Friday, January 31, 2020

Short History on Cyber Space Essay Example for Free

Short History on Cyber Space Essay The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J. C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn Clark, 1962-1974). The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security, 2012). Many aspects of our lives include the electronic transferring of data through some means of electronic devices such as cell phones, computers and other mobile devices such as emails and text messaging. Everything from traffic signals, car technology and airport/airplane navigation has been linked to the usage of transferring vital information via the web and through other communication channels. Government data such as birth records, social security documentation and tax records also need to be protect ed. This information is very confidential and establishes the identity of millions of people in the world today. What exactly is cyber security? In its broadest definition, it is the protection of information and computer systems in we rely on, whether at work or at school. Information is crucial and it may not be altered incorrectly. It should only be shared with the appropriate users and intentional parties. There are, of course, many different levels of security. The information must only be accessible to those who need it and have been intended to see it, for example, medical records. They should have a different level of security and only be made available to those who need this information such as the appropriate doctors, hospitals, insurance companies and other medical staff. These records need to be well protected to prevent anyone from making unauthorized changes resulting in harmful activities. Cyber security is becoming increasingly more important, because every day, new attack methods are being launched and thousands of web pages are discovered continuously in the involvement of illegal data breaches. Several examples of types of ‘electronic infections’ include ‘Denial-of-Service’, which includes the actual shut-down of many legitimate websites and denies access to its existing user base, rendering many users unable to access important information. Another type of malicious attacks is ‘Malworms’ or ‘Trojan Horses’; these are viruses spread by email and instant messaging, sometimes unaware by the user. They may be downloaded simply by visiting the wrong websites. ‘Botnets or Zombies’ use several computers to launch the attack and steal information across a spread of terminals, copying the ‘evil software’ from one device to the next. Social network attacks are also on the rise and sometimes a link may be posted to steal personal information or download a virus hidden by the attacker. User’s inherent trust in posting vital information for their friends is what causes these social networks to be prime targets for the attackers (Internet security, 2012). Today, 70% of large companies rank viruses and hacking ahead of fraud and physical break-ins as their greatest threat. The importance of protecting vital electronic data is more important today than it has ever been. Whether it is the stealing of information, the planting of malicious malware or simply the intention to ‘search and destroy’, hackers have become the nation’s number one threat in creating immense damage to businesses of all sizes and can severely impact a company’s integrity or capability to perform at its peak potential. IT security has now been placed very high on the risk management agenda of any major corporation (â€Å"Why cyber security, 2010). There are several examples of attacks on computers to obtain private information. One of many examples involves a 20 year old kid, by the name of Christopher Maxwell who created a 50,000 computer zombie network that caused approximately $135,000 in damage by infecting a Seattle hospital and various military locations. The attack shut down not only the finance departments, but also attacked computers in the hospital’s intensive care unit, seriously compromising many patients welfare (OBrien, 2007). With the high demands of IT versatility, companies are more and more in need of more flexible hardware and software to cater to the ever growing demands of data transfer and information storage capabilities. The technology is becoming more advanced and creates endless opportunities for today’s businesses however this also creates more opportunity for cyber criminals to launch attacks and become more proficient in succeeding with new ‘gateways’ to cause great harm or steal valuable data. A new recent trend in stealing data is when traveling employees use these so called ‘hot-spots’ to obtain internet access. Clever hijackers have found ways to throw up ‘splash pages’. These splash pages track user data, credit card details used to pay for the wireless service and other information that may be used to harm the employee and/or the company the person works for. This also applies to home networks. Usually, individuals do not invest into the same type of security that companies may do, making these home networks viable for attacks. This is very crucial, because the home computer can become infected with vicious malware and introduced into the workplace or vital information can be stolen that is confidential to the company (â€Å"Why cyber security, 2010). It is now known that the Secret service maintains its own Electronic Crimes Task Force (ECTFs), which focus on identifying and locating cyber criminals involved in all types of criminal activity such as bank fraud, sensitive data breaches and other cyber related issues. The DHS (Department of Homeland Security) prevented the potential losses of nearly $1.5 Billion through cyber crime and brought charges against 72 individual cyber criminals for their direct or indirect participation of wide-spreading the use of children pornography (â€Å"Combat cyber crime,n.d.). In most recent news, President Obama is considering issuing an executive order that would require the DHS to prepare a set of guidelines and rules in the combat against cyber criminal activity. In April of 2012 (this year) the Cyber Intelligence Sharing and Protection Act (CISPA) was introduced into the House of Representatives, but failed to pass the Senate due to privacy issues, shows how serious Americans are on creating a plan of attack. Even though CISPA was not passed, the executive order that would be issued would not surpass the privacy issues that were the reason for CISPA not passing the Senate’s approval. The reason the CISPA bill did not pass is that several privacy advocacy groups oppsed the bill strongly because it would have allowed private companies to sell or exchange user data with the federal government for critical cyber security information (Koebler, 2012). Cyber security is the processes and practices designed to protect programs, networks and computers (and other devices) from malicious attacks and unsupervised access. It represents the body of technologies to understand and fight back in the event of unlawful damage and unnecessary harm (cybersecurity, 2010). The conclusion is to do our best to try and prevent as much cyber criminal activity as possible. There a few things that companies and individuals can do. Stop. Think. Connect. These basic rules and guidelines have been measured by the industry and several help factors have been evaluated. The first of many basic rules is to keep your firewall and security software (ani-virus programs) up-to-date. Computer viruses and hackers are like any other common flu virus, they evolve and become stronger with each step in their evolutionary path. Constantly changing your passwords on your devices/software is also recommended. On average (at a minimum) these passwords should be changed at least once every three months. The second recommendation is to shop online with the utmost care. Make sure you are on a HTTPS (Hypertext Transfer Protocol Secure) website when submitting personal information such as credit card numbers and bank account records or transactions. Another is laptop security. If a laptop is stolen, make sure you have the proper software installed. There is tracking software available to pinpoint where you laptop is and there is also software available that can remotely access your computer’s files, erase them on the stolen device, and then place them in a secure data center for recovery. Another important tip is to avoid spam and scams. Questions every email of which the origin you do not know or trust, because simply by opening the wrong email can one access a virus or other harmful software. Social networking has become huge and it is also a great tool to obtain and research valuable information. It is highly recommended that not all data be put out there for one to see. This information is sometimes easily accessible to the wrong individuals. Also, don’t just open any attachments or click on any suspicious links. Download with caution, because the Internet has a lot of harmful software out there that can cause serious damage to either your hardware or data files (and software). References cybersecurity. (2010, December). Retrieved from http://whatis.techtarget.com/definition/cybersecurity Combat cyber crime. (n.d.). Retrieved from http://www.dhs.gov/combat-cyber-crime Internet security. (2012). Retrieved from http://www.internetsociety.org/what-we-do/issues/security?gclid=CNydtKjAr7ICFYSo4AodvnIA0g Koebler, J. (2012, September 11). Obama may use executive order to advance cybersecurity policies. Retrieved from http://www.usnews.com/news/articles/2012/09/11/obama-may-use-executive-order-to-advance-cybersecurity-policies Leiner, B., Cerf, V., Kahn, R., Clark, D. (1962-1974). Brief history of the internet. Retrieved from http://www.internetsociety.org/internet/internet-51/history-internet/brief-history-internet OBrien, R. (2007, January 22). Cyber crimes impact on

Wednesday, January 22, 2020

Ecstasy and the Youth :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Rave as a Post- Modern Phenomena is continuing to increase is size. Every year more teenagers discover the potential of this way to have fun. They suddenly feel part of something, which they enjoy. However, the rave phenomena primarily depended of taking the drugs. Unfortunately, like any other culture, or cult hippies is self-stupefying. This means that the ignorance of the Ravers maintains as the existence of Raves. Those who become part of such drug taking culture, the problem often intensified, due to the lack of sport with in the raving community, who are still having too much fun. This is made worse because, there is also a lack of support in the community for the victims of recreational drug abuse.   Ã‚  Ã‚  Ã‚  Ã‚  Rave culture is highly attractive to the youth audience in general, regardless of class or ethnic background. Raves are non-elitist, and are primarily for the working class. This makes Raves quit different from all other postmodern sub-cultures. The legalization of a Rave has not prevented the illegal taking of the drugs. This means that there are a lot of young people indulging in Rave culture and recreational drug taking every weekend.   Ã‚  Ã‚  Ã‚  Ã‚  Rave has provided an environment where drugs like ecstasy are socially acceptable. Rave like other cult is self-stupefying and refuses to question the taking of the drugs affecting its continual and successful existence. â€Å"Recreational drug users often see only benefits only from drug use and at this stage will have control over the drug taking, despite using drug on regular basis. However recreational drug use does not mean problem free drug use. For this reason it is vital to raise awareness about some of the known effects of the drug use. Both within the raving community and the general public, after all the young Ravers of today a whole generation, who will ultimately affect the future of the country?   Ã‚  Ã‚  Ã‚  Ã‚  Many young people feel Ecstasy allows them to stay in control unlike alcohol. In an article by Sheila Henderson she particularly emphasis’s the attraction of Ecstasy and the E-culture for young women. She suggests that women felt that being in an environment where every one was on Ecstasy, rather than say alcohol, freed from unwanted sexual attention from men. She state, â€Å"Instead of being tied to a boyfriend, having to stick close to friends, feeling self-conscious about appearance or dace style or intimidated by attention from men, the young women occupied this social space with confidence, circulating and meeting new people independently.

Tuesday, January 14, 2020

Reasons to be a Nurse

I love the idea that I choose to pursue the dream of becoming a nurse. I love being around children and helping other that are hurt. My daughter and my sister have inspired me to become a better person. I have chosen that the best career for me would be a Pediatric Nurse. Being a Pediatric Nurse would benefit me. I would have a variety of job opportunities, flexible hours and last but not least you would get to make a great and rewarding salary. First, as a Pediatric Nurse I would have an excellent and flexible schedule to choose from.While having a child and being a single mom a flexible work schedule will be excellent for me and her. To me working whatever hours I like would really benefit me because I would be able to spend more quality time with my baby girl who means the world to me. My baby girl is the reason why I want to accomplish this goal. Secondly, there is a wide variety of job opportunities to choose from such as a hospital, clinic, school, nursing home, and travel nurs e.As a Pediatric Nurse I will have the opportunity to choose a position in the nursing field such as a staff nurse, floor charge nurse, floor unit manager, director of nursing and many more to choose from. When I become a Pediatric Nurse I would like to work in a hospital. I won’t to work with the babies. Being around children makes me feel on top of the world. Last, working as a Pediatric Nurse, I would make a great salary. I can make on an average of $40,000.For me making a nurses salary would truly benefit me. I would not have to live paycheck to paycheck. I would be able to support my family. I would not have to depend on anyone to support my family. All of these reasons have influenced my decision on becoming a Pediatric Nurse. The salary a nurse makes is awesome. I love having money in my pocket and a nurse would be an excellent career to pursue. But, the most important reason I am choosing to become a nurse is to support my family.

Monday, January 6, 2020

The Seven Habits of Highly Effective People - 3534 Words

The Seven Habits An Overview In 1989, Stephen Covey s book The 7 Habits of Highly Effective People started a landmark revolution in how we think about time and life management. In this book, Covey presents seven principles for developing effectiveness in our private and public lives. By developing these habits, one moves from being dependent on other people to being and acting independently. Then we learn how to move to the more advanced state of interdependence and successful Cooperation. As a part of the seven habits. Covey introduces important and powerful techniques of time management under the habit of Put First Things First. It is necessary to understand (and Practice) all seven habits so that the tools of time management can be†¦show more content†¦Habit 3 : Put First Things First. The habit of personal management. First Things are those things you find most worth doing according to your personal vision of your mission. We use these priorities to manage our time and events so that every day we ar e sure to keep these first things first in our lives. A key concept related to this habit is Quadrant II Planning. The diagram at the end of this section is what Covey calls a Time Management Matrix. The top of the matrix divides the blocks into things that are Urgent, and Not urgent, and the left side divides the matrix into Important and Not important. Here is a summary of the quadrants. Quadrant I : Urgent and important. This quadrant includes those items that represent true crises (your mother has a stroke and you need to bring her to the hospital), deadline driven projects (a paper that has a deadline that can not be moved, and represents a substantial part of your grade) and other such truly important and pressing items. Quadrant II : Not urgent but important. This quadrant includes items that are truly important in our lives (preparation, relationships, relaxation, self-renewal, etc.) that we truly need to do to maintain our PC abilities. Unfortunately, since they are not urg ent (Oh, I can put that off!) we tend not to do them. We procrastinate because they are not urgent. Unfortunately, if we do this long enough, this tends to create highly urgent crisesShow MoreRelatedThe Seven Habits Of Highly Effective People1652 Words   |  7 PagesIntroduction This paper takes the topics and theories discussed in the book; The Seven Habits of Highly Effective People and applies it to nursing practice. We will take a look at the book’s background and how the work is implemented in nursing. Throughout this paper, I will introduce a few of the relevant habits, what they represent and how they can be applied to different nursing roles. Furthermore, I will conduct a personal reflection on how the topics presented influenced my personal growthRead MoreThe Seven Habits Of Highly Effective People1860 Words   |  8 PagesKenny Sides Mr. Martin Principles of Management 17 November 2015 Word Count: 1877 The Seven Habits of Highly Effective People In the book, The Seven Habits of Highly Effective People, the writer Stephen Covey seeks to help the reader learn how they can better their life. Covey mentions a total of seven habits that he believes can lead to a more productive life and help the reader become more of a leader. He firmly believes that we have the power to become stronger and change ourselves for the betterRead MoreEssay on The Seven Habits Of Highly Effective People1782 Words   |  8 PagesThe book that I decided to read for this assignment was The 7 Habits of Highly Effective People, by Stephen R. Covey. Initially, my reason for selecting this book was because my boyfriend had begun to read it and I noticed a drastic change in his vocabulary, which was beginning to irritate me. He was explaining every word and action in terms of choices; I choose to do this or I chose to feel that. And, because I didnt understand where he was coming from, I got aggravated and asked him to quitRead More Seven Habits Of Highly Ef fective People Essay1073 Words   |  5 Pages THE 7 HABITS OF HIGHLY EFFECTIVE PEOPLE The 7 Habits of Highly Effective People was written by Stephen R. Covey in 1989. This book has been on the National Best Seller list for over 200 weeks. Many people have attended Covey’s seminars on the subject. Many companies have required top executives to read this book including AT amp; T, Dow Chemical, Ford, Deloitte and Touche, Marriott, Xerox and Ritz Carlton Hotels. This book proposes that there are seven habits that can be learned to improveRead MoreSummary of the Seven Habits of Highly Effective People2323 Words   |  10 PageslIn â€Å"The Seven Habits of Highly Effective People,† Stephen Covey helps people become more effective when dealing with the significant challenges of life. In details, Stephen Covey provides guidelines for managing time and balancing studies, social life, job, and other priorities. The first three habits are focused on personal victories. They teach how to develop self-mastery and dependence. Those three habits are: Be Proactive, Begin with the End in Mind, and Put First Things First. Habits four, fiveRead MoreThe Seven Habits of Highly Effective People Essay2414 Words   |  10 PagesThe Seven Habits of Highly Effective People When facing a problem, human nature looks for a â€Å"quick fix.† Whether it is the latest diet fad or a get rich scheme, almost all â€Å"quick fixes† produce the same short-lived results and often no results at all. As a society, we are drawn to the appeal of a quick and easy route which leads to immediate results. We have grown accustomed to an easy lifestyle that uses superficial tactics when interacting with others. The problem with these quick fixes is thatRead MoreThe Seven Habits of Highly Effective People Essay2323 Words   |  10 PagesThe Seven Habits of Highly Effective People (Covey, 2004) has become the cornerstone of leadership and management wisdom. The habits emphasize personal responsibility and personal leadership. There is challenge in living everyday under the guidance of the habits but there is also great benefit as living the habits can influence everything we do in life. I was introduced to Covey’s seven habits through a one day semin ar at my workplace several years ago. I learned some of the terminology and a fewRead MoreThe Seven Habits of Highly Effective People by Stephen Covey727 Words   |  3 Pages Stephen Covey was an American businessman, author, educator, and keynote speaker. â€Å"The Seven Habits of Highly Effective People† is known as being his most popular work and he has since written several other books, some of which have expanded on the seven habits. â€Å"The Seven Habits of Highly Effective People† does not only entertain the idea of becoming an entrepreneur and making money, but it is also a guide that can be used to find means of living a meaningful and fulfilled life. With that beingRead MoreBook Report: Seven Habits of Highly Effective People887 Words   |  4 PagesHayes-Morrison Seven Habits of Highly Effective People Seven Habits of Highly Effective People starts off with an introduction to the concept of Paradigm Shift which is, essentially, a change in basic assumptions. Author Stephen R. Covey prepares the reader to have a change in mindset. Covey explains that there exists a different perspective amongst individuals. Two people can see the same thing but each individual can have a very different understanding from one another. The first three habits introducedRead MoreThe Seven Habits Of Highly Effective People By Dr. Covey891 Words   |  4 PagesThe Seven Habits of Highly Effective People by Dr. Stephen Covey outlines seven behaviors of a successful leader. He called it Principle-Centered Leadership (2000, p. 13). The seven habits as described by Dr. Covey are: 1. Be proactive 2. Begin with the end in mind 3. Put first things first 4. Think win/win 5. Seek first to understand†¦ then to be understood 6. Synergize 7. Sharpen the Shaw The attached profile sheet reflects a panoramic view of my alignment to some of those principles. The seven