Friday, December 27, 2019

“Ships at a Distance” Dreams in Their Eyes Were Watching...

Zora Neale Hurston opens Their Eyes Were Watching God with an eloquent metaphor regarding dreams: â€Å"Ships at a distance have every man’s wish on board. For some they come in with the tide. For others, they sail forever on the horizon, never out of sight, never landing until the watcher turns his eyes away in resignation, his dreams mocked to death by Time (Hurston 1).† Hurston describes here how some dreams are achieved with time while others lurk out of reach until the dreamer gives up. Janie Crawford, protagonist of Their Eyes Were Watching God, encounters numerous ambitions throughout her life, mainly concerning a desire to somehow achieve something in life, and to not just go through the motions. While Janie’s dreams and my own do not†¦show more content†¦The pear tree is her inspiration and her first true desire. She longs to bud and blossom, like the tree, and cannot wait to discover herself and all the wonders of the world. Another desire of young Janie is to find true, passionate love in a relationship. Returning to the metaphor of the pear tree, Janie says to her Grandma, â€Å"‘Ah wants things sweet wid mah marriage lak when you sit under a pear tree and think’† (Hurston 24). Janie dreams of a peaceful, pleasant, and comfortable love in her marriage, similar to the quiet bliss of sitting in the shade of a blossoming pear tree. In her article, Kubitschek also points out Darwin Turner’s understanding that â€Å"‘All Janie wants is to love, be loved, and to share the life of her man. But . . . she must first find a man wise enough to let her be whatever kind of woman she wants to be’† (qtd. in Kubitschek 109). Unfortunately, this love and freedom was not acquired in Janie’s first marriage. Despite her hope that feelings of true love would develop with her first husband Logan Killicks, â€Å"she knew now that marriage did not make love. Janie’ s first dream was dead, so she became a woman† (Hurston 25). Discontent with lack of passion in her first marriage, Janie decides to abandon her dream of finding love with Logan and does not hesitate to run away with Jody Starks when the situation presents itself. Deborah Clarke comments on this change in heart, writing, â€Å"Janie thus gives up aShow MoreRelatedTheir Eyes Were Watching By Zora Hurston1172 Words   |  5 PagesThe book their eyes were watching was written by Zora Hurston, and she tells the life story of a girl named Janie. It starts off with a metaphor explaining that women are the type to chase their dreams and even when it seems they can never accomplish it they never lose sight of it. Men on the other type to have dreams but instead of chasing like how Zora says women do they want their dream to come to them. The book is a frame narrative being and told by Zora but switches from Janie s point of viewRead MoreA Womens Search for Identity in Zora Neale H urston’s Their Eyes Were Watching God729 Words   |  3 Pagesâ€Å"It’s uh known fact, Pheoby, you got tuh go there tuh know there†¦Ã¢â‚¬  (Hurston 192). The theme of identity can be seen throughout Zora Neale Hurston’s Their Eyes Were Watching God, of a story of a women’s journey for self-identification. Through symbolic imagery, such as the pear tree, Janie’s hair, and the horizon, Hurston ultimately shows a women’s quest for her identity. As a young teenager, Janie becomes infatuated with the idea of an idealistic romance: â€Å"She saw a dust-bearing bee sink into theRead MoreGender Roles in Their Eyes Were Watching God1087 Words   |  5 Pagesï » ¿Gender Roles in Hurston’s Their Eyes Were Watching God During the 1900’s, women, specifically black women, were considered to be property of men in the United States, especially down south, in states such as Florida and Georgia. Legally, women had no voice. For example, if a woman was abused by her husband, the court system would not acknowledge it even if it did really happen. In the article â€Å"Sexism in the Early 1900’s†, Becca Woltemath states that â€Å"†¦a woman’s job is to take care of the houseRead MoreHow One Fulfills A Dream?1570 Words   |  7 PagesHow one fulfills a dream is a contested and unsettled concept. Is it based on luck, skill, chance, or something else entirely? Attributing a dream’s success to outside forces, such as luck and chance, creates unambitious tendencies. On the other hand, when a person has an internal locus of control, a belief that he or she can influence their success themselves, they take their life into their own hands and control their own destiny. In multiple studies, it has been shown that those with an internalRead MoreTheir Eyes Were Watching God Summer Assignment1071 Words   |  5 Pages Their Eyes Were Watching God Summer Assignment Passage: â€Å"Listen, Sam, if it was nature, nobody wouldn’t have tuh look out for babies touchin’ stoves, would they? ’Cause dey just naturally wouldn’t touch it. But dey sho will. So it’s caution.† â€Å"Naw it ain’t, it’s nature, cause nature makes caution. It’s de strongest thing dat God ever made, now. Fact is it’s de onliest thing God every made. He made nature and nature made everything else.†(Hurston 64-65) Journal Entry: (R) This is a passageRead MoreThe Horizon of Possibility in Their Eyes Were Watching God by Hurston 595 Words   |  3 PagesTheir Eyes Were Watching God, Hurston describes the horizon as possibilities and opportunities. When the story starts out Janie’s perception of the horizon changes first from desire for love to the need of love, and ultimately the feeling of contentment towards love to show Janie maturing throughout the novel. Firstly, Janie views the horizon as an opportunity for something great to happen in her life. For example, in the beginning paragraph in the novel, it illustrates how harboring ships give peopleRead MoreThe Great Gatsby By F. Scott B. Fitzgerald1635 Words   |  7 Pagesprotagonist in Their Eyes Were Watching God to the use of first person narration of a secondary character in The Great Gatsby. What is the effect of having Nick tell Gatsby’s story versus Janie telling her own? Is Nick a reliable narrator? Is Janie? a While Janie tells her own perspective of her American Dream, Nick is under the impression of admiration towards Gatsby’s American Dream. 3. How are women able to express power in each novel? a The women in both novels were able to express powerRead MoreTheir Eyes Were Watching God : Gender Differences1584 Words   |  7 PagesKhealsea Elkins Professor Katherine Chiles ENG AFST 233: Major Black Writers 14 October 2014 Their Eyes Were Watching God: Gender Differences Zora Neale Hurston is considered one of the most unsurpassed writers of twentieth-century African-American literature. Published in 1937, Zora Neale Hurston’s Their Eyes Were Watching God depicts the life of Janie Crawford, an African-American woman, who is in search of true love and ultimately her true self. In the novel, Janie shows us that love comesRead MoreNot All Dreams Come True in Their Eyes Were Watching God by Zora Neale Hurston601 Words   |  3 Pages At one point in every persons life, they have a dream. However, not all hopes and dreams come true. In the novel, Their Eyes Were Watching God by Zora Neale Hurston, the protagonist, Janie Crawford, experiences the deaths of some of her dreams, but she also experiences the success of one. The deaths of these dreams change her opinion of men and caused her to become unsure of love. â€Å"Ships at a distance have every man’s wish on board. For some they come in with the tide...Then they act and do thingsRead MoreTheir Eyes Were Watching God By Zora Neale Hurston1459 Words   |  6 Pages 1. In â€Å"Their Eyes Were Watching God† by Zora Neale Hurston, the main character Janie Crawford experiences many different kinds of love. Throughout her childhood, Janie experienced protective love from her grandmother. When Janie reached the ripe age of 16, her grandmother wanted her to get married. Because of this, she ended up marrying her first husband, Logan Killicks. Just like she did when she was with her grandmother, Janie was the receiver of protective love from her husband. The next type

Thursday, December 19, 2019

The Intermediate Target Of Monetary Policy - 1961 Words

?The inability to control the money supply has left central banks with no choice but to pursue price stability through the manipulation of short-term interest rates.? INTRODUCTION The intermediate target of monetary policy is a core part of the entire operation of monetary policy, the monetary authorities to observe the effect of monetary policy significance. Money supply as monetary policy intermediate variables, their effectiveness has been controversial features of theorists. Whether short-term interest rates through the operation by a central bank is aimed to make a price stability? It will be discussed in this paper. According to the given topic, there are some definitions and questions have to make clear in advance: What is Monetary Policy? How to control the money supply? How to manipulation interest rates? What impact it will take? CONTENT In order to promote full employment, price stability and economic growth a macro-economic management, the government regulates the level of aggregate demand by adjusting the interest rates is the meaning of the monetary policy. Money supply can be controlled by monetary policy instruments via three prime ways. The first method is statutory deposit reserve ratio.In the form of laws commercial banks and other financial institutions will be paid a portion of their deposits in the central bank as a reserve ratio. Adjust the statutory deposit reserve ratio of commercial banks can quickly change multiple deposit expansion andShow MoreRelatedFederal Reserve Act Overview Essays1229 Words   |  5 PagesFEDERAL RESERVE ACT OVERVIEW The Federal Reserve Act States that, The Board of Governors of the Federal Reserve System and the Federal Open Market Committee shall maintain long run growth of the monetary and credit aggregates commensurate with the economy’s long run potential to increase production, so as to promote effectively the goals of maximum employment, stable prices, and moderate long-term interest rates. (Federal Government, 1977) After several years of financial turmoil and panics,Read MoreThe Best Economic Environment for Inflation Targeting1113 Words   |  5 Pagesdefinition of inflation targeting (IT). It is a monetary policy strategy intended to achieve price stability within a specific range (Mishkin,2000).As is concisely demonstrated by Mishkin, IT â€Å"establishes a transparent and credible commitment† to the precision of the future â€Å"numerical objective†(Mishkin,2008).Nonetheless, it is not a prudential policy. It is prone to encounter the predicament of â€Å"long and variable lags† of â€Å"implementing and monitoring† the policy (Svensson, 1996, p.2). Under current circumstancesRead MoreNotes On Monetary And Monetary Policy Essay1525 Words   |  7 Pages FROM MONETARY TARGETING TO INFLATION TARGETING BY DAVID EYO USANG 138581 List of Abbreviations CB Central Bank ECB European central bank FEDS The federal reserves MP Monetary Policy IT Inflation TargetingRead MoreCentral Bank : Monetary Policy1178 Words   |  5 Pagescentury, central bankers conducted monetary policy by relying on intermediate targets such as monetary aggregates and exchange rates. Until the 1970s, central banks used a currency peg, which linked the value of the domestic currency to the value of another currency, usually of a low-inflation country. But this approach meant that the country’s monetary policy was tied to the country to which it pegged, restraining the central bank’s ability to adapt their policy to shocks such supply shocks or changesRead MoreMonetary Policy of Bangladesh1674 Words   |  7 PagesMonetary Police Monetary policy is the term used by economists to describe ways of managing the supply of money in an economy. Monetary Policy is the management of money supply and interest rates by central bank to influence prices and employment for  achieving the objectives of general economic policy. Monetary policy works through expansion or contraction of investment and consumption expenditure. According to Paul Einzig â€Å"Monetary policy includes all monetary decisions and measures irrespectiveRead MoreInflation Targeting Is A Monetary Policy Framework That1639 Words   |  7 PagesInflation targeting is a monetary policy framework that commits the central bank to achieving low and stable inflation. Inflation targeting is a long-run goal for monetary policy. It was implemented due to the poor performance of exchange rate and monetary targeting. The central bank has an explicit numerical target for inflation rate, for the medium term and announces it to public which is around 2% in the UK. Monetary policy supports the long term economy growth by maintaining the price stabilityRead MoreMonetary Policy in the United States Essay738 Words   |  3 PagesMonetary Policy in the United States 1. Identify at least three problems facing the FED in achieving its goals of monetary policy and give your recommendations on how to deal with each of the problems you list. Inflation presents a problem for the FED achieving it’s goal of price stability. Inflation is unavoidable as far as the natural progression of an economy is concerned. Supply and demand also affect inflation. While the FED cannot control supply and demand of a product, I would suggest thatRead MoreInterest Rates : The Core Of The Monetary Policy1404 Words   |  6 PagesInterest rates are considered to be the core of the monetary policy set by economists and policy makers and that is applied by central banks to achieve certain economic objects regarding measures like inflation and output. In other words, interest rates are just means to influence dimensions of macroeconomic activity and central banks usually do not have any inherent preference for one interest rate level versus another. Empirical literature has revealed that changes in the supply of bank reservesRead MoreCredibility of an Inflation-Targeting Regime1377 Words   |  6 PagesMishkins view (2011) before the rec ent crisis, inflation targeting was the standard framework for monetary policy with it being seen as highly successful in OECD countries, with low inflation and low variability of inflation. However the recent crisis not only crushed economic activity, creating the most severe world-wide economic contraction since the Great Depression, but it also seemed to destroy confidence in the ability of central bankers to effectively manage the economy. As a result centralRead MoreHow Does Cracks Appear Within The Fomc s Unity Essay1606 Words   |  7 Pagesspeech in late-August that the case for a higher policy rate had recently strengthened, Fed Chair Yellen has flip-flopped and sided with the dovish members of the Federal Open Market Committee (FOMC). Her credibility as an effective communicator for the entire FOMC has, therefore, been compromised. Additionally, there are now clear signs of rising dissent amongst FOMC members, something which financial markets will have noted. The 20-21 S eptember policy meeting released updated economic and federal

Wednesday, December 11, 2019

Security and Privacy Risks HR Database-Free-Samples-Myassignment

Question: Discuss about the various security and privacy risks and threats that are associated with the conventional HR database and the cloud based approaches. Answer: Introduction: The Department of Administrative Services (DAS) is used to provide public services to the other department s present in the Australian state government. The services that are provided include the personnel management and HR, management of contract tendering, payroll, procurement and contractor management. The data centre of the department is responsible for providing such services. This report discusses about the approach that is being made by the DAS. This approach is the Shared Services Approach. The report also includes the securities and the privacy issues that are associated by adopting the various intended requirements. The report also covers the identity risks that can be associated with the approach. In addition, the risks of the provider of such services along with the sensitivity in data are also included in the report. Discussion: The main concept to be applied is the Shared Services approach. The main idea of this approach is to centralize the services that are being provided by the DAS. These services are now been made to be provided to the whole government. The requirements of this approach are the need of different departments of the government to migrate their resources to the central server. The departments who were intending their data and resources for their users now need to upload the resources to the central servers to incorporate the idea of shared services. This migration will be done on the DAS central database. After the migration of the data and resources, the DAS will be responsible for sharing the gathered resources among all the present departments of the government. This approach is further strengthened by the presence of a government policy that requires the presence of incorporation of cloud computing architecture for the updating the services present. The payroll of the DAS will b incorp orated in the COTS (Commercial off the Shelf) application that will help in managing the payroll related services directly from the cloud. The DAS intranet will also be incorporated in to the Microsoft SharePoint PaaS to provide the services associated with the intranet to all the departments of the government. To meet the intended outcomes, the DAS has decided to adopt certain services to help facilitate the service procurement. Firstly, the DAS is responsible for purchasing a HR and personnel management application from an US based company. The main idea is to get Software as a service (SaaS) model. The application software is supposed to include the HR management and the personnel management application embedded on it. To apply this, the provider of the application has informed the DAS about their main database situated in Dublin, Ireland. Along with the HR and personnel management, the DAS will also acquire Contractor management application software to help visualize and manage the contractor that is being associated in the DAS. Security of employee data: Risks and threats in the in house HR database of the DAS: The in house of the HR department is subjected to many threats and risks. The traditional database grants many privileges in case of access and this invites many forms of risks and threats to the data and resource involved. The first risk to the HR database is the excessive or misuse of privileges granted (Ted et al., 2013). When employees are given access to the whole system, they may cause damage depending on the intentions of the employee involved. For example, a banker with full access to the employee savings account may change the data of any other employee to create a nuisance in the flow of operation. In addition, when an employee is terminated, the access to the information remains and due to the change in emotional stability, the access of such data can create problems by hampering the operation of the company or organization involved. This unnecessary risk arises due to the acquisitions of full access to the database involved. The more privilege given to an employee, the mo re vulnerable and the more prone to attacks the system gets. Risks and threats are also provided when an unauthorized user tries to get access to the system by attacking the system (Aloul et al., 2012). This is termed as a cyber attack. The HR database is the traditional one and for accessing this in an unauthorized process, the SQL injection attack is used. This attack gives the rogue user access to the entire database and crucial information is unethically accessed using this process. This is also another threat as it may affect the security related aspects of the employees. Malware is also another form of unauthorized access and the infected system is not aware of the state of it. The employees or users still work on the infected computer and their information is unethically accessed. This is also another risk to the employee data as the security and privacy of the data and resources are hampered. The more information a data centre possesses, the more vulnerable and the more prone to attacks the system gets. The transactions that are ongoing in any company or organization involved must be recorded automatically in the database servers. The failure to comply with such process may lead to problems to be associated with the organizations as well as the employees concerned (Arasu et al., 2013). For example, the transactions of one month for salary might not be recorded and the database may show that the employees have their salaries even in the next month and might not avail for the salary acquisition. This may lead to employee related problems. Organizations or companies with poor auditing mechanism face difficulties in streamlining their operations. As, a result the companies or organizations involved turn to third party providers to give access to system that helps in auditing. However, the most important thing to consider is the user interface and detailed mechanism. The detailed mechanism of the third party processes do not consider all the detailed transactions and thus fail to store a ll the information in the database (Jeun, Lee Won, 2012). Moreover, the software may use different platforms like the DB2 and the MS-SQL logs, which are not compatible with the organizational structure. This also imposes another constraint in the process of operation and affects the security and operation of the concerned individuals. Employee data is also hampered during security breaches for the backup disks in the system. As the backup data is always unprotected, the breach to get such data is always prominent (Moore, Spink Lipp, 2012). The information present in the hacked database affects the concerned resource of the organization or companies involved or the employees concerned. The more information a data centre possesses, the more vulnerable and the more prone to attacks the system gets. Risks and threats after migration to SaaS application: Security is a main concern which needs considering even after the incorporation of a new project. Though the SaaS architecture is a new model, which is being used by many business organizations or companies, the risks and threats associated with it are always considered (Chou, 2013). The risks are due to the presence of integration of the information in its internal data center. The more information a data centre possesses, the more vulnerable and the more prone to attacks the system gets. As the step to integration of information and resources to the SaaS needs the access of such information to the third-party service providers, the question for access and consistency always remains the same (Hussein Khalid, 2016). This is the reason for employee and company problems regarding who gets the access to their information. Another risk that is present due to the presence of SaaS application is the instability due to unavailability of the providers. As the services provided by the SaaS applications are great, many companies and organizations are adopting the concept (Alani, 2014). This has made a need for competition in the market among the providers of such services. However, not all companies can take such investments and this creates problem in the competition, which may result in loss of business of some providers. It may happen sometimes that the services taken from the provider are no longer available due to their unavailability. The problem for employee data as well as organizational resource hampering is the main thing affected by such risks. This risk is to be considered before adoption of such services and the company needs to consider their policies of mitigating such problems. Transparency is a concern among the organization accessing the application services from the third-part vendors. The providers are often very secretive about their operation and assure the clients about the services that are being provided. This is the reason of developing distrust in the relationship among the providers and the clients (Lee, 2012). This results in less data to be shared to them and creates vulnerabilities in security regarding the employee information or organizational resources. Though the providers have reason to believe that hiding the information about their centers can help in minimizing the risks associated with the disclosure of information, the question of transparency still lies in the relationship. Identity theft is another aspect, which requires security to be implemented. The providers of the services require payment for providing the services. This is done by taking the credit card information and then the payment is done. The risk it implies is still an ethical issue among many users. The unethical providers are to be recognized before passing on the information of payment related services to them as the use of this information can be used for doing wrong things (Prasanth, 2012). The employees associated with the adoption of such services may pass the payment information before researching about the vendors and unethical doings can be caused by that. This is termed as identity theft. In addition, the information shared with the application providers are not in control of the individuals whose information is passed (Agrawal, El Abbadi Wang, 2013). This results in unease and absence in mind as the employee concerned is directly impacted in case of any actions taken that affects their security and privacy. Assessment of resulting Security of Employee Data S.No Security Threat/Risk Description Likelihood Impact Priority Preventive Actions Contingency Plans Student 1 1. Excessive or misuse of privileges granted L VH M 1. Review of privileges 2. Daily check for user entry 1. Backup of data 2. Cross-checking by higher authorities 2. Cyber attack VH VH VH Antivirus presence Locking of data to prevent access 3. Malware H H H Presence of antivirus Locking of data to prevent access Student 2 4. Automatic recordings of transaction in the database H M M Better infrastructure Backup of the data present 5. Poor auditing mechanism M H H Better mechanisms for auditing 6. Security breaches in backup disks H VH VH Reviewing the security protocols Locks in the disc with encrypted password Existing security threats to Employee data Likelihood - VL, L,M, H, VH Impact- - VL, L,M, H, VH Priority- - VL, L, M,H, VH S.No New Security Threat/Risk of employee data Description (after moving to Saas) Likelihood Impact Priority Preventive Actions Contingency Plans Student 1 1. Access and consistency VH L L 1. Reviewing the terms and conditions 2. Need to communicate with the service provider 1. Legal actions to be taken in case of problems 2. Instability due to unavailability of the providers M VH H Better research regarding the service providers Backup of the system Student 2 3. Transparency VH M L Terms and conditions reviewing 4. Identity theft VL VH H Use of different payment account with little balance Legal actions 5. Loss of control of individual data H L L Better review of the terms and conditions New Security Threat to Employee data(after moving to SaaS) Likelihood - VL, L, M, H, VH Impact- - VL, L, M, H, VH Priority- - VL, L, M, H, VH Severity of risk and threat to security employee data Probability Very High Accessibility and consistency Transparency Cyber attack High Loss of control in user data Transaction recording Malware Security breach in backup disc Medium Poor auditing Unavailability of providers Low Misuse of user privileges Very Low Identity theft Severity Very Low Low Medium High Very High Privacy of employee data: Risks and threats in the privacy of the data in the in house HR database: The privacy of data is an important aspect that is the main concern related to every decision taken for doing any project. The information contained in any organization or company is deemed private or public depending upon their credibility (WANG MENG, 2014). The private information is to be safeguarded and access to such information should not be given to the unauthorized users. However, many risks and threats are associated with the privacy of such data. The threats to the privacy of data in the database include the integrity loss. The changes in the database must not hamper the information present in the database. Any changes like the insertion or deletion must not be done without fully backing up the data (Ziegeldorf, Morchon Wehrle, 2014). The loss of integrity is made by many deliberate or accidental actions. The loss of data needs to be modified as the use of changed data may lead to inaccurate results and fraud detection, which might affect the performance of the serviced, involved. The availability of the database is a major concern, as all the information pertaining to the services is stored in the system (Raschke, Krishen Kachroo, 2014). Database availability means making certain parameters available to the employees or other legitimate software. Protection of confidential information is a great concern for the HR database. The protection of data and information from unauthorized access is termed ad confidentiality of data. The unethical and unauthorized access to the system can lead to the violation of the privacy of data (Basharat Azam Muzaffar, 2012). This unprotected, unauthorized and accidental disclosure of data and information can lead to certain problems ranging from small-scale data breach to legal issues against the company or organization involved. The more information a data centre possesses, the more vulnerable and the more prone to attacks the system gets. Risks and threats after the migration to SaaS applications: After the hosting of the data by the client, the provider needs to assure the clients regarding the associated security and the privacy of the components (Theoharidou et al., 2013). The provider also needs to assure the clients regarding the unauthorized access prevention to their information. This is included in the security and privacy conditions of the associated providers. The privacy regarding the integrity of the data is to be considered. The application provider needs to provide the consistency of applications and the type of information and resources that are being uploaded in the cloud based application (Chen Zhao, 2012). As the client paying for the services has the right of knowing the information, the service provider needs to tell their client about the composition of the data and the ongoing processes for the application. The right to know the information is also being leveraged by the clients. The clients need to know the place of the data center where the information of the clients is being stored. However, the information for the location of the data centers is not always provided to the clients (Kalloniatis et al., 2014). In addition, the service provider works by using the resources available of other providers who have collaborated with them. This causes a risk to privacy as the client involved needs to know the location of the data center involved with storing the information. Assessment of Privacy of Employee Data: Existing privacy threats and risks to the privacy of employee data S.No Privacy Threat/Risk Description (Employee data) Likelihood (Probability) Impact (Severity) Priority Preventive Actions Contingency Plans Student 1 1. Integrity loss M H H 1. Backup of data 2. Protection of database 1. Recovery 2. Security protocol review 2. Database availability L H VH Student 2 3. Protection of confidential information VH VH VH S.No New Privacy Threat/Risk of employee data Description (after moving to Saas) Likelihood Impact Priority Preventive Actions Contingency Plans Student 1 1. Consistency of applications H M H 1. Terms and condition review 2. Researching of the provider before application 1. Backing up of data 2. Security protocol review Student 2 2. Location of the data centres L L VH 3. Unauthorized access prevention VH H VH New Security Threat to Employee data(after moving to SaaS) Likelihood - VL, L, M, H, VH Impact- - VL, L, M, H, VH Priority- - VL, L, M, H, VH Severity of risk and threat to privacy employee data Probability Very High Unauthorized access prevention Protection of confidential information High Consistency of application Medium Integrity loss Low Location of data centers Database availability Very Low Severity Very Low Low Medium High Very High Fig: Solution architecture in privacy and security (Source: created by the author) Digital identity issues: When a company or organization decides to make a change by adopting the cloud-based architecture, the issues that will be faced are to be considered before facing the problems. The authorities need to know the certain requirements like the requirements of various passwords and URLs for each of the application to be accessed by each of its users. The employees working in a SaaS service needs to identify the various passwords and the various URLs associated with each application that they are involved (Grover, 2014). This creates a problem of identity related issues in the minds of the employees concerned. Incase of new employees, the company provides access to the applications that are needed by the employees. The access to the application is often given one at a time by the various applications. This is done by the administrator of the system and not by an IT professional. The employees are required authorized access to the system for functioning. It happens that sometimes the employees may need the use of some other application for doing their work. The access is not given to them without proper identification. This creates an issue of identity and the administrator is required to give temporary access to the application. The access to the application is provided in the cloud computing architecture. This enables the remote access of the systems. However, due such access new integrations and new passwords with URLs are to be made in to the system. This causes a hindrance to the employee accessing the system. As the cloud applications enable the integrations of the organizational resources in the cloud, the need for administration is given to one department (Jang-Jaccard Nepal, 2014). For example, in a particular company the cloud access is administered by the IT department. This necessitates the need for the sales department to check on their data and thus frees up their data. This creates a problem as the administration rights, centralized data is viewed by the IT department, and this creates the problem of identity, as every time the information is to be accessed, the IT operation needs to provide the identification URLs. Provider solution issues: To meet the intended outcomes, the DAS has decided to adopt certain services to help facilitate the service procurement. Firstly, the DAS is responsible for purchasing a HR and personnel management application from an US based company. The main idea is to get Software as a service (SaaS) model. The application software is supposed to include the HR management and the personnel management application embedded on it. To apply this, the provider of the application has informed the DAS about their main database situated in Dublin, Ireland. The operations regarding the processing, maintenance and storage of data are to be done from Bangalore. The service provider has advised the employees of the clients that the access to the system and their performance will be controlled by a link included in the intranet of the DAS. The employees will be allocated a digital identification, which will be used to provide authenticated access in the performance and HR system. This ID will be generated by the individual department involved. The risks discussed above in the report are not mentioned in the provided solutions and thus the DAS needs to review the terms and conditions of the proposals and apply for contract accordingly. The issues with digital identities are still present, as the employees are needed to get authorized access to the system via digital identification. Along with the HR and personnel management, the DAS will also acquire Contractor management application software to help visualize and manage the contractor that is being associated in the DAS. The application provider is a German based company and they have said that the database of the provider is located in Heidelberg, Germany. However, the maintenance and operations will be done from the laboratory of the service provider located in Walldorf, Germany. However, the data that is being processed is not managed by the service provider. The DAS is responsible for ensuring the correctness and efficiency of the data that is being uploaded. The data is supposed to be uploaded via a secure channel. The employees associated with the DAS will enter their information credentials in to the application service via a secured URL that will be provided by the application provider. Although the application provider addresses the risk of providing individual data access to the client and the employ ees involved, the application provider is not concerned with the correctness and the security of the data that will be uploaded and this is a place for concern in the DAS. In case of any hindrances or grave situations, the service provider has to be notified by the client for all the required assessment. Data sensitivity and jurisdiction: Data sensitivity is defined as the protection of those types of data that requires the non-disclosure from unauthorized access. The access to these types of sensitive data should be protected and safeguarded for various reasons like ethical and privacy related reasons (Gampala, Inuganti Muppidi, 2012). The sensitive information consists of all data that includes: Personal information (defined by North Carolina Identity Theft Protection Act, 2005) Health information protection (defined by Health Insurance Portability and Accountability Act, 1996) Educational records of the students (Family Education Rights and Privacy Act) Information of customer record (Gramm Leach Bliley Act) Credentials of payment (defined by Payment Card Industry Data Security Standards), Confidential data of personnel (State Personnel Act) Confidential information (North Carolina Public Records Act) These jurisdictions are in compliance to the international security standards that affects the information on a global level. Many international agencies are concerned with the protection of cloud-enabled services among the clients and their providers. The International Telecommunications Union and the Internet Engineering are directing their activities for specifying the protocols of the functions associated with the cloud computing services (Martini, Choo, 2012). The sensitivity of data is being undertaken by various agencies in the Australian government such as the Australian Government Information Management office and the Australian Computer Society. The issues relating to the data sensitivity are the unauthorized access to the system that is being implemented by the DAS. The sensitive information as discussed above must be followed and access to such information must not be given without the presence of identification and authorization. The DAS system implementation should also comply with the various jurisdictions that are also given in the report. These jurisdictions are to be followed to avoid unnecessary risks and threats as more information present in the system, the more vulnerabilities the system gets. Conclusion: Thus, it is concluded from the report that he DAS system needs to apply the threats and risks discussed in the report and apply them carefully to avoid the various risks of implementing cloud-based services. The Security related threats are to be analyzed and the priorities must be given to the employees associated, as they are the one who will be impacted by such steps taken. The Privacy related issues are also to be considered as failure to comply with the jurisdictions may result in various legal actions taken by the employees and this will give rise to the operations of the competitors in the market. References: Agrawal, D., El Abbadi, A., Wang, S. (2013, April). Secure and privacy-preserving database services in the cloud. InData Engineering (ICDE), 2013 IEEE 29th International Conference on(pp. 1268-1271). IEEE. Alani, M. M. (2014). Securing the cloud: Threats, attacks and mitigation techniques.Journal of Advanced Computer Science Technology,3(2), 202. Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions.International Journal of Smart Grid and Clean Energy,1(1), 1-6. Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R. (2013, January). Orthogonal Security with Cipherbase. InCIDR. Basharat, I., Azam, F., Muzaffar, A. W. (2012). Database security and encryption: A survey study.International Journal of Computer Applications,47(12). Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Gampala, V., Inuganti, S., Muppidi, S. (2012). Data security in cloud computing with elliptic curve cryptography.International Journal of Soft Computing and Engineering (IJSCE),2(3), 138-141. Grover, N. (2014). A Study of Security Threats and Issues in Cloud Computing.IITM Journal of Management and IT, 78. Hussein, N. H., Khalid, A. (2016). A survey of Cloud Computing Security challenges and solutions.International Journal of Computer Science and Information Security,14(1), 52. Jang-Jaccard, J., Nepal, S. (2014). A survey of emerging threats in cybersecurity.Journal of Computer and System Sciences,80(5), 973-993. Jeun, I., Lee, Y., Won, D. (2012). A practical study on advanced persistent threats.Computer applications for security, control and system engineering,339, 144-152. Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., Kavakli, E. (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.Computer Standards Interfaces,36(4), 759-775. Lee, K. (2012). Security threats in cloud computing environments.International Journal of Security and Its Applications,6(4), 25-32. Martini, B., Choo, K. K. R. (2012). An integrated conceptual digital forensic framework for cloud computing.Digital Investigation,9(2), 71-80. Moore, J. C., Spink, J., Lipp, M. (2012). Development and application of a database of food ingredient fraud and economically motivated adulteration from 1980 to 2010.Journal of Food Science,77(4). Prasanth, A. (2012). Cloud computing services: a survey.International Journal of Computer Applications,46(3), 0975-8887. Raschke, R. L., Krishen, A. S., Kachroo, P. (2014). Understanding the components of information privacy threats for location-based services.Journal of Information Systems,28(1), 227-242. Ted, E., Goldberg, H. G., Memory, A., Young, W. T., Rees, B., Pierce, R., ... Essa, I. (2013, August). Detecting insider threats in a real corporate database of computer usage activity. InProceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining(pp. 1393-1401). ACM. Theoharidou, M., Papanikolaou, N., Pearson, S., Gritzalis, D. (2013, December). Privacy risk, security, accountability in the cloud. InCloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on(Vol. 1, pp. 177-184). IEEE. WANG, L., MENG, X. F. (2014). Location privacy preservation in big data era: a survey.Journal of Software,25(4), 693-712. Ziegeldorf, J. H., Morchon, O. G., Wehrle, K. (2014). Privacy in the Internet of Things: threats and challenges.Security and Communication Networks,7(12), 2728-2742.

Tuesday, December 3, 2019

South Atlantic Eddies Essays - Ocean Currents, Oceanography, Oceans

South Atlantic Eddies The article I chose to do my assignment on was Giant Eddies of South Atlantic Water Invade the North. The eddies that the article discusses are thought to originated from sharp changes of the direction of the currents, which are called North Brazil Current retroflection eddies. These are observed to the largest eddies in the Atlantic. Scientists and Oceanographers are still uncertain about the causes and effects of these eddies, and about the history and numbers of the eddies, and are still continuing their research today. Between the time period of 1989 to 1992 six retroflection eddies were tracked for the first time, using subsurface floats and surface drifters. As a result of the tracking of these eddies, researchers were able to describe the number, movement, and characteristics of the eddies. Research has found that the deepest loops of an eddie can have diameter up to 250 kilometers, with a depth of 1200 meters, and swirl speeds up to 80 centimeters per second. Research implies that between July to March at least three eddies form, but appear to go away when they approach a 1,0 00 meter ridge between Barbados and Tobago. Retroflection eddies seem to bring a great deal of volume of water from the South Atlantic northward into the North Atlantic. These eddies move approximately one million cubic meters of water per second, and with three eddies annually this accounts for up to a quarter of the total northward movement of the upper limb of the thermohaline circulation cell. The newly discovered eddies clear up reasons as to why there was a difference between recent data from drifting buoys and the history of ship drifts that showed continuous flow up the coast to the Caribbean. Oceanographers and scientists have only begun to investigating more deeply into these eddies. Even the information discussed in this article is undeveloped; therefore researchers are still searching for a more clear explanation of the occurrences of these eddies. Science