Wednesday, January 29, 2020

Information security Essay Example for Free

Information security Essay Most organizations today are adopting and integrating technologies in their production with an aim of improving production, efficiency, profitability and the competitive advantage in the market. This has been accelerated by the increasing globalization and innovation of new technologies which pose a major competitive threat to many organizations. Also, formulation of environmental standards as well as increased expectation on the standards and quality of goods and services by both the government and customers has also necessitated adoption of new technologies to ensure this is met. New technologies in use today like the web 2. 0 and also the new internet as well as wireless technologies have led to increased efficiencies as well as increased productivity for most organizations. However, despite the advantages which accrue from introduction and use of new technologies in organizations, they pose major security threats to an organization. Data hijack by criminals as well as terrorism threats are some of the challenges that organizations are facing during new technology implementation processes (Bazelon, Choi Canady, 2006). Security issues in regard to new technologies implementation in an organization Security is a top concern for most business since it may lead to destruction of a company’s reputation thus affecting the competitiveness of an entity. With increased globalization and increased terrorist threats, security risks have increased posing a major threat to most organizations. One of the major threats that companies face while implementing information technologies are the risk of losing or protecting sensitive data. Information technologies especially via internet and other wireless technologies are accessible globally which poses a major threat to an organization. Organizations hold private and sensitive information regarding their employees, production processes and also marketing strategies which are vital for competitive advantage. However, with technology implementation, and the dynamism in technology, such data may be accessed by unauthorized individuals causing a business great harm in terms of profitability. This also exposes the employees as well as an organization’s customers’ at risk of fraudulent activities via technologies. Information security experts insist that just like information networks operate or cross borders with no regard for the provincial and national boundaries, also security vulnerabilities and threats pass in the same way thus necessitating greater and stern security measures to ensure that the threats are minimized (Hinojosa, 2005). Another threat that organizations are facing is terrorist attacks and threats. Currently, there are many terrorist groups which operate globally and they employ high technologies to carry out their tasks and to harass businesses and employees as well as the customers. An increase in global terrorist organizations in the world that are connected via the new technologies poses a major security threats to most organizations in the world. Terrorists may not only be interested with soliciting the financial and production processes of an organization, but also the structural and day to days activities of an organization with an aim of identifying weak areas or points which could be used to attack an organization. This is made possible by new technologies which enable then to tamper the security measures taken by an organization to ensure that it is protected (Sussman, 2008). Phishing and data mining is also another information security risk that is faced by organizations during implementation of technologies in an organization. Phishing refers to the unauthorized use of personal information of another person which is obtained through networks. It also involves alteration of an individual’s computer software with an aim of obtaining the computer owner’s personal information by scrupulous individuals and for the purposes of defrauding the person or harming their reputation or career. With implementation of new technologies in an organization, the entity is enabled to sell its goods and services online and all the transactions are carried without having to meet the customer or the client. While making the payments, a client gives his private financial data depending on the mode of payment which he or she uses. Computer criminals have a way of tampering with or gaining access of such information which they can manipulate to make purchases while pretending to be the clients. The business thus faces a risk of being sued by a client on such grounds and for lack of adequate protection measures. This has increased the cost of implementing technology especially with different cases of security breach being reported today. Organizations are supposed to ensure that the private information of their clients and employees are well protected and that their privacy is upheld despite the cost this may involve (Ena, 2008). Risk of loss of important documents by an organization has also been a major security issue while implementing information technology. Apart from the risk of terrorist threats and phishing, an organization also faces the risk of losing vital information through dangerous programs such as the viruses which are transmitted via the internet and other networks. If such programs find their way to the computers and other technologies in a company, a company may risks losing most of its vital information as these programs corrupts the whole network system in an area. This could be dangerous for and organization as it may lead of reduced productivity, increased costs and reduced earnings (Blankespoor, 2005). With increased awareness of information security threats increasing in the world, the attackers have changed their tactics posing even a major threat to an organization. Most of the attackers are usually professional information technologists who invent new methods of accessing data from an organization despite the security measures taken. As mentioned earlier, technology is changing at a very high speed and so are the security threats to an organization. The dynamism of technology is a risk which cost organizations heavily as they try to keep pace with it. While implementing new technologies, organizations are also faced with the problem of testing the validity of the technology. Most of the cases involving security breach end up being the problem in an organization. IT companies exonerate themselves by arguing that lack of adequate security policies in an organization are the major causes of any cost that an organization may incur (Wallace, Lusthaus. Kim, 2005). Conclusion Information technology is a major strategy that has enabled most of the businesses to perform well in terms of growth and expansion. New technologies have been on high demand in the recent past especially as most organizations go global which necessitates networking. Technology improves the efficiency, effectiveness and the overall productivity of an entity. However, it poses major threats to the privacy of a company as well as its clients and employees. Stern security measures should be taken to ensure that technology implantation in an organization does not turn out to be more costly. This can be done though formulation of technology security policies and procedures to ensure privacy is upheld.

Tuesday, January 21, 2020

Henry V :: Chorus

In Henry V, the Chorus informs us before each act what happens and where the action takes place, notifies us if the play skips over certain periods of time. However, one of his main goals is to compensate for what the staging is unable to achieve, ask the audience to use their imagination, and try to see what cannot be shown on stage. If we read this speech, we can observe that everything the Chorus tells us can actually be summarized in a few sentences (The English fleet sails from Southampton and the siege of Harfleur begins by the English army. The ambassador returns with an offer from the French King: the hand of his daughter Katharine, with some dukedoms of little importance. The offer is rejected, and the the siege goes on†¦). However, the importance of the speech lies in something different- the approach and literary techniques (language, style, tone†¦) that Chorus uses to arouse our attention, suspend our disbelief and stimulate us to use our imagination. The Chorus does so very intelligently in its use of verbs as in â€Å"Suppose† (Henry V, Act 3, scene 1, line 3), â€Å"Play† (7), â€Å"behold† (7), â€Å"Hear† (9), etc. Such phrasing gives enormous energy to the speech and we feel encouraged to take part in the play and make the most out of it. The styl e is adjectival, as in the following line: â€Å"With silken streamers the young Phoebus [fanning].† (6) ; Imaginative, as when the Chorus compares ships at sea to â€Å"A city on th’inconstant billows dancing† (15). The speech also contributes to the heroic tone of the work which is highly patriotic and celebratory, and which, together with a lot of hyperbolic words, leads to creating an epic, exaggerated and almost mythical view of the whole military operation: â€Å"Work, work your thoughts, and therein see a siege: behold the ordnance on their carriages, with fatal mouths gaping on girded Harfleur.† (25-27). The "ordnance" on the "carriages" are compared to "fatal mouths" that turn towards Harfleur as the English army starts its siege of this French city. The description of these mouths that "gape" at Harfleur certainly help to exaggerate the power of Henry's army. Henry's fleet is described as â€Å"majestical.† (16). The Chorus is keen to pr esent the fleet as being powerful and numerous so as to exaggerate the military power of Henry.

Monday, January 13, 2020

Foreshadows and Suspense the Lottery

Many of the seemingly innocuous details throughout â€Å"The Lottery† foreshadow the violent conclusion. In the second paragraph, children put stones in their pockets and make piles of stones in the town square, which seems like innocent play until the stones’ true purpose becomes clear at the end of the story. Tessie’s late arrival at the lottery instantly sets her apart from the crowd, and the observation Mr. Summers makes—â€Å"Thought we were going to have to get on without you†Ã¢â‚¬â€is eerily prescient about Tessie’s fate. When Mr. Summers asks whether the Watson boy will draw for him and his mother, no reason is given for why Mr.Watson wouldn’t draw as all the other husbands and fathers do, which suggests that Mr. Watson may have been last year’s victim. Jackson builds suspense in â€Å"The Lottery† by relentlessly withholding explanation and does not reveal the true nature of the lottery until the first stone hit s Tessie’s head. We learn a lot about the lottery, including the elements of the tradition that have survived or been lost. We learn how important the lottery is to the villagers, particularly Old Man Warner. We go through the entire ritual, hearing names and watching the men approach the box to select their papers.But Jackson never tells us what the lottery is about, or mentions any kind of prize or purpose. She begins to reveal that something is awry when the lottery begins and the crowd grows nervous, and she intensifies the feeling when Tessie hysterically protests Bill’s â€Å"winning† selection. And she gives a slight clue when she says that the villagers â€Å"still remembered to use stones. † But not until the moment when a rock actually hits Tessie does Jackson show her hand completely. By withholding information until the last possible second, she builds the story’s suspense and creates a shocking, powerful conclusion.

Saturday, January 4, 2020

Rwandan Genocide of 1994 Essays - 2528 Words

The Rwandan Genocide of 1994 lasted only for a brief period and lasted for approximately a hundred days. During that time, an estimated amount of 800 000 people were slaughtered. Beginning on April of 1994, massacres were held on a daily basis with the intent to eliminate an ethnic group known as the Tutsi by another ethnic group known as the Hutus. This genocide was overlooked by the United Nations, and the superpowers of the time offered very little or no assistance at all to Rwanda. The civil unrest between the Hutus and the Tutsi has been in place since the Belgians segregated the two groups after being handed Rwanda after World War I. The Tutsis were favoured and placed above the Hutus and identity cards were distributed to†¦show more content†¦After World War I, the Belgians were given Rwanda and Burundi after the defeat of Germany. Despite their cultural similarities, which included language and geography, the Hutus and the Tutsi were given identity cards by the Belgi ans that marked their ethnic affiliation. The Belgians favoured the Tutsis and so they were privy to a much higher social status and were able to gain a decent education, which allowed them to get better jobs whereas the Hutus were often restricted to being farmers or servants. There was a deep cultural unbalance and the idea of favouritism and segregation led to unrest and discrimination against the Tutsis by the Hutus. Ethnic groups was divided by white people before leaving our countries after getting our independence saying that one of the part had more advantages over the other†¦. Like saying Tutsis were rich and Hutus just work for them in their farms as workers or grooms. That’s why they were seeking to revenge against Tutsis and so genocide to happen. After World War II, the Belgians had prepared to pull out of Rwanda, allowing it to gain independence. In 1959, the nationalist Party of the Hutu Emancipation Movement (PARMEHUTU) came to power and by this time, the Hutus held the majorityShow MoreRelatedThe Rwandan Genocide of 19941183 Words   |  5 PagesIn April of 1994 a terrible event took place, one where approximately one-million people were brutally murdered on the basis of their ethnicity or if they opposed the regime. (Uvin, 2003). This terrible event occurred in Rwanda, and it is known as the Rwandan Genocide. Genocide can be described as a one sided mass killing in which the state or other authority intends to destroy a group, as that group and membership in it are identified by the perpetrator. (Hintjens, 1999) This is exactly whatRead MoreThe Rwandan Genocide Of 1994 Effect The Hutu And Tutsi1998 Words   |  8 Pagesinvestigation will seek to answer the question â€Å"How Did the Rwandan Genocide of 1994 Effec t the Hutu and Tutsi?† I chose this question because last year I read the book Left to Tell and I wanted to know more about the two different types of groups, the Hutus and the Tutsis. This was and still is an important topic because many died that day just for belonging to a specific group. This topic shows how much our world has changed since 1994. In order to answer my historical investigation question, IRead MoreThe Rwandan Genocide Began On April 6Th 1994 Culminating1370 Words   |  6 PagesThe Rwandan Genocide began on April 6th 1994 culminating in the killing of an estimated 800,000 Hutus and their sympathizers. After it became apparent that the Rwandan government was not willing or able to protect it s citizens, the question became why did the international community do nothing to intervene. Rwandan citizens’ lived under the premise, that their rights are protected under UN accords and treaties. The Genocide Convention of 1948, outlined the responsibilities of the participatingRead MoreRelationship Between Rwanda, Israels Perceptions Of The 1994 Rwandan Genocide1249 Words   |  5 PagesBeginning in 2008, my research focuses mostly on Rwanda’s political, militarily, economic reconstruction since the 1994 Rwandan Genocide. This research has led to a greater exploration of regional dynamics between other African Great Lakes region nations. During my various periods living within Rwanda, I have had the opportunity to perform independent research and analysis on the nation’s political, military, agricultural-focused development, religious and social history and presence. This researchRead MoreThe Rwanda Of The Rwandan Defence Force904 Words   |  4 Pageshistory, perpetrators, victims and bystanders with difficult answers on how to solve them. The p ost-genocide nation of Rwanda witnessed one of the most horrific events a nation could experience, genocide. However, it has rebuilt itself to become an example nation for transitional justice, political stability and economic development. Rwanda’s military capabilities within the institute of the Rwandan Defence Force (RDF) are well known for its organisation capability and effectiveness in compact. InRead MoreWhat Was Happening Of Your Town?1094 Words   |  5 Pagesin your town? I was born on April 13, 1994, in a small town in the USA. Today, I am a college going student, busy with my studies and other activities. However, during a history lesson, something made me ponder as to what the world would have been like in the year I was born or the month. I listen regularly to the news, but those headlines are forgotten by the end of the day. I just wondered what my city or town or the country was like in the year 1994. I was thinking about going back by twoRead MoreRe Writing History And Rwandan Identity Through The Kigali Genocide Memorial Centre Essay1473 Words   |  6 PagesRe-writing History and Rwandan Identity Through the Kigali Genocide Memorial Centre In April 2004, the Kigali Genocide Memorial Centre opened to commemorate the tenth anniversary of the Rwandan Genocide. Peacefully overlooking the city of Kigali, the Centre seeks to be a place of remembrance and honor for survivors as well as a step towards creating Rwanda’s post-genocide identity. Rwanda has sought to find its place politically, socially, and in memory through this westernized approach to remembranceRead MoreInternational Community Is Culpable For The Rwandan Genocide1376 Words   |  6 PagesFrom April to June 1994, in a mere 100 days, approximately 800,000 Tutsi and moderate Hutu were murdered during the Rwandan genocide (Destexhe, 1994). The international community failed to prevent or stop this slaughter. Considering the horrific nature of this genocide and the vast number of victims, there is a question whether the international community is culpable for the Rwandan genocide; specifically, the role of its key players, the US, the UN, France and Belg ium. I will argue that the internationalRead MoreRwand The Rwandan Genocide1296 Words   |  6 Pages The Rwandan genocide was the killing of 800,000 people in just 100 days. The Rwandan genocide took place in 1994. During this time Rwanda was a small country with a mostly agricultural economy. Although it is small it had one of the largest populations. In 1994 Rwanda was made up of three different ethnic groups. The Hutu made of 85% of the Rwandan population. The Tutsi’s made of 14% of the population and was the minority. The Twa was a small Pygmy group that made up 1% of the population (unitedhumanrightsRead MoreInformative Speech on Rwandan Genocide Outline1300 Words   |  6 PagesBen Johnson Intro to Comm. 1320-04 11/8/12 Rwandan Genocide General Purpose: To Inform Specific Purpose: To share with the class that the Rwandan Genocide was a brutal genocide that most people know little about. Thesis: The Rwandan Genocide is one of the lesser known, quickest, and most inhumane genocides this world has ever seen, and it is still affecting the people of Rwanda till this day. Organizational Pattern: Topical Introduction I. Attention Getter: