Thursday, August 27, 2020

Communists Win Chinese Civil War Essay Example for Free

Socialists Win Chinese Civil War Essay What amount of the Cold War was influenced by the Chinese Civil War? One may pose themself this inquiry and not discover an answer since one may barely care about another nation being a piece of various wars simultaneously. The Chinese Civil War affected the Cold War totally. The Chinese Civil War left an inheritance of numerous individuals, significant occasions ever, significance towards the Cold War and numerous others. The individuals who caused this war to happen additionally left behind their own objectives alongside their own heritages. â€Å"The Chinese Civil War was a common war battled between the Kuomintang (KMT), the overseeing gathering of the Republic of China, and the Communist Party of China (CPC) for the control of China which in the long run prompted Chinas division into two Chinas, Republic of China (ROC) in Taiwan and Peoples Republic of China (PRC) in Mainland† (Chinese Civil War, 2012). The KMT and CPC are the gatherings of individuals who made the Chinese Civil War in light of their various and remarkable convictions on government. This war for control started in April 1927 during a similar time of the Northern Expedition, which was a military battle drove by the KMT to bring together China under the Kuomintang flag (2012). The Cold War started in 1941 or most assets state precisely after WWII indicating that both the Chinese Civil War and Cold War went on in a similar timespan ever (Cold War, 2012). In the Chinese Civil War the fundamental target of each incredible gathering was to deal with China and set up their considerations on government. This common war denoted the third biggest war ever, being spoken to by ideological split between the Nationalist KMT and Communist CPC (2012). The principle heads of the Chinese Civil War were the Nationalist’s pioneer, Chiang Kai-shek, and the Communist’s pioneer, Mao Zedong. The Chinese Civil War finished because of significant dynamic fights finishing in 1949-1950 (2012). Most would state the war is as yet going on with no closure yet in light of the fac t that no truce or harmony bargain has been marked at this point. With most assets demonstrating the Civil War of China finished around 40 years sooner than the Cold War (Cold War, 2012), yet considering the Chinese Civil War never had a truce nor harmony bargain the war has never effectively finished or endedâ at all. The Chinese Civil War was chiefly finished however because of the Sino-Japanese War decimating the KMT seriously toward their ethical, troops, and trust all through China. The Japanese attacked as of now compelling the KMT and CPC to join trying to drive out the attacking Japanese (2012). Besides, the KMT while safeguarding Japanese assaults lost numerous losses, however once it was the CPC’s turn they shielded definitely more than desire pushing the Japanese back some utilizing guerilla fighting (2012). This increased a ton of regard and trust inside the CPC adding new supporters to its gathering. After this finished the Western-bolstered Nationalist KMT and the Soviet-upheld CPC returned at it for the control of China (Chin ese Civil War, 2008). The most recent three years of the war are all the more ordinarily known as the War of Liberation, or then again the Third Internal Revolutionary War (2012). â€Å"On October 1, 1949, Mao Zedong announced the Peoples Republic of China with its capital at Beiping, which was renamed Beijing; Chiang Kai-shek and roughly 2 million Nationalist Chinese withdrew from terrain China to the island of Taiwan† (2012). The Chinese Civil War influenced the Soviet Union and United States from numerous points of view. Among the timespan of World War II the United States turned into a huge factor in Chinese undertakings (Chinese Civil War, 2011). The United States as a partner helped the Nationalist government by sending a program of huge military and money related guide in the late long periods of 1941 (2011). â€Å"In January 1943 the United States and Britain drove the route in updating their bargains with China, finishing a time of inconsistent settlement relations† (2011). By doing this the United States were attempting to turn into a solid partner with China, balancing out power in after war East Asia (2011). â€Å"As the contention between the Nationalists and the Communists increased, nonetheless, the United States looked for fruitlessly to accommodate the opponent powers for an increasingly compelling enemy of Japanese war effort† (2011). â€Å"Toward the finish of the war, United States Marines were utilized to hold Beiping and Tianjin against a potential Soviet invasion, and calculated help was given to Nationalist powers in north and upper east China: (2011). American specialists bantered among themselves on whether the United States ought to mediate trying to forestall a Communist triumph, which would be following the arrangement of regulation (2011). In December 1945 General George Catlett Marshall showed up in China with the contemplations of additional so bringing the KMT and CPC together to fabricate aâ coalition government that would comprise of all the fighting political and military gatherings in China (2011). â€Å"Under Marshalls direction, the Nationalist and Co mmunist groups set up an Executive Headquarters at Peiping, China (otherwise called Beijing), in January 1946† (2011). The United States Army delegated military work force into central command attempting to help regulate the truce exchanges (2011). Joined State powers were as yet considered responsible towards occurrences of brutality between the Communist and Nationalist forces (2011). Besides, â€Å"the United States additionally helped repatriate Japanese armed force work force who were abandoned in China after World War II† (2011). Shockingly for General Marshall, both the Nationalist’s and Communist’s agents couldn't bargain or go to a concurrence on certain crucial issues or give up the domains they had picked up in the hour of the Japanese acquiescence (2011). Due to these miscommunications and terrible haggling between both of the Nationalist and Communist powers, the truce endeavors bombed following a while bringing about fights continuing on indeed (2011). The ceasefire maintained between the two powers before long self-destructed in the spring of 1946 (2011). â€Å"Negotiations still continued† (2011). â€Å"On 08 January 1947 Marshall was had, understood that American endeavors shy of huge scope outfitted mediation couldn't stop the war† (2011). â€Å"Marshall was then dispatched as Secretary of State in President Trumans Cabinet† (2011). After this General George Catlett Marshall persuaded Congress to give Europe $13 billion to help remake, this got known as the â€Å"Marshall Plan† (2011). â€Å"Marshall got the Nobel Peace Prize in 1953† (2011). The United States still firmly helped the Nationalists with enormous monetary credits, yet no military help (2011). The Chinese Civil War fights turned out to be more seethed between the two powers (2011). The two powers now battled for an area as well as for the devotion of cross areas of the populace (2011). â€Å"By utilizing Manchuria as a base of flexibly and labor and by quickening the phases of Maos hypothesis, Communists field leaders vanquished Kuom intang powers in a progression of ordinary commitment in the late 1940s and built up the Peoples Republic of China in October 1949† (2011). After various operational set-moves in Manchuria the Communists had the option to assume control over the district and put more concentration towards the war south of the Great Wall (2011). â€Å"Stalin really attempted to limit Mao on a few events while he gauged American reactions to improvements in China† (2011). The intersection of the Yangtze River finished in the breakdown of the KMT opposition (2011). This drove straightforwardly to Chiang Kai-shek’s retreat to Taiwan and the arrangement of the People’s Republic of China on October first, 1949 (2011). â€Å"The Mandate of Heaven had been pulled back from Chiang Kai-shek† (2011). This brought about the last triumph of the Communist powers drove by Mao Zedong in the Chinese Civil War; this threw a dismal pall over world undertakings (2011). Around the same time, Russia exploded its first nuclear bomb, finishing the United States directing power over atomic weapons (2011). The weapons contest had started with the atomic war danger continually being a significant consistent worry vulnerable War (2011). The general effect of the Chinese Civil War finished in favor for the Soviet Union and conflicting with the United States. This is on the grounds that the United States were rehearsing an approach of control. â€Å"The procedure, control, is the methodology that the USA had of leaving the spread of Communism right speechless toward the beginning of the Cold War† â€Mr. Crow. Considering the United States didn't stop the spread of Communism to China, they can consider this occasion a misfortune neglected War. Then again, the Soviet Union (USSR) could look at this as a triumph neglected War considering they supported the Communist Party and power in China, helping them win the Chinese Civil War and spread the idea and conviction of Communism. The idea or conviction of Communism: â€Å"a hypothesis or arrangement of social association dependent on the holding of all property in like manner, genuine proprietorship being attributed to the network in general or to the state† (Dictionary.com, 2012). â€Å"Communism has ten basic boards, which are the Abolition of Private Property, Heavy Progressive Income Tax, Abolition of Rights of Inheritance, Confiscation of Property Rights, Central Bank, Government Ownership of Communication and Transportation, Government Ownership of Factories and Agriculture, Government Control of Labor, Corporate Farms and Regional Planning, Government Control of Education† (Communism Amorality, 2012). References â€Å"Chinese Civil War.† GlobalSecurity.org. N.p., n.d. Web. 13 May 2012. http://www.globalsecurity.org/military/operations/chinese-common war.htm.

Saturday, August 22, 2020

Companies and the Customers Who Hate Them Essay

In what manner can client disappointment lead to higher benefits for the organization? Organizations have discovered that poorly educated clients can be valuable for them as far as benefits. A few organizations have mishandled their clients deliberately, anyway others accidentally misused and exploited them. The Slippery incline: There are two significant manners by which organizations make benefits by deluding their clients: * Offering the clients an expansive assortment of administrations or items, which can be befuddling, particularly when there is absence of straightforwardness. In addition, if even the data is finished for the clients, the organizations can take points of interest of consumers’ challenges in foreseeing their requirements. * Using expenses and punishments for balancing costs and demoralizing unfortunate client conduct. These threatening procedures are normal from banking and lodging ventures to video stores and vehicle rentals. Here especially 3 ventures will be talked about in subtleties: mobile phone industry, retail-banking industry and fitness center industry. Mobile phone industry: When a client pursues an assistance plan, he picks a specific valuing choice with various scopes of minutes. These plans can have different limitations and stipends. Be that as it may, these changed plans are not a consequence of client driven technique. They are fairly approaches to exploit customer’s ignorance of which intend to pick, in the consequence of which clients can be punished either for utilizing an excessive amount of time or for not utilizing enough. Be that as it may, such methodologies can't generally ensure benefits for the organization. They can expand the disappointment among clients, the verification of which can be a huge number of grievances that the U. S. Government Communications Commission gets yearly. These objections ought to be troubling to organizations since clients can switch toward a straightforward and benevolent other option. Retail-banking industry: Another circle wherein the organization driven technique is utilized is retail-banking industry. For joining in the financial records individuals are offered many other options. On the off chance that the clients can't absolutely foresee their necessities, they can have misfortunes. Here are a few instances of circumstances when the banks exploit over the customers’ obliviousness * The clients get less premium when the consumers’ balances are over the base of the equalization pail and if the alances fall underneath the base level, they need to take care of certain punishments. * Banks for the most part charge the consumers’ checks in the request for size, as opposed to in a sequential request, for the remainder of the checks to skip and to cause numerous overdrafts, subsequently punishments. The organization driven procedure of banks prompted the customers’ disappointment and it turned out to be inescapable to the point that New York congresswoman Carolyn Maloney reintroduced the Consumer Overdraft Protection Fair Practices Act to prohibit banks charging overdraft security expenses, except if the clients unequivocally are educated about the administration. Fitness center industry: Health clubs entice clients to sign long haul contracts, realizing that they will once in a while visit the club. They understand that every one of their clients won't totally utilize the office and along these lines sell a larger number of participations than they have the floor space to suit. Additionally, an examination led by the New York City Council reasoned that 41% of clubs didn’t clarify their expenses recorded as a hard copy, 81% didn’t give potential individuals an agreement to peruse at home and 96% didn’t educate clients regarding all the manners in which they could legitimately drop an agreement. In New Jersey a great deal of grumblings have brought suit against very nearly two dozen gyms that gave fake agreements. Fitness centers require to invest more energy to pull in new clients in light of the fact that their current ones attempt to discover an exit plan. Additionally they even urge approaches to hold clients with remuneration focuses for individuals who work out routinely. The admonition signs: According to the examination the greater part of the administrators are recognizing the negative impacts of the capacities depicted above however they notice that those activities don't speak to a deliberate methodology. The officials realize that due to these negative practices the organizations slid down the dangerous slant and experience issues for buying in transit back up in this manner getting defenseless for the contenders. For maintaining a strategic distance from this training the administrators ought to ask themselves the inquiries referenced howl. * Are our most beneficial clients the individuals who have motivations to be disappointed with us? * Do we have rules we need clients to break in light of the fact that doing so creates benefits? Do we make it hard for clients to comprehend or submit to our guidelines, and do we really assist clients with breaking them? * Do we rely upon agreements to keep clients from abandoning? Moving go into favor: Effective CEOs can perceive the chances and wipe out the negative impacts which make the organization powerless. The organization driven methodologies can cause loss of the objective market and gainfulness in a drawn out period, subsequently numero us organizations incline toward being financially supportable.

Friday, August 21, 2020

How to Use the Common App Essay Career Examples

How to Use the Common App Essay Career ExamplesIf you are looking for career samples and career applications that are free and contain tips, then I am sure that you have come across the common app essay career examples that are available online. These are used as the most popular method for many to find a good job these days.If you are thinking of applying for the job and it is not quite so easy to find a way to get the job then this could be the most popular application method that is known. If you are fortunate enough to find a job that you really want then you will also need to take the time to learn the basics. This will ensure that you are not wasting time and effort on an application that may not work in the long run.The common app essay career examples usually go over different job requirements such as those that will be required in a hospital, or in the local area. This can prove to be very helpful in the event that you are considering applying for this particular job.Althoug h you might want to spend some time learning about the process, the common app essay career samples are available to help you on your way. In fact the content is so specific that you may find that you get help within seconds of knowing what needs to be done.It is important that if you are planning on applying to jobs that are located in the local area that you have to make sure that you have to make a good first impression on your interview. By going over the basics and learning the basics that you will be able to succeed.If you find yourself having to face interview after interview, it is then a perfect scenario to see what you are made of as a candidate. The content of the common app essay career samples will show you what it takes to succeed.Employment can also be found within the community too. If you do not know anyone that is in a position to hire, then you may want to consider going out there and meeting them and showing them that you can be hired if they want you.The common app essay career examples can give you a feel for all of the different things that you will be required to do if you are ever to find a job. As well as giving you a feel for all of the things that are required of a jobseeker, it also gives you a platform to try out different things before you commit to any particular one.

Monday, May 25, 2020

Armistice Day Quotes

Armistice Day or Remembrance Day is a day to honor the service of military personnel during the First World War. On November 11, 1918, the Allied Forces and Germany signed the armistice agreement for the cessation of war. After the Second World War, November 11 is celebrated as Armistice or Remembrance Day in the British Commonwealth of Nations and as Veterans Day in the US. In the US, Armistice Day was renamed to Veterans Day in 1954, at the end of the Korean War. It was instituted to honor all war veterans, living and martyred. On this day, military personnel and their families enjoy special treats, discounts, and perks from military and non-military establishments. Today, Armistice Day is a national holiday in Commonwealth Nations, and countries outside the Commonwealth such as France, Germany, and Belgium. Government s recognize the contribution of war veterans, who displayed courage and patriotism in the face of danger. Soldiers are honored with medals, certificates, and prizes. Grand parades, marching bands, and other military ceremonies mark the holiday, building the spirit of patriotism and brotherhood. General Omar N. Bradley Armistice Day is a constant reminder that we won a war and lost a peace. Blaise Pascal We must kill them in war, just because they live beyond the river. If they lived on this side, we would be called murderers. Chris Taylor, Platoon I think now, looking back, we did not fight the enemy; we fought ourselves. The enemy was in us. The war is over for me now, but it will always be there, the rest of my days. Kurt Vonnegut, Breakfast of Champions Armistice Day has become Veterans Day. Armistice Day was sacred. Veterans Day is not. So I will throw Veterans Day over my shoulder. Armistice Day I will keep. I dont want to throw away any sacred things. General William Tecumseh Sherman I confess without shame that I am tired and sick of war. Its glory is all moonshine. It is only those who have neither heard the shrieks and groans of the wounded, who cry aloud for more blood, more vengeance, more desolation. War is Hell. Francis Marion Crawford They fell, but oer their glorious grave Floats free the banner of the cause they died to save. Will Rogers We cant all be heroes because someone has to sit on the curb and clap as they go by. James A. Hetley She mourned with a bleak blank determination, marching straight ahead with a shell-shocked vets hollow-eyed thousand-yard stare while doing the next thing and the next. Joseph Campbell As we express our gratitude, we must never forget that the highest appreciation is not to utter words, but to live by them. Elmer Davis This nation will remain the land of the free only so long as it is the home of the brave. Thomas Dunn English But the freedom that they fought for, and the country grand they wrought for, Is their monument to-day, and for aye. Jimmy Carter War may sometimes be a necessary evil. But no matter how necessary, it is always an evil, never a good. We will not learn how to live together in peace by killing each other’s children. Gen. Jack D. Ripper, Dr. Strangelove War is too important to be left to politicians. They have neither the time, the training, nor the inclination for strategic thought. Carol Lynn Pearson Heroes take journeys, confront dragons, and discover the treasure of their true selves.

Thursday, May 14, 2020

Managing Diversity and Ethics in the Workplace - 1

Elizabeth Thomas MGT450: Leadership Practices Team Leadership Professor Kathleen Dove July 20, 2012 Managing Diversity and Ethics in the Workplace Introduction There steps leaders and managers can take to effectively manage diversity and ethics concerns. How a manager effectively manages ethics and diversity, within the organization is directly correlated to the cultural, organizational and external environment influence ethical behavior. One of the step’s leaders and managers can take is to incorporate diversity training of the organization. This big†¦show more content†¦There is no better way to understand diverse group than interaction, joining together at certain times in order to interact and communicate. Leadership of Teams Essential important when implementing a change of the organization core values, and goals is to form a top management team. (Jones, 2011 p. 499). Top management teams are the ones responsible for developing diversity training methods and a strategy to implement the training within the organization in order to achieve the organization goals. Top management teams, are normally compose to a diverse group, with knowledge, expertise and experience in stressing diversity. As cross-functional top management team the members are comprised from the various departments within the organization as a formal group. The top management as a formal group, come together to form a cross-cultural team, by following the five stages of forming a group, as group role is to set the behaviors and task. One of the behaviors for diversity training is that the members of the team to lead by example, in demonstrating ethical and social responsibility. By treating employees based on skills rather than age, sex or race. The integration of leadership exercises in diversity training programs will help employees realize the importance of this attribute within the organization. There areShow MoreRelatedBenefits of Managing Ethics in Workplace1141 Words   |  5 Pages10 Benefits of Managing Ethics in the Workplace Many people are used to reading or hearing of the moral benefits of attention to business ethics. However, there are other types of benefits, as well. The following list describes various types of benefits from managing ethics in the workplace. 1. Attention to business ethics has substantially improved society. A matter of decades ago, children in our country worked 16-hour days. Workers’ limbs were torn off and disabled workers were condemnedRead MoreDiversity in the Workplace964 Words   |  4 PagesRunning head: DIVERSITY IN THE WORKPLACE Abstract Select (highlight) this text and then begin typing your abstract, which should be limited to one paragraph of not more than 120 words A Survey of Organizational Culture and its Effectiveness on Managing Diversity in the Workplace Diversity in the workplace is a relatively new concept that has been attracting considerable attention from the executives of most businesses. â€Å"Ongoing demographic trends (increasing percentages of African-AmericansRead MoreEthics Training Is Becoming An Increasingly Popular Trend1594 Words   |  7 Pagesorganizations. Diversity is one of those problems, diverse workplace is made up of employees of different races, genders, abilities, ages and cultural differences. A company that lacks diversity often experiences deterioration of employee morale, a drop in productivity and a flat-lining bottom line. Maintaining diversity and ethics practices is important to most small businesses who want to gain the loyalty of employees and trust of consumers. According to Joshua Joseph of the Ethics Resource CentreRead MoreEthical Issues in Human Resource Management Strategies936 Words   |  4 PagesEthical issues in HRM strategy Introduction The plans for managing an organizations structure, culture, people, training and development are referred to as HRM strategies. These strategies are also used to determine how employees fit in the organizations growth in the future. In business practices, the level of honesty and transparency is referred to as ethics. HRM strategies should guide employees on their workplace behavior. These strategies show the organizations expectations of its employeesRead MoreManaging Diversity Within The Workplace1605 Words   |  7 PagesAbstract- Managing Diversity in the workplace requires a lot of focus, training, and time. This paper gives an insight into the world of management and how diversity plays a big part. It explores the key benefits to putting emphasis on diversity and also how not putting emphasis on diversity could hurt your business. This paper also gives examples on how to go about managing diversity in the workplace. With proper focus on managing diversity, your organization ca n be at a big advantage. I. INTRODUCTIONRead MoreEthical Issues in Management Essay1199 Words   |  5 PagesEthical Issues in Management Charles Hall Axia Student Diversity in the workplace refers to the stark contrast of individuals within the same work environment. Many moral and ethical issues are faced by managers every day concerning diversity. Social Issues and ethically responsible management practices relate to workplace diversity in simple but important ways. Ethically it is irresponsible for managers to manage diversity in the workplace by acting insensitively towards employees. There are manyRead MoreManaging Multiple Generations in the Workplace1075 Words   |  5 PagesManaging Multiple Generations in the Workplace Diversity is no new thing in the workplace. Many different factors account for this circumstance in the business arena. Gender, race and ethnicity, and age are a few of the major factors that create diversity within the workplace. The latter, age, is one of the more understated and disregarded issue of diversity. But over time, differences in age in the workplace has been growing more and more, generating conflicts that could not be ignored anyRead MoreManagement : Management Careers And Diversity Essay1744 Words   |  7 PagesManagement Careers and Diversity Introduction Ongori and Agolla (2007) state that managing workforce diversity in an organization is a complex phenomenon. They suggest that with the current organizational transformations being implemented across the globe, management of workforce diversity cannot be downplayed. Diversity in the workforce is based on the acknowledgement of the reality that people are different in more than one way, mainly in terms of culture and ethnicity, personality, religionRead MoreTable Of ContentsPrefacexiiiPART ONEThe Strategic Human1743 Words   |  7 PagesTable of Contents Preface xiii PART ONE The Strategic Human Resource Management Model 2 Chapter 1 Strategic Importance of Human Resource Management Chapter Objectives Challenges Facing Canadian Organizations Spotlight on Ethics: What Is a â€Å"Right† Behaviour? Objectives of Human Resource Management Strategic Human Resource Management The Organization of Human Resource Management The Human Resource Management Profession of the Future The Framework Used in This Book Spotlight on HRM: Will the 21stRead MoreLiterature, Business and Social Change1578 Words   |  7 Pagesthe problems and emotions related to the workplace. Literature communicates past and present changes which occur in businesses. These literary works represents the voice of the people. Past and present business literature assists businesses and its workers to better understand human nature, social and/or political issues and changes emerging in today’s workplace environment. Past literary works in business has focused on the worker and the workplace environment. Themes related to this era

Wednesday, May 6, 2020

Essay Bulimia Nervosa - 1311 Words

BULIMIA NERVOSA 307.51 (F50.2) Introduction Individuals diagnosed with bulimia nervosa undertake frequent binge eating, followed by expelling the food, typically by inducing vomiting, but also through exercising and the use of laxative agents, diuretics, and enemas (American Psychiatric Association, 2013). The binge eating occurrences are often prompted by a negative perception of one’s body image, temporarily alleviated by the binge eating episode. Since the individual with bulimia nervosa is overanxious about body weight, purging of the food is viewed as a necessity. This is in contrast to binge eating disorder, which does not involve the purging of food after an excess of food consumption (Bulik et al., 2012). Furthermore, although†¦show more content†¦There is an additional feature that must be present alongside these symptoms in order for a patient to be diagnosed with bulimia nervosa: any binge eating events followed by compensation needs to be relatively frequent. Specifically, if these events take plac e at a minimum of one time per week – over a 3 month timespan – then a diagnosis of bulimia nervosa may be made. Although these are the symptoms that must be present in order for a diagnosis of bulimia nervosa to be made, there are often other symptoms that accompany bulimia nervosa. Signs of psychosis have been found in patients with eating disorders like bulimia nervosa (Miotto et al., 2010). Moreover, those with bulimia nervosa frequently have the feeling that there is something flawed with their mind, and that others are at fault for their problems (Miotto et al., 2010). In addition, there is evidence that a feeling of loneliness is correlated with the occurrence of bulimia nervosa (Levine, 2012), highlighting the psychological dynamics that are at play behind this disorder. Causes of Bulimia Nervosa: from genetics to environment The environmental and biological mechanisms that underlie bulimia nervosa have been researched in some depth. The principle mechanisms that give rise to bulimia nervosa may be classified into two groups: genetic variables at play and environmental factors that impact the patient. There is a considerable body of evidenceShow MoreRelatedThe Treatment Of Bulimia Nervosa1042 Words   |  5 PagesAuthor: Haley McDaniel, Pharm.D. Candidate Date Answered: November 2, 2015 Question: 47. Should topiramate be considered for the treatment of bulimia nervosa? Answer: The drug Topiramate is a sulfamate-substituted derivative from the monosaccharide D-fructose that is known for its anticonvulsant and antimigraine actions.1 Therefore, it is helpful for patients with seizures and migranes. Epilepsy is a specific example of what this drug is used to treat. Topiramate is different from otherRead MoreBulimia Nervosa Argument1639 Words   |  7 PagesBolanle Soyombo Cox AP Lit A2 April 18, 2012 Bulimia Nervosa: Argument Although bulimia nervosa can be treated in multiple fashions, there is a specific treatment that is proven to be the most effective in not only bulimia nervosa, but also other anxiety related disorders. This effective treatment is an specific form of short term psychotherapy. Cognitive Behavioral Therapy is productive in both reducing the amount of times one may purge in a day and diminishing the entire disorder altogether;Read MoreEating Disorders : Bulimia Nervosa1383 Words   |  6 PagesBulimia Nervosa â€Å"Up to 30 million people of all ages and genders suffer from an eating disorder† (Wade, Keski- Rahkonen, Hudson, 1995). There are many factors which contribute to the development of eating disorders including â€Å"biology, emotional health, and societal expectation, and other issues† (â€Å"Diseases and Conditions Bulimia nervosa†). One of the most prominent eating disorders in America and around the globe has been around since the Middle Ages: â€Å"Bulimia is first reliably described amongRead MoreBulimia Nervosa Is An Eating Disorder1420 Words   |  6 PagesBulimia nervosa is an eating disorder that consists of the distortion on one’s body image and an obsessive desire to lose weight. It involves binge eating which is the rapid ingesting of large amounts of food, commonly followed by vomiting, fasting, or purging that is accompanied by depression. An individual with bulimia will attempt to avoid weight gain by vomiting or using laxatives, diu retics, or enemas. It is common to see a bulimic individual restrict their food intake or exercise excessivelyRead MoreBulimia Nervosa1676 Words   |  7 PagesBulimia Nervosa [also known as Bulimia] is a very serious and dangerous eating disorder. The disorder can be describe as bingeing and then followed by purging or a person who eats a large amount of food in short periods of time and then vomits after eating to prevent on gaining the weight cause by the food. There is different ways of going about ways to prevent the weight gain, making oneself throw up, taking pills, or laxatives which will increase how fast the food will move through your body, exercisingRead MoreAnorexia Nervosa And Bulimia Nervosa1452 Words   |  6 Pagesfrom it. Eating disorders can kill the victims if it is not treated in time. People who have eating disorders begin to experience deterioration of their bodies. The two major types of eating disorders are Anorexia Nervosa and Bulimia Nervosa. One of the descriptions of anorexia nervosa was during the 12th and 13th centuries. A woman, Saint Catherine of Siena, ceased her intake of food for a spiritual denial of herself. During the 16th century people who had self-discipline and practiced abstentionRead MoreBulimia Nervosa Is An Eating Disorder Essay2102 Words   |  9 PagesBulimia nervosa is an eating disorder that is most commonly found in women of teenage or young adult age (Herzog, D. B. (1982). This disorder can have very serious effects on the body. Some of these physical effects include â€Å"dental problems, inflamed esophagus, EEG abnormalities, abdominal or urinary disturbances, and changes in blood sugar level.† (Muuss, R. E. (1986). ) The mental and emotional tolls of this disorder can be equally as dangerous. According to Pompili, M., Girardi, P., Ruberto, ARead MoreThe Importance Of Treatment For Bulimia Nervosa2263 Words   |  10 Pagessignificance of treatment for Bulimia Nervosa as well as which way of treatment is best for Bulimia. The purpose of this research is to analyze the best treatments for Bulimia Nervosa. More emphasis on the question, is Bulimia Nervosa best treated with Cognitive Behavioral Therapy or with antidepressants such as Adapin or Prozac? Furthermore, in the paper the results will indicate the efficacy of treatment of which method of treatment is best for Bulimia. Bulimia Nervosa is characterized by The DiagnosticRead MoreAnorexia Nervosa And Bulimia Nervosa1122 Words   |  5 PagesAnorexia Nervosa and Bulimia Nervosa are a few of the most common disorders struggled with today. Anorexia Nervosa is a condition of the intense fear to gain weight, which results in consistent lack of eating. Bulimia Nervosa, involves frequent episodes of binge eating followed by throwing up because of fear of gaining weight. The mortality rate for anorexia is the highest of all mental disorders yet the genetic factors relating them were not a huge concern to look into. It is easy to think thatRead MoreAnorexia Nervosa And Bulimia Nervosa Essay1944 Words   |  8 Pagesobsessed, that they will start to see themselves as larger than they truly are and will take serious measures to accomplish their dream of being thin. This â€Å"thin fantasy† develops into eating disorders such as anorexia nervosa and bulimia nervosa. Although anorexia nervosa and bulimia nervosa are both eating disorders where the person has a misperception of his or her own body and relies on starving/fasting, purging, and excessive exercise to lose weight, these conditions do vary in the way they are defined

Tuesday, May 5, 2020

Business Law Scallop Marketing Authority

Question: Discuss about theBusiness Lawfor Scallop Marketing Authority. Answer: Introduction In the case, Bob beech is a scallop fisherman, who is engaged in commercial scallop fishing in New South Wales. But the subject of scallops is under protective legislation. The act of Scallop fishing and marketing uses quota based system to each fisherman, which they can get after applying. For individual, the quota is fixed 50 tonnes within a year. Further, the act gives power to Scallop Marketing Authority for purchasing scallops for those fishermen, who have reached their quota limit. But, fishing of scallop more than give quota by authority is offensive. As per the act of Scallop finishing and marketing, no one has right for Scallop fishing more than the given quota. It means no one has a right to do excess of Scallop fishing otherwise it can be a matter of penalty that can be up to $100,000. Due to the capacity of Bob, his daughter tells him to incorporate a company to get double his catch. In this case, the main issue is Can Bob double his catch by incorporating a company. The corporation law 2001 of Australia, a corporation is also a legal entity. It means, the liability of a corporation can be defined as similar as an individual person (Commonwealth of Australia, 2015). This is because the corporation law of Australia separates the rights of a corporation from the owner of the corporation. The owner and corporation can be both separately sue in the title of their different positions (Commonwealth of Australia, 2015). As per the act of Scallop Marketing Authority, it is not possible to give the exemption to a corporation because the act strongly says that a person will get quota to catch 50 tonnes of Scallops in a year. It means a person whether it is a real person or legal entity such as a corporation may set the quota to catch Scallops under the allotted quota. Further, the statement of the act of Scallop finishing and marketing includes a particular word such as permit him or her. It means the law does not allow corporations to enter into the catching areas to catch the Scallop. The statement of act clearly says that the quota will be allotted to a real person rather any legal person. It means a person cannot be able to get the quota for catching Scallop after incorporating a company. Therefore, it can be stated that the daughter of Bob is not correct because her suggestion is just opposite to the provisions of the Scallop fishing and marketing act, which does not consider the corporation for fishing activities. further, the area of Jervis Bay is for the regeneration of Scallops that means the allocation of more quota to a person can affect the regeneration policy of the NSW that will also affect the eco-system and ecology of Jervis Bay, which will affect the entire business of Scallop in negative manner because of the limited availability of the Scallops stock (NSW Department of Industry, n.d.). There is limited availability of the Scallops stock that means the increment in the yearly quota may affect the regeneration process of Scallops in Bay area negatively. The given situation describes that Hard rock band controls the New Nirvana Ltd. this organization manages the activities of band through the help of its several subsidiary companies. This means New Nirvana Ltd is involved in the setting of the business routes and policies for it's every subsidiary company and the action of each company is guided by the holding company. Further, the wrong action of Nuclear Blast Sounds Pty Ltd caused critical harm to the audiences due to its negligence work. But, the company has no insurance to manage its negligence work. In this case, the main issue is Should the holding company of Nuclear Blast Sound liable for the action of negligence. It can be explained through the help of some examples and principles related to the holding company and subsidiary company. Section 588V to Section 588X of corporation law defines the responsibility of the holding company towards the subsidiary company and allows a liquidator for recovering compensation against the action of the subsidiary company from its holding company, if the subsidiary company is involved in unethical or insolvent trading (AUSTLII, 2000). But, Industrial Equity v Blackburn (1977) 52 ALJR 89 is a case related to liability of the subsidiary. In this case, court held that the subsidiary company may not treat as merely part of a holding company only for the purpose to determine holding companys profits (AUSTLII, 2000). This is because the court gives the value to the concept of separate legal entity. As per this case, the subsidiary company may not be considered under the umbrella of a holding company because the concept of separate legal entity defines that actions and decision of holding company and subsidiary company are not mutually related and taken by the different board of directo rs. On the basis of this, the corporate veil can be lifted if following points are available: Profit of a subsidiary company is treated as profit of holding company. It is clearly shown in the case of New Nirvana Ltd because it gives the business to its subsidiary company that means profits of Subsidiary company will be considered as the profit of New Nirvana. Business of the subsidiary must be allotted by the holding company. The similar situation is presented in the case of New Nirvana. Holding company should be brain and head of trading venture. Similar situation is also presented in the case of New Nirvana. Holding company should be controlled by the business. Profits earned by subsidiary company should be based on holding company's direction and skills and Holding company should be in effective control. As per above points, it is clear that New Nirvana company directs the business functions of its subsidiary company. On the basis of the above result, it can be stated that the injured audience members can make new nirvana Ltd liable for the Nuclear Blast Sound Pty Ltds negligence. This is because the actions and decisions made the Nuclear Blast are fully controlled by its holding company. This is because holding company such as New Nirvana Ltd makes planning for the event of the band and the distribute the responsibility of the works to its subsidiary company. As per the situation, Simon, Michael and Don develop a project management company. According to the constitution of the company, Don is a solicitor and he will be the solicitor for purchase or sales of any land. On the other hand, the article of company defines that any disputes between company and its members will bring to the arbitrator before any court proceeding. Further, Michael and Simon took the decision to change the solicitor. In this case, there are two issues. First issue is related to the validity of decision made by the directors of the company and the second issue is related to changes in the companys constitution and article. As per the corporation law of Australia, internal management of a company may govern by: Provisions of Corporations Act 2001 Constitution of company or Both above (ASIC, 2016) Section 135 and section 136 of corporation law defines that a company can be run through the help of the constitution of a company that is changeable, while the provisions of the corporation act 2001 may help to run the business but it may not be changed by the company (ASIC, 2016). The section 139 of the Corporation law 2001 defines that the up-to-date copy of the changed constitution must be provided to members of the company within 7 days (ASIC, 2016). Overall, it can be said that the actions of directors are governed by the constitution of the company. As per the case, the director of Project Company does not make any change in the constitution of the company in regard of the changes in the existing solicitor but the two directors have taken the decision to change companys solicitor. In this context, the company can be stated that the new solicitor is more effective for the survival and profits of the company. And Don is not outside and he will also gain his profit share. Further, both directors may argue in court that they have already informed Don about their decision and the decision is taken by majority that means the company is going to make changes in the constitution of company to give solicitor post to other persons. Simon and Michael may argue that the post of solicitor and director is related to conflict of interest. It means responsibility under both positions may not perform by a single person. Therefore, the majority of the directors have taken the decision to appoint the new solicitor for the company to hold the best interest of its shareholders. Finally, both directors of the company may argue that the action of Don is just against the constitution of the company because it needs to contact the arbitrator initially before court. But Don did not do this action and violated the rule of the company. Therefore, he has no legal right to raise the issue against the decision taken by the directors. Hence, the company can request to the court to reject the case of Don. References ASIC 2016, Constitution and replaceable rules, Available at: https://asic.gov.au/for-business/starting-a-company/constitution-and-replaceable-rules/ (Accessed: 14 October 2016). AUSTLII 2000, A Two-Edged Sword: Salomon and the Separate Legal Entity Doctrine, Available at: https://www.austlii.edu.au/au/journals/MurUEJL/2000/32.html (Accessed: 14 October 2016). AUSTLII 2000, Corpoartions Act2001 - SECT 588V, Available at: https://www.austlii.edu.au/au/journals/MurUEJL/2000/32.html (Accessed: 14 October 2016). Commonwealth of Australia. 2015, Company, Available at: https://abr.gov.au/For-Business,-Super-funds---Charities/Applying-for-an-ABN/Business-structures/Company/ (Accessed: 11 October 2016). NSW Department of Industry (n.d.) Scallops - research information sheet, Available at: https://www.dpi.nsw.gov.au/fishing/aquaculture/publications/species-saltwater/scallops (Accessed: 13 October 2016).

Tuesday, April 7, 2020

The Space Shuttle Challenger and Columbia Accidents an Example of the Topic Science and Technology Essays by

The Space Shuttle Challenger and Columbia Accidents by Expert TheSmartwriter | 23 Nov 2016 It has been claimed that the engineers were to blame for both the Challenger and Columbia Space Shuttle accidents and we shall, therefore, look into the failure on the part of management and the extent to which they are responsible for the failures of the two missions. Need essay sample on "The Space Shuttle Challenger and Columbia Accidents" topic? We will write a custom essay sample specifically for you Proceed Space programs have enormous implications, pressure and expectations as regards the result as in countries like America the whole is usually watching. This paper I will argue that the decision-making power on whether to launch or not should be made by the engineers and not the management as they are in a better position to establish whether a space shuttle can be launched without the risk of accidents. Our Customers Frequently Tell EssayLab specialists: Who wants to write paper for me? Specialists propose: Don't Waste Your Time As per the investigations that have been carried out into the causes of both the Challenger and Columbia disaster the management was found to have played a role in the disaster. The NASA management in the case of the Space Shuttle Challenger was found to have ignored safety concerns raised by the engineers. Therefore it is, therefore, safe to say that if the management had paid attention to the concern raised by the engineers the accident would not have taken place. The Space Shuttle Columbia disaster was attributed to structural flaws though in almost all previous missions a foam insulator had broken off but had not caused any significant amount of damage. However, in this particular case, the chief thermal protection system engineer and other engineers raised concern but the managers did not respond. The Space Shuttle Challenger burst into flames just 73 seconds after launch from Cape Canaveral, Florida, killing all seven crew on board. This was caused by the failure of the O-ring in the right Solid Rocket Booster at liftoff. The O-ring is a rubber ring which seals the joint around the connection point between the Solid Rocket Booster (SRB) and the Hydrogen tank. The failure of the O-ring was attributed to low temperatures, close to 31F (1C), at the launch which was below the minimum temperature permitted for launch. The engineers at Morton Thiokol, the contractor responsible for the construction and maintenance of the shuttles SRBs, had raised concern that the temperature would affect the resilience of the rubber O-rings and that they did not the data necessary to establish whether the joint would seal properly. This was discussed by the engineers and managers at Morton Thiokol, NASA managers from the Kennedy Space Center and those from the Marshall Space Flight Center. The concerns were not heeded by the Morton Thiokol management who recommended that the launch proceeds as scheduled. NASAs managers pressured the Morton Thiokol management by requiring them to prove that the launch was unsafe rather than prove it was safe and since they were unable to prove that the launch would unsafe their concern and recommendation was totally disregarded. The launch proceeded as planned and barely 2 minutes into the flight, the Challenger burst into flame killing all the seven crew onboard. Subsequent investigation revealed that the O-rings were responsible for the tragedy and further investigation revealed that the failure was caused by the failure of the O-rings to seal the joint between the srbs. This, therefore, points to a breach of engineering ethics and negligence on the part of the management both at NASA and at Morton Thiokol, and thus they were entire to blame for the tragedy. The Space Shuttle Columbia burst into flames during its re-entry into the earths atmosphere only 16 minutes before it was scheduled to land at CAPE CANAVERAL, Florida. This was attributed to the damage caused when a piece of foam insulation broke off the Space Shuttle external tank and struck the left wing during liftoff. The foam piece is said to have struck the leading edge of the left wing which damaged the Shuttles Thermal Protection system (TPS) which shields the Shuttle from the extreme heat generated as a result of friction between the Shuttle and the earths atmosphere during re-entry. The NASA manager back on earth downplayed the extent of the damage caused by the insulation foam and went on to make a statement that it was not a safety threat, they even declined to request from other agencies claiming that nothing could be done. This not withstanding the engineers should have gone on and taken the images they required to establish whether This was an outright poor management decision by Lind Ham, head of the Space Shuttle Managers, as she declined several requests made by NASA engineers for high-resolution images of the left wing to be taken to establish the exact extent of the damage. The managers also rejected the idea to have an image of the shuttle's left wing taken before re-entry. This was attributed to the managers low level of concern and their one minded decision to have the mission continue, this made the engineers found themselves in a position similar that of those responsible for the Challenger in that they were required to prove that the situation was unsafe rather the norm which was to prove that the situation was safe. Therefore though this tragedy was mostly attributed to structural flaws the management could not be let off the hook as they had to try and come up with a solution. The problem, in this case, is that though the engineers tried to do something nothing could be done as the final decision was reserved to the Space Shuttle Program management. Decision-making on whether a shuttle should be launched or not should be made by the engineers and not the management. It was evidence in the case of the Challenger whereby the decision making was left to the management who in trying to comply with their launch schedule disregarded the safety concerns raised by the engineers both at NASA and at Morton Thiokol. The management can be said to have been driven by the fear of having any more delays as this would make them look incompetent and they were, therefore, afraid that they would lose funding which they received from the government. The NASA management was fully briefed of the danger that was posed by proceeding with the launch in those kinds of temperatures. They were even part of the group, include engineers from the Kennedy Space Center and Marshall Space Flight Center, that discussed what would be the outcome if the shuttle was launched in such conditions to which the engineers responded that they did not have enough information to determine whether the O-ring would seal the SRB joint properly. This should serve as enough evidence that such kind of decision should not be left to people who do not have the safety concerns of their colleagues as the top priority no matter the stake. It should be noted that where an engineer(s) raise concern, the mission should not go any further until those concerns have been addressed and there is no other concern or doubt on the performance of any of the equipment on the shuttle(s). The managers also find themselves in very difficult situations as in most situations they are under pressure to deliver in the provided time failure to which they will be assumed to be incompetent and not capable of delivery. The Space Exploration program is considered to be a symbol of Americas intellectual power and also serves as a show of its might and it is used as a way to remind the rest of the world that America is still the most developed country in all facets. Therefore in cases where the managers are under tremendous amounts of pressure, they tend to downplay small hitches which involve overlooking engineering ethics and order the continuation of the mission so that they can come out as being able to deliver this acts as a boost when they seek funding (Charles, 2008). Therefore as per the evidence that was tendered in investigation into both the Columbia and Challenger disasters the decision to launch should be an engineering decision and not a managerial decision as in the case studies above the management disregarded very credible concerns by the management which if heeded even if not in the Columbia case would have prevented the disaster. Reference Charles, B. (2008). Engineering Ethics. New Jersey : Pearson/Prentice Hall

Monday, March 9, 2020

SQL BUSINESS REPORT essays

SQL BUSINESS REPORT essays Third-Part Augmenting Software and Enhancements 5 Data modification and retrieval 9 Application Environment 10 The Team A Corporation is the creator of a next-generation software program called Do It All Software. Team A is planning to soon start a user Beta testing program for Do It All Software. The Team A beta test management team is expecting a heavy interest by users to test the program and is preparing a website to assist them. Team A anticipates that the website will be updated several times a day. Team A plans to create a SQL driven Content Management System for the current website that will allow the beta test team members to dynamically update pages on the website and create new pages as needed, without worrying about knowing HTML. The Content management System (CMS) will be primarily used to manage a beta-testing website for the new software programs. The Team A beta test management team will be creating pages to support the development and beta test of Do It All Software. The main goal is to make it easy for the beta test management team to create, manage, distribution, and publish pages to the website. It will also have the ability to manage the structure of the site, the appearance of the published pages, and basic site navigation provided to the users. Since Team A anticipates a high number of beta testers, powerful hardware and software will need to be utilized. To meet these requirements, the CMS will run on multi-processor Intel based server running Microsoft Windows 2003 Server. The CMS will be developed by in-house engineers using Microsoft SQL Server as the database engine to manage and store beta testing information on Microsoft Internet Information Server (IIS) and ASP.NET to serve the website pages. The initial CMS prototype will be developed using Microsoft Access because of it ease of use. The CMS will require beta testers to register on the website. The foll...

Friday, February 21, 2020

Why U.S automobile company such as Ford had great lost in 2006 and how Essay

Why U.S automobile company such as Ford had great lost in 2006 and how it influences on the U.S auto market - Essay Example (Isidore) Plans to cut-off more jobs were also announced and more than half of its U.S. hourly workforce had already agreed to take one of its buy-out schemes in the next few months. For the first time, Ford Motors is mortgaging its total assets to finance all of this restructuring. It hopes to raise $18 billion from its factories, equipment, office buildings, patents and trademarks, and stakes in subsidiaries; an amount that exceeds the company's total market value of all its outstanding stock by more than $2 billion. This move has never been done before as Ford Motors' credit line has always been good and it can borrow money without mortgaging its assets (Bunkley) So what is really happening to Ford Motors and the U.S. automobile industry as a whole Why is it losing so much while its overseas counterparts like Toyota and Honda, are moving towards the opposite direction Declined Sales, Quality Issues, Marketing Strategy, Labor Cost Discrepancies, Productivity and Currency Exchange Rates are the principal factors. Declined Sales - Overseas Automobile makers share in the U.S. market had steadily grown through the years. Chart 1 shows how Japan and the European markets had slowly crept up in market share from the 70s to the present, a trend that had Toyota surpassed Ford Motors as being the second biggest seller of automobiles in the U.S. This loss in the market share however, is not experienced by Ford Motors alone but by practically all U.S. automobile manufacturers as well. Honda has exceeded Chrysler in sales and is almost catching up with Ford. On the other hand, General Motors has not had the lowest share in new car and light truck sales since the 1920s. (Train & Winston) The pickup trucks, though still considered as the nation's best selling vehicle, also experienced very low consumer demand in 2006. Ford Motors' F-series pickups, regarded as one of its main product lines had a major sales drop exceeding 100,000 units. (Isidore) This shows the magnitude of the dire state the U.S. car makers are facing. With surging oil prices in the world market, consumers are opting for the more fuel efficient smaller cars, vehicles that does not guzzle gasoline like light trucks do. With this preference shift, U.S. automakers, such as Ford Motors are left with many truck factories that can't afford to be operational but stay inactive. Adjusting to the changes, U.S. car makers are not only closing their truck factories but have re-focused towards the smaller "cross-over" type cars which are scaled down versions of SUV. While GM announced its plans to shift towards building more small vehicles in the Beijing auto show last year, Ford Motors also confirmed that it will cease its Freestar minivan production and redirect its focus on building more crossover vehicles (CBC) Quality Issue - Sales drop due to quality issues is totally another story. Of this year's "Top Picks" lists based on the annual Consumer report, all picks are vehicles made by Japanese automakers. It has been two years in a row that no American cars made it to the list. To merit a Consumer Reports' recommendation to the "Top Pick", the car must pass certain criteria like reliability, safety,

Wednesday, February 5, 2020

Leadership in Health Care Organizations Practicum Coursework - 14

Leadership in Health Care Organizations Practicum - Coursework Example Our entire organization was sealed in a way for the safety precaution purpose. Along with my team, especial health team was also overlooking the patient’s case. We were either prohibited to approach the patient unnecessarily. When I and my team went to give the initial treatment to the patient, then I examine that it might not be small pox. I immediately inform my leader to run some blood tests, before beginning the small pox precaution treatment. My leader humiliated me, and disagreed. Patient’s condition was not getting better with the given treatment. His condition was getting more critical. I hardly managed to conduct some tests of patient, to come up with a proof. I presented the tests result to my leader with a proof that, it is some other skin allergy containing identical signs of small pox. I asked my leader to agree with my observation, trust and stop the wrong medical treatment. On getting the patient worst, my leader eventually gave importance to my evaluatio n and made the especial health control team to cope up with me. As soon as the treatment given to the patient was replaced, it confirmed the misjudgment of small pox taken by my leader. Patient’s overall condition got stable and in control. Patient had some other skin disease, which was absolutely treatable. I was glad that my leader put down his stubbornness for a while, by giving the significance to my experience so far. That was the time, I really felt myself well acknowledged and educated in my working field. Leader can’t always be right. Sometimes the situations come across, which could probably mislead a leader’s examination over his team members. By doing the right thing at the right time, we as a team were successful in saving the life of our patient. Our organization was unsealed, and the inside working was switch onto usual. The outcome which can be taken by this experience is that, humility is

Tuesday, January 28, 2020

Different types of tourism destinations

Different types of tourism destinations Introduction This report is going to look at the key appeal factors of France, USA, Spain and China. It will identify different types of tourism destinations and look at arrivals statistics to these countries. According to UNWTO (2008) in the Worlds Top Tourism Destinations 2008 first four places by international tourism arrivals were occupied by France, Spain, USA and China. First of all this report will identify the meaning of travel destination and tourist destination. A travel destination is the end point of the journey (Marvell and Hayward 2005). People travel to a destination for a variety of reasons, including holidays, business and visiting friends and relatives. A tourist destination combines travel with facilities and attractions that appeal to tourists (Marvell and Hayward 2005). There are many different types of tourist destinations; however this report will discuss coastal, urban and rural tourism and give examples of places that appeal to the destination. Main part Coastal tourism Coastal destination usually associated with the image of seaside resort. Holloway (2006) pointed that it is the most popular appeal of a destination. The attractiveness of the seaside resort is the combination of sun, sea and sand. Page et al. (2001) stated that it remains one of the most significant types of holiday in the world. The Spanish Costas are found along the southern coastline, on the shore of the Mediterranean Sea. Spain has many resort areas: Costa Blanca, Costa Almeria and Costa del Sol. While some of the Costa names may not be familiar, the resort of Benidorm is well known. Benidorm is the most popular resort in the Costa Blanca. According to Dale et al. (2006) resort attracts approximately five million visitors each year. Tourists are attracted by its wide sandy beaches and warm climate with average summer temperature around 30oC. The beaches are gently sloping and the water is warm and clear, making the sea safe for adults and children. Behind the sandy beaches are many high-rise hotels with plenty of nightclubs, bars, restaurants and casinos. There are places in France which are as popular as Spanish Costas. One of the famous seaside areas in France is the place called Cote dAzur which is famous for its resort Nice. It is a capital of French Riviera situated on the Mediterranean coast. According to Williams and Le Nevez (2007) Nice is well-known holiday destination on the Cote dAzur. Williams and Le Nevez (2007) in addition pointed that resort attracts visitors to take a delight in its beautiful beaches and warm climate. Tourists enjoy dining at the restaurants located along the French seaside. Appetizing seafood and delicious wines can be enjoyed at many seaside restaurants in this Mediterranean city. Nice has something for everyone: a medieval old town and other grand architectural monuments; a wide selection of museums; lots of bars and restaurants of all standard and type; the fine Mediterranean climate; and of course easy access to beaches. Besides, America is very famous for its beaches too. According to Fry (2008) places like Florida or California, or even further to Mexico, the Bahamas and the Caribbean are popular tourists destinations. According to Fry (2008) Florida is well-known for its famous Florida Keys and the resort of Key Largo. The Keys are long, low islands at the south of Florida. This place has many beaches and blue waters that are popular with divers. The Keys are also famous for swim with dolphins. Urban tourism Urban tourism is another type of tourist destination. Holloway (2006) stated that towns and cities attract many tourists by growing interest in cultural activities for example visits to museums and art galleries, leisure activities like shopping, and entertainment to sports. There are many different towns in France, Spain, USA and China which are famous for its rich culture and heritage, delicious food and designer shops. Holloway (2006) says that Paris in France, Madrid and Barcelona in Spain are popular destinations where tourists arrive for city holidays. They combine all the factors for a good stay: high quality hotels and restaurants, fine museums, outstanding architecture, festivals and many beautiful eye-catching shops. According to UNWTO (2008) Spain ranked on the third place in terms of arrivals-57, 3% in 2008, with France continued to lead the ranking of the worlds major tourism destinations in terms of arrivals-79, 3% in 2008. The French capital Paris has a reputation as a very charming and romantic city with popular attractions, including the Eiffel Tower, the Louvre museum, Notre-Dame and Arc de Triomphe. According to Law (1996) there are approximately 800 festivals held annually in France. The theme varies, but amongst well-known is festival related to the cinema-Cannes. Law (1996) stated that attractiveness of the Paris is incomparable and millions of tourists come here to admire the elegant beauty of the city, enjoy its rich cuisine and certainly exclusive shopping. Law (1996) also says that Barcelona is a very amazing town too, known for its rich culture, architecture and unforgettable beauty. On city break in Barcelona tourists will enjoy museums, statues on the streets, delicious Spanish food and famous boutiques. According to Holloway (2006) cities like New York in USA and Shanghai in China are popular tourist destinations for shopping. By UNWTO (2008) the USA is ranked second in arrivals-58, 0% in 2008 and China held onto their 2007 position in terms of arrivals and ranking fourth-53, 0% in 2008. As an example, according to Zhang et al. (2005) China is the worlds factory where can be found just about anything. Chinas biggest city is Shanghai. Zhang et al. (2005) says that it has a status of cosmopolitan centre of design. Shanghai is a fantastic shopping destination. Shopping here is simple and suitable for all type of tourists. Shanghai has a range of shops from roadside and boutique shops to the busy shopping centres where different types of goods and clothes can be bought. And finally, New York undoubtedly has a lot to offer to its visitors. New York has many attractions, including the Statue of Liberty, the Empire State Building, museums and Central Park. And also its well-known for shopping. The Fifth Avenue offers a range of fashionable shops. Broadway offers entertainment in the evening and the range of nightlife. Rural tourism And the final type of tourist destination is countryside. The combination of lakes and mountains attract different markets. Leisure visitors enjoy the scenery, while more active tourist enjoys climbing in summer, and do winter sports at other times. According to Andalucà ­a website (2009) Spanish countryside will give a chance to enjoy the peaceful and calming environment of old-fashioned villages. There is a large variety of accommodations like cottages, farmhouses and mansions. It will offer to visitors a variety of activities like, walking and trekking, horse riding, cycling and mountain bicycling, bird watching and camping. Andalucà ­a for example is the best place for camping, mountain bicycling and horse riding. It offers almost a year-round sunshine and wide natural environment. French Alps on the other side are very popular to active-minded tourists like skiers and snowboarders. According to Collins (2004) the Alps has more than 200 resorts and one of the famous is Chamonix. Chamonix is an alpine town which a best place for ski lovers. Collins (2004) says that sky-scraping mountains, majestic ice falls and glaciers will make everyones journey memorable.

Monday, January 20, 2020

Essay --

Behavioral approach is more so mental and shown by actions. You notice a lot of things on ones face and through their actions. If Jake is looking concerned, biting fingernails, avoiding eye contact, or even crying it wouldn’t take a long time for a psychologist to visually detect his distressed behavior may be connected to anxiety. When Jake goes to therapy there will be a lot of questions such as what persuades the anxiety and the nervous behavior and then stimulating it. He has to identify the problems for what they are, and answer in ways that actually calm, rather than worsen, your body and your attitude. Behavior doesn’t touch the mind, so treating anxiety with only behavioral methods wouldn’t be the best way to treat anxiety. Except if it’s paired with Cognitive-Behavioral Therapy which is the thinking of negative thoughts and thinking in a more realistic and helpful manner. Humanistic approach is self-satisfying and, pressures the good in human behavior besides Jake may have not had a problem before college, and his anxiousness appeared to have started after he started taking ...

Sunday, January 12, 2020

Charachter Analysis Atticus Finch Essay

In â€Å"To Kill a Mockingbird† by Harper Lee, Atticus Finch is a man who fights for what he believes in. He is very strong willed and always the one who will stand up for what is right, not what the most popular thing is to do. He also is often reffered to as the wisest man in his town. Atticus believes in equality among people. In his mind all people are equal and deserve equal treatment no matter what race they are. Atticus tells Jem and Scout, his two children, not to judge people until you walk in their shoes. Atticus is also a defense lawyer for his county of Maycomb. Durring his case with Tom Robinson, the black that was accused of raping a white girl, Atticus tries to change the injustices and racism in his small hometown. Atticus is a older male, about 50 years old, with a darker hair color that is turning gray as he ages. He wears glasses because his left eye is nearly blind. He said â€Å"Left eyes are the tribal curse of the Finches.† He is also rather tall. His two children were once ashamed of him, because he didn’t fish or hunt, like the other children’s fathers, due to his age. But as they grew, they began appreciating him not for the activities he did on the weekend, but his morals and beliefs. Atticus is one of the most loyal, humane, and consistent with his views and beliefs than any other character in the novel. Miss Maudie states, â€Å"Atticus Finch is the same in his house as he is on the public streets†. His intelligence, calm wisdom, courage, humility, lack of prejudice, and strong sense of justice, causes him to be respected by everyone, including the very poor and black people. Although he is looked down on and mocked by many characters in the novel for his kindness towards the â€Å"Negros†, the people of Maycomb still respect him and keep re-electing him to be their representative in the State Legislator. Durring the trial with Tom Robinson, Atticus Finch defendes him to the best of his ability despite significant difficulties from the community. Since it was back in the time of civil unrest and racial segregation. This had a huge impact on the community, as Atticus Finch was a highly respected attorney in the white community, who ended up drawing the most adoration and respect from the entire black community for his efforts to stand up for the truth regardless of race. Atticus is a strong willed man who stands for what he belives in. His thoughts do not change because of a persons skin color. He is kind and understanding and helpful to his children as well as anyone else who may seek for help. He is a well respected man in Maycomb, because he stands for what he believes, not the popular beliefs.

Friday, January 3, 2020

Application Network Security - Free Essay Example

Sample details Pages: 24 Words: 7116 Downloads: 3 Date added: 2017/06/26 Category Internet Essay Type Essay any type Tags: Cyber Security Essay Did you like this example? 2.0 CHAPTER TWO 2.1 INTRODUCTION The ever increasing need for information technology as a result of globalisation has brought about the need for an application of a better network security system. It is without a doubt that the rate at which computer networks are expanding in this modern time to accommodate higher bandwidth, unique storage demand, and increase number of users can not be over emphasised. As this demand grows on daily bases, so also, are the threats associated with it. Don’t waste time! Our writers will create an original "Application Network Security" essay for you Create order Some of which are, virus attacks, worm attacks, denial of services or distributed denial of service attack etc. Having this in mind then call for swift security measures to address these threats in order to protect data reliability, integrity, availability and other needed network resources across the network. Generally, network security can simply be described as a way of protecting the integrity of a network by making sure authorised access or threats of any form are restricted from accessing valuable information. As network architecture begins to expand, tackling the issue of security is becomes more and more complex to handle, therefore keeping network administrators on their toes to guard against any possible attacks that occurs on daily basis. Some of the malicious attacks are viruses and worm attacks, denial of service attacks, IP spoofing, cracking password, Domain Name Server (DNS) poisoning etc. As an effort to combat these threats, many security elements have been desig ned to tackle these attacks on the network. Some of which includes, firewall, Virtual Private Network (VPN), Encryption and Decryption, Cryptography, Internet Protocol Security (IPSec), Data Encryption Standard (3DES), Demilitarised Zone, (DMZ), Secure Shell Layer (SSL) etc. This chapter starts by briefly discussing Internet Protocol (IP), Transmission Control Protocol (TCP), User datagram Protocol (UDP), Internet Control Message Protocol (ICMP), then discussed the Open system interconnection (OSI) model and the protocols that operate at each layer of the model, network security elements, followed by the background of firewall, types and features of firewalls and lastly, network security tools. 2.2 A BRIEF DESCRIPTION OF TCP, IP, UDP AND ICMP 2.2.1 DEFINITION Going by the tremendous achievement of the World Wide Web (internet), a global communication standard with the aim of building interconnection of networks over heterogeneous network is known as the TCP/IP protocol suit e was designed (Dunkels 2003; Global Knowledge 2007; Parziale et al 2006). The TCP/IP protocol suite is the core rule used for applications transfer such as File transfers, E-Mail traffics, web pages transfer between hosts across the heterogeneous networks (Dunkels 2003; Parziale et al 2006). Therefore, it becomes necessary for a network administrator to have a good understanding of TCP/IP when configuring firewalls, as most of the policies are set to protect the internal network from possible attacks that uses the TCP/IP protocols for communication (Noonan and Dobrawsky 2006). Many incidents of network attacks are as a result of improper configuration and poor implementation TCP/IP protocols, services and applications. TCP/IP make use of protocols such as TCP, UDP, IP, ICMP etc to define rules of how communication over the network takes place (Noonan and Dobrawsky 2006). Before these protocols are discussed, this thesis briefly looks into the theoretical Open Systems Intercon nection (OSI) model (Simoneau 2006). 2.2.2 THE OSI MODEL The OSI model is a standardised layered model defined by International Organization for Standardization (ISO) for network communication which simplifies network communication to seven separate layers, with each individual layer having it own unique functions that support immediate layer above it and at same time offering services to its immediate layer below it (Parziale et al 2006; Simoneau 2006). The seven layers are Application, Presentation, Session Transport, Network, Data, Link and Physical layer. The first three lower layers (Network, Data, Link and Physical layer) are basically hardware implementations while the last four upper layers (Application, Presentation, Session and Transport) are software implementations. Application Layer This is the end user operating interface that support file transfer, web browsing, electronic mail etc. This layer allows user interaction with the system. Presentation Layer This layer is responsible for formatting the data to be sent across the network which enables the application to understand the message been sent and in addition it is responsible for message encryption and decryption for security purposes. Session Layer This layer is responsible for dialog and session control functions between systems. Transport layer This layer provides end-to-end communication which could be reliable or unreliable between end devices across the network. The two mostly used protocols in this layer are TCP and UDP. Network Layer This layer is also known as logical layer and is responsible for logical addressing for packet delivery services. The protocol used in this layer is the IP. Data Link Layer This layer is responsible for framing of units of information, error checking and physical addressing. Physical Layer This layer defines transmission medium requirements, connectors and responsible for the transmission of bits on the physical hardware (Parziale et al 2006; Simoneau 2006). 2.2.3 INTERNET PROTOCOL (IP) IP is a connectionless protocol designed to deliver data hosts across the network. IP data delivery is unreliable therefore depend on upper layer protocol such as TCP or lower layer protocols like IEEE 802.2 and IEEE802.3 for reliable data delivery between hosts on the network.(Noonan and Dobrawsky 2006) 2.2.4 TRANSMISSION CONTROL PROTOCOL (TCP) TCP is a standard protocol which is connection-oriented transport mechanism that operates at the transport layer of OSI model. It is described by the Request for Comment (RFC) 793. TCP solves the unreliability problem of the network layer protocol (IP) by making sure packets are reliably and accurately transmitted, errors are recovered and efficiently monitors flow control between hosts across the network. (Abie 2000; Noonan and Do brawsky 2006; Simoneau 2006). The primary objective of TCP is to create session between hosts on the network and this process is carried out by what is called TCP three-way handshake. When using TCP for data transmission between hosts, the sending host will first of all send a synchronise (SYN) segment to the receiving host which is first step in the handshake. The receiving host on receiving the SYN segment reply with an acknowledgement (ACK) and with its own SYN segment and this form the second part of the handshake. The final step of the handshake is then completed by the sending host responding with its own ACK segment to acknowledge the acceptance of the SYN/ACK. Once this process is completed, the hosts then established a virtual circuit between themselves through which the data will be transferred (Noonan and Dobrawsky 2006). As good as the three ways handshake of the TCP is, it also has its short comings. The most common one being the SYN flood attack. This form of attack occurs when the destination host such as the Server is flooded with a SYN session request without receiving any ACK reply from the source host (malicious host) that initiated a SYN session. The result of this action causes DOS attack as destination host buffer will get to a point it can no longer take any request from legitimate hosts but have no other choice than to drop such session request (Noonan and Dobrawsky 2006). 2.2.5 USER DATAGRAM PROTOCOL (UDP) UDP unlike the TCP is a standard connectionless transport mechanism that operates at the transport layer of OSI model. It is described by the Request for Comment (RFC) 768 (Noonan and Dobrawsky 2006; Simoneau 2006). When using UDP to transfer packets between hosts, session initiation, retransmission of lost or damaged packets and acknowledgement are omitted therefore, 100 percent packet delivery is not guaranteed (Sundararajan et al 2006; Postel 1980). UDP is designed with low over head as it does not involve initiation of s ession between hosts before data transmission starts. This protocol is best suite for small data transmission (Noonan and Dobrawsky 2006). 2.2.6 INTERNET CONTROL MESSAGE PROTOCOL (ICMP). ICMP is primarily designed to identify and report routing error, delivery failures and delays on the network. This protocol can only be used to report errors and can not be used to make any correction on the identified errors but depend on routing protocols or reliable protocols like the TCP to handle the error detected (Noonan and Dobrawsky 2006; Dunkels 2003). ICMP makes use of the echo mechanism called Ping command. This command is used to check if the host is replying to network traffic or not (Noonan and Dobrawsky 2006; Dunkels 2003). 2.3 OTHER NETWORK SECURITY ELEMENTS. 2.3.1 VIRTUAL PRIVATE NETWORK (VPN) VPN is one of the network security elements that make use of the public network infrastructure to securely maintain confidentiality of information transfer between hosts over t he public network (Bou 2007). VPN provides this security features by making use of encryption and Tunneling technique to protect such information and it can be configured to support at least three models which are Remote- access connection. Site-to-site ( branch offices to the headquarters) Local area network internetworking (Extranet connection of companies with their business partners) (Bou 2007). 2.3.2 VPN TECHNOLOGY VPN make use of many standard protocols to implement the data authentication (identification of trusted parties) and encryption (scrambling of data) when making use of the public network to transfer data. These protocols include: Point-to-Point Tunneling Protocol PPTP [RFC2637] Secure Shell Layer Protocol (SSL) [RFC 2246] Internet Protocol Security (IPSec) [RFC 2401] Layer 2 Tunneling Protocol (L2TP) [RFC2661] 2.3.2.1 POINT-TO-POINT TUNNELING PROTOCOL [PPTP] The design of PPTP provides a secure means of transferring data over the public infrastructure with authentication and encryption support between hosts on the network. This protocol operates at the data link layer of the OSI model and it basically relies on user identification (ID) and password authentication for its security. PPTP did not eliminate Point-to-Point Protocol, but rather describes better way of Tunneling PPP traffic by using Generic Routing Encapsulation (GRE) (Bou 2007; Microsoft 1999; Schneier and Mudge 1998). 2.3.2.2 LAYER 2 TUNNELING PROTOCOL [L2TP] The L2TP is a connection-oriented protocol standard defined by the RFC 2661which merged the best features of PPTP and Layer 2 forwarding (L2F) protocol to create the new standard (L2TP) (Bou 2007; Townsley et al 1999). Just like the PPTP, the L2TP operates at the layer 2 of the OSI model. Tunneling in L2TP is achieved through series of data encapsulation of the different levels layer protocols. Examples are UDP, IPSec, IP, and Data-Link layer protocol but the data encryption for the tunnel is provided by the IPSec (Bou 2007; Townsley et al 1999). 2.3.2.3 INTERNET PROTOCOL SECURITY (IPSEC) [RFC 2401] IPSec is a standard protocol defined by the RFC 2401 which is designed to protect the payload of an IP packet and the paths between hosts, security gateways (routers and firewalls), or between security gateway and host over the unprotected network (Bou 2007; Kent and Atkinson 1998). IPSec operate at network layer of the OSI model. Some of the security services it provides are, authentication, connectionless integrity, encryption, access control, data origin, rejection of replayed packets, etc (Kent and Atkinson 1998). 2.3.3.4 SECURE SOCKET LAYER (SSL) [RFC 2246] SSL is a standard protocol defined by the RFC 2246 which is designed to provide secure communication tunnel between hosts by encrypting hosts communication over the network, to ensure packets confidentiality, integrity and proper hosts authentication, in order to eliminate eavesdropping attacks on the network (Homin et al 2007; Oppliger et al 2008). SSL makes use of security elements such as digital certificate, cryptography and certificates to enforce security measures over the network. SSL is a transport layer security protocol that runs on top of the TCP/IP which manage transport and routing of packets across the network. Also SSL is deployed at the application layer OSI model to ensure hosts authentication (Homin et al 2007; Oppliger et al 2008; Dierks and Allen 1999). 2.4 FIREWALL BACKGROUND The concept of network firewall is to prevent unauthorised packets from gaining entry into a network by filtering all packets that are coming into such network. The word firewall was not originally a computer security vocabulary, but was initially used to illustrate a wall which could be brick or mortar built to restrain fire from spreading from one part of a building to the other or to reduce the spread of the fire in the building giving some time for remedial actions to be taken (Komar et al 2003). 2.4.1BRIEF HISTORY OF FIREWALL Firewall as used in computing is dated as far back as the late 1980s, but the first set of firewalls came into light sometime in 1985, which was produced by a Ciscos Internet work Operating System (IOS) division called packet filter firewall (Cisco System 2004). In 1988, Jeff Mogul from DEC (Digital Equipment Corporation) published the first paper on firewall. Between 1989 and 1990, two workers of the ATT Bell laboratories Howard Trickey and Dave Persotto initiated the second generation firewall technology with their study in circuit relays called Circuit level firewall. Also, the two scientists implemented the first working model of the third generation firewall design called Application layer firewalls. Sadly enough, there was no published documents explaining their work and no product was release d to support their work. Around the same year (1990-1991), different papers on the third generation firewalls were published by researchers. But among them, Marcus Ranums work received the most attention in 1991 and took the form of bastion hosts running proxy services. Ranums work quickly evolved into the first commercial product—Digital Equipment Corporations SEAL product (Cisco System 2004). About the same year, work started on the fourth generation firewall called Dynamic packet filtering and was not operational until 1994 when Check Point Software rolled out a complete working model of the fourth generation firewall architecture. In 1996, plans began on the fifth generation firewall design called the Kernel Proxy architecture and became reality in 1997 when Cisco released the Cisco Centri Firewall which was the first Proxy firewall produced for commercial use (Cisco System 2004). Since then many vendor have designed and implemented various forms of firewall both in hardware and software and till date, research works is on going in improving firewalls architecture to meet up with ever increasing challenges of network security. 2.5 DEFINITION According to the British computer society (2008), Firewalls are defence mechanisms that can be implemented in either hardware or software, and serve to prevent unauthorized access to computers and networks. Similarly, Subrata, et al (2006) defined firewall as a combination of hardware and software used to implement a security policy governing the flow of network traffic between two or more networks. The concept of firewall in computer systems security is similar to firewall built within a building but differ in their functions. While the latter is purposely designed for only one task which is fire prevention in a building, computer system firewall is designed to prevent more than one threat (Komar et al 2003).This includes the following Denial Of Service Attacks (DoS) Virus attacks Worm attack. Hacking attacks etc 2.5.1 DENIAL OF SERVICE ATTACKS (DOS) â€Å"Countering DoS attacks on web servers has become a very challenging problem† (Srivatsa et al 2006). This is an attack that is aimed at denying legitimate packets to access network resources. The attacker achieved this by running a program that floods the network, making network resources such as main memory, network bandwidth, hard disk space, unavailable for legitimate packets. SYN attack is a good example of DOS attacks, but can be prevented by implementing good firewall polices for the secured network. A detailed firewall policy (iptables) is presented in chapter three of this thesis. 2.5.2 VIRUS AND WORM ATTACKS Viruses and worms attacks are big security problem which can become pandemic in a twinkle of an eye resulting to possible huge loss of information or system damage (Ford et al 2005; Cisco System 2004). These two forms of attacks can be programs designed to open up systems to allow information theft or programs that regenerate themselves once they gets into the system until they crashes the system and some could be programmed to generate programs that floods the network leading to DOS attacks. Therefore, security tools that can proactively detect possible attacks are required to secure the network. One of such tools is a firewall with good security policy configuration (Cisco System 2004). Generally speaking, any kind of firewall implementation will basically perform the following task. Manage and control network traffic. Authenticate access Act as an intermediary Make internal recourses available Record and report event 2.5.3 MANAGE AND CONTROL NETWORK TRAFFIC. The first process undertaken by firewalls is to secure a computer networks by checking all the traffic coming into and leaving the networks. This is achieved by stopping and analysing packet Source IP address, Source port, Destination IP address, Destination port, IP protocol Packet header information etc. in order decide on what action to take on such packets either to accept or reject the packet. This action is called packet filtering and it depends on the firewall configuration. Likewise the firewall can also make use of the connections between TCP/IP hosts to establish communication between them for identification and to state the way they will communicate with each other to decide which connection should be permitted or discarded. This is achieved by maintaining the state table used to check the state of all the packets passing through the firewall. This is called stateful inspection (Noonan and Dobrawsky 2006). 2.5.4 AUTHENTICAT E ACCESS When firewalls inspects and analyses packets Source IP address, Source port, Destination IP address, Destination port, IP protocol Packet header information etc, and probably filters it based on the specified security procedure defined, it does not guarantee that the communication between the source host and destination host will be authorised in that, hackers can manage to spoof IP address and port action which defeats the inspection and analysis based on IP and port screening. To tackle this pit fall over the network, an authentication rule is implemented in firewall using a number of means such as, the use of username and password (xauth), certificate and public keys and pre-shared keys (PSKs).In using the xauth authentication method, the firewall will request for the source host that is trying to initiate a connection with the host on the protected network for its username and password before it will allow connection between the protected network and the source host to be established. Once the connection is been confirmed and authorised by the security procedure defined, the source host need not to authenticate itself to make connection again (Noonan and Dobrawsky 2006). The second method is using certificates and public keys. The advantage of this method over xauth is that verification can take place without source host intervention having to supply its username and password for authentication. Implementation of Certificates and public keys requires proper hosts (protected network and the source host) configuration with certificates and firewall and making sure that protected network and the source host use a public key infrastructure that is properly configured. This security method is best for big network design (Noonan and Dobrawsky 2006). Another good way of dealing with authentication issues with firewalls is by using pre-shared keys (PSKs). The implementation of PSKs is easy compare to the certificates and public keys although, aut hentication still occur without the source host intervention its make use of an additional feature which is providing the host with a predetermined key that is used for the verification procedure (Noonan and Dobrawsky 2006). 2.5.5 ACT AS AN INTERMEDIARY When firewalls are configured to serve as an intermediary between a protected host and external host, they simply function as application proxy. The firewalls in this setup are configured to impersonate the protected host such that all packets destined for the protected host from the external host are delivered to the firewall which appears to the external host as the protected host. Once the firewalls receive the packets, they inspect the packet to determine if the packet is valid (e.g. genuine HTTT packet) or not before forwarding to the protected host. This firewall design totally blocks direct communication between the hosts. 2.5.6 RECORD AND REPORT EVENTS While it is good practise to put strong security policies in p lace to secure network, it is equally important to record firewalls events. Using firewalls to record and report events is a technique that can help to investigate what kind of attack took place in situations where firewalls are unable to stop malicious packets that violate the access control policy of the protected network. Recording this event gives the network administrator a clear understanding of the attack and at the same time, to make use of the recorded events to troubleshoot the problem that as taken place. To record these events, network administrators makes use of different methods but syslog or proprietary logging format are mostly used for firewalls. However, some malicious events need to be reported quickly so that immediate action can be taken before serious damage is done to the protected network. Therefore firewalls also need an alarming mechanism in addition to the syslog or proprietary logging format when ever access control policy of the protected network is viol ated. Some types of alarm supported by firewalls include Console notification, Simple Network Management Protocol (SNMP), Paging notification, E-mail notification etc (Noonan and Dobrawsky 2006). Console notification is a warning massage that is presented to the firewall console. The problem with this method of alarm is that, the console needs to be monitored by the network administrator at all times so that necessary action can be taken when an alarm is generated. Simple Network Management Protocol (SNMP) notification is implemented to create traps which are transferred to the network management system (NMS) monitoring the firewall. Paging notification is setup on the firewall to deliver a page to the network administrator whenever the firewall encounters any event. The message could be an alphanumeric or numeric depending on how the firewall is setup. E-mail notification is similar to paging notification, but in this case, the firewall send an email instead to proper address. 2.6 TYPES OF FIREWALLS Going by firewall definition, firewalls are expected to perform some key functions like, Application Proxy, Network Translation Address, and Packet filtering. 2.6.1 APPLICATION PROXY This is also known as Application Gateway, and it acts as a connection agent between protected network and the external network. Basically, the application proxy is a host on the protected network that is setup as proxy server. Just as the name implies, application proxy function at the application layer of the Open System Interconnection (OSI) model and makes sure that all application requests from the secured network is communicated to the external network through the proxy server and no packets passes through from to external network to the secured network until the proxy checks and confirms inbound packets. This firewall support different types of protocols such as a Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and Simple Mail Transport Protocol ( SMTP) (Noonan and Dobrawsky 2006; NetContinuum 2006). 2.6.2 NETWORK ADDRESS (NAT) NAT alter the IP addresses of hosts packets by hiding the genuine IP addresses of secured network hosts and dynamically replacing them with a different IP addresses (Cisco System 2008; Walberg 2007). When request packets are sent from the secured host through the gateway to an external host, the source host address is modified to a different IP address by NAT.  When the reply packets arrives at the gateway, the NAT then replaces the modified address with genuine host address before forwarding it to the host (Walberg 2007).The role played by NAT in a secured network system makes it uneasy for unauthorized access to know: The number of hosts available in the protected network The topology of the network The operating systems the host is running The type of host machine (Cisco System 2008). 2.6.3 PACKET FILTERING. â€Å"Firewalls and IPSec gateways have become major components in the current high speed Internet infrastructure to filter out undesired traffic and protect the integrity and confidentiality of critical traffic† (Hamed and Al-Shaer 2006). Packet filtering is based on the lay down security rule defined for any network or system. Filtering traffic over the network is big task that involves comprehensive understanding of the network on which it will be setup. This defined policy must always be updated in order to handle the possible network attacks (Hamed and Al-Shaer 2006). 2.6.4 INSTRUCTION DETECTION SYSTEMS. Network penetration attacks are now on the increase as valuable information is being stolen or damaged by the attacker. Many security products have been developed to combat these attacks. Two of such products are Intrusion Prevention systems (IPS) and Intrusion Detection Systems (IDS). IDS are software designed to purposely monitor an d analysed all the activities (network traffic) on the network for any suspicious threats that may violate the defined network security policies (Scarfone and Mell 2007; Vignam et al 2003). There are varieties of methods IDS uses to detect threats on the network, two of them are, anomaly based IDS, and signature based IDS. 2.6.4.1 ANOMALY BASED IDS Anomaly based IDS is setup to monitor and compare network events against what is defined to be normal network activities which is represented by a profile, in order to detect any deviation from the defined normal events. Some of the events are, comparing the type of bandwidth used, the type of protocols etc and once the IDS identifies any deviation in any of this events, it notifies the network administrator who then take necessary action to stop the intended attack (Scarfone and Mell 2007). 2.6.4.2 SIGNATURE BASED IDS Signature based IDS are designed to monitor and compare packets on the network against the signature database of known malicious attacks or threats. This type of IDS is efficient at identifying already known threats but ineffective at identifying new threats which are not currently defined in the signature database, therefore giving way to network attacks (Scarfone and Mell 2007). 2.6.5 INTRUSION PREVENTION SYSTEMS (IPS). IPS are proactive security products which can be software or hardware used to identify malicious packets and also to prevent such packets from gaining entry in the networks (Ierace et al 2005, Botwicz et al 2006). IPS is another form of firewall which is basically designed to detect irregularity in regular network traffic and likewise to stop possible network attacks such as Denial of service attacks. They are capable of dropping malicious packets and disconnecting any connection suspected to be illegal before such traffic get to the protected host. Just like a typical firewall, IPS makes use of define rules in the system setup to determine the action to take on any traffic and this could be to allow or block the traffic. IPS makes use of stateful packet analysis to protect the network. Similarly, IPS is capable of performing signature matching, application protocol validation etc as a means of detecting attacks on the network (Ierace et al 2005). As good as IPS are, they also have their downsides as well. One of it is the problem of false positive and false negative. False positive is a situation where legitimate traffic is been identified to be malicious and thereby resulting to the IPS blocking such traffic on the network. False negative on the other hand is when malicious traffic is be identified by the IPS as legitimate traffic thereby allowing such traffic to pass through the IPS to the protected network (Ierace N et al 2005). 2.7 SOFTWARE AND HARDWARE FIREWALLS 2.7.1 SOFTWARE FIREWALLS Software-based firewalls are computers installed software for filtering packets (Permpootanalarp and Rujimethabhas 2001). These are programs set up either on personal computers or on network servers (Web servers and Email severs) operating system. Once the software is installed and proper security polices are defined, the systems (personal computers or servers) assume the role of a firewall. Software firewalls are second line of defence after hardware firewalls in situations where both are used for network security. Also software firewalls can be installed on different operating system such as, Windows Operating Systems, Mac operating system, Novel Netware, Linux Kernel, and UNIX Kernel etc. The function of these firewalls is, filtering distorted network traffic. There are several software firewall some of which include, Online Armor firewall, McAfee Personal Firewall, Zone Alarm, Norton Personal Firewall, Black Ice Defender, Sygate Personal Firewall, Panda Firewall, The DoorStop X Firewall etc (Lugo Parker 2005). When designing a software firewall two keys things are considered. These are, per-packet filtering and a per- process filtering. The pre-packet filter is design to search for distorted packets, port scan detection and checking if the packets are accepted into the protocol stack. In the same vein, pre-process filter is the designed to check if a process is allowed to begin a connection to the secured network or not (Lugo and Parker 2005). It should be noted that there are different implantations of all Firewalls. While some are built into the operating system others are add-ons. Examples of built-in firewalls are windows based firewall and Linux based. 2.7.2 WINDOWS OPERATING SYSTEM BASED FIREWALL. In operating system design, security features is one important aspect that is greatly considered. This is a challenge the software giant (Microsoft) as always made sure they implement is their products. In the software industry, Microsoft Windows operating system as grown tremendously both in design and functionality over decades. As new version of the product is released, additional feature s are added and the defects in the previous version are been corrected to improve the performance of the new product. One of such improvement is the implementation of windows firewall with Service Pack 2 (SP2) in XP and Windows Server 2003 with Service Pack 1 surrogate for Internet Connection Firewall (ICF) (Microsoft Corporation 2005). Windows firewall is a stateful connection management and can be configured for specific traffic on the network. The following are features of Windows Firewall in XP SP2. Windows Firewall in XP SP2 is a global setup which apply to any kind of connection It has a new mode of operation Group policy settings configuration IPv4 scoping for all Incoming traffic Excepted traffic can be specified by program filename It has in Built support for IPv6 Windows Firewall in XP SP2 is enabled by default to all connections of the system New Windows Firewall component of Control Panel (Microsoft Corporation 2005). Similarly, Windows Firewall with Advanced Security is another windows based firewall introduced into Windows Vista OS which is a layered security model. This firewall is derived from the integration of Internet Protocol Security (IPsec) and Windows Firewall configuration setup to form a single Microsoft Management Console (MMC). Unlike the previous versions of windows firewalls that block only inbound traffic, Windows Firewall with Advanced Security provides end to end packet filtering on the network by blocking malicious network packets coming in and going out of the protected network (Microsoft 2006). 2.7.3 THE FLAWS IN WINDOWS FIREWALL Without any doubt, Microsoft as done a lot of work in the area of security to make sure that users are protected from possible attacks, by continually making patches available to update their products. But one thing that should be noted about windows OS is, it is not primarily designed for security threats as security is just a fraction of t he entire functionality of the product, therefore, making the product vulnerable to attacks. Research works as shown that, it is always better to install dedicated firewall application that is solely responsible for analysing and filtering packets rather than depending on all in one windows OS for protection. The following are some of the flaws in windows based Firewalls [ ]. Windows based firewall in XP unlike Vista does not inspect outbound packets and likewise can not protect against Trojans. Windows based firewall can not protect against e-mail containing threats such as worms when it been accessed. Windows firewall can efficiently filter inbound traffic but lacks the utility to detect DOS attacks. If a system already has a virus before the windows firewall is configured, the firewall can neither detect nor remove the virus (Microsoft Corporation 2005). 2.8 LINUX BASED FIREWALL â€Å"Since its birth in 1991† (SUSE LINUX 2004), Linux operating system (OS) has made a land mark over the years. Linux is an open source OS that is secure, scalable, flexible, stable, and can be implemented on all different platforms and in most cases, Linux distributions (SUSE, Debian, Red Hat, Centos, Fedora Core, etc.) are free, expect for few which requires users to pay. Presently, Linux is gaining more acceptances in corporate data centres and from users who are beginning to discover the features which the OS offers (Cisco System 2004) All Linux OS distributions package comes with built-in firewall that can be configured when installing the OS. The implementation of firewall in Linux OS is cheap in that most of the distributions are free and it requires little hardware configuration. The implementation of firewall in Linux started with ipfw code an idea taken from Berkeley Software Distribution (BSD) of UNIX. As security demand increases , more security features is required by the firewall to protect the system against possible attacks which the ipfw could not provide. Therefore, ipfwadm utility was developed to complement ipfw code. Both ipfwadm utility and ipfw code were implemented in the Linux kernels 1.0 series and provided significant flexibility by allowing the administrator to do the following (Noonan and Dobrawsky 2006). To setup, TCP ACK, and TCP SYN handshake To add additional rules automatically in situations where named hosts IP address is more than one. To setup reliable accounting system by listing and resetting the packet counter To modify the default policies setup for firewall To state the address of the interface and name for the rules IP address masquerading To list existing rules in number of formats (Noonan and Dobrawsky 2006). The release of new version of Linux brought about improvements in the existing filter that was implemented in the Linux 1.0 series. This upgrade is known as ipchains and was implemented in Linux 2.2. The ipchains firewalls are upgrade of the ipfwadm and ipfw code firewalls. The Ipchains setup allow TCP traffic with ACK bit which is set to permit return traffic from a remote server into the protected network (Noonan and Dobrawsky 2006). But there is a problem with this type of filtering technique reason been that, this firewall depend on the transmitted packet to determine if it is part of the established connection or not. This technique makes the whole system vulnerable to attacks, as transmitted packets can be imitated thereby rendering the firewall useless. This pitfall in ipchains based firewall was improved upon in the later version of Linux kernel (Linux 2.4 kernel) known as NetFilter or iptables. NetFilter is a stateful firewall unlike the ipchains, having better filtering a nd logging capabilities [ ]. The features of Netfilter includes, â€Å"stateless packet filtering (IPv4 and IPv6) stateful packet filtering (IPv4 and IPv6) all kinds of network address and port translation, e.g. NAT/NAPT (IPv4 only) flexible and extensible infrastructure multiple layers of APIs for 3rd party extensions large number of plugins/modules kept in psatch-o-matic repository†(Netfilter 2007). 2.9 HARDWARE FIREWALL Hardware firewalls are physical devices with which specific program (proprietary standard software) is integrated to provide firewall operations. Hardware firewalls are routers which are capable of filtering packets (Permpootanalarp and Rujimethabhas 2001). These devices do not need separate program installation other than the one already integrated in the devices. However, these devices require some form configuration in defining the right polices to secure any network. Hardware firewalls are the first point of defence to any secure network and they seat in between protected network and the external system or network. In situations were both hardware firewalls and software firewalls are used together to secure the network, the hardware firewalls can be configured such that they filter out the incoming packets from the external source while the software firewalls are setup to inspect the network packets. There are many vendors designing and manufacturing these products (hardware firewalls). Four of them with their products are as follows. 2.9.1 UTM-1 TOTAL SECURITY This device offer a complete set of security features including firewall, intrusion prevention, antivirus, anti-spy ware, messaging security, Web application firewall, VoIP security, instant messaging (IM) and peer-to-peer (P2P) blocking, Web filtering, as well as secure site-to-site and remote access connectivity (Check Point software technologies ltd. 2008). 2.9.2 CISCO ASA 5500 SERIES ADAPTIVE SECURITY APPLIANCES The Cisco ASA 5500 Series Adaptive Security Appliances are the latest security solutions from Cisco that integrate firewall, Unified Communications (voice/video) security, SSL and IPsec VPN, intrusion prevention (IPS), and content security services in a flexible, modular product family. These products are designed to provide intelligent threat defence and secure communications services that stop attacks before they impact network operations and to protect networks of all sizes (Cisco systems 2007). 2.9.3 SIDEWINDER APPLIANCE Sidewinder is a multi-function firewall appliance by Secure Computing that delivers true enterprise-class features and performance. This device has a multi-gigabit performance capabilities and hardware monitoring and redundancy features which allow its multiple security functions to run simultaneously, including its multi-layer firewall, Trusted Source reputation services, anti-virus, anti-spyware, anti-spam, URL filtering or blocking, VPN encryption services, and more (Secure computing 2008). 2.9.4 SONICWALL NETWORK SECURITY APPLIANCE The SonicWALLs network security appliance can be configured and customized with an expanding array of security services into a solution  that will integrate seamlessly into any network while providing complete protection. Every appliance is capable of integrating support for gateway anti-spyware, antivirus, intrusion prevention, content filtering, wireless se curity and more. Likewise, it utilises encryption technology and deep packet inspection to provide secure VPN connectivity to an array of deployments including site-to-site, and continually monitoring each connection to deliver instant and automatic protection against transmitted threats, ensuring each connection is as reliable as possible (Sonicwall 2008). 2.10 NETWORK SECURITY TOOLS Network security tools can be classified into different categories based on the function they perform. Three of such categetgories include; network troubleshooting tools (Packet analysis tools), security test tools, logging and logging analysis tools. 2.10.1 NETWORK TROUBLESHOOTING TOOLS One of the network troubleshooting tools are the Packet-analysis tools which are security tools used in a network setup to monitor all communication activities between hosts in order know how hosts interact with each other likewise, to detect and identify network-based problems and communications errors (No onan and Dobrawsky 2006). Packet-analysis tools are also known as Packet sniffers. Packet-analysis tools are designed to decode the traffic flowing through the network to a readable format (plaintext). There are different types of packet analysis tools, but the common ones are, Ethereal, Microsoft Network Monitor and TCPDump (Noonan and Dobrawsky 2006; Davis D 2006). 2.10.1.1 ETHEREAL This is an open source Packet-analysis tool that is designed for analysis and troubleshooting of traffic between hosts. It can be implemented on different types of OS (windows OS, Linux or Unix kernel, Mac OS X) having the same interface and functionality across the this different platform of the OS. Ethereal is a graphical user interface tool that is probably easy to use, as it works by decoding the information on the network to a readable text format which is easy to understand for the network administrator (Davis D (2006). Ethereal make use of three window panes to display result of the analys is in real time. They are panes are; The first pane is the top pane which display the list of packets The second one is the middle pane which display packet details The third one is the bottom pane that displays the packet bytes (Noonan and Dobrawsky 2006). 2.10.1.2 MICROSOFT NETWORK MONITOR. Microsoft Network Monitor is a window based tool designed to monitor, manage and troubleshoot hosts on the network running windows OS. Microsoft Network Monitor is not different from Ethereal as both perform the same function. The only difference between the two is that, unlike Ethereal, Microsoft Network Monitor can not simultaneously captured and display packets in real time but can only do one thing at a time (Noonan and Dobrawsky 2006). 2.10.1.3 TCPDUMP TCPDump is another open source packet analysis tool used by the network administrators to troubleshoot the network, debug network traffic, capture packet from the network, decipher the bits and pieces, and display them in a semi-coherent fashion (Fuentes F and Kar 2005). TCPDump can be implemented in Linux or UNIX and in Window OS (WinDump). A good understanding of TCPDump will aid the learning of other packet analysis tools. One of such is Ethereal that uses the same syntax for packe t filtering with TCPDump (Fuentes F and Kar 2005). To use TCPDump in Linux or UNIX environment requires administrative privilege (root) to run the tool (Noonan and Dobrawsky 2006). 2.10.2 NETWORK SECURITY TOOLS One of the good qualities of a network security setup is, the ability of such network to have logs that can accurately and comprehensively monitor and record all the events that are taking place in order to give the network administrator a clear understanding of what actually happened at a particular point in time on the network and the required action to take. Logs are designed to serve different tasks such as, Troubleshooting system application problems Gives early warning notification of system abuse. In the case of a system crash logs provides helpful forensic information (Yamanishi K and Maruyama Y 2005). A tool that is capable of performing these tasks is the syslog. 2.10.2.1 SYSLOG Syslog is a security utility designed to monitor and record system events across the network. They are used to address issues like network performance, network failure, system crash, record alteration in system configuration etc (Yamanishi K and Maruyama Y (2005)). 2.10.3 NETWORK SECURITY TESTING While it is a good thing to secure the network by configuring the appropriate tools with aim of preventing unauthorised access into the network. The question then is how secure is the network? To address is doubt, it therefore becomes mandatory as a good security practise to carry out security testing after finalising security configuration. Network security testing is an activity that conclusively determines the integrity of the network security. Security testing is carried out to detect unknown vulnerabilities on the network and to ensure proper security is in place (Wack et al 2003). Network s ecurity tools can be classified in the following groups; networks port-scanning tools (Network Mapper), vulnerability-scanning tools (Cybercop Scanner, Nessus), password-cracking tools (John the Ripper, Novel Netware password cracker), Network Sniffers (Ethereal, Snort) etc. Network mapper and Nessus are briefly discussed. 2.10.3.1 NETWORK MAPPER (NMAP) Nmap is a network port scanning tool that is used to check if a network port is open or closed. It makes use of IP packet to identify if ports are open, the type of OS the hosts are running and also the version available on the hosts, the type of firewall implementation etc (Yamanishi and Maruyama 2005). If Nmap is used to scan hosts ports on the protected network as against rules define for the ports on the secured network and it is discovered that there are response from some of the ports apart from the rules defined for those ports, it then means that the ports responding to Nmap scan request are exposed and are likely point s through which attackers can gain entry into the network (Noonan and Dobrawsky 2006). 2.10.3.2 NESSUS Nessus is another vulnerability scanning tool used to identify holes (open ports) and the kind possible attacks that might occur through the open ports on the protected network. An example is DOS attacks. Nessus is a freeware that can be implemented in Linux, Mac OS X, and windows OS. In addition, Nessus is a client-server based operation. The Nessus sever is responsible for vulnerability testing and scanning while the Nessus client provides reporting and front end configuration (Noonan and Dobrawsky 2006).