Tuesday, August 25, 2020

Concepts of Business Education Essay Example for Free

Ideas of Business Education Essay Introductions: The medical attendants will be indicated introductions by experienced medical attendants and specialists. 5. Test: There will be tests held for the attendants on the things instructed. 6. Assessment: The attendants will be assessed by their presentation. 7. Shows: The medical attendants will be given showings by the accomplished medical attendants on care giving. 8. Usage: The medical attendants should exhibit whatever they have learnt under the management of the office head. 9. Post assessment: Depending on the exhibition of the medical attendants, they will be posted in the necessary divisions. The most essential issue of reasoning of training is that concerning points: what are the best possible points and directing standards of instruction? What are the best possible measures for assessing instructive endeavors, foundations, practices, and items? A portion of the AIMS proposed or engaged with the instructive undertaking are †¢cultivation of interest and the aura to ask encouraging of inventiveness †¢production of information and of proficient understudies †¢enhancement of understanding †¢promotion of good reasoning †¢feeling and activity †¢enlargement of the creative mind cultivating of development, improvement, and self-acknowledgment Based on the AIMS idea we are building a web based learning framework for our representatives: Ideally, the learning results arranged by need are ?Translated into course substance, assets and a way to deal with the educating and learning process that will empower an understudy to accomplish those results. ?When these fundamental boundaries have been thoroughly considered, the courseware advancement group will share the obligation of interpreting the hypothesis and goals into courseware and internet learning capacities. These courses will at that point be conveyed by the learning the board framework (LMS) ? LMS will interface with the library and other computerized assets related administrations alongside the understudy data framework (SIS) ? This action will be done through a safe server that can verify the understudy login. From the understudies perspective, they will interface with the LMS and the related administrations through an easy to understand clients gateway, with a solitary login, they can approach their courses and can be connected to every single related asset and administrations. At long last, to guarantee continuous improvement, an assessment procedure for the adequacy of the framework, in view of accomplishment of the learning results and understudies criticism will be set up, as an autonomous quality evaluation process, which additionally gives takes care of go into the advancement cycle. Through the above advances the association intends to give quality instruction by making them on the web, the courses would cover hierarchical improvement programs like oTime Management oLeadership Skills Training oConflict Management Workforce Development Relating LMS ; Courses to AIMS according to John Dewey †¢AIMS consistently identify with results, the first and most significant thing is whether the work relegated has characteristic congruity †¢AIMS infers a methodical and requested action, one in which the request comprises in the dynamic consummation of a procedure †¢AIMS implies prescience ahead of time of the end or conceivable end †¢AIMS as a predicted end provides guidance to the action; it’s not an inactive view for the onlooker but rather impacts steps taken to arrive at the end. How each earlier occasion leads into its replacement while the replacement takes up what is outfitted and uses it for some other stage, until we show up toward the end, which sums up and completes the procedure? †¢Foresight works in 3 different ways ?Involves cautious perception of given conditions and means accessible to arrive at the end. ?Propose the correct request or grouping in the utilization of means, encouraging prudent choice and course of action. ?Settles on selection of choices conceivable

Saturday, August 22, 2020

MGMT 4370 Organizational Design Essay Example | Topics and Well Written Essays - 250 words

MGMT 4370 Organizational Design - Essay Example In the money related year finished December 2010 the organization had made incomes of US$ 99.9 billion and had utilized 426,751 workers around the world. Throughout the years IBM has kept on moving its business blend, leaving commoditized fragments while expanding its quality in higher-esteem zones, for example, administrations, programming and incorporated arrangements (IBM, â€Å"International Business Machines Corporation SEC Form 10-K† 1).Currently, the organization gives coordinated arrangements that use data innovation and the company’s information on business procedure to offer an assorted arrangement of administrations extending from big business programming to counseling to usage of administrations to financing. To empower it to offer every one of these administrations seriously, IBM has partitioned its significant tasks into five significant business sections: Global Technology Services, Global Business Services, Software, Systems and Technology and Global Financing. IBM’s plan of action is worked to help two head objectives: first is to enable its customers to prevail with regards to conveying busines s esteem by getting increasingly creative, productive and serious using business knowledge and IT arrangements; and besides, is to give long haul an incentive to its investors (IBM, â€Å"International Business Machines Corporation SEC Form 10-K†

Friday, July 31, 2020

Career Counseling What is It and How Can I Use it for Career Progression

Career Counseling What is It and How Can I Use it for Career Progression Career progression is the aim for most workers, but career development is not something most of us think of regularly. But without proper understanding of what we want from our careers and how we can achieve our goals quicker, we can quickly end up dissatisfied with our jobs.Career counseling is a process that can help you with your career progression. © Shutterstock | Andrey_PopovIn this guide, we will examine what career counseling entails and discover whom to look for if you want to consider trying it. We’ll also discuss who can benefit from the practice and how, before looking closer at how career counseling can be used for career progression.WHAT IS THE DEFINITION OF CAREER COUNSELLING?Career counseling refers to mentoring or coaching on issues, which relate to a person’s career. It generally helps individuals make the right choices in terms of career paths, career development and career change. The overall aim of career counseling is to help the individual maximize the successes they’ll have on their chosen career path.Perhaps one of the simplest ways to understand the essence of career counseling is by examining what it isn’t about. Career counseling is not a process where the person is told what career they should pursue in terms of simply stating the job the person should apply for or the course they should enroll in.  More importantly, career counselors won’t provide you with a job.The focus of career counseling is to provide the tools for you to understand your passion or the so-called ‘true calling’. While it will provide you better awareness of the ways you can improve your job search and help you apply for the right roles regarding your career goals, experiencing career counseling won’t guarantee you with a job.[slideshare id=29544234doc=careerdevelopmenttheory-131228135202-phpapp01w=640h=330]WHO PROVIDES CAREER COUNSELLING?There are a number of options when it comes to receiving career counseling. It can be provided by a therapist, a life coach, or a voluntary business coach. A professional career coach is someone with expertise and academic qualifications in career development theory, counseling techniques, and in administrative and interpretative assessment. In addition, career coach has to have a vast understanding of career information resources.Career counselors typically work in schools and universities. If you are studying, your institution’s website and Career Department are likely to have more information about career counselors.But the popularity of career counseling has also meant many larger organizations now have in-house counselors. It’s a good idea to check with the HR department if you are considering a meeting with a counselor.Furthermore, you can also find private career consultants. You could simply use Google to find a career coach near you. You can type in “career counselor in [your city]” and you should be able to receive plenty of results.You can also try the professional associations of your country’s career counselors. For example, in the US this would mean checking out the National Career Development Association (NCDA).Watch this funny career counseling session with Monty Python. WHO CAN BENEFIT FROM CAREER COUNSELLING?According to some studies, around 70% of Americans are unhappy at work. It’s therefore quite evident most people would benefit from better career planning. Career development is a lifelong process and most people find themselves questioning their career choices later on.Job satisfaction isn’t something to take lightly. It can lead to stress, which can hinder your health and relationships with other people. It isn’t just the feeling of being unhappy at work. A 2014 study in the US showed only a little over 20% of workers are happy with promotion prospects and fewer than 40% were happy with their current compensation.Therefore, whether you are just starting out, in the middle of your career or indeed coming to the end of your career, you can benefit from career counseling, as it can help you gain focus and find the direction you want to steer your career.Career counseling is especially beneficial if you’ve had some of the below thoughts cross your mind:“I don’t know what to do with my life”“I’m not sure which course to choose or which job offer to take”“I am cert ain of what I want to do, but I have no idea how to achieve my career goal”“I don’t know how to best use my current skillset”“I didn’t get the university place or job I wanted”“I want a career with good financial rewards/job security/challenging roles”“I’m not sure whether to move somewhere else in order to find work”A career counselor can help you answer the above questions and find a route to better career satisfaction. The important point to keep in mind is that career counseling isn’t only beneficial when you want to find a new job or get on to the career ladder.The tools you get from a career counselor can help you feel more satisfied in the current job, for instance, through learning how to improve your position either by earning a promotion or a raise.For people with a high interest in career counseling, this compendium is very helpful.[slideshare id=45790496doc=gumwos5tpwyhoodbc6lc-signature-d7e26b028bc99f1930f6387558b77ecfdefec07f182af218380d8ac881 a37021-poli-150313043709-conversion-gate01type=dw=640h=330]WHAT ARE THE ADVANTAGES OF SEEING A CAREER COUNSELLOR?As the above highlighted, career counseling can help people in different stages of their careers.The common advantages you can enjoy with career counseling are:Identifying the different options and choices available for you in terms of your career.Helping you clarify your career goals in order for you to achieve more in your career.Supporting you during the job search through the provision of resources and feedback.Ensuring you obtain a better understanding of your individual strengths and weaknesses.Providing you with educational support and guidance, whether you are starting your studies or wanting to improve your current skills.Let’s examine the above benefits through case studies. Both of the below examples are available in more detail on the Skill Scan website.The first case study looked at Claire, who is at the start of her career. She had completed her studies at university, with a degree in Business Administration and Conservation Studies, but had no clue what to do. Through her visit to a career counselor, she learned more about her skills and values.The different tests and discussions helped her reveal an interest towards organizational and managerial positions. She began focusing on applying for these types of positions in PR and landed a job quickly.In Claire’s case, the career counseling helped identify the kind of jobs she would most like to perform, as well as the ones suited for her specific talents. She identified different options and created a path towards a career she liked.The second case study focused on Andrew, who was transitioning from one job to another. He had been laid off from a law firm and he wanted to re-evaluate the direction his career was heading.Andrew’s problem was that he hadn’t previously planned a career in law, but had just taken on the opportunity as a young man. Yet, he was worried about the difficu lties in changing a career. Through the assessment and discussion with a career counselor, Andrew noticed he was drawn to being creative and solving problems. He considered a number of different career paths that would fit his skills and values, and eventually went on to complete a Financial Planning certificate.In Andrew’s case, the career counseling helped him understand what his actual interest are and the different options he has available, without it causing him financial problems. He learned about different study routes and options to continue in the legal field, while gaining skills in another subject.The two examples highlighted the benefits of career counseling in different situations. The practice can empower you to better understand your own preferences, but also receive real life tips on how to achieve those goals.In addition to the above, career counseling can also provide specific social and economic benefits. A 2003 report titled, The Educational, Social and Economi c Value of Informed and Considered Career Decisions, found career counseling being able to provide benefits such as:Increase your job satisfaction. You can learn strategies that can help you solve issues at your current position, such as negotiating a promotion. On the other hand, you can simply find your true calling, ensuring you aren’t stuck in a career you don’t like.Lower work-related stress and depression. Unhappiness at work has been shown to lower your ability to make healthier life choices. Thus, you can suffer from more stress and even depression. By ensuring you’re happy at work, you can reduce these harmful effects.Shorten your unemployment periods. You’ll receive tools for a more effective job search and networking, which can ensure you aren’t unemployed for long.HOW CAN CAREER COUNSELLING HELP WITH JOB PROGRESSION?To fully comprehend the ways career counseling can boost your job progression, you should understand the process behind it. All career counseling f ocuses on similar tactics, although the methods they use might vary slightly.Identifying your strengths and skillsFirst, a career counselor typically starts by helping you define the strengths and weaknesses you have in terms of personality. This is often done through both self-assessment and different personality tests.There are a number of different personality tests and different counselors might use different assessment methods. One of the major analysis options used for career analysis purposes is the Myers-Briggs Type Indicator test.This test looks at the four personality dichotomies: extraversion/introversion, sensing/intuition, thinking/feeling, and judging/perceiving. The test will show the traits that are the most dominant in you, all of which can be used to understand the kind of roles most suited for your personality.Watch the below to find out more about Myers-Briggs method: Furthermore, the counselor will also help you examine your skill set. This can involve skill-bas ed tests, such as an IQ test. The aim is not to find out how smart you are, but rather where your strengths lie. In addition, your skills are also analyzed through the education you have and the work or other experience you’ve gained.The above will then be used to better understand the roles and positions, most suited for you and your career. This can help you identify the direction you want to take if you are starting out or re-direct your career path to a different direction.The more understanding you have about your own capabilities and values, the more able you are to look for the roles that you want and which help you progress.For instance, you might work in the service industry and through the above assessment realize your true strength lies in the sales sector. This can help you focus on searching for sales in the service industry, rather than customer service aspect of the industry, for example.Examining factors which influence career developmentThe second point that helps your career progression is the focus on factors influencing your current career development. The counselor will help you identify the different issues that can have an impact on your career progression. These include:Personal factors â€" If you have a family to support, career counselor will help identify career goals with you, which align with your family’s needs. For instance, if you can’t afford to stop working while changing careers, the counselor can help identify ways to obtain skills while working.Value-based factors â€" These include not only things you want from your job, but also specific values that might influence your job satisfaction. For example, you might want to find a role that focuses on social justice.Educational factors â€" What are the skills you have and how can you continue to learn more about your chosen industry? Career counselor will help map out the educational landscape, both in terms of the past and the future.Ability-based factors â€" You’ll als o examine the ability-based things influencing your career progression. This is a combination of examining your experience and finding different ways to increase the experience. For example, internships might be a suitable option for you or you should consider pursuing your new career as a hobby first.Understanding how each of the above factors are influencing your career progression, both in terms of hindering it or boosting it, you can focus your efforts in strategies that work the best.For instance, you might notice your education is slowing down your chosen career progression and keeping you from promotions. With the help of a career counselor, you can start looking into ways to educate and train yourself further.Focusing on the right strategiesCareer counseling will also help you focus on the right strategies in terms of career progression. The assessment and tips provided by the counselor will help you understand how to land a job of your dreams and where to put your energies when it comes to re-focusing your career.Some of the strategies you can learn from a career counselor include:Networkingâ€"Career counselor can help you understand how networking can help your career and teach you more about the best practices regarding the process.Use of social media â€" Social media’s role in finding a job is growing and career counselors can help you understand how to take advantage of it. If you are wholly unaware of its use, you could even get help in creating profiles in platforms like LinkedIn.Finding training opportunities â€" Career counseling can help you find resources for training your skills. If you are at university, you can discuss the different course options and any additional studies you should take. For workers, career counseling can help identify adult learning opportunities, both in full- and part-time education.Creating personal development goalsâ€" Finally, you’ll also learn strategies in terms of personal development. The enhanced awarene ss of your personality can help you improve the weaker aspect and learn more about using your best traits.Together with the career counselor, you are able to identify the resources you need in terms of career information, opportunity and development. Furthermore, you can better understand how to use these resources, which can guarantee you more access to better job opportunities.For instance, strategies, such as networking, can be crucial for guaranteeing faster career progression, as it connects you with influential people within the industries you are passionate about.As mentioned above, the strategies are not only useful for people looking to get on the career ladder or seeking a new direction with their career. Career counseling provides you more tools to ensure your current work situation improves. Training or better focus on personal development can give you the resources you need to seek for a promotion or ask for a salary increase. Career progression doesn’t necessarily me an changing jobs, as simply improving your status or financial incentive, can ensure you go forward in your career.CONCLUSIONCareer counseling can be a highly beneficial practice in terms of career progression. The process isn’t just for people at the start of their career. Whilst the process isn’t about telling you what to do and landing a job on your plate, career counseling can help you better understand what you truly want from your career.In terms of career progression, career counseling guarantees you don’t stall in your career development. It does this by helping you identify your ideal career goals and the routes you need to take to achieve them. It’s also crucial for strengthening your abilities in order to march forward. It can do so either by improving your skills through training or by boosting your ability to use different resources and strategies to your advantage.

Friday, May 22, 2020

Why Does Urine Glow Under a Black Light

You can use a black light to detect body fluids. Its actually a good way to look for pet urine or make sure a bathroom or hotel room is really clean. Cat urine, in particular, glows very brightly under ultraviolet light.  Urine glows under a black light primarily because it contains the element phosphorus. Phosphorus glows yellowish green in the presence of oxygen, with or without black light, but the light imparts additional energy that make the chemiluminescence easier to see. Urine also contains broken down blood proteins that glow under a black light.

Wednesday, May 6, 2020

Dbq French and Indian War Free Essays

DBQ the French and Indian War The French and Indian War is known as an unintentional war sparked by a young George Washington’s actions towards the French ambassador. Both the English and French wanted to obtain control of the Ohio Valley. Each group desired to show their superiority and gain the benefits of the new world. We will write a custom essay sample on Dbq: French and Indian War or any similar topic only for you Order Now The English and French could not solve their disagreement peacefully, and war was inevitable. The war not only changed the new world forever, but also, Britains relationship between its American colonies. The relationship between Britain and its American colonies was transformed through the political, economic, and ideological relations, due to the French and Indian War. Britain’s political relations with its American colonies were effected as a result of the French and Indian War. America today, as we know it, would not be the same if the English had not been victorious over the French. The war determined who would gain control of the new world. The maps in Document A show that before the war, the French controlled most of the new land, but after the war, the English had secured the new world as its territory. It is easy to see that Britains victory over the French helped Britain politically, however; it produced tension with its American colonies. Shortly after the war, England realized what the war had really cost them tons of money they did not have. Britain expected the colonies to help pay the debt from the war, but the colonists felt it was not their responsibility. This controversy contributed to the political strain between Britain and its American colonies. The French and Indian War altered Britains relationship with its American colonies drastically, as Britain imposed its political authority on the colonists. Britains relationship with its American colonies was not only altered politically due to the French and Indian War, but also through its economy. The British began placing taxes upon the colonists and essentially telling them what they could and could not do and who they could and could not trade with. The colonists were infuriated and felt that the taxation was unjust. Document F states the reason that taxes were placed upon the colonists. The British Order in Council clearly states that, â€Å"we find that the revenue arising there from is very small and inconsiderable,†¦and is not yet sufficient to defray a fourth part of the expense necessary for collecting it. † The commissioners said that all the money it took to make the war happen was not paid back through the land acquired; so, as a result, taxes were placed upon the colonists. Another document that supported this claim about financial troubles was Document H. The picture in Document H was meant to show that after the war, Britain faced extremely rough times economically. Some colonists were depressed, sorrowful, and penniless. The outcome of the French and Indian War damaged Britains economic relations with its American colonies. The American colonies ideological relations with Britain changed after the French and Indian War. All colonists did not view Britain the same way. In documents D and E, two very distinct views of Britain were displayed. The solider in Document D writes. â€Å"Therefore we now see what it is to be under martial law and to be with [British] regulars, who are but little better than slaves to their officers. † The Massachusetts soldier in this document hated Britain and felt they were treated no better than the slaves. Although, Document E stated, â€Å"Here shall our indulgent Mother, who has protected us, be served and honored by growing Numbers, with the Duty, Love and Gratitude, till Time shall be no more. † Reverend Thomas Barnard said in his sermon that Britain protected them. He felt the colonists should love, honor, and serve Britain forever to show their appreciation. Reverend Barnard viewed Britain as a blessing from God and he loved Britain. The colonists’ views of Britain were not all the same, while some loved and appreciated Britain, but others hated and criticized them. The French and Indian War completely changed the ideological relations between Britain and its American colonies. As can be seen, Britains relationship with its American colonies was undoubtedly altered due to the results of the French and Indian War. Britains victory over the French came at a cost, as Britain’s grasp on its American colonies began to slip away, and the results of the war changed America as it is known today. The relationship between Britain and its American colonies was altered through the political, economic, and ideological relations, as a result, of the French and Indian War. How to cite Dbq: French and Indian War, Papers

Wednesday, April 29, 2020

The Mortal Immortal Questions and Answers

Horror, romance, darkness, death and the supernatural are the main elements of the Gothic literature. The main characters are usually maniacal, villainous, extremely idealized and dangerously flawed.Advertising We will write a custom term paper sample on The Mortal Immortal: Questions and Answers for Discusstion specifically for you for only $16.05 $11/page Learn More Frankenstein: or, The Modern Prometheus (1818) was a significant landmark for the works of famous British novelist and short story writer, Mary Wollstonecraft Shelley. Her works prove that she truly lived a literary existence. Although Shelley uses these Gothic elements in her work, her novels and short stories explore many thought-provoking themes such as the self concerning society. Of equal significance was a personal weakness, isolation, emotional and internal upheavals caused by supernatural forces. During the 1820s and ’30s, Shelly wrote 21 short stories, many containing supern atural elements. The setting for these stories where times and places far removed from early 19th century England. Her work can be viewed as containing early science fiction elements. Among this collection of short stories about life and the supernatural, was â€Å"The Mortal Immortal,† published in 1833. A tale told in flashback, and the story is narrated by a 323-year-old man called Winzy – the Mortal Immortal. What is the cause of his immortality? He was the former assistant to Cornelius Agrippa a famous German physician, writer, theologian, and alchemist. In trying to overcome obsessive love, he drinks one of Agrippa’s potions thinking it will cure him or be a love antidote. Instead, it is an immortal potion which cannot be reversed. He marries his true love – Bertha. He experiences pain and despair as he must watch her and those he loves age eventually and die. The story begins by the protagonist praising July 16, 1833, as his 323rd anniversary. He s tates â€Å"This is a memorable anniversary for me; on it I complete my three hundred and twenty-third year! (Shelley). This praise and happiness dissolve, and the protagonist’s internal battle comes to the surface. Instead of enjoying the benefits of everlasting life, his life has only been filled with despair and many unanswered questions. â€Å"Am I, then, immortal? This is a question which I have asked myself, by day and night, for now, three hundred and three years, and yet cannot answer it†¦ For ever! Can it be? To live for ever! I have heard of enchantments, in which the victims were plunged into a deep sleep, to wake, after a hundred years, as fresh as ever: I have heard of the Seven Sleepers—thus to be immortal would not be so burdensome: but, oh! The weight of never-ending time—the tedious passage of the still-succeeding hours! How happy was the fabled Nourjahad!—But to my task (Shelley).†Advertising Looking for term paper on b ritish literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More What is the tragedy of immortality? It is time. Time can be viewed perhaps as the common antagonist to all humankind. In this particular case, the time has a mortal and immortal devastating purpose. For the protagonist, immortality/ everlasting life and time has become an enemy. For Bertha and others, mortality (susceptibility to death) and lack of time is the adversary. â€Å"Whereas the latter fears death and aging, the Mortal Immortal yearns for death – it ends his misery. Death! Mysterious, ill-visaged friend of weak humanity! Why alone of all mortals have you cast me from your sheltering fold? Oh, for the peace of the grave! The deep silence of the iron-bound tomb! That thought would cease to work in my brain, and my heart beat no more with emotions varied only by new forms of sadness! (Shelley).† Mary Shelley uses time as a significant element in â€Å"The Mort al Immortal.† She explores its dualistic and/or pluralistic nature. Can time indeed be the healer of all wounds? In the case of the Mortal Immortal, the answer is no. The Mortal Immortal is physically alive, but his soul and spirit are dead because of the perpetual despair he experiences. Is immortality something that can be truly experienced and enjoyed? â€Å"The Mortal Immortal† illustrates or seems to suggest that the joy of everlasting life or immortality can only truly be enjoyed when everyone can have the same experience and aging as well as death is finally defeated. This term paper on The Mortal Immortal: Questions and Answers for Discusstion was written and submitted by user Cynthia Carson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Friday, March 20, 2020

Responce to Blood Brothers essays

Responce to Blood Brothers essays This play is an observation of modern day living and also of the evils of the class system. The main three characters in the play are Eddie, Mickey and Mrs Johnstone. Eddie and Mickey are twins, and Mrs Johnstone is their mother. They are separated at birth and grow up unaware of this. The play is told in a form so that the only person that changes his or her role is the narrator, who changes throughout in order to create the idea that the main characters are somehow cut off from the outside world at that they are unable to escape that. The Narrator follows the plot and is there from the first page to the last, almost like some deadly ethereal spectre, and he represents the devil that he often talks about. He is always a figure in the background, never directly intervening for good nor ill, he only accelerates the sense of impending disaster. The play itself is a musical, and all the music that is in it boils down to one theme tune, this theme is in the piece of music Tell me its not true. And all the other music in the play is based on that one tune. The music itself is quite sad and almost ominous, and it is made clear early on in the play that the ending will not be pleasant. Having seen the ending of the play at the start, and always knowing that Mickey and Eddie are going to die dramatically changes the way we, the audience see the play. We now see that the childish play of Eddie and Mickey the first time they meet is tainted with a sense of foreboding and dread, we also see this in the fairground scene where the narrator utters the lines And whod dare tell, the lambs in spring, What fate the later seasons bring. This really puts unease in our hearts and we know that even in this scene of apparent happiness and joy there is a hidden evil, and that disaster awaits, whatever they do. They are plagued by som ...

Wednesday, March 4, 2020

Wernher Von Braun and The History of the V-2 Rocket

Wernher Von Braun and The History of the V-2 Rocket Rockets and missiles can serve as weapons systems that  deliver explosive warheads to targets by means of rocket propulsion. Rocket is a general term that describes any jet-propelled missile which is thrust forward from the rearward ejection of matter like hot gases. Rocketry was originally developed in China when firework displays and gunpowder were invented. Hyder Ali, prince of Mysore, India, developed the first war rockets in the 18th century, using metal cylinders to hold the combustion powder needed for propulsion. The First A-4 Rocket Then, eventually, came the A-4 rocket. Later called the  V-2, the A-4 was a single-stage rocket developed by the Germans and  fueled by alcohol and liquid oxygen. It stood 46.1 feet high and had a thrust of 56,000 pounds. The A-4 had a payload capacity of 2,200 pounds and could reach a velocity of 3,500 miles per hour. The first A-4 was launched from Peenemunde, Germany on October 3, 1942. It reached an altitude of 60 miles, breaking the sound barrier. It was the worlds first launch of a ballistic missile and the first rocket ever to go into the fringes of space. The Rockets Beginnings Rocket clubs were springing up all over Germany in the early 1930s. A young engineer named Wernher von Braun joined one of them, the Verein fur Raumschiffarht or Rocket Society. The German military was searching for a weapon at the time that would not violate the Versailles Treaty of World War I but would defend its country. Artillery captain  Walter Dornberger  was assigned to investigate the feasibility of using rockets. Dornberger visited the Rocket Society. Impressed with the club’s enthusiasm, he offered its members the equivalent of $400 to build a rocket.   Von Braun worked on the project through the spring and summer of 1932 only to have the rocket fail when it was tested by the military. But Dornberger was impressed with von Braun and hired him to lead the militarys rocket artillery unit. Von Brauns natural talents as a leader shined, as well as his ability to assimilate great quantities of data while keeping the big picture in mind.  By 1934, von Braun and Dornberger had a team of 80 engineers in place, building rockets in Kummersdorf, about 60 miles south of Berlin.   A New Facility With the successful launch of two rockets, Max and Moritz, in 1934, von Brauns proposal to work on a jet-assisted take-off device for heavy bombers and all-rocket fighters was granted. But Kummersdorf was too small for the task. A new facility had to be built. Peenemunde, located on the Baltic coast, was chosen as the new site. Peenemunde was large enough to launch and monitor rockets over ranges up to about 200 miles with optical and electric observing instruments along the trajectory. Its location posed no risk of harming people or property. The A-4 Becomes the A-2 By now, Hitler had taken over Germany and  Herman Goering ruled the Luftwaffe. Dornberger held a public test of the A-2 and it was successful. Funding continued to flow in to von Brauns team, and they went on to develop the A-3 and, finally, the A-4. Hitler decided to use the A-4 as a vengeance weapon in 1943, and the group found themselves developing the A-4 to rain explosives on London. Fourteen months after Hitler ordered it into production, on September 7, 1944, the first combat A-4 now called the V-2 was launched toward Western Europe. When the first V-2 hit London, von Braun remarked to his colleagues, The rocket worked perfectly except for landing on the wrong planet. The Teams Fate The SS and the Gestapo ultimately arrested von Braun for crimes against the state because he persisted in talking about building rockets that would orbit the earth and perhaps even go to the moon. His crime was indulging in frivolous dreams when he should have been concentrating on building bigger rocket bombs for the Nazi war machine. Dornberger convinced the SS and the Gestapo to release von Braun because there would be no V-2 without him and Hitler would have them all shot. When he arrived back at Peenemunde, von Braun immediately assembled his planning staff. He asked them  to decide how and to whom they should surrender. Most of the scientists were frightened of the Russians. They felt the French would treat them like slaves, and the British did not have enough money to fund a rocket program. That left the Americans. Von Braun stole a train with forged papers and ultimately led 500 people through war-torn Germany to surrender to the Americans. The SS was issued orders to kill the German engineers, who hid their notes in a mine shaft and evaded their own army while searching for the Americans. Finally, the team found an American private and surrendered to him. The Americans immediately went to Peenemunde and Nordhausen and captured all the remaining V-2s and V-2 parts.  They destroyed both places with explosives. The Americans brought over 300 train cars loaded with spare V-2 parts to the U.S. Many of von Brauns production team were captured by the Russians.

Monday, February 17, 2020

Porters generic strategies for Glaxo Smith Kline Essay - 1

Porters generic strategies for Glaxo Smith Kline - Essay Example lities refer to its ability to retain talent, ability to innovate new product, ability of learning from past experiences, ability to improve efficiency, ability to identify target customers etc. Pharmaceutical giant GlaxoSmithKline (GSK) started its operation in 1715. Today it is one of largest and oldest companies in the world. GSK’s headquarter is located in UK and its operation is based in US. As far as company’s human resources is concerned there are 99,000 people in more than 100 countries working in GSK (GlaxoSmithKline, n.d.). GSK is a financially sound organization. Last year company’s total turnover was 24 billion euro. Company’s strong financial condition can be further justified by the fact that every hour GSK spend around US$562,000 in finding new medicines. As far as infrastructure is concerned GSK has more than 100 sites in 68 countries. Being the second largest pharmaceutical company GSK has been successfully aligned all its resources to its business strategies. Currently company is focusing on three major strategies that it has adopted. These three strategies are, growing a diversified global business, delivering more products of value and simplifying the operational model. Company is utilizing its vast pool of human resources in order to build a diversified global business. Apart from human resources GSK is one of the largest users of IT which helps the company in order to achieve its objectives. According to the company IT plays important strategic roles as it facilitates access to global information. IT also facilitates global communication which is crucial in case of mergers and acquisitions. According to GSK, IT enables the extension and transformation of major business activities. IT supports major operational processes at all level of operation starting from local to global (GlaxoSmithKline, n.d.). As a res ult it is quite clear that IT helps GSK in the process of simplifying its business model. GSK give huge importance to its

Monday, February 3, 2020

SC2C67C Essay Example | Topics and Well Written Essays - 2250 words

SC2C67C - Essay Example , Middle and Far East for new workers, providing them with British citizenship and inviting them to take up jobs within the UK labour market (Kenny; Briner, 2006: 3). The UK workforce has steadily become more multi-ethnic in the past five decades (p.31). Gender: The number of women working away from home has increased several-fold, with the proportion of women in the workforce nearly equal to that of men, and steadily increasing. But, in terms of remuneration, choice projects or promotions, they are discriminated against. Age for retirement around the mid-fifties is considered too early in present times, with men and women perceiving themselves to be capable of several more years of employment. Employers’ preference for younger people is prevalent, with educational qualifications and energy counting more than experience which veterans may have. Ethnic and Racial Discrimination: In a study, among those who reported discrimination at the work place on the basis of ethnicity or race, 28 % reported being passed over for promotion, 21% reported being assigned undesirable tasks, and 16% reported hearing racist comments Dixon, et al, 2002 quoted in (Nelson; Nielsen, 2005: 18). Migration to the United Kingdom, and settlement patterns mean minority ethnic people now make up 8% of the UK population residing mainly in the larger cities like London and Birmingham. UK Government projections show that, because of their younger age profile, minority ethnic people account for 50 per cent of the growth in the UK working population between 1999 and 2009 (Cabinet Office Strategy Unit, 2003 as quoted in Kenny; Briner, 2006: p.3). Ethnic minorities like the Africans also are represented as a significant proportion of the population, many of them having their roots in Britain since several generations earlier. Ogbonna (1998) quoted in Kenny; Briner (2006: 14), states that a â€Å"vicious circle of unequal opportunities† commonly affects the motivation of unemployed minority

Sunday, January 26, 2020

Wireless Networking And Malicious Association Computer Science Essay

Wireless Networking And Malicious Association Computer Science Essay Wireless security is to prevent unauthorized user to access the wireless network or damage the computer by using wireless network. When the wireless technology has been first introduced to the world, it already has few danger methods that will harm the users desktop or laptop, but that time cracker and hacker dont have any resources to crack or hack a network by using wireless technology. At that time, the wireless network only use by the big company. But now day, wireless network is very common, every corner of the world like cafà ©, shopping mall, school, or college that has provide wireless access for the people to access it. Not only cafà © and college using wireless network, at other country it use wireless technology to connect whole citys network. With this technology, people that around the wireless router can easily to access the wireless network to do the search of the information, check mail or play online game. Because of the wireless technology, now day, every laptop has wireless adapter card pre-install inside and make the laptop more portable and let them can connect to internet easily. Not only for laptop, wireless technology also make benefit for the desktop. Desktop can connect to network by installing a wireless adapter card or plug in an USB wireless adapter then desktop can connect to a network and without cable messy around the floor. In this case, wireless technology has become widely use and because of this reason, the risk of using wireless technology has increase and let many hacker found the way to hack the wireless network. All of security risk is related to the current wireless protocol and encryption method. Most of the wireless networks use IEEE 802.11b for standard communication and IEEE 802.11b have already became standard wireless networking technology among the small business user and home user. The IEEE 802.11b can support the indoor distance from several meter to several hundred meters, and can support the outdoor from several kilometer to several ten of kilometers by using unlicensed wireless band. Now day, the wireless network devices normally are equipped with Wired Equivalent Privacy (WEP) data encryption. WEP data encryption was based on 64-bit RC4 encryption algorithm. Other that 64-bit RC4 encryption algorithm, 128-bit encryption algorithm is another data encryption on the WEP data encryption. But this kind of device is more expensive compare with 64-bit RC4 encryption and beside that, all the nodes must use the same encryption level. 1.2 Aim of Research Aim of the research is to implement the wireless security into the CSC System to prevent unauthorized user to access the wireless network. To increase the security level of the wireless network. To avoid the data or information inside the server or computer been hacked by unauthorized user. To increase the safety of the data transfer between server and computer. To add extra encryption method to encrypt the packet need to be transfer. To prevent unauthorized user to shut down whole system though the wireless access point. Chapter 2: Main Body 2.1 Wireless Security Concept A research has been carried out about the concept of the Wireless Security and how to enhance the wireless security. Wireless Security is to prevent an unauthorized user to invade the server database and bring harm to entire network. Below are the results of the research. 2.1.1 Unauthorized Access According to the research, have a lot of way to break into the wireless access point without an authorization. The unauthorized access will cause companys daily operation failure and lose profit. Below are the some of the examples unauthorized accesses. 2.1.1.1 MAC Spoofing MAC spoofing is a technique to change an assigned MAC (Media Access Control) address to another different MAC address. When a person using this technique, he/she has his/her reason to changes a network devices MAC address, whether is legitimate or illegitimate. Changes a network devices assigned MAC address allows bypass the access control list on the server or router, either hiding a computer on a network or attacking a network by simulate another network device. MAC spoofing occurs when a cracker or hacker has the ability to listen the network traffic that passed by and through it; the cracker or hacker can identify the MAC address of the computer with network privileges. Most of the wireless system allows MAC filtering to only allow authorized computer that with specific MAC address to access the network. The computer that dont has specific MAC address cant access the network, so the cracker or hacker use a program which has network sniffing capability and combine with other software or program to pretend the computer has any MAC address that the cracker desires. (Wikipedia, 2010) 2.1.1.2 Malicious Association The Malicious Association is hacker that can connect to company network by using their cracked laptop. This type of laptop is known as soft AP (Access Point) and this type of laptop is created by using some software that makes the hacker laptops wireless adapter card look like a legitimate access point. After the hacker has already gained the access to the company network, the hacker can steal the password or plant the computer virus into the network. (Wikipedia, 2010) 2.1.1.3 Ad-hoc Network Ad-hoc network, also known as peer-to-peer network built up between two or more wireless computers and these wireless computers dont have access point in between them. Ad-hoc network usually provide little protection, encryption method to the network. When a company or person using Ad-hoc network and wired infrastructure network together at the same time, and will link up a secured network to an unsecured network. Connect two different network topology need to have a bridge between them. Bridging is in two forms. User can connect the network topology y a direct bridge and indirect bridge. Direct bridge need to configure by the user and indirect bridge is user share resource on the user computer. The indirect bridge is provides two security problems. The first problem is the data can be obtained through the secured network on the user computer and this data exposed to other user discovery via the Ad-hoc network bypassing the user secured network. The second problem is a Trojan, computer virus or worm can be placed on the user computer through the Ad-hoc network. The unauthorized user no needs to crack the password of the network and can place the computer virus through the Ad-hoc network. (Wikipedia, 2010) 2.1.1.4 Denial of Service C:UsersZoukyDesktop424px-Stachledraht_DDos_Attack.jpg DoS (Denial of Service) or DDoS (Distributed Denial of Service) will occurs is when an attacker continues non-stop bombards an attacker targeted access point with bogus request, failure messages, or other commands. Denial of service will cause other users cant get into the network and also will cause a network crash. The DoS attack will expose a little bit of the data to the attacker, when the DoS attack happen, the interrupted network will prevents the data flow and also indirectly prevent the data from being transmitted. After the DoS attack has been performed, the attacker will start to observe recovery of the wireless network. During the initial handshake code is start to re-transmitted to the wireless network, the attacker continue what he remain. The attacker will record down the initial handshake code and use cracking tools to analyze the security weakness and exploit this code to get an unauthorized access to the system. (Wikipedia, 2010) 2.1.1.5 Man-in-the-middle Attack Man-in-the-middle attacker using a computer to sets up a soft AP (Access Point) and enticing other computers to log into the computer that already been sets up to soft AP. After this all are done, the attacker connects to a real access point by using other wireless card and the attacker will offers a steady flow of the network traffic through the done hacking computer to real network. Man-in-the-middle attack forces other computers AP drop the connection to real network and reconnect to attackers soft AP. This allows hacker to receive what other computers want data need to send out to real network. (Wikipedia, 2010) 2.2 Basic Security for Wireless Wireless network exist in this world already has a decade, at that time the security for the wireless network still not strong enough to prevent infiltrate by hacker or cracker. But at that time the hacker doesnt familiar on technology or technique to hack the wireless network. One of the reasons is the hacking device to hack the wireless network still hard to achieve on that time market. After a decade, the technology and technique to hack a wireless network and the step to build up the hacking device can found on internet. So now day the wireless network users need to have a strong and better wireless security to secure the wireless network. Below are the basic securities for wireless network for the first wireless network has been introduced. 2.2.1 Service Set Identifier SSID (Service Set Identifier) is a common network name for a device in a wireless LAN and some of the wireless device has its own default SSID. The default SSID can be replaced by other string and normally this string is generated randomly. SSID is to identify a name for particular wireless access point. All wireless network need to have SSID within the wireless access point just can communicate each other. The client doesnt know the SSID of the access point, then that client cant simply access the network; this is to prevent hacker to invade network by access through access point. The hacker need to know the SSID of a network just can complete the 802.11b protocol to access the network. The access point will broadcasts the SSID by the beacon inside the wireless device. However, even the broadcasting of the access point is turn off, the SSID still can detected by hacker with undetected monitoring of particular network or sniffing. So, all the clients need to know the SSID of the acce ss point before can make connection to the wireless device. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.2 Medium Access Control Address Filter Each wireless access point can be configured only accept the clients MAC address that already registered inside the wireless access point. With this function, the network administrators can limit the access of the client into wireless network by register the clients MAC address into the wireless access point. Most of wireless devices MAC address is unique and MAC address filter only allow the clients MAC address already registered in the wireless access point to access the network. The entire clients MAC address will store into MAC address ACL (Access Control List) and wireless access point will denied other wireless device if the wireless devices MAC address is not register inside wireless access points MAC address ACL. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.3 Wired Equivalent Privacy WEP (Wired Equivalent Privacy) is intend to give wireless users have a security scheme is equivalent to the wired network security. WEP doesnt provide any superior level or higher than that level of security, although WEP doesnt has superior level of security but it security level is equivalent with wired network. In the practice, the result show that the security level of WEP need to equivalent to wired network security is hardly to achieve. The use of WEP is to prevent the wireless client from sending and receiving data from the wireless access point, the wireless clients need to have the correct WEP key just can connect to the wireless access point. Now mostly of the network devices is equipped with the WEP data encryption and the encryption algorithm for the WEP is 64-bit RC4. Some of the network device capable to uses 128-bit encryption algorithm. After WEP is active, each 802.11 packet will encrypted by 64-bit RC4 key with RC4 cipher stream. This key is composed of 24-bit IV (I nitialization Vector) and other 40-bit is WEP key. IV is chosen by the sender and the IV can be change, this make every packet wont encrypt with the same key. Another additional 4-byte is for ICV (Integrity Check Value); ICV is computed and appended on the original packet. RC4 cipher stream is generated by 64-bit RC4 encryption algorithm. The WEP encryption algorithms work on a key that share between wireless device and wireless access point. The packet is encrypted by using the key before packet is send out and all packets wont have same cipher stream. The packet receiver use integrity check to ensure that the packet is not modified during the transmission. Most of the systems are share a single key among all the wireless device and wireless access point. The Integrity Check Field is to ensure the packets are not been modified during the transmission and Integrity Check Field also encrypted with the RC4 cipher stream. WEP is using CRC-32 (Cyclic Redundancy Code 32) mechanism for i ntegrity check. CRC is defined as a class of checksum to prevent overflow by dividing the message into binary. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Prasad, 2007) 2.3 Comparison between SSID, MAC Address Control Filter and WEP From the research, SSID (Service Set Identifier), MAC (Medium Access Control) address control filter and WEP (Wired Equivalent Privacy) are the basic security for the wireless network. This three security methods can implement together in one network. Because these are basic security for wireless network, so the security methods are easy to break by unauthorized user. If not implement other security methods and only just implement SSID, MAC address control Filter and WEP into wireless network, that wireless network will not secure under protection of these three security methods. The wireless access point will broadcast the SSID to the wireless client and wireless client just can access to the access point. When the access point broadcast its own SSID, the entire nearby wireless client will know the SSID of that network or access point, even the unauthorized users also will know the SSID of the network. The unauthorized users will attempt to access the wireless access point. And the wireless access point can close the SSID broadcast function; mean that the SSID is hidden. But when the authorized user requires connecting to the access point, the authorized user will broadcast the SSID to the wireless access point, if the SSID broadcast by the authorized user is match with the SSID of the access point. The authorized user just can make connect to the access point. This make hacker a chance to hack the access point because when authorized user is broadcasts the SSID to the access point, hacker can capture the packet that broadcast by the authorized user and make connection to the wireless access point. The wireless devices MAC address will store inside the wireless access point ACL (Access Control List), the wireless devices MAC address need to be match with MAC address inside the wireless access point ACL just can connect with wireless network. If that wireless network has more than 20 computers need to connect to the wireless network, then the network administrator need to enter all the computers MAC address into the wireless access point ACL. This will make the network administrator very troublesome enter the MAC address one by one and MAC address can be forged. WEP has been considered as a failure in wireless security, at the end it still accepted by the IEEE because WEP wasnt aim for provides fully security for wireless. WEP encryption is very easy to crack by the unauthorized user. WEP only authenticates the wireless client. This allows an unauthorized user to capture the packet send by the wireless client. WEP key is easily lost or stolen by unauthorized user and if the stolen WEP key hasnt been report to the network administrator, the network administrator wont able to detect the unauthorized user has already infiltrated the wireless network. If the stolen WEP key has been reported, network administrator require to change the entire devices that have use the same WEP key with stolen devices WEP key. If the company or enterprise has more than thousands of wireless user using that wireless network, this can be a very difficult task for the network administrator to change the entire WEP key for each wireless users. Like just mentioned, the WEP authentication message is easy to forging by the unauthorized user. Unauthorized user can capture the authentication message that send by the wireless client and forge a new authentication message; unauthorized user can use this forged message to associate with wireless access point. The management for WEP key in not specific in WEP standard. Since dont have management for WEP key, then WEP key will be use for a long term and lack of quality. Most of the wireless network uses one WEP key and share between the entire network and the entire wireless clients access point need to program with same WEP key. Because of this reason, network administrators rarely change the WEP key. SSID, MAC address control filter and WEP is basic security for wireless network; these methods still cant apply in wireless network. Just using SSID, MAC address control filter and WEP are not enough to prevent the security break. These methods require associate with other security methods to enhance the wireless security to prevent security break. 2.4 Advanced Security for Wireless From the research that carried out, advanced wireless securities are to replace the basic wireless security and improve what basic wireless security vulnerability. 2.4.1 Wi-Fi Protected Access WPA (Wi-Fi Protected Access) is a certification program that created by Wi-Fi (Wireless Fidelity) Alliance; WPA is a subset of the IEEE 802.11i. This technology is designed to response to the weaknesses that found in WEP. WPA will generate the key based on the master key and the master key never use by WPA. To encrypt the data, WPA is much more secure than WEP. Key management and updating in WEP is poorly provided, the secure key management is a built-in function in WPA. Mean that WPA can update and manage the key easily, not like WEP. If WEP need to manage or update the key, the network administrator needs to change entire wireless client key that has connection with the wireless network. WPA got one key only and that is master key like just mentioned, network administrator only require to change that master key then WPA will generate the key based on the master key. Generated key is hierarchy of the master key. So this make the management and updating become much easier. The IV (Initialization Vector) values can be reuse and the length of the IV is become longer, from 24-bit increase to 48-bit. Another additional part, the IVs are the sequence counters for the TSC (TKIP Sequence Counter), to protect the loop of the data. The WEP message integrity protocol CRC-32 has been proved ineffective. Because of this reason, WPA uses a MIC (Message Integrity Check) mechanism to replace the WEP message integrity protocol. The correct MIC is very difficult to guess. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) WPA has 3 improvements over WEP: Improved Data Encryption WPA improves the data encryption through the TKIP (Temporal Key Integrity Protocol). TKIP generates the key by using hashing algorithm and adding the integrity checking feature, this will ensure the key havent been edited by other person. TKIP is a Temporal Key hash Function and it is another option to WEP to fix all security problems that WEP has and it doesnt require installing other new hardware. TKIP same like WEP, use RC4 stream cipher to encrypt and decrypt data and all involved clients require share the same key. This key must be 128-bit and it calls Temporal Key (TK). The Initialization Vector also include in TKIP. Even if the TK is shared among all the wireless clients, all wireless clients generate different RC4 key stream. Since the communication participants perform a 2-phase generation of a unique Per-Packet Key (PPK), which is used as the key for the RC4 key stream. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) User Authentication User authentication in WPA is through the EAP (Extensible Authentication Protocol). This function is missing in WEP and WEP access to the wireless network is based on computers network cards MAC address and MAC address is very simple to be stolen. The purpose of EAP is to create a more secure public-key encryption system to ensure that only authorized user can access the wireless network. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Integrity WPA has a new mechanism call (MIC) Message Integrity Code for TKIP is computed by a new algorithm, name Michael. MIC is computed to detect errors in the data contents, either is transfer errors or purposely change the data content. The Michael is a 64-bit MIC and need to add to the data and ICV (Integrity Check Value). (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) 2.4.2 Robust Security Network RSN (Robust Security Network), also call as WPA (Wi-Fi Protected Access) 2. At year 2004, concept of RSN has been released, where the wireless devices need to support by additional capabilities. RSN is fully tested by Wi-Fi Alliances. RSN has a whole new standard and architecture to utilize the IEEE 802.1X standard for AES (Advanced Encryption Standard) and access control. RSN is using a pair-wise key exchange (Four Way Handshake) protocol, RSN also utilizing with 802.1X for key management process and mutual authentication. Now, 802.11i allows for the network implementation and also can use TKIP (Temporal Key Integrity Protocol). By default RSN uses CCMP (Counter Mode MAC Protocol) and AES (Advanced Encryption Standard) to provide for a scalable and stronger solution. AES is a replacement for RC4. Data transmission between the wireless access point and wireless device, RSN uses encryption algorithms and dynamic negotiation of authentication on the data transmission. The authentication of RSN is based on 802.1X and EAP (Extensible Authentication Protocol). Encryption algorithms and dynamic negotiation of authentication make RSNs security more secure and save. RSN is stronger and better than WEP and WPA because RSN is using dynamic negotiation, 802.1X, EAP and AES. Unfortunately only the latest devices have the capability let RSN to accelerate the speed of algorithms calculation in wireless client and wireless access point; now day of wireless product cant fully provide the performance of RSN. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) 2.5 Comparison between WPA and WEP WPA (Wi-Fi Protected Access) is the solution for the WEP vulnerability, has some critics done for the WEP, the WPA has numerous enhancements over WEP. WPAs TKIP encryption algorithm has fully enhances the WEPs RC4 encryption algorithm. TKIP make the data encryption more efficient and replace the RC4 vulnerability. WPA has made the key management became much more easier compare with WEP, because the WEPs key require enter one by one to the wireless client, if the company has more than thousands users then the network administrator need to enter more than thousands keys into the users computer. If the key is hacked by unauthorized user, then network administrator need to change key for entire companys computers. On the other hand, WPA no needs so troublesome, WPA only needs to enter one master key, and then WPA will generate key according with the hierarchy of master key, after that WPA will assign the key to the clients and the key is generated in 48-bit of IV size. Even the company g ot more ten thousands users also no need to trouble the network administrator. If one of the key has been hacked by unauthorized user, TKIP just need to generate a new key then network administrator can info the wireless client to change the key. WPA has EAP to authenticate the wireless user. WEP is using MAC address to authenticate the wireless user and some of the wireless devices MAC address can be forged. If the wireless devices MAC address has been forged by unauthorized user then the unauthorized user can easier to connect the wireless network without known by the network administrator. Network administrator also wont notify the wireless network is infiltrated by the unauthorized user until the wireless user report there is a missing MAC address. WPA is using EAP to authenticate the wireless user and the EAP for each wireless client is hard to forge by unauthorized user. If the EAP of the client is forging, but the unauthorized user still need wireless clients private key just can access the wireless network. WEP dont have error checking for the data content, and this will cause the looping of the data. If cant prevent replay attacks and will cause the wireless network crash. WPA has inserted the MIC into TKIP and IV sequence mechanism; this is to prevent replay attacks in the wireless network. MIC and IV sequence mechanism support for the existing wireless infrastructures not require installing new wireless device. Adding MIC and IV sequence mechanism without install new wireless device, adding these two methods can increase the wireless security and also without increase the installation cost of wireless device. Compare WPA with the WEP, WPA has solved a lot of WEP vulnerabilities. This make WPA is more secure compare with WEP because WEP only is basic security for the wireless network; it doesnt provide any protection for the wireless network. WEPs security methods can let a small enterprise to setup a small wireless network. For the big company, WEPs security methods are hard preventing the unauthorized access from outsider. 2.6 Comparison between WPA and RSN For now, never the less, RSN (Robust Security Network) is the strongest wireless security protocol for the wireless network. RSN provide stronger data encryption algorithm and all advantages of WPA. The RSN data encryption algorithm method is using AES (Advanced Encryption Standard) to encrypt the data. What advantages WPA have all included in RSN, expect the RSN data encryption algorithm is more advance. For WPA require upgrade for the software and firmware of the wireless device for the existing wireless network infrastructure, but the RSN doesnt support existing wireless network infrastructure, require upgrading the wireless device in order to implement AES. Implement RSN into the existing wireless network infrastructure require extra cost for just upgrade the hardware. RSN need large amount of processing resources in order to protect the wireless network. Mean that implement RSN will reduce the wireless network performance by processing the data transfer or verify the wireless client. 2.7 Table of Comparison between WEP, WPA and RSN Below is summary of the comparison between WEP, WPA and RSN: Features of Mechanism WEP WPA RSN Encryption Cipher Mechanism RC4 RC4 / TKIP AES / CCMP CCMP / TKIP Encryption Key Size 40 bits 128 bits 128 bits Encryption Key Management None 802.1x 802.1x Encryption Key Per Packet Concatenated Mixed No need Encryption Key Change None For Each Packet No need IV Size 24 bits 48 bits 48 bits Authentication Weak 802.1x EAP 802.1x EAP Data Integrity CRC 32 ICV MIC (Michael) CCM Header Integrity None MIC (Michael) CCM Replay Attack Prevention None IV Sequence IV Sequence (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Chapter 3: Conclusion 3.1 Achievement of Objectives 3.1.1 To increase the security level of the wireless network. In chapter 2.2 until 2.4, the different wireless securities provide different service. 3.1.2 To avoid the data or information inside the server or computer been hacked by unauthorized user. In chapter 2.1, the type of the unauthorized user that can infiltrates the wireless network and chapter 2.2 and 2.4 the methods to prevent hacking. 3.1.3 To increase the safety of the data transfer between server and computer. In chapter 2.2 until 2.4, increase the safety of the wireless access point of wireless network. 3.1.4 To add extra encryption method to encrypt the packet need to be transfer. From chapter 2.2 until 2.4, the extra encryption methods that can hide the data detail. 3.1.5 To prevent unauthorized user to shut down whole system though the wireless access point. In chapter 2.2 until 2.4, the methods to prevent the unauthorized user to connect with wireless access point. 3.2 Research Conclusion A research has been carried out to finish this seminar report by studying the type of the unauthorized access, concept of the wireless security and how efficiency is the wireless network security by determine the wireless security method. Now wireless has already became widely use by company or enterprise, even at home also can using wireless to connect to internet for home purpose like surfing the internet. The reason why so many people like to use wireless network compare with wired network, is because the structure of wireless network is more neat and easy to manage. At the time wireless just came out to the market, the security for the wireless still breakable by hacker or cracker but need a lot of resources to break the security of wireless network. Because last time, wireless network just introduced, the hacker or cracker lack of technology and technique to break the wireless network. Still after few years, the technology and technique to break the wireless security can found in internet. At that time the wireless network has sound the alert and organizations are finding the solution for solve the wireless security problem. But now, the new technology of wireless security has out to market and the security methods are easy to install. So, now wireless security is not a problem. In the report got mentioned is RSN can be the most dependable wireless security for the wireless network. But it still has certain problem like higher cost. Installation for the RSN needs to change whole wireless network infrastructure. WPA got a lot of security methods that cant compare with RSN but WPA still dependable just like RSN. Doesnt mean the expensive item is the good item. As long as the item is reliable then that item is a good item.

Friday, January 17, 2020

Madame Curie and a Beautiful Mind: A Comparison

There is a lot to commend about the two movies which are the subjects of this paper. The former is a biographical film about the Polish-French physicist, Marie Curie who was the first woman to win a Nobel Prize in Science and also the first to have won two in the same field; while the latter is also about the life of John Forbes Nash, a Nobel Laureate Mathematician. These two films that tackle at a personal level the lives of prominent individuals have arrived at certain commonalities and distinctions, however unintended. It is the aim of this discussion to identify these similarities and differences in a way that we will also be able to identify some elements of the stories. An assumption however is made which is that a classic film such as Madame Curie may have a lot to learn from relatively modern movie A Beautiful Mind, possibly for any intentions for a remake of the first. The idea of Madame Curie is to be able to reveal the personal characteristics of the great female Physicist; how she came to be popular with her discoveries, and how she had lived her life to the fullest. She was disclosed to us during her early childhood as a poor student who had tendencies of fainting in class because of her unhealthy condition. Her name is Marie Sklodowska. Her enthusiasm in science nonetheless led her to an occasion where at the same time she met her future partner and husband, in the name of Pierre Curie- whom she have met in a soiree which was thrown by Professor Perot’s wife. It was coincidental that the couple is both interested in science being a physicist himself, Pierre at first offered Marie his laboratory then had asked him to marry her in a scientific, logical and philosophical way – this added on to the thrill and fun part of the story. The movie has indeed been successful in being able to combine the factual knowledge about Marie’s work and her social and love cum family life. For instance, her attempt to discover a third radioactive element in the rock which she found to have enough energy to take small photographs also led her to divulge to Pierre’s family about her pregnancy. At the same time, the film has socio-political implications. It has presented to its audience some of the issues and problems in the scientific research and academe. Sorbonne Physics Department for example did not want to provide financial support for the implementation and pursuit of their project. In search for the element, radium, they had to withstand the old building where they had to conduct their experiments. The movie had shown the pain and difficulties of a scientist like Marie Curie only for the sake of knowledge and discovery. The movie hence was able to share virtues that humans need to uphold for development and success such as patience, dedication and hard work. Such grand consequences are expressed in their world tours and vacation, engagement in press conferences and acceptance of Nobel Prize not to mention the new laboratory that was given to them by the University since its discovery’s fulfillment. Yet scientists and intellectuals however serious and devoted people suffer from desperation too especially in the midst of a tragic death of a loved one. It is interesting how the life story of Madame Curie had been translated into a love story too which has a beginning and an end. Marie almost lost her mind with Pierre Curie’s accident. However, the movie’s finale proved itself a movie worthy of remembrance as Marie attended and delivered a speech in the 25th Anniversary Celebration of Radium’s Discovery. To her, science which is her craft and her husband’s too is the way to a better world. Inspiring and challenging indeed are the commentaries of critiques to this much celebrated film in the forties. A Beautiful Mind is a 2001 film about John Nash. The movie evolved from a Pulitzer Prize nominated book in 1998 by Sylvia Nasar. Like the Madame Curie film, the beginning of the story is the early life of Nash in a university setting. He studied then at Princeton where he planned on   his unique perspectives aimed at improving the future of Mathematics as a recepient of Carnegie Scholarship in Math. To most people who did not know John Nash,   the movie may appear to be a story of a schizoprenic. Just like the first movie we dealt with above, A Beautiful Mind is a creative way of presenting the ideas of a genius like Nash while invading his private family and social affairs. For instance, the movie utilized a scene at the bar with his friends where a rejection of him by woman has induced his interest in the concept of governing dynamics, a theory in mathematical economics which became his thesis’ subject. Similar to the interpretation of Marie Curie’s character as physicist; Nash’ mathematical skills led him also to relate and mingle in the practical world using math reasoning and solutions – again to provide excitement among its audience. Like Curie, Nash too got interested in teaching after graduation. He taught Calculus in MIT, but Marie Curie was more driven by Pierre to study further in her area of interest. In the same context, Nash met and fell in love with his student, Alicia Larde whom he married eventually. The movie benefitted from the modern visual effects of the twentieth century in succesfully portraying the paranoia and delusional episodes of the main character. Like Madame Curie, a mixture of happiness, pain, sorrow and difficulties traversed in the various acts in the story. However, unlike the first, this second film has been criticized for the inaccuracies of John Nash’s life in several accounts as portrayed here. Perhaps, an understandable exaggeration of the latter has been advised to make the story more moving and appealing. The main difference with this film against the other one is its more complicated plot and additional conflict elements. The story becomes an action film at the same time when Nash was subjected to a mission of decoding an encryption of the enemy’s telecom at the US Department of Defense. The mission has deepened into an anti Soviet-related plot. The pressures and tensions provoked in the scenes of gunfires had caused Nash to behave erratically. He has turned paranoid which made his wife bring him to a psychiatric hospital where he thought everybody were Soviet kidnappers. The twist of the film is that the other characters like Marcee, the girl he became fond of, Charles, his bestfriend, and Parcher, the secret agent are all products of his hallucinations. The story revolved in this kind of set-up where the three would appear and would tell him things he often believed and reacted to; to the point that one of them, Parcher, has convinced him to kill his wife. Like Madame Curie, A Beautiful Mind is a love story which showed the loyalty, and patience of Alicia to her husband John. Imagine how hard it was for Alicia to join Nash in his psychosis and relieve him of his worries and dilemmas not to mention the almost murderous act of Nash of drowning their baby during bathing. In reality however, John Nash suffered only from auditory hallucinations, not visual. Like Madame Curie, the movie ended in a pleasing way nonetheless, where he earned a Nobel Prize in Economics for his famous Game Theory. In conclusion, Madame Curie film is equally a powerful attempt at telling the real story of Marie Curie while preserving the details of her life. A Beautiful Mind however has evolved into a commerialized film which sought to gain interest among the watchers by complicating and fictionalizing on several scenes. It does not pain however doing this in a similar occasion for a revival of Madame Curie movie. I would suggest an inclusion of twists and conflicts as well; say, infidelity, dishonesty or money and power status competition. In this way, the movie is not only modernized, it also becomes more challenging on the part of the audience and the film makers. It is nevertheless important for any movie to announce which details are made up and which are real.                                             

Wednesday, January 1, 2020

The Autobiography of an L.A. Gang Member by Sanyika Shakur...

This book Monster: the Autobiography of an L.A. Gang Member by Sanyika Shakur aka Kody Scott depicts all of the events that Kody went through from the day he joined a gang up until when he decides to leave the gang, and his life after the gang. He joined the Eight Tray Crips when he was only eleven years old. He gets initiated into the gang after his sixth grade graduation, and he describes his initiation as an even bigger right of passage into society than his own graduation. The reasons that Kody suggests that he had joined a gang has to do a lot with the whole concept of belonging. He makes it sound like his family life was not a very good one, and that in school he felt as if he had no power because he hints at being bullied as a†¦show more content†¦In this story Kody’s actions are learned first through the observations of others in his neighborhood or school. People all around him at the time were deciding to join gangs; it was the thing to do. During his initia tion he observed what the others did when it was his turn to shoot at the people in the streets, and after he shot and potentially killed them he was praised and rewarded with officially being a member of the gang. After that night his gang members positively reinforced him anytime he killed or hurt anyone from the enemy gangs, at times even civilians. Even while his mother was disapproving and there was a potential for severe punishment from the police, the positive reinforcement from his friends was more powerful because of his level of respect and admiration for them. An aspect of this theory that Albert Bandura claims teaches people violence is behavioral modeling, which states that people learn how to act by modeling what they have seen others do. This is shown throughout the book because Kody ends up joining a gang, like many others that he knows have done, and he goes along with what other people in the gang are doing and saying. He grows up around his gang members and fashio ns his behaviors to be similar to the ones that he looks up to, and this behavior is repeated with his younger brother, who idolizes Kody, when he joins