Thursday, January 30, 2020

Information Assurance Essay Example for Free

Information Assurance Essay Information Assurance (IA) can be referred to as the process that involves in the management of perils that are closely related to the usage, processing, storage and electronic transfers of information. This field has been birthed by information security, a field in computer security. Information Assurance is aimed at availability, authentication, non-repudiation, integrity and confidentiality of information and information systems thus serving as a defense and protection turf for electronic information. The process of Information Assurance commences with the act of specifying and classifying the assets of the information to be protected. This process of information specification and classification is done objectively taking into contemplation the nature, source and the purpose of the information in focus. This is followed by risk assessment that is done by Information Assurance practitioner who has to put into consideration the likelihood and the impact of the undesired actions that may negatively affect the disclosure of the information in storage to unauthorized individuals. It is at this stage that the both qualitative and the quantitative value of the risk in relation to the current situation and predictable hazard is determined. Moreover, the IA practitioner develops a risk management plan that puts forward the countermeasures that can probably mitigate, accept, eliminate or transfer the risks. The plans also puts into consideration the detection, prevention and response towards the emergent or prospective perils (Qian, Tipper, Krishnamurthy, 2008). During the plan development, various frame works can be employed such as ISO 17799, PCIDSS, ISO/IEC 27002 or CobiT. Procedures and policies such as frequent data and information backups and configuration hardening, installation of anti-virus programs and firewalls are among the countermeasures that can be used. Other activities included as countermeasures are trainings and the restructuring of the computer network systems which put in place computer emergence response team (CERT) or computer security incident response team (CSIRT). These countermeasures aim at managing, extenuating or totally eliminating the forthcoming risks in the most cost-effective manner. Later, implementation, testing and evaluation of the plan are undertaken through various designed methodologies such as formal audits. An overhaul, known as the service integrity service is put in place to protect the resources of the system from accidental unwarranted change, destruction or loss (Rogers, 2004). The system’s authenticator, also referred to as the system administrator, bears the entire authorization mandate and it is only through his certification and accreditation that a third party or any other person can access the information in store. In addition, liaison of the authenticator with the user representative and the program manager grants equal access rights to the protected information. The above three officials also have to decide agreeably on the most appropriate approaches to be instituted in an attempt to meet all the information security prerequisites. Once they have identified these methodologies, they also highlight on the security remedies that are satisfying. The authenticator’s leadership, these information system officials are bestowed with the obligation to oversee the activities of the information system security. So as to be able to access the information in the system, the authenticator has to issue a declaration indicating that approval has been granted to the any alleged declaration holder to operate the automated information system (AIS). Included in this declaration are the sets of standardized rules and regulations that must be adhered to the latter by all users having the right of access to the stored information. These prescriptions are aimed at safeguarding the information in store and the Automated Information System at large. Besides this declaration, data security can be ensured by the use of logins, passwords and digital certificates which are specifically issued to those users who are sanctioned (May, et al, 2004). The former is not so much campaigned for but instead, the latter and the use of biometric techniques such as voice and fingerprints as regarded as more secluded methods. Computer information attackers have devised ways to overwrite and also override these login passwords and as a result, this safety methodology is rarely relied upon. Once authentication has been granted, encryption of the sensitive data is done to avert it from eavesdropping and other related computer information crimes. During the process of authentication personal information is gathered and entered into the automated system which aids in the person’s identification. As a result, the party is issued with a credential. This credential validates the user identity claim when he/she is accessing the controlled and protected assets or information. In pursuit to ensure more safety over the stored information, multi-factor authentication has been employed. The multi-factor authentication process is subject to various environments and other technological rudiments and varies depending on these two aspects (Department of the Army, 2007). These techniques may include network architecture controls, remote network access, network sniffers and securing network ports. Failure to conform to or adopt any of the above mentioned authentication methodologies will expose the stored data to computer information systems defaulters who can craftily bypass weak technical controls. Consequently, they distort the information. This distortion may vary from mere acts such as modifying the main memory’s information after having read it to causing notable and probably irreversible behavior of the schedulers which are finally associated with the crashing of the entire information systems with large volumes data loss. In addition the can disable the firewall module packet filtering by transforming the image such that the agent’s in-memory store code starts working inappropriately (Larry, 2009). This may render the agent disabled from accessing the system. Once automated information attacker gains this unauthorized opportunity to access to the clients’ information he has the freedom to perform dynamic data modifications. Besides, he can access the system management memory (SMM) handler. The end result of this will be a system management random access memory (SMRAM) cache-based attack. Computer information criminals also alter the information system’s operating codes. Moreover, they can access client’s personal and confidential details such personal identification numbers and probably financial institution’s information thus ending up in a big loss in their finances. National and scientific databases have been prepared and managed by the governments of various states. Moreover, academic organizations and research institutions are also reliable. However, these stakeholders have to take keen attention during the auditing of the information, especially those received from partnerships with other organizations to avoid errors that may be disastrous in the future. In information assurance, the information flowing in the associated institutions should be confidential as earlier said and also the information’s integrity should be well safeguarded. In ensuring that the information meets these prerequisites, the British standards well implemented. Information assurance standards are also published a template in the IA website. Moreover, the Defense Information Systems Agency (DISA) site contains these standards which are also coordinated with the MCNOSC. Therefore in conclusion, information assurance can be basically taken to mean the information operations (IO) aimed at information and information systems (IS) protection. This is achieved through the information assurance standards that see the achievement of information availability, its integrity, confidentiality, authentication and non-repudiation. The realization of these standards ensure the refurbishment of IS through the amalgamation of restoration, detection, fortification and reaction competences

Wednesday, January 22, 2020

In this experiment we are going to be studying the affects of Osmosis :: GCSE Biology Osmosis Coursework

In this experiment we are going to be studying the affects of Osmosis in Potatoes. Osmosis is the passage of water from a region of high water concentration through a semi-permeable membrane to a region of low water concentration. A semi-permeable membrane is a very a very thin layer of material, cell membranes are semi-permeable. These will allow some things to pass through, but will prevent other things from passing through. For example, cell membranes will allow small molecules such as Oxygen, water, Carbon Dioxide, Ammonia, Glucose, amino acids, etc. to pass through. But they will not allow larger molecules such as Sucrose, Starch, and protein, etc. to pass through. A region of high concentration of water is either a very dilute solution of, for example, sucrose, or Pure Water. In each case there is a lot of water: there is a high concentration of water. A region of low concentration of water is a concentrated solution of something, for example, sucrose. In this case there is much less water. When one puts an animal or plant cell into a liquid which contains water three things can happen. If the medium which surrounds the cell has a higher water concentration than the cell, the cell will gain water by osmosis. Water molecules are free to pass across the cell membrane in both directions, but more water will enter the cell, than leave it. The Result of this is that water enters the cell and the cell is likely to swell up. If the medium has exactly the same water concentration as the cell, there is no overall movement. The cell will stay the same size. Water will cross the cell membrane in both directions, but the amount entering it will be the same amount leaving it, so there is no overall movement of water. The cell will stay the same size. If the medium has a lower concentration of water than the cell, the cell will lose water by osmosis. The water will cross the cell membrane in both directions, but now more water leaves the cell than entering it. The Result of this will mean the cell will shrink. Variables In this experiment I am going to cut 12 potato sections, I am going to try keeping these roughly the same size and weight. They will be around 4cm long, and all will have an average weight of 2.74g. The liquid that the potato sections will be put into will have different concentrations, but they will all have a volume of 30 cm. I am going to have 6 different test tubes which will have the same volumes but different concentrations. In this experiment we are going to be studying the affects of Osmosis :: GCSE Biology Osmosis Coursework In this experiment we are going to be studying the affects of Osmosis in Potatoes. Osmosis is the passage of water from a region of high water concentration through a semi-permeable membrane to a region of low water concentration. A semi-permeable membrane is a very a very thin layer of material, cell membranes are semi-permeable. These will allow some things to pass through, but will prevent other things from passing through. For example, cell membranes will allow small molecules such as Oxygen, water, Carbon Dioxide, Ammonia, Glucose, amino acids, etc. to pass through. But they will not allow larger molecules such as Sucrose, Starch, and protein, etc. to pass through. A region of high concentration of water is either a very dilute solution of, for example, sucrose, or Pure Water. In each case there is a lot of water: there is a high concentration of water. A region of low concentration of water is a concentrated solution of something, for example, sucrose. In this case there is much less water. When one puts an animal or plant cell into a liquid which contains water three things can happen. If the medium which surrounds the cell has a higher water concentration than the cell, the cell will gain water by osmosis. Water molecules are free to pass across the cell membrane in both directions, but more water will enter the cell, than leave it. The Result of this is that water enters the cell and the cell is likely to swell up. If the medium has exactly the same water concentration as the cell, there is no overall movement. The cell will stay the same size. Water will cross the cell membrane in both directions, but the amount entering it will be the same amount leaving it, so there is no overall movement of water. The cell will stay the same size. If the medium has a lower concentration of water than the cell, the cell will lose water by osmosis. The water will cross the cell membrane in both directions, but now more water leaves the cell than entering it. The Result of this will mean the cell will shrink. Variables In this experiment I am going to cut 12 potato sections, I am going to try keeping these roughly the same size and weight. They will be around 4cm long, and all will have an average weight of 2.74g. The liquid that the potato sections will be put into will have different concentrations, but they will all have a volume of 30 cm. I am going to have 6 different test tubes which will have the same volumes but different concentrations.

Monday, January 13, 2020

Zara International Case Study

Zara International was a retail shop originated in La Coruna, Spain in 1975. It was clothing and accessories shop and imitated the latest fashion trends and sold them at a lower cost. It became Zara International after entering Portugal in 1988 and then the United States and France in the 1990s. The distributor for this brand is Inditex and is considered the most successful retail chain in the world. Zara has a business strategy that is very different from the retailers nowadays.If a customer orders a product Zara’s distribution centers can have the items in the store within 24 to 48 hours of receiving the order, depending upon the country. The business plan that Zara’s executives made was very innovative and played a great part in the success of this retail chain. Not only has it been successful and profitable in the past, they are successful in the present and have been expanding their brand all over the world Zara International’s business strategy has elements of classical management approach.Classical Management approach has the assumption that people at work act in a rational manner that is primarily driven by economic concerns. This approach has three major branches: Scientific management, administrative principles and bureaucratic organization. Scientific Management Frederick W. Taylor used the concept of time study which is to analyze the motions and tasks required in any job and to develop the most efficient ways to perform them. His first principle was motion study which is the science of reducing a job or task to its basic physical motions.This concept was clearly evident in Zara International’s case. Time is the main factor that is considered by Zara International as opposed to production costs and advertisements. According to Schermerhorn (2010), â€Å"Parent company Inditex Group shortens the time from order to arrival by a complex system of just-in-time production and inventory reporting that keeps Zara ahead (p. 54)à ¢â‚¬  It is only possible if Zara has skilled workers and the required training to train these workers with the ability to send the product within 24 hours of receiving an order in the European store and 48 hours in American and Asian stores.This is evidence of using the principles two and three of Scientific Management. All this requires careful planning which is the fourth principle of scientific management. Administrative Principles: Henri Fayol’s administrative principles are also clearly seen in Zara International’s case. Zara had a foresight of what it was doing will create profit. It did not spend any money on advertising but instead on being efficient and on time on its production. With no advertising the company made a profit of $10 billion in sales which were overwhelming.The CEO of Inditex Pablo Isla seems to have great organization and leadership in gaining profit for the business. Zara international also applies a Behavioral Management approach in doing b usiness. According to Schermerhorn (2010), â€Å"The behavioral approaches maintain that people are social and self actualizing. † (p. 38) Instead of advertising their brand Zara makes sure that the interiors and exteriors of the stores are up to date and designed based on the location. They focus on what people are demanding and keeping in mind their social and cultural needs.It also keeps a close watch on the latest trends and the buying behavior of customers. Zara’s strategy of being successful consists of various factors. Zara has succeeded by doing business according to customer’s needs and buying behavior. Their different approach in production approach is another factor. They have created a very efficient link in between their management principles and social environment. Their use of complex systems of just in time production has played a major role in its success. Zara also has believed in cutting expenses wherever and whenever possible and has done tha t in an intelligent way.Their strategy of inventory control is also worth applauding. By using this distinctive thinking Zara has been successful amongst the fashion world. The latest trends in the competitive apparel industry are companies going digital. Reinvention of fashion runways and then use of social media in publicizing the latest fashion is a hot trend. Use of mobile devices such as smartphones and iPads for shopping for the convenience of customers is also a very hot trend. There are also virtual dressing rooms and interactive store windows that make shopping for apparel easier (Agathou, 2012. Zara has also started to come up with innovations to stay in the competition. Zara International has launched its online store in Mainland, China (Inditex to launch, 2012). Zara has also expanded its stores internationally by entering South Africa this year (Kew, 2012). Zara International will definitely continue to do well with the business strategy. However it will still have to a dapt to the changes in the global economy and plan their business strategies according to the customers and clientele. It will do well since it is expanding internationally and also adapting the latest technologies.Zara International has gained huge success by following the classical management approach and the behavioral management approach. Inditex has used a distinctive business strategy in their production and inventory control. Even in the competitive trends in apparel industry, Zara will survive in the competition if it continues to do business according to the clients’ needs and wants. BIBLIOGRAPHY (2012, September 4). Inditex to launch Zara’s online store in Mainland, China. www. fibre2fashion. com. Retrieved from http://www. fibre2fashion. com/news/apparel-news/newsdetails. spx? news_id=115305 Agathou, Amalia. (2012, June 30). 6 Hot Digital Trends transforming the fashion industry. Insider. Retrieved from http://thenextweb. com/insider/2012/06/30/6-hot-digital -trends-transforming-the-fashion-industry/ Kew, Janice. (2012, August 27). Zara Enters South Africa as Foreign Brands Seek Growth. Bloomsberg Businessweek. Retrieved from http://www. businessweek. com/news/2012-08-27/zara-enters-south-africa-as-foreign-brands-seek-growth Schermerhorn Jr. , John R. (2010). Management. Management Learning Past to Present. (pp. 31-56)

Sunday, January 5, 2020

An Inside Look at Teenage Obesity Essay - 623 Words

What exactly is obesity? Obesity (noun) - the condition of being grossly fat or overweight. A bunch of people don’t understand what being obese means. Just because you have a couple extra pounds on you doesn’t mean that you are overweight! You have to always eat till your stomach gets full. If you always eat too much it doesn’t mean that you are overweight. You have to eat too much of the wrong foods. The reason more and more people are developing eating disorders is because they are misusing food and stress eating and eating for fun, whenever they are bored. Another term for obesity is Bulimia. Bulimia is an eating disorder. Bulimia is also known as bingeing and purging. Bingeing is eating until you are sick full and purging is when you†¦show more content†¦Obesity can become a lifelong issue if you don’t do something about it. Obesity commonly begins when you are around the ages of 5 and 6 years old, or during adolescence. Some risks of obesity are increased risk of heart disease, having a very high blood pressure, type 2 diabetes, having trouble breathing, and being restless at night. If you don’t focus too much on your child’s weight, then they probably won’t get as emotional if you discuss the topic. Don’t make your child feel about themselves! Some kids cant help being obese! A bunch of kids are not able to burn off their baby fat. The biggest challenge for an obese teen is the emotional and social problems that they are having. More teens are obese now then ever before. There are a bunch of factors that I have listed to being obese and overweight, but there are 4 main ones; eating too much, exercising too little, poor eating habits, and genetics. Sometimes even the fat cells can grow bigger and you just can’t help it!! Statics show that some guys only date obese girls to take advantage of them. If you ever feel like you are â€Å"fat† don’t sit and stress yourself out, but just go and talk to your doctor and find out if you are getting more on the obese side. If you ever feel bed about being overweight, DON’T starve yourself! Otherwise you can develop Anorexia Nervosa. (Anorexic) also don’t ever purge after you binge! It can make you severely sick and can even cause serious health issues! It is VERYShow MoreRelatedToday’s Teenage Nutrition Essay599 Words   |  3 PagesToday’s Teenage Nutrition Getting something to eat from a convenience store or a fast food restaurant is an everyday thing for most teenagers. For breakfast it’s a sugar covered donut, for lunch: a bacon cheeseburger from a fast food restaurant near the school, and for dinner: mom’s homemade 4 cheese casserole! A typical day for an unhealthy teen! Today’s teens are not getting enough nutrients; most teens rather not eat then have fruit or vegetables. Which is a very bad idea because it will haveRead MoreObesity Is The Most Common Pediatric Chronic Disease Essay1740 Words   |  7 PagesAbout one-third of children and adolescents ages 6 to 19 are considered to be overweight or obese(NIH). Obesity has become the most common pediatric chronic disease in todays time.(TRINITY). An approach to this would be to make a dietary plan to help the youth overcome this sickness .Many illness that occurs in obese teenagers are a result of their eating habits, minimal excise time, and continual depressi on. Over eating can be a result of the teenagers not having enough activities to engage inRead MorePhysical Maturation B : Cognitive Development And Schooling1406 Words   |  6 Pagesand late maturation are the consequences of puberty timings. Nutrition is necessary for physical growth in adolescence. There are two problems related to nutrition are eating disorders and obesity. Obesity occurs due to fast food availability, lack of exercise and most of children spend their leisure time inside the home. Anorexia nervosa and bulimia are two eating disorders and these are cured by dietary modifications and physiological therapy. Brain is not fully developed until the early 20s. AtRead MoreEssay on The Dangers of Eating Disorders795 Words   |  4 PagesDangers of Eating Disorders How a person perceives their body is influenced by what it looks like to them and what it looks like to others. Our society teaches us through media and social pressure that body image is important. Feeling attractive is an important part of self worth and for many, feeling attractive means matching a certain ideal appearance. Most of us will never be able to look like this ideal, but the message we get is that we risk social failure if we do not try hard enoughRead MoreHealth Assessment of the famli using Gordons 11 Functional Health Patterns1274 Words   |  6 Pagesin assessing and evaluating the family’s established health patterns, allowing the care provider an inside look at the overall health of a particular family and able to assist them in setting goals for better health outcome for the entire family. This paper will discuss the health habits and manner of functioning of the Lamoth’s family, which consist of a mother age 41, father age 37, and 3 teenage sons, ranging in ages from 19, 16 and 14. This assessment will be conducted by asking 2 to 3 open-endedRead MoreEssay about Eating Disorders1206 Words   |  5 PagesCompulsive overeaters may feel empty inside, and turn to food to help them feel full. A binge can average from any where between 1,000 calories to 20,000, or even as low as 100 calories.   Ã‚  Ã‚  Ã‚  Ã‚  An eating disorder can develop due to a number of reasons. It could be emotional and personality disorders, family pressures, a possible genetic tendency, not to mention a culture we live in that has an obsession with food and being thin. This is especially true for the young teenage girls, who see the models inRead MorePersonal Experience: My Distorted Body Image Essay examples1167 Words   |  5 PagesI am fake†¦ ugly†¦worthless. I conceal my face with layers of makeup hoping that half a bottle of BB cream will be enough to make me as flawless as Kylie Jenner look on the cover of Seventeen magazine. I use innumerous acne medications, aspiring to be as unblemished as the girls in the Clean and Clear commercials. I reject bags of MMs and fudge brownies thinking that my sacrifices will make me â€Å"love my body† as much as the emaciated Victoria Secret models love theirs (see appendix A). I routinelyRead MoreDiscrimination And Body Acceptance In Society. â€Å"Why Are1928 Words   |  8 PagesDiscrimination and Body Acceptance in Society â€Å"Why are so many people discriminative against other people’s bodies?† (Kelli Jean Drinkwater) Why is it anyone’s business how others choose to live their lives and how they look? One of the most pervasive and yet ignored discriminations in our society is due to weight, size and body image. As a society, we should be respecting one another as individuals instead of judging each other superficially. Keyboard Commandos on social media sites are constantlyRead MoreBody Image, Eating Disorders and Advertising3063 Words   |  13 Pagesdefined what clothes I should wear. As I grew into an adult, I became comfortable with the body my parents gave me and realized that too often magazines entice prospective readers with strikingly beautiful models and tag lines that lead us to believe inside the magazine lay the secrets to beauty, happiness and fitness. For instance the woman staring back at me on the latest Runner’s World cover is not necessary a stereot ypical female runner. In fact, she portrays an image the average American willRead MoreEssay on Fat Americans1643 Words   |  7 PagesAmerican’s being overweight has become such a common trend, that when I walk down the street, and happen to see an overweight person, I don’t even consider them as being overweight anymore, because it has become commonplace, and obese American’s may get a look here and there but for the most part they are just passed by the same as everyone else. Americans are living in a society where people worship food and supermarkets have become the new cathedrals in this country.   Ã‚  Ã‚  Ã‚  Ã‚  There is a multitude of reasons