Tuesday, October 29, 2019

Effect and Influence of Social Factor on Business Essay

Effect and Influence of Social Factor on Business - Essay Example This essay focuses on the significance of the social aspect in the PEST analysis in regards to a business from apparel manufacturing industry. Environmental analysis is a marketing function which includes study of all external factors that may determine the success or failure of a business. Relatively qualitative in nature, this analysis involves identifying of environmental variables, scanning them, analyzing and finally forecasting of business situation. Environmental analysis is significant for a business to survive and grow. This analysis helps in identifying the probable opportunities and threats to a business. It opens new avenues for business activity expansion and also provides opportunities for discovering and exploitation of business. PEST analysis is an acronym for â€Å"political, economic, social and technological.† Its purpose is to conduct analysis and identify various external factors that might affect business and also to help in market research.Social aspect of PEST analysis includes factors such as age distribution, income level, education, diet and nutrition, religion, population growth, consumerism, social class, and expectation of society from business. It also includes buying trends, change in lifestyle, cultural aspects, ethics, publicity factors, advertising, media, career attitudes, health consciousness and emphasis on safety. Social trends to a great extent affect demand for a product The social factor from PEST analysis creates various opportunities at a global, national and international level. ... It enables business and organizations to understand future problems and face them boldly. This analysis helps organizations in expanding their business while contributing towards social groups and causes. Environmental analysis keeps guiding the organizations from time to time about changes in socio economic conditions at the same time enabling them to take benefit of technological developments, government policies etc. Apart from providing various opportunities environmental analysis also helps business in identifying threats from competitor and other sources. Threats are uncontrollable and can put survival of organization or business at stake. Environmental analysis overcome organization’s threat and also helps in identifying competencies of business. Identification of one PEST factor PEST analysis is an acronym for â€Å"political, economic, social and technological.† Its purpose is to conduct analysis and identify various external factors that might affect business and also to help in market research. Out of all the factors from PEST analysis I am considering Social factor for discussion about how it affects business. Social aspect of PEST analysis includes factors such as age distribution, income level, education, diet and nutrition, religion, population growth, consumerism, social class, and expectation of society from business. It also includes buying trends, change in lifestyle, cultural aspects, ethics, publicity factors, advertising, media, career attitudes, health consciousness and emphasis on safety. Social trends to a great extent affect demand for a product (Miller 1992). Industry considered Considering apparel manufacturing industry for

Sunday, October 27, 2019

Analysis of Data Security in Wireless Networks

Analysis of Data Security in Wireless Networks Chapter 1: Introduction Research Method Research is defined as search for new knowledge or an art of scientific and careful investigation of new facts. Research method is referred as a systematic methodology of defining and re-defining the problems, suggest solutions, formulate hypothesis, evaluate the data, make deductions and then reach conclusions. At last, test the conclusions to determine whether they are suitable for the formulating hypothesis or not (KOTHARI, C. R., 2005). The research method chosen for the present study are case studies. Case study research is used because of its capability to bring a clear idea on any complicated issue and thereby strengthening the previously developed research works. A key characteristic of case study research method is its ability to provide multiple sources of evidence each with its strengths and weaknesses (Bill Gillham, 2000). The steps involved in case study research method are as follows: Getting Started The research work started with the collection of data on Wireless Sensor Networks. Sensor networks are referred as secured networks if they can provide end to end security with authenticity and confidentiality. The present research work emphasizes the importance of providing data security in sensor networks through Location-Aware End-to-end Data Security system. Selecting Cases Selection of cases is an important aspect of building theory from case studies. The earlier stages of the research work focused on various security systems and then identified Location-Aware End-to-end Data Security system for providing data security in sensor networks. Literature review section of this research work will explain all these aspects very clearly. Case study research method is quiet difficult as it provides multiple sources of evidence in its research. So to develop this research work, data was collected from various sources like books, journals, articles and online websites. Crafting Instruments and Protocols After the collection of data related to sensor networks and its importance in the field of providing security for networks it was analyzed that efficient steps must be followed by the organizations to provide security for sensor networks. In order to provide an efficient data security system for sensor networks, the research work was customized a number of times. All the design principles were considered for improving the security in sensor networks so to implement better communication networks. Entering the field After gathering the information related to wireless sensor networks from various sources like websites, journals, articles and books. The information gathered gave a better understanding on Location-Aware End-to-end Data Security system for providing data security in sensor networks. Analyzing data The case study research method primarily concentrated on Location-Aware End-to-end Data Security system for providing data security in sensor networks. The data collected for this research work was analyzed using various methods and techniques. This analysis helps to find the link between the research objects and outcomes with respect to the present study thereby providing an opportunity to strengthen the research findings and conclusions. Shaping hypotheses The task of shaping hypotheses is mainly applied for the alteration or modification of models applied for the research work previously. The new models applied in the research depend upon the data analysis. Enfolding literature After the analysis stage which was helpful in assessing the proposed solutions related to the problems occurred by disasters then a detailed critical analysis will be presented in literature review section that will evaluate the existing security designs so as to improve the performance of sensor networks. Reaching closure From the start of the research work to the analysis stage it was analyzed that providing efficient security for sensor networks is very important as it increases the life of networks and improves the efficiency of networks. Background study of Wireless Sensor Networks Wireless Sensor networks will fall under the category of modern networking systems. It has emerged in the past and caters the needs of real world applications. These networks are the preferred choice for the design and development of monitoring and control systems. In the year of 1940s and 50s wireless sensing technology was developed. To discover and chase enemy craft this was used by military (Shimmer, 2006). The technology formulated to let in radio frequency identification and real time location system but the real force behind wireless sensor network was the power to place detectors in remote or in the environment without wired lines. This allows in turn for capture and analysis of information to transmit warnings and to identify the approaching phenomenon. The quality of life by allowing real time information was developed by WSNs. WSNs supply real world information in a perceive manner rather than a virtual world (Shimmer, 2006). As the health of the people is becoming worse a nd the global population is getting older, with the ability to sense and perform direct measurements biometric solutions can be created which will improve the healthcare and improves the quality of life. As one of the key drivers for wireless sensor networks data will be captured and analyzed for detecting and predicting the phenomena like falls and warnings to develop intelligent solutions for industry. Chapter 2: Literature Review 2.1 Overview Providing security for data in Wireless Sensor Networks (WSNs) is a difficult task because of complexity in managing the critical resource. Data security in sensor networks can be achieved by Location-Aware End-to-end Data Security system. A sensor network can called as secured if it can provide end-to-end security through data confidentiality, authenticity and availability. Applications like wildlife monitoring, manufacturing performance monitoring and military operations use wireless sensor networks. Security is the most important requirement for all these WSNs applications. Providing security in wireless sensor networks is different from traditional approaches because of resource limitations and computation restrictions. Node compromise attacks, DoS attacks and resource consumption attacks are the most general attacks in the wireless sensor networks while providing security to the data. This research concentrates on wireless sensor networks, data security in sensor networks, Locat ion-Aware End-to-end Data Security (LEDS) systems and its performance in providing data security. 2.2 Wireless Sensor Network Wireless Sensor Network is a fast growing technology and has exciting research area. Military and civilian activities can be operated successfully using this network. Interconnection between thousands of sensor nodes in large sensor networks can create technical issues (LEWIS, F. L., 2004). To offer a high quality sensing in terms of space and time the sensing nodes are closely arranged and are made to work together. This technology is responsible for sensing and also for the first stages of the processing hierarchy. Computations, communication capacities, memory, low cost devices which have limited energy resources are included in the network. One of the major applications of sensor networks is actuators. This type of sensor networks is widely used in many sectors like military applications, environmental applications and commercial applications (RAGHAVENDRA, C. S., Krishna M. Sivalingam and Taieb F. Znati, 2004). Networks can be organized in multi-hop wireless paths and large lands capes in order to recognize the events of interest. Industries attain security and safety by making use of wireless sensor networks. This network uses sensors for the detection of toxic, harmful and unsafe materials and also provides a way for the identification of leakages which may cause dangerous results. These networks are best suitable for monitoring and help in controlling rotations in moving machinery (Edgar h. Callaway, 2003). Wide usage of sensor networks in large applications forces the network to provide security for data in order to operate the applications effectively. Security is the major issue faced by wireless sensor networks. The main reason for security problems in sensor networks is hold of data by attackers. If number of nodes increased in communication then there may be chance for tampering the data which may create the problem of data loss (CHAN, H. and PERRIG, A., 2003). This sensor network helps in expanding the internet into physical space. Compared to customary approaches wireless sensor networks provide many advantages. Information in sensors networks is available only at runtime. Sensors networking is done by contribution from signal processing, database and information management, embedded systems and architecture and distributed algorithms. Much number of sensors is already in use for monitoring the traffic in networks (Feng Zhao and leonidas J. Guibas, 2004) The organization growth reduces internally by loss of important data and due to false data introduced by hackers in network.However, the lack of end-to-end security guarantee makes the WSN weak due to the attacks. Functions in the networks are injured by internal attacks which lead to breakdown of mission-critical applianc es (Elaine Shi and PERRIG, A., 2004). Hence from the above discussion it can be understood that wireless networks leads to a new trend as the way of interchanging of data through internet service like e-mail and data file transfers is increasing tremendously. WSN is used in many martial appliances. As these networks provide many benefit for organizations and users it lacks in providing security to data while transferring. Wireless sensor networks play a vital role in transferring the data from one network to another without any delays or disturbances. The functionality and behavior of the WSN are completely dissimilar from the other wireless network devices present in WSN.WSN are not assured by the users. In terms of battery and power these devices are much more restrained. The WSN can be separated into two parts Data acquisition and data dissemination network. Data acquisition network consists of sensor nodes and base stations. Sensor nodes are the accumulation of small devices wit h the charge of assessing the physical information of its setting, and base stations are influential devices in case of gathering information of its surroundings. Sensor networks are mainly projected for real-time collection and analysis of low level data in aggressive environments (Javier Lopez and Jianying Zhou, 2008). For this reason they are well fitted to a significant amount of monitoring and observation applications. Famous wireless sensor network applications involve wildlife monitoring, bushfire response, military command, intelligent communications, industrial quality control, infrastructures, smart buildings, traffic monitoring and examining human heart rates etc. greater part of the sensor network are spread in aggressive environments with active intelligent resistance (Feng Zhao and Leonidas J. Guibas, 2004). Hence security is a crucial issue. One obvious example is battlefield applications where there is a pressing need for secrecy of location and resistance to subvers ion and destruction of the network. 2.3. Evaluating the existing security designs in WSNs Evaluation of existing systems can be done with the help of data security requirements like data authentication, availability and authentication. Security is not provided efficiently by the existing systems due to weak security strengths and is exposed to many different attacks. Security authentication tools such as authentication and key management. These tools provide various security mechanisms for sensor network. Routing and localization are supports sensor network (Donggang Liu and Peng Ning, 2007). Similar to the traditional networks most of the sensor network applications need security against introduction, and modification of packets. Cryptography is the standard defense. Interesting system tradeoffs grow while comparing cryptography into sensor networks. For point-to-point communication, continues cryptography attains a high level of protection but involves those keys to be set up among all end points and be in companionable with passive participation and local broadcast (C. S. Ragahavendhra, Krishna M. Sivalingam, Taieb F. znati, 2004). Link layer cryptography with a network wide shared key simplifies key setup and supports passive participation and local broadcast but intermediate nodes might alter messages. The earliest sensor networks are likely to use link layer cryptography because this approach supplies the greatest ease of deployment among presently available network cryptographic approaches. Subsequent systems may react to demand for more security with more advanced use of cryptography. Cryptography implies a performance cost for extra computation that frequently gains packet size. Cryptographic hardware support increases efficiency and also increases the financial cost of implementing a network. Limitations of existing key management schemes From many past years many different pre-distribution schemes have been proposed. Hop-by-hop is one of the techniques which dont provide end-to-end security in a proper manner. This hop-by-hop not only involves the end points but also have the intermediate components for data forwarding. Hop-by-hop header carries information which should be examined by each and every node along the packet path. As this technique involves each node referencing and processing it becomes complex in analysis of networks (Alberto Leon Garcia and Indra Widjaja, 2004). Data authentication and confidentiality is very much vulnerable to inside attacks and the multi hopping makes a worse while transmitting the messages. The problem of distributing and updating cryptographic is to valid member is known as Key Management. The key management is one of the most important tasks in the cryptographic mechanisms for networks. However the sensor networks, the key management is one of the more challenging network because there may be no central authority, trusted third party, or server to manage security keys. The key management performed in the distributed way. The self organization scheme to distribute and manage the security keys proposed (Yang Xiao, 2006). This system certificates are stored and distributed to the user by themselves. False data filtering and their analysis This helps in protecting data from validation in WSNs. Data that is not authorized will be filtered out by the transitional nodes. Location Based Resilient Secrecy (LBRS) is the proposed scheme that identifies the problems and errors in Statistical En-route Filtering (SEF) and Interleaved Hop-by–Hop Authentication (IHA). All these methods are highly exposed to interference attacks and selective forwarding attacks (kui Ren, Wenjing Lou and Yanchao Zhang, 2008). SEF helps in detecting and dropping the false reports during the forwarding process that contains Message Authentication Codes (MAC) generated by multiple nodes (Anne-Marie Kermarrec, Luc Bouge and Thierry Priol, 2007). IHA identifies the fake reports by using interleaved authentication 2.4. Data Security Requirements in Wireless Sensor Networks (WSNs) As wireless sensor networks usage is increasing in organizations, security should be provided for data in order operate organizations successfully. Data security in wireless sensor networks includes data authentication, data availability and data confidentiality. Data should be available for authenticated users only in order to provide security. Various data security requirements for wireless sensor networks are (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008): Data availability Data Confidentiality Data authentication Data integrity Time synchronization Secure Localization Data availability – To ensure availability of message protection in sensor network it should protect the resources or sensor nodes. Nodes in sensor networks should be guarded from unnecessary processing of messages. Avoiding unnecessary processing can reduce the energy usage so that the life time of sensor network increases. Wireless sensors are influenced by many factors like limited communication capabilities and computation. Wireless sensor networks are vulnerable to various attacks like Denial of Service attacks, node compromise attack and resource consumption attack (Shinqun Li, Tieyan Li and Xinkai Wang, 2002). Hence, in order to provide availability and security resources should be maintained effectively. Data Confidentiality – In wireless sensor networks confidentiality can be achieved by allowing only authenticated users to access the data. In sensor networks data can be secured by using cryptographic methods. Using encryption and decryption for data allows only authenticated users to access the data. Unauthorized or third parties cannot read the original data if confidentiality is provided effectively (Chris Karlof, Naveen sastry and David Wagner, 2004). Hence to have confidentiality for data wireless sensor networks should make of encryption methods. Data authentication – Authentication is necessary for controlling the sensor networks effectively. Data authentication in sensor networks allows the users to verify whether the data is sent from authorized resources or not. It also protects the original data from alterations. Digital signatures can be used for authentication in sensor networks (Mona Sharifnejad, Mohsen Sharifi and Mansoureh, 2007). Hence, authentication in sensor networks can be achieved with digital signature which helps in authenticating the senders. Hence from the discussion it can be given in order to provide security data availability, authentication and confidentiality should be sustained in sensor networks. Data Integrity Data integrity in sensor networks is required to check the dependability of the information and concerns to the capability, to support that message has not been corrupted, altered or changed. Even if the network has confidentiality measures, there is still a possibility that the data integrity has been compromised by alterations (Richard Zurawski, 2006). The integrity of the network will be in trouble when the malicious node present in the network throws fake data. Wireless channel cause damage or loss of data due to unstable conditions. Hence from the above it can be given the information provided by the sensor network is easily corrupted which can leads to loss of data. Time Synchronization Most of the sensor network applications trust on some form of time synchronization. Moreover, sensors may wish to calculate the continuous delay of a packet as it moves among two pair wise sensors. For tracking the applications a more collaborative sensor network may involve group synchronization. Secure Localization The usefulness of a sensor network will trust on its ability of each sensor to accurately and mechanically locate in the network (G. Padmavathi and D. Shanmugapriya, 2009). A sensor network planned to locate faults and it need accurate fixed information in order to identify the location of a fault. In this an attacker can easily misrepresent non secured location information by giving false signal strengths and playing back signals. Hence from the above content it has discussed about the security goals that are widely available for wireless sensor networks. 2.5. Proposing Location-Aware End-to-end Data Security (LEDS) LEDS helps in providing safety to data in a well-organized way. Security to data is provided through confidentiality, authentication and availability in LEDS. This mechanism has the ability to provide en-route filtering and end to end authentication. It makes use of key management for achieving data security. LEDS can be used either in small networks or large networks (Ed Dawson and Duncan S. Wong, 2007). LEDS splits the whole network into small cell regions and sends keys for each cell in order to provide security. Cell size of LEDS depends on the number of keys distribute and it does not support dynamic topology. Sensors helps in finding events that are occurring in network. Encryption of events is happened in networks by sensor nodes which are participating in the network. In order to encrypt the events LEDS uses the pre distributed cell keys (Abu Shohel Ahmed, 2009). Sensor nodes calculates unique share key for sensors after encrypting the data, where this is demonstrated using d ifferent sinks. Sensor nodes use authentication keys for calculating MACs. To avoid duplicate reporting each and every report is given with different MACs. A report or data validity will be checked at each and every node while broadcasting through networks in order to provide data security (Fan Ye, Hao Yang and Starsky H.Y. Wong, 2006). Hence from the above discussion it can be understood that, LEDS mechanism helps wireless sensor networks in providing end to end security. This mechanism makes use of key management in order to provide data authentication, confidentiality and availability. The main aim of designing LEDS is to provide end to end data security through data confidentiality, authenticity and availability. LEDS has the capability of preventing false data report attacks. Brief description of the goals of designing LEDS: Provide end-to-end data confidentiality and authenticity: Event reports in wireless sensor networks can maintain authenticity and confidentiality if the sending nodes themselves are not compromised for data corruption. Compromised nodes may affect the neighbor node performance. Cryptographic methods are used to protect data from attackers which is collected from compromised nodes. Key management assists in providing data authenticity and confidentiality by LEDS (Jun Luo, Panos Papadimitratos and Jean-Pierre Hubaux, 2007). In LEDS key management mechanism the nodes use keys for applying cryptographic methods on data in order to provide security. Achieve high level of assurance on data availability: If any attack occurs on data in wireless sensor network, then it should be flexible in selecting alternative ways for forwarding the data. In order to ensure availability, networks should be able to detect and drop the duplicate reports in an efficient and deterministic manner (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008). LEDS assures data availability in the networks by identifying the duplicate reports early in the networks. Hence from the discussion it can be understood that, LEDS was designed for providing security in the wireless sensor networks. False information reports can be eliminated by using some LEDS mechanisms in networks. 2.6. Components of Location-Aware End-to-end Data Security To provide data security, LEDS makes use of two major components: Location-aware key management framework. End-to-end data security mechanism. LEDS provides end to end security by providing data authentication, confidentiality and availability. 2.6.1. Location-aware key management framework As wireless sensor networks are used in wide range of applications it should be deployed correctly in order to collect data. Network planners should give a framework before organizing in order to have security to data. LEDS makes use of key management in providing framework for the sensor networks. Using Key management in LEDS exploits the static and location-aware nature of wireless sensor networks (Reihanah Safavi Naini, 2008). Key management adopts a grid structure for redistributing and examining specific properties related to designing process. For providing a light-weight and robust location aware key management framework for sensor nodes in network preloaded keys are distributed in networks. This framework can be understood through embedding location information into the keys. Framework using key management should be derived in such a way that it should provide data authentication, confidentiality and availability (Yan Zhang, Honglin Hu and Masayuki Fujise, 2006). In LEDS ever y sensor node computes three different types of location-aware keys for distributing purpose. A sensor node computes two unique secret keys which can be shared between a node and sink. These keys help in providing node to sink authentication. A cell key will be distributed between two nodes in the same cell. Confidentiality to data in Wireless Sensor Networks is given by distribution cell keys among network elements. A set of authentication keys can be distributed among the nodes in the network in order to provide authentication to the nodes. This distributing of keys can help sensor networks in data filtering. A Sensor node in the network computes the location-aware key independently. Key management provides basis for end to end data security (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008). Key management strategies for wireless sensor network have proposed recently existing keys which are based on pre-distribution where a probabilistic access for fixing up session keys among adjace nt nodes. Random key Pre-distribution schemes are dangerous to selective nodes and node replication attacks. These frequent attacks can be prohibited by the location aware key management. More challenges are to be taken by the location aware key management such as connectivity within the groups, deployment flexibility and security resilience (Xiaofang Zhou, 2006). Existing strategies need the deployment data as a priority before the deployment. This makes it very hard in major applications. Hence from the above discussion it can be concluded that, for developing a structure for WSN LEDS uses the key management technique. In this framework the safety to data is given by the distribution of keys between sensor nodes. Different location-aware keys computed from sensor nodes can provide data confidentiality, authentication and data filtering. 2.6.2 End-to-end data security mechanism Security is the main issue in transformation of data over internet or any wired or wireless communication. Several encryption methods are implemented and deployed in organization for providing security to data. Network smart cards supports networking mainstream standards and secured protocols. Private data can be sent from smart cards to remote server by establishing a secured connection between network smart cards and trusted remote internet server. This mechanism helps in avoiding manual type for confidential information. End-to-end mechanism struggle in identifying threat mechanism that will capture the data before it is encrypted (Yuliang Zhenq, 2004). Specificdevices and protocols can be installed at the end point connection for offering end to end security. Hyper text Transfer Protocol (HTTP) connection is an example of end-to-end connection to web server where an IP security is used as end-to-end security. There is an opinion that end-to-end security mechanism provides solutio ns in providing security to network based systems. Wireless sensor networks usually consist of a prominent number of resource constraint sensor nodes which are distributed in neglected uncongenial surroundings, and therefore are displayed to more characters of serious insider approaches due to node cooperation. Existing security designs generally supply a step by step security prototype and are exposed to such attacks (Claude Castelluccia, 2005). Moreover, existing security designs are also exposed to several DOS attacks such as report disruption attacks and selective forwarding attacks and thus put information accessibility at stake. To overcome these exposures for major static WSNs come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations (frank Stajano , Catherine Meadows, Srdjan Capkun and Tyler more, 2007). This location alert property successfully limits the impact of settled nodes only to their locality without involvin g end-to-end data security. The suggested multi functional key management framework checks both node to sink and node to node authentication along with the report forwarding routes and the suggested data delivery access assures effective en-route fake data filtering, and is highly influential against DOS attacks. In end-to-end security the end points refers to connection between client and server. Providing security is the major constraint for transferring data in a secured manner. For providing end-to-end secure communication constrains components like (Michael H. Behringer, 2009) Identity- which helps in identification of entities at both the ends Protocols- to provide required security functions protocols are implemented with the help of algorithms. Security- the end points used by network should be provided with secured protocols and the operations implemented on the end points should be in a secured manner. Thus from the above context it can be given that networks which uses end-to-end security mechanism provides a great security. In spite of having some potential problems end –to-end security many of the organizations are deploying this type of mechanism. End-to-end security protocols and their clarification acts as keystone in having security for the networks. 2.7. Security and performance analysis of LEDS Location aware End to end Data security design (LEDS) function is to anticipate the security and analyze in diverse etiquette. Digital systems afford the sanctuary by means of sundry techniques. In providing the security features researchers generate innovative services for improving the recital and trustworthiness of single technique algorithm (Sam Brown, 2002). Along with security the performance, hardware and software implementations are focused, transparency of the requirements as well as performance and productivity. The factors that involves in escalating this technology are Viability, power consumption, area, complexity, Flexibility. Security analysis can be explained in three dissimilar ways (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008): Data Confidentiality as the security strength Data Authenticity Data Availability Data Confidentiality as the security strength: The requirement of provide data confidentiality within the internal network can be met using the same deployment and management approaches used. Using of the data encryption standard the confidentiality of encryption could be obtained. Data Confidentiality is also used in the Marketing and Sales (John W. Ritting House and James F. Ransome, 2004). In LEDS every report is encrypted by the corresponding cell key and therefore no nodes out of the event cell could obtain its content. Node from the event cell is compromised as the attacker obtains the contents of the corresponding reports because of the data confidentiality. Scheming total network cells number of compromised nodes and portion of compromised cell were utilized. There are two ways for calculating they are Random node capture attack and selective node capture attack. The above figure shows the data confidentiality in LEDS. One has to be clear that in compromising 40% of total cells at least 5% of the total nodes are to be compromised. Along with random node capture attacks accessible defense designs in which compromising a few hundred nodes usually compromise even in all the network communication, which specifies the dominance of the altitude in litheness. Data Authenticity By using diverse online techniques authenticity of data is accomplished. Significance of the data generation determines the position of the obligation (Chris Mann and Fiona Stewart, 2000). Security strength of LEDS regarding the data Authenticity is obtained by the content o

Friday, October 25, 2019

Essay --

Bijoy Shah Mrs. Jones Sophomore English (H) 8 January 2014 Men > Women Throughout The Odyssey by Homer, many women, if not servant girls or deities, are assigned to the powerless role of mothers or seductresses. In most instances, the women are in need of support and guidance as they are weak and fragile. Without a steady male hand to guide them, these women appear to be lost and heartbroken. Women serve little function aside from mourning their men and urging them to remain safe. In many ways, the value placed on fathers and sons in The Odyssey is far greater than the bonds with mothers or daughters. Anticleia, Odysseus’ mother, cannot even exist without her son as she dies after waiting for years for him to come home. For Anticleia and other women, the entire purpose for existence is to look after, nurture, and protect their sons and husbands. However, no female character in The Odyssey is quite as complex as the grief-stricken Penelope. Some women are known for the deeds of their sons or husbands, but never for a heroic deed of their own, thei r personalities, and what they do them...

Thursday, October 24, 2019

Active Citizen

I’m going to become an active citizen in four simply steps which are learn about the issues, figure out what is not working and try to come up with solutions, take action, and make sure to talk to others. Step 1: read a good newspaper or website like www. cp24. com. Find out what is going on and what’s good and bad about my city, state, country, and the world. Step 2: start by looking in my city you I don’t get confused. To do this, I will need to make a list of categories, which will help me break down all the problems.Some examples are: Are there problems with the public education or catholic system? Is there a lack of community in my neighborhood? Step 3: write letters, call, and meet with your elected officials. I will make my voice be heard by writing to the media or even just starting a blog or website. I can host a creative fundraising project or volunteer with an organization. Step 4: make as many people as possible to be concerned about each problem that ’s happening with in our community, so that they can take their own actions and the problem can get solved.The most important thing is putting the word out there so people can act wisely. The three most significant lessons about citizenship that I will take away from this course are the freedom of speech, the freedom of voting, and the freedom of religion. Freedom of speech is extremely important because it refers to the right of an individual to express his/her views about matter of interest to him/her with the freedom of press which means the freedom of writing which both represent their thoughts.Freedom of speech gives people the right to express their opinions without being arrested and thrown to jail. The freedom of voting is also important because it lets people choose the person they feel will represent them better. Freedom of voting is also important because a democratic government can only function when as many people as possible are able to participate in the electo ral process.Freedom of religion is important because people need to feel that they are able to have some sort of influence that is free from the external control. Individual need to feel some sort of level of spiritual fulfillment and should be able to choose freely how that path is taken. Freedom of religion is so important because no matter what ones religion is all of them have one thing in common. It is also important because people wont be force to follow certain customs or beliefs like they used to back in the days.

Wednesday, October 23, 2019

Practice Makes Perfect Essay Essay

Our world is constantly wrought with the concept that certainty can allow one to achieve all of our desires and dreams. But this ever-present idea is utterly misleading. One cannot rely on certainty because nothing is truly certain. Everything that we hold to be true, has not been proven wrong. According to William Phelps, a sense of certainty will achieve the impossible. However, Bertrand Russell believes it is important to always carry a bit of doubt in one’s life. Nevertheless, people are torn between extra confidences and doubtless. While some may be certain of everything or doubt in any little thing, the human brain should balance these two factors in order to have a well and steady mind. Throughout our daily lives, everyone needs some sort of certainty in order to build up one’s self esteem. However, the certainty should be to an extent. Living in a world full of confidence is not always the right decision thus it can guide into failure. Although, strong beliefs, or a set of mind that leads to certainty is not wrong at all, especially in today’s society, it has been proven that one’s visualization of things is the dependable factor of the outcome of the activity one is about to do. It develops a confident and certain mentality. This way, one is able to give out positive vibes and inspire others to be the best of themselves ad eventually achieve â€Å"virtually anything† even that that seems â€Å"impossible† ().The mindset of believing in achieving the impossible is motivation everyone needs to develop a strong character. Relying too much of certainty may not be so good, since it makes you close minded. This is because you are certain of what you say is right, you don’t even listen to other people’s opinion, which brings tension around you. Over analyzing things and always going for what’s right won’t necessarily make you perfect or certain, instead it could gui de you into a big failure, since at some point you have to make mistakes. Thus, in order to prevent a big upcoming failure one should balance out the certainty they have in themselves. Nevertheless, doubt is an extremely huge necessity one needs among their lives. One of the most important components of doubt is trial  and error. One cannot be certain something will make sense or work if the hypothesis one has, has not been tested whether by experimentation or refutation. For instance, if Thomas Edison was absolutely certain he had created a means to harness electricity and produce light without testing his theory over 50 times, his certainty would be invalid. However, his influx of doubt and therefore his willingness to augment and change based upon that doubt, enabled him to produce what could probably be the most important scientific discovery yet. Another example of the importance of doubt is perhaps the most controversial topic among us-religion. Whether or not one has faith and is certain of that faith, is refutable. There are hence, two sides to this cause. Because nothing has been definitely proved that a higher, supreme power exists. On the other hand, there has been research of evolution throughout time, but it still hasn’t necessarily proven a certain answer. However, even in this process of comparing the two sides one doubts because one is extrapolating that either could be true. If either is true, we are still uncertain about it. In conclusion, the use of doubt has brought upon many debates, changes, and ideas whether for better or worse. This debate of uncertainty or certainty has been entrenched in our cultures consciousness possibly since its inception. But if we were to deny that the geniuses of our times did not doubt, we are making a vast ad unintelligent assumption. Even so, throughout time, certainty has also come to a great importance in our lives. Without the doubts of all our past generations and the little certainty they used to carry our world would not be anything like the way it is. One thing is certain; doubt and certainty are two factors that are an absolute necessity.