Wednesday, January 29, 2020
Should you hire an experienced hacker to protect your IT systems Essay Example for Free
Should you hire an experienced hacker to protect your IT systems Essay Securing IT systems from potential threats and thefts is a daunting task faced by organizations. Sensitive information in wrong hands could be harmful and can cause lot of damage. Hackers not only gain access to information but also indulge in various forms of cyber terrorism such as extortion. Hackers, discover the vulnerabilities of an IT system and exploit it. They understand the nuances of the system so well that exploiting it for their advantage becomes easy. The question one needs to think about is if hackers are so talented enough to break into security system, why shouldnââ¬â¢t their services be sought to protect the system. A hacker depending on his intentions could be a white hacker/white hat, black hacker/black hat or grey hacker/grey hat. A hacker who indulges in hacking with a non-malicious intention to expose the vulnerabilities of the system is known as white hat. These hackers employ the techniques used by malicious hackers to test the security of an IT system and detect any errors. Hackers who intrude IT systems with motives such as theft of data or cyber terrorism are commonly known as black hat. They find the mistakes in the computer systems and use it to their advantage. A grey hat would be someone whose intention is at the borderline. Grey hat hackers are those who perceive breaking into a security system , a challenge for their skills. They may not cause any harm but nevertheless they intrude a system. White hat are also known ethical hacker assess the possible threats to a IT system. It is necessary for these ethical hackers to gain an insight into the mind and techniques of malicious hackers. An example of an ethical hacker is Mark Seiden who works as an independent security consultant. It is his job to find the weak links in a security system and provide solutions for those loopholes. He has helped various organizations in tracking the vulnerabilities of their security system. According to him, the creation of a security system is an effort required by two people. One who is responsible for creation of the security system and the second who would test the system for its faults. These days there are various institutes which offer training in hacking for the detecting loopholes in a security system. Anyone with knowledge of computer programming or network administration is eligible for this course. These modules which aim at producing a ââ¬Å"certified hackerâ⬠, train people interested in hacking by providing them in-depth knowledge about security systems and how to detect loopholes within them. The sole aim of this training is to enable the white guys use skills such as penetration testing, internal/external network hacking, war dialing etc. to test the vulnerability of their networks and IT systems. Thus armed with knowledge about the workings of the bad guys, they are sought by organizations to help them avert intrusion. However, one needs to address the issue whether the ethical hackers work under a code on ethics that will prevent them from using this knowledge for a wrong cause. When students enroll for courses in learning regarding hacking systems, there is no way to detect whether he is going to use it for a malicious purpose or not. There are various risks associated with training people with skills to detect vulnerabilities. Some of the courses are taught online. It is possible for malicious hackers to gain access to this to further enhance their knowledge. There are certain disadvantages in hiring or training ethical hackers. There is no assurance that the hacker will comply to the code of ethics. Since they have the knowledge of breaking into systems and gaining access to valuable data, their intentions might vary and they may get lured into unethical activity. Therefore, while offering training on these hacking courses one needs to ensure awareness regarding misuse and unauthorized access. Information regarding the legal implication in unethical usage should be available to students availing such courses. Exposure to laws and punishments regarding malicious hacking should be provided. This can act as a deterrent to behave in an unethical manner. Organizations should exercise great caution while hiring hackers. They should have legal contracts which explicitly state the terms and conditions under which hacking is carried out. Ethical hackers should develop a code of ethics under which they operate. They should ensure that these hackers are working under strict policies and supervision of the organizations. Good security policies are another way to dissuade unethical hacking. Employees with a proven track record can be trusted with responsibilities of ethical hacking. One should be cautious while employing a criminal hacker to detect system weakness. Conclusion The advantages associated with ethical hacking outweigh the risks. Under supervisions and security policies organizations can engage experienced hackers to test their system for weal areas. Information in wrong hands could be dangerous and harm the credibility of organizations. An experienced hacker thus identifies the error in the software of security system and provides patches to secure it further. It is true, to overpower oneââ¬â¢s enemy, you need to think like the enemy.
Tuesday, January 21, 2020
Society and Government Essay -- Philosophy, Hobbes, Locke
Thomas Hobbesââ¬â¢ Leviathan and John Lockeââ¬â¢s Two Treatises of Government have produced two definitive and vastly different theories of government. Though both philosophers seem to be embedded in the concept of a natural law, why do Hobbes and Locke seem to come to two opposing conclusions about society and government? The answer lies in critical distinctions between their interpretations on the state of nature, including their conjectures on human nature, their perceptions of freedom and equality, and their ultimate reasoning for civil society. Human nature is an integral part of the state of nature theory. Hobbesââ¬â¢ theorizes that human nature is flawed, with men being naturally selfish and hedonistic: ââ¬Å"of the voluntary acts of every man, the object is some Good to himselfeâ⬠(Hobbes, 1996, p. 93). This suggests that in a natural state, humans are only guided by their own needs and wants. As a result, Hobbes believes that the only law that governs the state of nature is maintenance of self-preservation. This gives rise to a clashing of desires, which compels man to undermine any concern for others and put oneself above all else. The extent to which man is able to undermine others for the sake of self-benefit is also limitless according to Hobbes: ââ¬Å"in this law of Nature for where no covenant hath preceded, there hath nor Right been transferred and every man had right to everything; and consequently, no action can be Unjustâ⬠(Hobbes, 1996, p. 100). There is a clear Hobbesian view of morality that begins to take form. Good and evil seem to be relative to Hobbes. Because of this, each individual in the state of nature has varying perceptions of morality, which often conflict, creating disagreement that only incites violence. This pr... ...have consent in order to act. This essentially gives sovereign power to the people. This philosophy is also consistent with Lockeââ¬â¢s favor for a republican structure of government. The apparent difference seen between the political theories of Hobbes and Locke can be attributed to their differing views on the state of nature. The development of mankind as a selfish being living in a state of war and violently attempting to obtain equality naturally lead Hobbes to conclude that an authoritative power is needed to instill order to chaos. On the other side of the spectrum, Lock molds the state of nature to be a state of peace, and attributing men to Reasonable creatures and consequently creates a representative government where the people hold sovereign power. Essentially, these theories seem are a result of a pessimistic and optimistic framing of nature and humanity.
Sunday, January 12, 2020
Review of Related Literature and Studies Essay
This chapter deals with the review of Literatures and Studies. It also presents the synthesis of the review and its relevance to the present study. Related Literature AMA student Kariz Reinalyn B. Galano (et. al. Don Ricardo C. Lazaro, Rozmaigne Ann L. Sebastian, Kevin Patrick E. Viesca) (2012) cited in their approved thesis proposal at present ACLC has three hundred sixty five students enrolled. The institution is currently using a manual system in their Library and has weak security. Students can borrow books but need to return it within 5 school days. There is no proper monitoring on books being returned. There are no penalties imposed to the students as well. The only way the librarian will find out if there are still pending books not returned is during the end of semester at the inventory period. The librarian then will not sign the clearance of the students who failed to return the books. Another problem is the list of inventory of books. The students need to go and ask for the librarianââ¬â¢s assistance in order for them to search for the books. Karen Foss (2010), Library Director of the Catawba County Library System in Newton, North Carolina has expressed that it is difficult to find materials to help new public library managers cultivate their professional development. Most of the research and writings on library management have focused on academic libraries and only recently has there been more interest in the administration of public libraries. The skill and style of public library managers ââ¬â the directors, branch managers, and department and service managers who are leading these institutions ââ¬â strongly affects the culture of a public library. Library staff looks to these managers to help them navigate through the rapid changes that are occurring in public libraries as these changes in technology, roles, and user expectations strongly alter their daily routines of public service. Contemporary library managers need a wider array of skills and attributes than their earlier and more traditional counterparts and will need to seek continual professional development to remain effective as public libraries transition into the twenty-first century. These managers will also need to distinguish between management and leadership skills and learn to identify and mentor leaders within their staff who can assist in the transition. According to Alvin javelosa (2011) library is a collection of books, resources, and services, and the structure in which it is housed; it is organized for use and maintained by a public body, an institution, or a private individual. The term ââ¬Å"libraryâ⬠has itself acquired a secondary meaning: ââ¬Å"a collection of useful material for common use,â⬠and in this sense is used in fields such as computer science, mathematics, statistics, electronics and biology. this study will help the library personnel or the librarian in monitoring the books accurately. Further, the use of cataloguing will be made easier through an advance system provided by this study. The librarian is encountering problems in doing transactions like borrowing books, checking the availability of books, returning and accessioning of books because all the transactions are being done manually. The process is time consuming. This proposed system will provide their library a computerized system making it more organized and easy to access. The advantage of this study is to make their current system more effective and efficient. This computerized library system is a transaction processing system (TPS) that will provide a convenient cataloguing, inventory, monitoring, accessioning, borrowing, returning, security and retrieving of records. html) According to Mohd Fairuz Anwar Bin Mahadi (2005), The Library management system will store all the books and members information that consist book number, book title, author name and racks to the system database. The system also provides search function to help students find the book by number of book. Search functions will search through the books database to look for the book and view where the book is situated. For the administrator user, only librarians have access to view or edit data from the system databases. Administrator user will handle administrative functions such create new LMS user account and decide the number of days allowed for the borrowed books. User needs to enter correct password and user id before user can access this function. From here, user can add, delete or update the book and borrower database. (http://library. utem. edu. my/index2. php? option=com_docman&task=doc_view&gid=3761&Itemid=208) According to Donna M. Salinas (2010) Library is the best place in the school where the students review and study. It is the place where students study so our group aims to improve the manual operation of the library system. We thought of something that makes the time of students and library personnel decreases for searching and borrowing of books. (http://www. scribd. com/doc/56632694/library-system) Related Studies: According to Shelagh (2001) Fisher library management system is becoming marginalized in the context of ICT developments currently taking place within the library sector because suppliers have failed to keep up with such developments, or have been more concerned with keeping up with the changes in the core functions. The aim of this research, therefore, was to determine the feasibility of developing and disseminating a model system specification which could be used to assist and guide libraries in the procurement of library management systems. The premise was that if a core set of requirements for library management systems, as articulated by purchasing libraries, could be identified, it followed that it would be feasible to develop a model specification or ââ¬Ëtoolkitââ¬â¢ on which procuring libraries could draw. Identification of a potential core set of requirements could be identified primarily by undertaking analyses ofà specifications produced by libraries for the tendering process in acquiring a library management system. Thus forty-one specifications were collected from libraries which had recently acquired a library management system, and these were subjected to various levels of analysis. The results are reported in Section 4. Secondly, it was decided that as library system suppliers were in receipt of large numbers of specifications produced by procuring library authorities they were in a strong position to comment on the feasibility, and desirability, of developing a model specification. Thus, a survey of UK system suppliers was undertaken to determine the collective view of suppliers on the role, content, quality and usefulness of the specification as a procurement tool. The results of the survey are reported in Section 5. A detailed account of the methods used in this Study is provided in Section 3. The next section (Section 2) provides a review of the literature on the role and content of specifications, and identifies weaknesses in approaches to producing specifications for the purchase of library systems. (et. al. Rachel Delbridge, Sian Lambert) (http://www. cerlim. ac. uk/projects/harmonise/harmonise. pdf). According to Veronica Adamson (2008) Changes in society and technology are impacting significantly on UK HE libraries and consequently on their management systems. Demographic changes, political and economic drivers are affecting university services and funding structures, and a ââ¬Ënew realismââ¬â¢ of pragmatic economic and business considerations presides. (JISC & SCONUL LMS Study Report, March 2008) Library management systems have developed in response to technical advances and user requirements, mainly in developing electronic interfaces, refining standards and access protocols, purchasing and acquisition processes and cataloguing systems. Increasing globalization of goods, services and communities means that technical platforms are now developed on an international basis and implemented for a worldwide network of users and contributors. A new market for library services and information provision has emerged, with Google and Amazon as a de facto paradigm and metaphor for discovery and delivery. Perceptions of the role and function of the university library are changing, developing and often conflicting, particularly in relation to the provision for collection and circulation, resource discovery, ownership and control, personalizationà and seamless access to resources. Enhancing usability and accessibility for an increasingly diverse user community is of increasing importance for libraries. Todayââ¬â¢s library users expect speed and immediacy of information discovery, one-stop access to aggregated services, user-generated open content, and personalized, workflow-related delivery to the desktop. (et. al. Paul Bacsich, Ken Chad, David Kay, Jane Plenderleith) (http://www. jisc. ac. uk/media/documents/programmes/resourcediscovery/lmsstudy. pdf). According to Herrera C Rocio (1987) the work habits of users in any activity requiring information, the importance they attach to obtaining it and the facilities at their disposal, their knowledge of these facilities, their assessment of their value and the possibility of their obtaining what they are looking for are the factors that affect user behaviour in the quest for information. The behaviour of the users of university libraries specifically is affected, in addition to the above factors, by others directly related to the university environment, such as teaching methods and the type of education provided. The countryââ¬â¢s education system is a teaching-learning process largly consisting in an essentially repetitive pattern in which the student consumes and reproduces the concepts transmitted by the teacher. This model is mainly based on the university lecture system, in which the teacher simply gives a course of study and provides the pupil with a brief bibliography consisting basically of texts. The result has been that education has not become a critical and creative process and library resources have accordingly been under-utilized. As regards the response to the information services provided by university libraries, it can be said that research workers do not use the services properly since the role of the library as an agent for the transfer of information has been disregarded in the research process, this type of user tending to acquire information through informal channels of communication, such as personal contacts with other colleagues. In its turn, the library has neglected its task as a constituent part of the research enterprise, forgetting that one of the priorities of the university, in addition to its teaching role, is that of research, which is the source of much knowledge of benefit not only to the university but also to the community in general. The university library should pay special attention to ascertaining not only the specific information needs of each type of user but also user behaviour patterns in the information retrieval process, in order that these needs may be met and the factors responsible for the non-use of the library restricted to a minimum. This will be achieved through an appropriate methodology for conducting user studies, which will then provide guidelines for the organization of user training or instruction courses aimed at the various groups. These courses will influence the future response of users to information services. Since user behaviour in the information retrieval process determines the level of library-user interaction, continual monitoring by the librarian of changes in that behaviour is necessary. These changes are dependent not only on information needs but also on the possible impact of the introduction of new services. This shows that, over and above the matter of training in the use of library resources, user behaviour presents a number of special features, largely reflecting the fact that the information needs of those concerned are not well defined and that their request for information are consequently vague and very general. It follows that library staff should bear in mind their active role in promoting and publicizing their services and resources since, despite the continual emphasis placed on the role of information in development, it has been shown that users tend to dispense with non-essential information, the usual practice being to rely on memory, to evade the problem or to solve it with vague or incomplete information. However, it should not be overlooked that there is another group of users who consult libraries actively and effectively in order to satisfy their information needs; although accessibility influences the use that they make of resources, the most important thing for this group is their confidence and faith in the information system. (c Loreto M. Libia and Rua R. Ivan) (http://www. unesco. org/webworld/ramp/html/r8722e/r8722e0l. htm) According Neelakdan,B (2010) a sincere attempt has been made towards finding out ways and means for automating activities in the School of Chemistry Library. The objective of this study is to use the Koha Open Source software system for the automation of the major dayà toà day activities of the various section of the School of Chemistry Library, which is tiresome and cumbersome. After the investigation, the researcher has found that Koha Software is more suitable for the library Automation. This project had the basic objective of designing a bibliographic database for the School of Chemistry library, with which the automation of circulation routines is carried out. From this point of view it may be concluded that Koha is a useful package for the creation of a database and for information retrieval. This set of Manuals for the automation of circulation section is tested with the database created from the collection of chemistry department library. A sample database for a few thousand works and a database of the users/borrowers are created. With that test sample the Manuals for each function of the circulation section is tested with the available computer system. Koha is an integrated software system with all the required models for small to very large libraries. It is found that this automation projects will serve as a model for any library. (http://www. ipublishing. co. in/jarvol1no12010/EIJAER1014. pdf) According to Dio P. Doble (2011) A college strengthens its educational level through the advancement of its library. The Botolan Community College Computerized Library System aimed to enhance the procedures of the library, from manually operated to a computerized system. This proposalââ¬â¢s purpose was to ease the transactions in the library, i,e. , leading of books, storing of books, search engine for books, manage members of the library and secure the library system. The librarian and the library users still use the manual way of transacting of borrowing and returning of books. The librarian use log books in listing the books. They use library cards and card catalogues in searching for reading and reference materials. (http://www. scribd. com/doc/99431218/Computerized-Library-System).
Saturday, January 4, 2020
The United States Constitution - 955 Words
The question that is often brought up is how an 18th century document can possibly deal with the Modern issues today. The initial problem faced by the framers of the United States Constitution was that it was impossible to list all the powers of government. There were just too many, and they wanted to build a government that would last and stand the test of time. Section 8 of Article one in the Constitution specifies in great detail the powers are limited to those listed and those that are allowed to carry them out. They added a rule near the end of the document, which states: Congress has the power to make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or any Department or Officer thereof.â⬠(U.S Const. art. 1, sec. 8) This clause, known as the ââ¬Å"Necessary and Proper Clauseâ⬠enlarges legislative power by enabling Congress to use an y means it thinks reasonable to put these powers into action. It also authorizes Congress to enact legislation necessary to carry out the powers of the other branches. It is also known as the ââ¬Å"Elastic Clauseâ⬠. This means that the powers listed are the government s only powers. It also means Congress can make any law it needs to, in order to carry out its enumerated powers. The clause allows the government to stretch beyond its literal description; therefor giving it the nickname of the elastic clause, sinceShow MoreRelatedThe United States Constitution And The Constitution Essay1491 Words à |à 6 PagesThe United States Constitution, this very detailed group of words was written in 1787, but it did not take effect until after it was ratified in 1789, when it replaced the Articles of Confederation. It remains the basic law of the United States then and till the present day of 2016. The first state to ratify the Constitution was Delaware; the last of the original thirtee n to ratify was Rhode Island and since only nine were required, this was two years after it went into effect. When the U.S. ConstitutionRead MoreThe Constitution Of The United States Constitution Essay1185 Words à |à 5 Pages(framersââ¬â¢ of the U.S. Constitution) position on the Presidency: The framers experienced the abuse of the English monarchs and their colonial governors. As a result, the framers were skeptical of the excessive executive authority. Furthermore, they also feared excessive legislative powers. This was something that the Articles of Confederation had given their own state legislatures. The framers of the constitution deliberately fragmented power between the national government, the states, and among the executiveRead MoreThe Constitution Of The United States885 Words à |à 4 Pages In 1787, our founding fathers came up with a few principles that would establish what we now know as the United States of America. These principles were put on paper to serve as a guideline for how the United States would be operated and structured. This historical piece paper became known as the Constitution of the United States. In the Constitution, a Preamble is implemented at the beginning that essentially tells what the founding fathers set out to do. ââ¬Å"We The People, in order to form a moreRead MoreThe Constitution Of The United States894 Words à |à 4 Pagesthe substratum for that country. A Constitution can be defined as a document that is the substratum of the countryââ¬â¢s principles. Elements in the Constitution may contain sundry information. Which can include: how many terms a leader may serve, what rights the citizens have, how the judicial system works, etc. The United States in no different from those countries. Every constitution is different, no country has the exact constitution as another. The U.S Constitution is a four-page document detailingRead MoreThe United States Constitution Essay1515 Words à |à 7 PagesThe United States constitution was written in 1787 by the founding fathers of this country. Now it might be appropriate to question why a document that is the basis of the government for one of the most culturally and racially diverse countries in the world, was written by a group of heterosexual, cisgender, rich, white men. Some might think that a constitution written well over 200 years ago would be outdated and irrelevant to the American society of today but with some research, it is quite theRead MoreThe Constitution Of The United States756 Words à |à 4 PagesPromulgation and Legislation in the U.S. Constitution: The federal system of government of the United States is based on its constitution. The Constitution grants all authority to the federal government except the power that is delegated to the states. Each state in the United States has its own constitution, local government, statute, and courts. The Constitution of the United States sets the judiciary of the federal government and defines the extent of the federal courtââ¬â¢s power. The federalRead MoreThe Constitution Of The United States1007 Words à |à 5 PagesThe United States of America has previously experienced failure every now and then. With trial and error, the country has learned to correct its ways and move toward(s) perfecting itself. Realizing the ineffectiveness of the Articles of Confederation is a prime example of the U.S. learning how to better itself. Subsequent to the Articles of Confederation, the Constitution of the United States was set as our new and improved framework of government. Possessing knowled ge on how America, although strongRead MoreThe Constitution Of The United States951 Words à |à 4 Pageshappening again. Unlike the artifacts, The Constitution of the United States has not been forgotten, it is actually still very alive today. Unlike most relics, The Constitution still holds a very heroic and patriotic implication, freedom. With freedom comes self-government, freedom of speech, religious tolerance, etc. With all these things comes the great responsibility to adapt and fit to the wants and needs of the decade. Even though the Constitution was made for the interests of the people ofRead MoreThe Constitution Of The United States1388 Words à |à 6 PagesInterpretation of the Constitution is one of the biggest conflicts within the United Statesââ¬âthe highly contentious issue of statesââ¬â¢ rights resulted from two different interpretations of what powers should belong to the federal government versus what powers belong to the individual states. No issue has ever caused as much turmoil as the issue of statesââ¬â¢ rightsââ¬âbut one side must have more valid arguments. Should the federal governmentââ¬â¢s power be superior, or should the authority of the individual states be heldRead MoreThe Constitution Of The United States1490 Words à |à 6 PagesIn 1787 the four founding fathers of the United States wrote the constitution . The constitution was written to let the people of the U.S know how the states would be governed and also to stop the government from having too mu ch power. The constitution is divided into three branches : the Legislative branch, Executive branch and the Judicial branch. All the branches are based on the idea of separation of power in which each branch has a specific power and responsibility and donââ¬â¢t rely on
Subscribe to:
Posts (Atom)