet Inspection abbreviated as DPI is a method of packet filtering whose zone of operation is in the application layer of the Open Systems Interconnection (OSI) reference model. DPI makes it possible to locate, recognise, differentiate, reroute or block packets with particular code or data that typical packet filtering tools fail to identify as they are tasked to examine only packet headers. Communication Service providers use DPI to allocate the resources that are available to them to achieve a streamlined flow of traffic (Antonello et al., 2012). An example can be cited in support of the topic discussed above. A message is tagged as high priority that can be routed to its destination before the pending less important or low priority data packets that are involved in ordinary internet browsing. DPI can be utilised further for speeding up transfer of data to avoid P2P abuse, enhancing the experience of most subscribers by improving the performance of the network. Many security implications are there of using DPI as the technology enables to recognise the original source as well as the recipient of content that contains specific packets (Antonello et al., 2012). A packet stream are basically fragmented parts of a message or data that is broken down into small bits, each of which contains part of the complete information that is present in the whole packet. The packet is broken down in such a way that at the receiving end it can be reassembled to its original form and the information within the packet is not damaged (Sanders, 2017). The process of analysing a packet stream within a network for possible malicious contents or detection of intrusion is called packet stream analysis. It is a basic method of monitoring a network. Many network packet analyser-tools are there that monitor all the incoming and outgoing packets in a network link and capture these packets to inspect for any malicious traffic. These tools also provide reconstruction of session that helps to understand the exact problem of the network. Apart from the packet header, most of the network data is binary trash. A large amount of processing power is required to extract the true meaningful information out of a network session. It multiplies to an exponential rate if the data is encrypted. More analysis requires implementation of hardware, which in turn requires higher expense of cost. That is why a true network analysis is processing intensive and tough on the analyst (Sanders, 2017). References Agrawal, M., Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering, 4(5), 877. Antonello, R., Fernandes, S., Kamienski, C., Sadok, D., Kelner, J., GDor, I., ... Westholm, T. (2012). Deep packet inspection tools and techniques in commodity platforms: Challenges and trends. Journal of Network and Computer Applications, 35(6), 1863-1878. Benny, D. J. (2013). Industrial espionage: Developing a counterespionage program. Crc Press. Bhatti, H. J., Alymenko, A. (2017). A Literature Review: Industrial Espionage. Durcekova, V., Schwartz, L., Shahmehri, N. (2012, May). Sophisticated denial of service attacks aimed at application layer. In ELEKTRO, 2012 (pp. 55-60). IEEE. Fachkha, C., Bou-Harb, E., Boukhtouta, A., Dinh, S., Iqbal, F., Debbabi, M. (2012, October). Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on (pp. 1-8). IEEE. Gunasekhar, T., Rao, K. T., Saikiran, P., Lakshmi, P. S. (2014). A survey on denial of service attacks. Hofheinz, D., Jager, T. (2012, August). Tightly Secure Signatures and Public-Key Encryption. In Crypto (Vol. 7417, pp. 590-607). Hsu, S. T., Yang, C. C., Hwang, M. S. (2013). A Study of Public Key Encryption with Keyword Search. IJ Network Security, 15(2), 71-79. Jeeva, A. L., Palanisamy, D. V., Kanagaram, K. (2012). Comparative analysis of performance efficiency and security measures of some encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 2(3), 3033-3037. Malekzadeh, M., Ghani, A. A. A., Subramaniam, S. (2012). A new security model to prevent denial?of?service attacks and violation of availability in wireless networks. International Journal of Communication Systems, 25(7), 903-925. Park, P., Yoo, S., Choi, S. I., Park, J., Ryu, H. Y., Ryou, J. (2012). A Pseudo State-Based Distributed DoS Detection Mechanism Using Dynamic Hashing. In Computer Applications for Security, Control and System Engineering (pp. 22-29). Springer, Berlin, Heidelberg. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Raiyn, J. (2014). A survey of cyber attack detection strategies. International Journal of Security and Its Applications, 8(1), 247-256. Sanders, C. (2017). Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press. Stallings, W., Tahiliani, M. P. (2014). Cryptography and network security: principles and practice (Vol. 6). London: Pearson. Surya, E., Diviya, C. (2012). A Survey on Symmetric Key Encryption Algorithms. International Journal of Computer Science Communication Networks, 2(4), 475-477. Tartakovsky, A. G., Polunchenko, A. S., Sokolov, G. (2013). Efficient computer network anomaly detection by changepoint detection methods. IEEE Journal of Selected Topics in Signal Processing, 7(1), 4-11. Tartakovsky, A., Nikiforov, I., Basseville, M. (2014). Sequential analysis: Hypothesis testing and changepoint detection. CRC Press. Wee, H. (2012, May). Public Key Encryption against Related Key Attacks. In Public Key Cryptography (Vol. 7293, pp. 262-279).
Subscribe to:
Posts (Atom)