Thursday, November 28, 2019

Old and Middle English Literature Essay Example

Old and Middle English Literature Paper The Norman conquest of England began In 1066 and with It began a legacy that would transform he English literature entirely and make way for a new culture known as Norman England. The links created with France established sources for dispersing of Ideas and the merging of others. A new acquired taste In art was evident as well as the popular way to tell poetry through a song and dance. Old English Literature rooted from a heroic culture which established a sense of hierarchical system among the people. A heroic culture was different from a Christian culture in the way social organization was established. The King or Lord was supposed to be a courageous and exemplary man while cowardice was abhorred. In a heroic culture women held no status and strongly believed in revenge as if it was a moral obligation. Another belief of during the literary time was that there was no after-life except in song celebrating valor and deeds. The collection of Old English Literature was preserved due to King Alfred. The literature during the time was primarily oral since few people were literate. Texts were copied by hand by monks for monks since it was extremely expensive. The form of an Old English Prosody consisted of a single poetic unit divided in half by a Caesura each half containing two stresses. A main poetic rule was the sole use of alliteration instead of the traditional rhyme. Another popular source for secular Old English Literature was the inability to distinguish between factual history and legend. We will write a custom essay sample on Old and Middle English Literature specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Old and Middle English Literature specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Old and Middle English Literature specifically for you FOR ONLY $16.38 $13.9/page Hire Writer These characteristics are transcribed well in Beowulf by an anonymous Anglo-Saxon poet. Beowulf, the protagonist, is a brave Seat who heroically battles a monster who has been terrorizing the residents Greened, Grenades mother, and a dragon. The heavily alliterated poem continues today to be one of the most prominent for recognizing the Old English Literature time and structure. After the Norman Invasion the Old English developed Into the new Middle English culture and language. The Impact of the church dominated highly on every aspect Including culture and literature until the government became centralized and the King became head. Poetry now consisted of new terms and Ideas such as Romance, Courtly love, carol, allusion and allegory. Three groups of poetry were born from the Impact of the Invasion which were religious, secular, and translations of Latin poems. Moral poems and devotional poems were structured on Christian beliefs such as he Crucifixion and the grief of the Virgin Mother. Poems Like Ye That Passe by the Wee, and A cry to Mary ask for people to become better Christians and to contemplate ratter than advocate Tort conversion. During ten tale another popular form was the secular poem which was intended to be sung rather than told such as The Cuckoo Song in which six voices celebrate the coming of spring. Courtly love was also dominant in Middle English Literature as it was in Alison by Francesco Patriarch. In the poem the speaker complains of the great pain the love he has for Alison causes him. Male-female romance is exaggerated and written about in most of the poetry from the Middle English period as well. The Anglo-Saxon period did bring a lot of poems during the 1 lath and 15th centuries which can avidly be distinguished as the Norman Invasion took place. When the Norman came, they brought with them a whole new culture and language which can be seen in the poetry that is left behind. The replacement of conventional rules and Old English literature with the Middle English was not a complete loss for tradition but also aided literature in becoming better and innovated.

Monday, November 25, 2019

Union Advantages and Disadvantages Essay Example

Union Advantages and Disadvantages Essay Example Union Advantages and Disadvantages Essay Union Advantages and Disadvantages Essay Advantages and disadvantages when being in a union The National Labor Relations Act was enacted by congress in 1935 in order to define and defend the rights of the employment relationship. The act allows employees of a company the right to form a union and have the union organization represent them through collective bargaining. Collective bargaining is the process of negotiation between both parties; Union representatives and a corporation, with the purpose of reaching an agreement for the best interests of employees and the corporation. In the negotiation process the attempt is to establish primary factors of importance which are advantages the union fights for and ultimately provide for its stakeholders that would otherwise not have if there were no union representation. Advantages include job security, higher wages, affordable healthcare coverage and specialized job duties. However, there are disadvantages associated with labor unions along with their benefits such as strikes, loss of individuality and union dues. Secure Job In a competitive global economy where there are layoffs and job loss the union difference is job security. Unions are often able to make sure that the hard working and experienced employees are protected against unjustifiable causes. When the company decides to improve technology and bring new machinery as a form of making more production the union prevents technology from replacing the worker. If the worker is punished, suspended or terminated without just cause, representatives from the union and lawyers will go investigate and defend your position. If unfair corrective action is found against employee union has the right of reversing such action by removing unfair discipline, or if fired unjustly having his/her job back. Job security is an advantage in a unionized workplace vs a non union workplace because when a union is involved they give you voice to participate in having an influence withing the decisions being made for the betterment of the company. The union in response protects you from any type of reprimands whereas non union workplaces the worker has no voice. The employer makes all the rules, sets the wage rates, makes all decisions on things like discipline, promotions and hours of work. Higher Wages In a union environment the union bargains with the employer for a contract and makes sure that such contract is carried out. In this contracts both parties define various important aspects such as wages. Workers pay is higher when they are in a union. â€Å"The median weekly earnings of union workers are 28 percent higher than non-union workers†. â€Å"According to a January 2011 Bureau of Labor Statistics report, workers who belong to a union typically earn higher pay than non-union workers doing the same kind of job. Although it varies based on sector and occupation†. $917 = Median weekly earnings in 2010 of union members. $717 = Median weekly earnings in 2010 of non-union workers. T Thats a yearly difference in salary of $10,400 for union members vs. non-union members Estimates varies depending on sector and occupation. Differences among public unionized sector vs public non unionized amount a higher salary than private sector either union or non union. An important factor of higher wages in a unionized workplace is that it helps the economy grow. One of the main reasons of why our current recession happened is that workers do not have the purchasing power they need to help the economy grow. Union provide workers to earn a significantly higher average in wages than non union workers. A sustainable economy is where workers are adequately rewarded and have the income they need to purchase goods and boost the economy. Higher wages are necessary for a variety of reasons most importantly helps improves the standard of living and gives the worker a sense of being a valuable asset to the company by such reward. Affordable Healthcare Coverage â€Å"In 2009, 92 percent of union employees in the U. S. had access to health care benefits, compared to only 68 percent of non-union workers. The union advantage is even greater when you compare the percentages of union vs. non-union workers receiving specific benefits:† Dental Care: Union, 70% | Non-union: 44% Vision care: Union, 53% | Non-union: 24% Prescription drug benefits: Union, 90% | Non-union, 68% The out of pocket costs for individuals is also less than that of non union individuals. At collective bargaining this benefits are fought for so that insurance coverage is more affordable. Workers are also more likely to receive workers’ compensation. Union members also get their benefits faster, and return to work more quickly. When workers are injured, unions help workers through the often complicated process of filing for workers’ compensation and protect workers from employer retaliation. They receive provisions that are made for weekly payments in place of wages, as a compensation for economic loss or reimbursement or payment of medical and other expenses. Job Specialization A well defined job duty involves giving workers individual job tasks to remove the responsibility of other jobs and reducing the workers capacity to one task in particular. Job specialization became common place during the industrial revolution with the creation of factories. Factory owners would not simply hire one worker who produces all the goods. The work is divided among many different workers and each employee becomes an essential element in the process of creating the product. Specialization creates an increase in efficiency as workers become more skilled in the specific jobs they do. Employees in a factory who are responsible for only one part of the process become as skilled as they possibly can in that process without the distraction of learning other skills. Hours and job duties are well defined. During the industrial revolution workers tended to work in horrible working conditions to go along with the bad hours. The typical work day back then lasted anywhere from 10-18 hours per day, six days a week. All of this began to change in the in the 19th century. United States began to work towards a shorter work day in 1791 when workers in Philadelphia were striking for a ten hour total work day. But finally in 1937 the eight hour work day was implemented and regulated by the federal government. It stipulates that workers were not to work more than 44 hours per week and any hours over 40 required of the worker were to be paid with overtime bonuses added to their normal pay rate. Union enforces and fights for this rights at collective bargaining Union representation established the eight hour work day as one of their primary goals. Strikes One of union representations greatest advantages can also be one of its main disadvantages: the ability to engage in economic strikes. The decision to strike for improved wages or working conditions is a serious subject that requires a thorough analysis of the strikes likelihood for success before it is undertaken. Union officials need to be experienced and knowledgeable about the many economic and social factors that will be brought to bear on striking employees before they make a decision. Incorrect judgments about striking can be harmful to employees who choose to engage in this activity. When a union is certified as the exclusive employee representative, employees become members of an overall bargaining unit in which the majority rules. Union leaders make decisions for all employees, which many may deem not to be in their best individual interest. Employers of striking workers have the legal right to continue to operate their business with permanent replacement employees who need not be discharged once the strike ends. If such circumstances are present for the employee, the best that they can expect is to be reallocated when an employment vacancy occurs fro which they are qualified. They are not entitled to immediate and unconditional reinstatement or back pay when their jobs are filled in by permanent replacements. Unfortunately they face such risk of losing their job and earn no money for a period of time that puts a financial burden on your family. Loss of individuality Another disadvantage for unionized workers is the loss of individuality. When a union is certified as the exclusive employee representative in a workplace, employees become members of an overall bargaining unit in which the majority rules. The ruling majority may not be sympathetic with each individuals specific employment needs or aspirations. Individual agreements etween employees and management are not allowed because the employer is under an obligation to deal exclusively with the union. The union leaders make decisions for all employees, which many may not be in the best interest of the individual. Loss of individuality is primary concern for many employees, as well as the loss of opportunity to negotiate for themselves an individual agreement. Union dues Still another disadvantage of union representation is the cost to e mployees. Most collective bargaining agreements require all employees to support the union financially as a condition of their continued employment. Federal law provides that employees may, regardless of the what is spelled out in the agreement, opt not to formally join the union; however they may still be required to pay certain dues and initiation fees. The union can demand the discharge of any employee who fails to pay required dues and fees unless a right to work law has been enacted in the state where the business operates. The cost of union membership vary widely from union to union but regardless of the cost, fees represent an expense to workers that they would not otherwise have. Michigan is one state that does not have a right to work law, a union worker from this state pays hundreds of dollars per year as a result of dues requirements. There are many advantages and disadvantages that come to mind when it comes to working with unions. Employees can come across a great deal of advantages and disadvantages in the event that they take on union membership. Despite of the drawbacks involved in the union-employer relationship, labor unions have been successful in helping raise the standard of living of millions of people during the nineteenth and twentieth century through better wages and other benefits. These benefits would not have been provided without the work done by labor unions. Many early leaders were prosecuted, harassed or gave their lives for labor movement in the United States. Some strikers were subjected to fire hoses, attack dogs and armed guards. These sacrifices Americans see that laws were needed to protect the right of workers. If labor unions were to disappear laws protecting workers rights would be repealed and without unions, workers would not be able to have a voice in the political process.

Thursday, November 21, 2019

WEEK 4 DISCUSSION PART 1 Essay Example | Topics and Well Written Essays - 500 words - 1

WEEK 4 DISCUSSION PART 1 - Essay Example In order to quantify the magnitude of Medicaid fraud in the US, the study will be conducted across a wide range of participants. The study will target people who have participated in Medicaid fraud or who have been affected by the scheme. Throughout the study, anonymity of the participants will be maintained unless instructed otherwise. In addition, the study will also target professional in the medical and legislative sectors who have facilitated the scheme either directly or indirectly. The study will be conducted through both open ended and closed ended questionnaires. Research assistant will conduct manual interviews and filling of questionnaires, however, electronic (online) questionnaires will be available. In either of the data collection methods, anonymity of the participants will be maintained unless they recommend otherwise. The research site will be identified through a random process that will be highly inclusive and conclusive. The selection will target both upper and mi ddle class Americans. In addition, the study will have a professional phase whereby the participants will be drawn from both the medical and legal professionals. The study will have a quantitative segment that will capture the magnitude of the phenomenon. On the other hand, the qualitative segment of the study will focus on the reasons or factors that contribute to Medicaid fraud among Americans. In the quantitative segment of the study, the researcher will be interested in identifying the magnitude of losses incurred in the health sector due to the scheme. Financial loses will be identified as the dependent variable while time will be identified as an independent variable. The quantitative segment will also be concerned with the variation of fraud across different social classes. Thus, different income classes will be identified as independent variables while financial losses will

Wednesday, November 20, 2019

Self-efficacy, Adherence and Education program Assignment

Self-efficacy, Adherence and Education program - Assignment Example Additionally, a summary of the findings of the studies is provided together with a proposed idea to address a gap noted after analysis of the studies. Four variables; social support, job presence or absence, the stage of attitude change regarding exercise behaviour and farm work participation, or non-participation; accounted 34% of levels of physical activity in the patients N= 119 patients for 4 recommendations of treatment: exercise, diet, self-monitoring of blood glucose, and oral intake of medication, in correlation with the questionnaire of â€Å"resistance to treatment† and Self-Care of Heart Failure Index Some of the aims of the studies were similar while in some studies, the aims and purpose of the studies were varied: ranging from evaluating the effectiveness of self-efficacy program, investigating the factors which lead to increased physical activity in the improvement of glycemia control in diabetes mellitus patients, and investigating the role of patient education n in enhancement of self management ability] and behavior as well as self-care (Karakurt et al, 2012) An analysis of the research literature shows that the research is current. The time span ranges from 2009 to 2014.This review of self-efficacy and medical adherence of diabetes includes 5 research studies. Each of the journals has different authors: No author appears to have contributed in writing more than one journal (Moriyam, 2009). The following is an in-depth analysis based on the details of each journal; starting with the most recent, as is presented in the table above. 1. Murano, I., Asakawa, Y.,Mizukami, M., Imai, T., Shimizu, K., & Takihara, J. (2014). Factors Increasing Physical Activity Levels in Diabetes Mellitus: A Survey of Patients after an Inpatient Diabetes Education Program. Journal of Physical Therapy Science, 26 (6), 695-9. Subjects eligible for this study were recruited from type 2 diabetes mellitus patients receiving

Monday, November 18, 2019

Product Marketing Assignment Example | Topics and Well Written Essays - 2000 words

Product Marketing - Assignment Example The report also aims at ensuring that Howden Joinery identifies problems facing it thus becoming very innovative a thing that will ensure that old customers are retained with new customers joining the company. The study looks at the basic fundamental in new product development. For the implementation of a good and improved new product development process the report offers the main elements which include; anchoring the innovative process with top management in the company, splitting the innovation process in two distinct part assigning responsibilities to each, establishing a link between technological and business strategy, developing communication of the strategy to all employees in the company, corporate marketing, among others. New product development (NPD) attempts to describe the whole process that involves bringing a new service or product in the market. (Ulrich and Eppinger, 2004) The new product development process involves; Most companies will view new product development as the most important stage in producing and marketing its products within the entire life cycle management process used in the market share expansion and growth. Ulrich and Eppinger (2004) argues that new products occur in various categories with some being new to the company , others are new to the market while others create new markets. Some concepts in new product process are slight modifications of those in existence when contrasted against a different measure; however some new product development processes are purely inventions from the companies. These new product development processes are; Idea Screening Howden Joinery should carry out idea screening with an aim of doing away with those ideas that are not worthwhile. This will save the company from allocating resources to such concepts. The company should evaluate whether its customers will benefit from the given product, this they can do by conducting a thorough research on the customer's tastes and references. (Ulrich and Eppinger, 2004) The company should assess the technical feasibility in the manufacturing of a given product. Here Howden Joinery will need to know the raw materials needed in production, their availability, and the cost of buying, transporting and processing. After which they will assess the marketability of the product. Lastly, the screeners should carry out a research as to whether their product will earn them some profit; this will incorporate the total cost of production labour and the selling price for the manufactured product. In evaluating the existing process it is important for the company to perform an Evaluation of the current development process. (Michael, 2004) Such an evaluation may touch on specific areas that need improvement. Examination can be in terms of both the performance and means applied. Howden joinery will discover the unemployed activities, streamlining opportunities and executing ones in order to trim down the general time of the cycle (Michael, 2004) Business Analysis According to Michael, (2004) Howden Joinery should carry out a business analysis so as to help in knowing the financial position of the business. This can be done through estimating the likely price tag of its products based upon the feedback from the customers and the

Friday, November 15, 2019

Advantages And Disadvantages Of Firewalls Computer Science Essay

Advantages And Disadvantages Of Firewalls Computer Science Essay A firewall is a boundary or a wall to keep intruders from attacking the network. The firewall is network device that is in between a private network and the internet. The firewall is configured to inspect network traffic that passes between the network and the internet. We can assign rules or protocols to the firewall to allow data to be shared. If the protocol isnt included in the approved list it would destroy or discard the packet of data and deny it from entering the network. When a private network is connected to the internet it allows the people to access information from external sources .when the network is connected to the internet it also allow external uses to enter the private network and steal information from the network. To prevent unauthorized access organizations has firewalls to protect them. There are mainly two types of firewalls. Software firewalls and hardware firewalls. A firewall provides configurable network access, authentication before accessing services and other services as well. Scope I will be covering only the 3 types of firewall types, the characteristics of firewalls, types of attacks to an organization, other devices that can be used in place of a firewall. I wont be covering the configuration of firewalls. Firewall What is a Firewall There are basically two types of Firewalls. They are software and hardware Firewall. A firewall is a software or hardware that filters all network traffic between your computer, home network, or company network and the internet. As shown in figure 1 the firewall usually sits between a private network and a public network or the internet. As shown in figure 1 a firewall is kept in the boundary of the privet network and the public network or internet. Figure Firewall A firewall in a network ensures that if something bad happens on one side of the firewall, computers on the other side wont be affected. Depending on the firewall type there many features such as antivirus guard, intrusion prevention etc. Type Of attacks (http://technet.microsoft.com/en-us/library/cc959354.aspx) There are many types of attacks to a network. These are some of them IP Spoofing Attacks IP Spoofing Attacks are where an attacker outside the network may pretend to be a trusted computer either by using an IP address that is within the range of IP addresses for the local network or by using an authorized external IP address that has authorized access to specified resources on the local network. Denial of Service Attacks(DoS Attacks) Denials of Service Attacks are attacks just to make a service unavailable for normal use by flooding a computer or the entire network with traffic until a shutdown occurs because of the overload. The attacker can also block traffic, which results in a loss of access to network resources by authorized users. Denial of service attacks can be implemented using common internet protocols, such as TCP and ICMP. Sniffer Attack A sniffer attack is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunnelled) packets can be broken open and read unless they are encrypted. Man in the Middle Attack As the name indicates, a man in the middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently. To prevent such attacks a computer or network should implement a firewall to the companys specifications, so that the firewall will protect the network without been a problem for the employees of the company. Types of Firewall (Google book) Packet filtering routers Packet filtering routers were the first generation of firewall architectures to be invented. Packet filtering firewalls work at the network level of the OSI model, or the IP layer of TCP/IP. As shown in figure 2 a Packet filtering routers will be placed between the boundary of the private network and the public network or internet. Packet filtering routers can provide a cheap and useful level of security to the network. Depending on the type of router filtering can be done at the incoming, outgoing interfaces or both interfaces. Packet filters work by applying a set of rules to each incoming or outgoing packets.The rules are defined based on the network security policy of the enterprise. According to these set of rules the firewall can forwarded or drop the packet. A packet filtering router is able to filter IP packets based on the Source IP address Destination IP address TCP/UDP source port TCP/UDP destination port Packet filters works well for blocking spoofed packets. It also can be used for Block connections from specific hosts or networks Block connections to specific hosts or networks Block connections to specific ports Block connections from specific ports Figure Packet filtering routers The three types of filtering firewall Static Filtering It is one of the oldest firewall architecture and it operates in the network layer. The administrator can define rules which packets are accepted and which packets are denied. The static filter will scan for IP header data and TCP header data. Advantages of Static Filtering Low impact on network performance. Low cost included in many operating systems. Disadvantages of Static Filtering Because it operates in the network layer it examines only the IP header and TCP header. It is not aware of the packet payload. Offers low level of protection. Dynamic Filtering Dynamic Filtering works on the network layer. These firewalls are the most common sort of firewall technology .The decision will to deny or allow the packet will be based on the examination of the IP and protocol header. Dynamic filter can differentiate between a new and an established connection. After a connection is established its information is kept in a table in the router. Advantages of Dynamic Filtering Lowest impact on network performance Low cost Because it can differentiate between a new and an established connection it increases performance. Disadvantages of Dynamic Filtering Because it operates in the network layer it examines only the IP header and TCP header. Provide low level of protection Stateful Inspection Stateful inspection is a technology that is similar to dynamic filtering, with the addition of more granular examination of data contained in the IP packet Advantages of using firewalls based on packet filtering Low cost. Packet filters make use of current network routers. Makes Security Transparent to End-Users. Easy to install. Packet filters make use of current network routers. Therefore implementing a packet filter security system is typically less complicated than other network security solutions. High speed Packet filters are generally faster than other firewall technologies because they perform fewer evaluations. Disadvantages of using firewalls based on packet filtering Packet filters do not understand application layer protocols. Packet filters does not offer any value-added features, such as HTTP object caching, URL filtering, and authentication because they do not understand the protocols being used. Packet filtering routers are not very secure. Cant discriminate between good and bad packet New rules may be needed to be added if an employee needs special requirements to connect to the internet. Difficulty of setting up packet filtering rules to the router There isnt any sort of user based Authentication. Packet filter cannot authenticate information coming from a specific user. (http://www.cse.iitk.ac.in/research/mtech1997/9711107/node14.html) Circuit level gateways Circuit level gateways are the second generation of firewall architectures. Circuit level gateways work at the session layer of the OSI model. It is basically a packet filter with additional features. In figure 3 shows a circuit level gateway works. The circuit level gateway examines and validates TCP and UDP sessions before if open up a connection or circuit through the firewall. So it will provide more security than the static packet and dynamic packet filter. The decisions to accept or deny packet is based on examining the  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Source address  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Destination address  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Application or protocol  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Source port number  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Destination port number Figure Circuit level gateways (William Stallings,) Advantages of firewalls based on Circuit level gateways Less impact on network performance. Breaks direct connection between the untrusted host and trusted client. Higher level security than the packet filter firewalls.. Disadvantages of firewalls based on Circuit level gateways Does not examine the packet payload. Low to moderate security level. Application level gateways The third generation of firewall architectures is called Application level gateways. Application level gateways are capable of inspecting the entire application data portion of an IP packet. When a computer sends a request to the internet the firewall inspects the entire packet against the rules configured by the network or firewall administrator and then regenerates the entire Internet request before sending it to the destination server on the Internet. The returned result will then again will be inspected, if the result meet the requirement of the rules then it will be allowed to pass through the network and into the network, then the firewall will create a response packet and send it to the corresponding computer. If the result does not meet the requirement of the rules then it will be blocked from passing through the network. The figure 4 shows an Application level gateway. Figure Application level gateways Advantages of Application level gateways The application proxy can inspect the entire application portion of the IP packet. This inspection happens both when the Internet request is sent and when the reply packet from the Internet server is returned. Highest level of security Because the application proxy understands the application protocol, it can create a much more detailed log file of what is sent through the firewall. Packet filter log files know only about the IP packet header information. The internal computer and the server on the Internet never have a real connection, because the firewall inspect the packet and then regenerates it. Proxy services understand and enforce high-level protocols, such as HTTP and FTP. Proxy services can be used to deny access to certain network services, while permitting access to others. Disadvantages of Application level gateways Application level gateways require great memory and processor resources compared to other firewall technologies. Have to create filter rule for each application individually. Must be written very carefully Vendors must keep up with latest protocols Software firewall For home users software firewalls are the most popular firewall choices. In figure 5, 6 and 7 are some of the most popular software firewalls in the market. Software firewalls are installed on your computer or server computer like any other software .The firewall can be customize it if necessary allowing you some control over its function and protection features. A software firewall will protect your computer from unauthorized access to the network or home pc and in most software firewall it provides protection against Trojan programs, e-mail worms, antivirus, antispyware and intrusion detection etc.  Software firewalls will only protect the computer they are installed on and not the whole network, so each computer will need to have a software firewall installed on it. There are vast numbers of software firewalls to choose from. A good software firewall will run in the background on your system and use only a small amount of system resources. It is important to monitor a software firewall once installed and to download any updates available from the developer. Norton Internet Security Figure Norton Internet Security Zone Alarm Extreme Security Figure Zone Alarm Extreme Security Kaspersky Internet Security Figure Kaspersky Internet Security Hardware Firewalls As seen in figure 8 hardware firewalls can be purchased as a stand-alone product, in present hardware firewalls are integrated in broadband routers. These will be very important for people with broadband connection for their company network. Hardware firewalls can provide better security and reduce the performance loss by using dedicated memory and processing power .They also can protect every machine on a local network. Most hardware firewalls will have a minimum of four network ports to connect other computers. A hardware firewall  uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of administrator created rules that determine whether the packet is to be forwarded or dropped. Figure Hardware Firewalls Firewall Characteristics Design goals of a firewall Every firewall has design goals. Because if the firewalls does not achieve these design goals the firewall will be a huge security risk to an organizations network. According to the security policy only Authorized traffic should pass through the firewall. All inbound and outbound traffic should pass through the firewall. The firewall should be immune to penetration. Four general techniques to control access Service control Determines the types of Internet services that can be accessed, inbound or outbound Direction control Determines the direction in which particular service requests are allowed to flow User control Controls access to a service according to which user is attempting to access it Behavior control Controls how particular services are used. Advantages of Using a Firewall A Company network or a home computer will have number of advantages when using a firewall. They are more cost effective than securing each computer in the corporate network since there are often only one or a few firewall systems to concentrate on. There are some firewalls which are able to detect viruses, Trojans, worms and spyware etc. There are Disadvantages of Using a Firewall Even if a firewall helps in keeping the network safe from intruders, but if a firewall is not used properly it would give a false impression to you that the network is safe. The main disadvantage of a firewall is that it cannot protect the network from attacks from the inside. They often cannot protect against an insider attack. Firewalls cannot protect a network or pc from viruses, Trojans, worms and spyware which spread through flash drives, potable hard disk and floppy etc. They may restrict authorized users from accessing valuable services. They do not protect against backdoor attacks. They cannot protect the network if someone uses a broadband modem to access the internet. (http://www.linktionary.com/f/firewall.html)must see Other devices that could be used in place of firewalls Antivirus Software Antivirus software is a programme detects and prevents malicious software programs such as viruses and worm. Malicious software programs are designed to infiltrate the computer network through the internet connection and cause damage to the system. These programmes are installed without the users knowledge. To prevent such programmes from been installed an antivirus has to be installed in every computer on the network. To prevent the latest malware from infecting the computers the antivirus software has to be up to date with the latest antivirus definitions from the developer. E.g.:- Norton antivirus, Kaspersky antivirus etc. Spyware Software Spyware is a type of malware that is installed in the pc without the knowledge of the user, it secretly collects personal information and monitors browsing activities of the computer user. Like antivirus software spyware software has to be updated regularly with the latest definitions. Most antivirus softwares has spyware protection. E.G.:-Spyware doctor, Norton antivirus etc. The purpose of using these devises Critical Analysis In todays world there are so many security risk a computer network cannot be fully protected. Even if a firewall gives protection from outside intruders it cannot protect the network from the inside. I have analyse the network security and come to a conclusion that network to be secured, they should use a hardware firewall to inspect all the outbound and inbound request and a software firewall to protect from other threats such as malware, Trojans, viruses, worms etc. In todays world there are many hackers who would want to hack a company for fun or for money and there are thousands of viruses rereleased to the internet every day. Threats can attack a network of computers in many ways, for example if the firewall allows emails to be sent and received and if an infected email is sent by an intruder, it will pass through the firewall and infect all the computers in that privet network. A software firewall may be considered as an antivirus guard which has a firewall, so this means that this type of software firewalls has more features than just only the firewall. It may have antivirus, spyware, intrusion, browser, email protection and may have many other features as well. As Ive taken the example of the email when the email is been received it will be scanned and filtered if it is detected as spam mail or it will be allowed to enter the network. Because the viruses are becoming more advance the software firewalls has become more advance in detecting threats. Some antivirus software uses three main different approaches to detect threats. They mainly use definition based detection. This is where the software detects viruses and other threats by checking for a known malicious code with the definitions and be removed or deleted. The second main approach is where the software uses is behaviour based detection. This is where the software looks at the installed software or downloaded softwares behaviour. If the software behaviours in suspicious manner where it is collection personal information without the users knowledge it will be removed. Behaviour based detection is more of an advance approach for antivirus software because it does not need the virus definitions to detect threats, it will detect threats even before the virus definitions are been downloaded. The third main approach is cloud based detections. This is where the antivirus company keeps a record of known suspicious and dangerous software in their databases, which has been collected by the antivirus company over the past years. If a user downloads software the antivirus guard will check the downloaded software with their companys databases of known suspicious and dangerous software to see if it is a threat or not to the user. These three approaches of a software firewall will help keep the network safer if the hardware firewall fails to detect threats. These antivirus help protect the network from intrusions through another computer or vulnerabilities in a software installed on a computer. This feature scans all ports the network traffic that enters and exits your computer and compares this information to a set of signatures or definitions. These signatures contain the information that identifies an attackers attempt to exploit a known operating system or program vulnerability. If the information matches an attack signature, Intrusion Prevention will automatically discard the packet and breaks or blocks the connection with the computer that sent the data. A privet network should have a good antivirus programme with all the above mention features and more. Antivirus software like Norton, BitDefender etc are superior antivirus softwares. So I think if there are both hardware and software firewalls in place in the network it will be more secure to threats and vulnerabilities. This is because if the threat is not detected by the hardware firewall there is a chance that the software firewall will detect it. Because these firewall are becoming more sophisticated with advance technology to detect threats these firewalls will be the next defence if the hardware firewall fails to detect the threat. Conclusion

Wednesday, November 13, 2019

cvbcvbcvbcvb Essay --

Truth has been discussed by philosophers over the course of history, going back to Aristotle, in this essay we will look a two theories of truth in order to determine which is the most plausible and general criticisms. It is important when discussing this matter to have a correct definition of truth, the meaning of it within the context of this question. This conception of truth is the question of one’s beliefs and things that one supports, it is the nature of this form of truth that philosophers have tried to understand and have debated. The two theories that will be discussed are the correspondence theory and the coherence theory; additionally briefly we will look at the idea of truth-bearers, as these vary between different philosophers. Finally, there will be a brief comparison of the two ideas in the conclusion. Arguably, the coherence theory appears to be a less flawed theory of truth. Kirkham gives a discussion of the debate of what is a truth bearer in his introduction to the theories of truth, and this is a debate unto itself, however broadly the main candidates for this are: propositions, sentences, beliefs, and statements (Kirkham, 1992, p. 59). Propositions, which is the information contained within a sentence, have been subject to debate as to whether they can represent truth and have been charged with being vague by Russell and it has also be questioned as whether they exist at all (Ibid. p. 57). Sentences too are criticised as they can be interpreted as both false and true at the same time, additionally both statements and beliefs as truth bearers mean that there are unstated statements and unbelieved beliefs, which is a paradox. The first theory of truth to consider is correspondence, this theory states that stat... ...which appears to be more convincing as this gives a whole definition of the question of what is true rather than Rescher’s ‘internal’ truths. In conclusion, both conceptions of the theory of truth appear to have contradictions within them, however correspondence theory appears to be more flawed. It must be taken into consideration that other theories of truth exist, and one could argue that neither of these appear to be a satisfactory account of truth in a general context. One important point that Walker raises is that coherence theory and correspondence theory do not necessarily have to conflict with each other, although if correspondence theorists see it as the nature of truth then there will be a conflict (Walker, 2001, p. 124). Nevertheless coherence theory gives a more satisfactory account of the nature of truth and to some extent as a test of truth as well.