Essay on helping someone
Informative Essay Two Source Topics
Monday, August 24, 2020
25 Coups de Plume
25 Coups de Plume 25 Coups de Plume 25 Coups de Plume By Mark Nichol What, precisely, is an overthrow, and what number of sorts of upsets are there? This post portrays an assortment of expressions utilizing the word, in addition to a variety of related terms. Overthrow, a word for an abrupt intense and additionally splendid act it likewise fills in as a truncation of ââ¬Å"coup dââ¬â¢Ã£ ©tatâ⬠originates from the French word upset, which means ââ¬Å"strokeâ⬠or ââ¬Å"blowâ⬠; eventually, itââ¬â¢s from the Greek expression kolaphos by method of the Latin acquiring colaphos. Not many of the accompanying articulations have been broadly embraced into English, yet theyââ¬â¢re all accessible for exacting as well as informal use: 1. Overthrow la porte (ââ¬Å"knock on the doorâ⬠): a sign or calling 2. Overthrow bas (ââ¬Å"low blowâ⬠): a shameful move 3. Overthrow dââ¬â¢archet (ââ¬Å"stroke of the bowâ⬠): contact of the bow with at least one strings on a violin or a comparative instrument 4. Overthrow dââ¬â¢chance (ââ¬Å"stroke of luckâ⬠): a blessed occasion 5. Overthrow dââ¬â¢eclat (ââ¬Å"stroke of gloryâ⬠): a radiant accomplishment 6. Upset dââ¬â¢Ã£ ©tat (ââ¬Å"stroke of stateâ⬠): the topple of a national government by an administration group for the most part, components of the nationââ¬â¢s military 7. Upset dââ¬â¢oeil (ââ¬Å"stroke of the eyeâ⬠): an overview taken initially 8. Upset de coeur (ââ¬Å"blow to the heartâ⬠): an extraordinary yet fleeting enthusiasm 9. Upset de pastel (ââ¬Å"stroke of the pencilâ⬠): an outflow of masterful inventiveness 10. Upset de destin (ââ¬Å"blow of fateâ⬠): a disastrous occasion 11. Upset de foudre (ââ¬Å"stroke of lightningâ⬠): a surprising unexpected occasion; likewise, all consuming, instant adoration 12. Upset de glotte (ââ¬Å"stroke of the glottisâ⬠): a strategy in singing and talking method in which the glottis, the space between the vocal folds, is out of nowhere controlled by solid withdrawal 13. Upset de grã ¢ce (ââ¬Å"stroke of mercyâ⬠): a blow or shot to end the enduring of a mortally injured individual or creature; a metaphorically comparative act; or a conclusive demonstration, occasion, or stroke 14. Upset de lââ¬â¢amitiã © (ââ¬Å"stroke of friendshipâ⬠): one (drink) for the street 15. Upset de principle (ââ¬Å"stroke of the handâ⬠): an abrupt, full-scale assault, or help 16. Upset de tuft (ââ¬Å"stroke of the penâ⬠): a clever or mind blowing manner of expression 17. Upset de poing (ââ¬Å"stroke of the fistâ⬠): a punch, or a stun 18. Upset de pouce (ââ¬Å"stroke of the thumbâ⬠): some assistance, or a bump 19. Upset de repos (ââ¬Å"stroke of restâ⬠): a chess move in which a player plans for a blow against the playerââ¬â¢s rival 20. Overthrow de sang (ââ¬Å"stroke of bloodâ⬠): extraordinary annoyance 21. Overthrow de th㠩ã ¢tre (ââ¬Å"stroke of theater)â⬠: an unexpected bend in a phase playââ¬â¢s content, or, when all is said in done, an abrupt unforeseen development or an unexpected impact; likewise, a fruitful stage creation 22. Overthrow du ciel (ââ¬Å"stroke from heavenâ⬠): unexpected favorable luck 23. Overthrow dur (ââ¬Å"stroke of trouble): an extreme blow, or something hard to acknowledge 24. Overthrow en traã ®tre (ââ¬Å"stroke of treacheryâ⬠): a betray 25. Overthrow montã © (ââ¬Å"stroke of fittingâ⬠): a casing up or con Numerous different expressions and articulations incorporate the word overthrow; those recorded above are only the majority of them that start with it. Among the others are overthrow pour upset (ââ¬Å"blow for blow,â⬠or ââ¬Å"tit for tatâ⬠) and overthrow sur overthrow (ââ¬Å"in snappy succession,â⬠or ââ¬Å"time after timeâ⬠). Upset shows up in different uses, and related terms flourish. An upset physical issue is one in which the head strikes an item, making injury the mind; the going with countercoup injury to the cerebrum happens when the head strikes a fixed article, making the mind sway against the skull also. Checking overthrow is the demonstration of commanding or crushing an adversary in single battle without causing injury; in some Native American societies, a warrior won such eminence by striking an adversary or a foe position with a hand, a weapon, or an upset stick, or by taking an opponentââ¬â¢s weapon or his pony. Achievement in checking overthrow, which required the honoree to pull back without injury, was recognized by indents trim in the upset stick or bird quills worn in the honoreeââ¬â¢s hair. Coupage has four unmistakable implications: mixing two kinds of wine to modify flavor, blending drugs in with different substances, expelling hair from a stow away, and tapping on the chest to help oust discharges, for example, in treatment for tuberculosis. Decoupage, inconsequential to any of these faculties, portrays enhancement of an article with paper patterns and different materials. Different terms with the root word upset incorporate recover, which initially implied ââ¬Å"to deduct,â⬠however now the general sense is of pay for a misfortune, and beaucoup, a French expression meaning ââ¬Å"many, an incredible number.â⬠The last entered general utilization in American English by method of military work force who had served in Vietnam, which had up to this point been a piece of French Indochina. Coupã ©, the word for a kind of carriage and, later, a style of vehicle, is connected; the sense is of something cut (with a stroke) down to a littler size. Thus, as well, is coupon, from the French word for ââ¬Å"piece.â⬠They are related with the action word adapt, every now and again found in the expression ââ¬Å"cope withâ⬠and meaning ââ¬Å"deal with challengesâ⬠and, less regularly, ââ¬Å"prevail in battle or competition.â⬠An adapting saw, in the interim, is a device with a little, flimsy, saw sharp edge set in a U-formed edge, and a coppice (likewise rendered brush) is a shrubbery of trees developed for cutting. Need to improve your English in a short time a day? Get a membership and begin accepting our composing tips and activities day by day! Continue learning! Peruse the Vocabulary class, check our mainstream posts, or pick a related post below:4 Types of Gerunds and Gerund PhrasesDifference among Squeezing and IroningHonorary versus Honourary
Saturday, August 22, 2020
I Know Its Over by Steven Patrick Essay -- Papers
I Know It's Over by Steven Patrick Rundown This is a depressing, maybe grim, yet delicate and smart melody verse, which most pundits see as being about the finish of anecdotal or dream relationship. Be that as it may, the understanding can be a lot further, without a doubt, an unlimited pit for the individuals who are slanted to flounder in powerlessness and self-destructive considerations. There are four particular areas that are not so much associated and this prompts an assortment of translations in connecting them, empowering the crowd to extend their own emotions onto the words. But then, the passionate power appears to create elation[1] not melancholy (maybe more in the execution than the verse). Hypothesis about the importance of the lines (as long as it isn't exaggerated) can prompt a delightful delight. Structure The principal area depicts our saint's quick perspective with the picture of his unfilled bed as a grave: Goodness Mother, I can feel the dirt falling over my head what's more, as I move into an unfilled bed Such is life. End of conversation. As though being covered alive, the despairing hero feels that his life should be finished: I know it's finished - still I stick/I don't know what other place I can go. Maybe an extraordinary relationship has come to an end, prompting musings of hopelessness and self destruction, yet it might be less self-evident. He compares his envisioned imminent demise with a sentiment of articulate powerlessness, yet it appears that demise isn't an alternative in light of the fact that he thinks that its hard to act, as we will see. In this way, in spite of the fact that the ocean needs to take me/the blade needs to cut me, he doesn't appear to need it. He does ask do you want to support me? however, of whom? His mothe... ...tates that affection is Characteristic and Real: is he apprehensive that for, for example, you and I, my adoration it is unnatural and fanciful? Subjects Normally for this essayist the topics are pathetic love, separation, dejection, defenselessness, and so on. The Wildean topics are, maybe, in the psyche of the peruser/audience. To be sure, the general unclearness and vagueness, regular of this creator, along with the unpredictability of the structure takes into account a polarity of translations. - - - - - [1] However, I recognize David Pinching, writing in his exposition Oscar Wilde's impact on Stephen Fry and Morrissey, when he says that Wilde speaks to disconnection inside one's own reality and a great arrangement of hypotheses about the most superfluous and preposterous things. [2] All italics unique
Tuesday, July 21, 2020
Marketing of GPS Application
Marketing of GPS Application Marketing of GPS Application HomeâºMarketing PostsâºMarketing of GPS Application Marketing PostsIntroductionGlobal Positioning System (GPS) application is a satellite navigation method that was developed, controlled and is maintained by the Government of United States. It was developed for military operations but has however been adopted by many civilians who use this application for many purposes. GPS is used as a source of online information to improve global productivity and economy and at the same time improve safety and protection of environment. GPS works by sending radio signals from orbiting satellite to the GPS receivers on earth which collects and further convert the signals into specific positions like street sign and name of the road, time information and velocity.This positions and information are then stored in a Geographic Information System that can be accessed later by users. This information is widely used by intelligence organizations and crime detectives around the world to uncover security threats faced by different nations including accessing terrorism information. GPS therefore becomes a right arm in fighting international insecurity. This product idea of having GPS Application adopted is therefore a welcomed idea that should be embraced by all countries to share economic, environmental, safety and technologically related information to make the world a safer and better place to stay.Executive SummaryThis marketing report focuses on GPS Application and analyses the situation on the level of application, environmental factors and analysis using Political, Environmental, social and technological (PEST) method on the impacts of GPS application. This report also analyses the competitors of GPS in terms of their products, strengths and challenges they offer that needs to be considered to ensure GBS remain a leader in the global satellite navigation. Identification of the target market is key to the growth of GPS application which is then segmented into different variables like demographic, psychographic and behavioral to be able to satisfy the needs of these entire groups and to be globally accepted.This report also examines the marketing mix that needs to be employed to ensure this information is fully available to the targeted groups around the world. The pricing, placing and promotion of the product are key to the growth as well market positioning of the GPS technology in the minds of many as being the solution to their safety. In part two of this report, threats and opportunities available for GPS applications is also examined into detail to aid the positioningSituation AnalysisGPS application is a very viable idea that has a number of advantages to the users. The benefits of this application include that it can pick signals from any location with or without internet connection only at a press of a red button for easy access for emergencies, contacts police, ambulance and firefighters after a certain amo unt of time when button pressed. However brings limitation regarding privacy of nations and individuals since GPS clear identifies and monitors the private activities carried out by individuals. This same technology can also be used by ill minded people or organizations to track and execute their terrorist attacks and threat security (Best 5 GPS Navigation Systems).The success and full adoption of GPS technology application depends on several external environmental forces that needs to be fully incorporated. The major factors are the political, economical, , social, technological and environmental that impacts (PESTE) either positively or negatively in to the marketing and adoption of this product idea. Politically, the acceptance of GPS depends on how world political elite and the citizens on the target nations perceive the product. Many may vies the idea as a spying tool to their government operations while others as safety provision mechanism. Governments must therefo re be persuaded to see the benefits of the technology. NASA being an American organization, many world leaders are likely to see the GPS application as a way of stamping authority and many who would simply discredit the idea simply because it is American.Economically, GPS will be of great boost to efficiency and safety in the trade since it guarantees accuracy in navigation of flights, maritime and rail transportation of goods around the world since the directions of the destinations are well identified. This helps the vessels not to navigate through the insecure roots as well as increasing the number of trips covered.The social aspect of this product idea involves increased speed in the sharing of information without use of internet. The public will be fully informed of what goes on and the security brought about by the technology.Technology has transformed the world to be a global village making communication, navigation and security measures manageable across the borders. The GPS technology becomes a major boost to world security and efficiency since the orbiting satellite can help specifically locate the position which is a source of insecurity and terrorist attacks to be raided by emergency rescue forces. Protection of environment against degradation and the effects of global warming remain the focus of the metrological parameters of the GPS application that checks the world weather and climate for any unusual occurrence like the Tsunami.Competitive Environment analysisGPS operates in a very competitive environment with many navigation system providers that has aided the vessel navigation over the years. Some of these competitors include GlONASS, Automotive Navigation System, Marine Navigation System, Inertial Guidance System and the Robotic Mapping (NetMBA, Competitor Analysis) that helps pilots and captains to locate their destinations when in the sea or in the air.Direct customers are the Government, aviation companies, navigation organizations, learni ng institution and metrological departments that give weather forecasts. The beneficiary of these services is the public who travel through these vessels and the benefits of safety and trade exchange between nations. The timely reception of signals leads to efficiency in response to natural disasters, fire break outs and insecurity ranging from abductions to terrorist attacks.Company Analysis (strength and weaknesses)NASA organization has over the years been very stable in its operations. This has also trickled down to the GPS application that has strength that the service if provided for free by the U.S government to the whole world. It also commands integrity in providing timely warnings, accuracy in position locations and availability of this system to be used by the navigators in dire need of the directions. This technology has also been accepted by many world over in the search of safety of the flights, naval vessels and trains as well as safety against terrorism. Other strengt hs of this application is that it is not influenced by weather, relatively of lower cost as compared to other navigation systems and 100% coverage of the whole world.GBS however has weaknesses that include; it relies on satellite signals received by radio and at the same time works better in open places than in enclosed places like under water, in tunnels, underground or in large cities with several skyscrapers hence weaker than the cellular phone signals. It may occasionally issue inaccurate signals especially when the satellites in the viewed field are restricted. GPS is fully controlled by the U.S department of defense and this monopoly may make them deny people the usage of the satellite for reasons well known to them. Customer AnalysisGlobal positioning system is used by people all over the world in all the navigations vessels, flight, trains and automated cars if finding the directions of their destinations. The aviation institutions, navigation bodies, metrological departmen ts, nasal organizations and learning institutions are some of the users of this technology.Market SegmentationThe market segment that is served by this application expects nothing less than safety, accuracy, integrity in the service and efficiency in the service delivery. This segmentation is based on the demographic aspects which involves safety of world population against any threats of insecurity. There is also the behavioral variable that target groups or organizations that behave in a particular suspicious manner to the world security like the terrorist groups under watch GPS.PromotionPromotion involves how customers get to know the products offered. NASA has to put in place an advertising campaign and government lobbying strategies to inform and influence countries to adopt the GPS Applications for world security reasons. This can be through the internet, World Wide Web, government releases and use of iPhone technologies to issue alerts.PositioningThis involves creating the br and to appeal to nationals and make it popular in the minds the people across all borders. Once people are made to understand that their safety is depended on the seriousness they attach to the technology, then many will have GPS application in their mind as the source of international safety. Positioning is achieved through intensive marketing and advertisements run through the mass media that include internet, World Wide Web, television and government releases.
Friday, May 22, 2020
TLS TRANSPORT LAYER SECURITY - Free Essay Example
Sample details Pages: 31 Words: 9318 Downloads: 4 Date added: 2017/06/26 Category Statistics Essay Did you like this example? v TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS. v TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Donââ¬â¢t waste time! Our writers will create an original "TLS TRANSPORT LAYER SECURITY" essay for you Create order 1. Authentication of the server. 2. Confidentiality of the communication channel. 3. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities. The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key. Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange. Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value. The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite. The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application. The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data. Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints. TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period. v IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithmUsed to encrypt and decrypt packet data. 3DES algorithmeffectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithmUsed to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)Used to authenticate packet data. Diffie-Hellman (DH)a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integritythe receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authenticationthe receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protectionAnti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting trafficTraffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transferData is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel terminationIPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums). v IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many. v Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: * Interface Specify the network card that the route applies to which is where the packets will come from. * Destination Specify the network address that the packets are going to such as 192.168.1.0. * Network Mask The subnet mask of the destination network. * Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. * Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network. Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: * Routing Information Protocol (RIP) version 2 for IP * Open Shortest Path First (OSPF) * Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces. v Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : . HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics. IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol. POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service. SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : .. MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click reply in their email clients. Can differ from the fromaddress which can be an automated or unmonitored email address used only to send messages to a distribution list. Reply-to should always be a monitored address. v IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator. v IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future. Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service. v Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits. v Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services. v Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: Since IPv6 addresses are longer, they Encapsulate the hardware address along with the IP address in the IPv6 address. The 64 most significant bits identify a specific network interface. The suffix easily encodes the physical address. DNS: A major problem arises when obtaining the domain name of an IPv6 address over existing IPv4 DNS infrastructure. Current 32-bit name servers cannot handle name-resolution requests for 128-bit addresses. However, IETF designers have defined an IPv6 DNS standard, utilizing a DNS called quad A to map domain names for an IPv6 address. The Major difference between IPv4 and IPng is the number of IP addresses. There are just over 4 billion IPv4 addresses. In contrast, there are over 16 billion-billion IPv6 addresses. Subjects IPv4 IPv6 IPv6 Advantages Address Space 4 Billion Addresses 2^128 79 Octillion times the IPv4 address space Configuration Manual or use DHCP Universal Plug and Play (UPnP) with or without DHCP Lower Operation Expenses and reduce error Broadcast / Multicast Uses both No broadcast and has different forms of multicast Better bandwidth efficiency Anycast support Not part of the original protocol Explicit support of anycast Allows new applications in mobility, data center Network Configuration Mostly manual and labor intensive Facilitate the re-numbering of hosts and routers Lower operation expenses and facilitate migration QoS support ToS using DIFFServ Flow classes and flow labels More Granular control of QoS Security Uses IPsec for Data packet protection IPSec becomes the key technology to protect data and control packets Unified framework for security and more secure computing environment Mobility Uses Mobile IPv4 Mobile IPv6 provides fast handover, better router optimization and hierarchical mobility Better efficiency and scalability; Work with latest 3G mobile technologies and beyond. Internet Protocol Version 6 (IPv6), sometimes called the next generation IP protocol (IPng), is designed by the IETF to replace the current version Internet Protocol, IP Version 4 (IPv4), which is now more than twenty years old. Most of todays network uses IPv4 and it is beginning to have problems, for example, the growing shortage of IPv4 addresses. IETF protocol designers have expended a substantial amount of effort to ensure that hosts and routers can be upgraded to IPv6 in a graceful, incremental manner. Transition mechanisms have been engineered to allow network administrators a large amount of flexibility in how and when they upgrade hosts and intermediate nodes. Consequently, IPv6 can be deployed in hosts first, in routers first, or, alternatively, in a limited number of adjacent or remote hosts and routers. Another assumption made by IPv6 transition designers is the likelihood that many upgraded hosts and routers will need to retain downward compatibility with IPv4 devices for an extended time period. It was also assumed that upgraded devices should have the option of retaining their IPv4 addressing. v Key Features: The IPv4 32-bit IP address space cannot accommodate users beyond 2020. 128-bit IPv6 makes the address space too large to be exhausted in the foreseeable future. IPv6 versatility allows for the accommodation of any reasonable address scheme, thus allowing network designers greater flexibility for devices of the future. IPv6 utilizes three (not two) hierarchical addressing levels. The highest is for the globally known public topology, the next involving individual sites, and the third for individual N.I.C. addresses. The inflexibility in IPv4.s header options led to inefficiency. When sending datagrams, an empty header occupied substantial space. IPv6 allows the sender the freedom to select the required extension headers. IPv4 used DHCP to facilitate manual assignment of host addresses. IPv6 alleviates manual assignment problems, allowing new hosts to assign their own addresses. An ICMPv6 message determines if the address is unique. Auto-configuration allows renumbering of hosts. IPv6 allows hosts to be given new prefixes without manual reconfiguration, allowing numerous devices to dynamically attach to a network without incurring the associated administration costs. v INTRUSION DETECTION SYSTEM Intrusion detection systems do exactly as the name suggests: they detect possible intrusions. More specifically, IDS tools aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. An IDS installed on a network provides much the same purpose as a burglar alarm system installed in a house. Through various methods, both detect when an intruder/attacker/burglar is present, and both subsequently issue some type of warning or alert. Although IDSs may be used in conjunction with firewalls, which aim to regulate and control the flow of information into and out of a network, the two security tools should not be considered the same thing. Using the previous example, firewalls can be thought of as a fence or a security guard placed in front of a house. They protect a network and attempt to prevent intrusions, while IDS tools detect whether or not the network is under attack or has, in fact, been breached. IDS tools thus form an integral part of a thorough and complete security system. They dont fully guarantee security, but when used with security policy, vulnerability assessments, data encryption, user authentication, access control, and firewalls, they can greatly enhance network safety. Intrusion detection systems serve three essential security functions: they monitor, detect, and respond to unauthorized activity by company insiders and outsider intrusion. Intrusion detection systems use policies to define certain events that, if detected will issue an alert. In other words, if a particular event is considered to constitute a security incident, an alert will be issued if that event is detected. Certain intrusion detection systems have the capability of sending out alerts, so that the administrator of the IDS will receive a notification of a possible security incident in the form of a page, email, or SNMP trap. Many intrusion detection systems not only recognize a particular incident and issue an appropriate alert, they also respond automatically to the event. Such a response might include logging off a user, disabling a user account, and launching of scripts. Classification and Types, Techniques of intrusion detection systems There are Four types of IDS 1. Host- Based IDS 2. Network- Based IDS 3. Hybrid Intrusion Detection System 4. Network Node Intrusion Detection System 1) Host-Based IDS (HIDS) Host-based systems were the first type of IDS to be developed and implemented. These systems collect and analyze data that originate on a computer that hosts a service, such as a Web server. Once this data is aggregated for a given computer, it can either be analyzed locally or sent to a separate/central analysis machine. One example of a host-based system is programs that operate on a system and receive application or operating system audit logs. These programs are highly effective for detecting insider abuses. Residing on the trusted network systems themselves, they are close to the networks authenticated users. If one of these users attempts unauthorized activity, host-based systems usually detect and collect the most pertinent information in the quickest possible manner. In addition to detecting unauthorized insider activity, host-based systems are also effective at detecting unauthorized file modification. On the down side, host-based systems can get unwieldy. With several thousand possible endpoints on a large network, collecting and aggregating separate specific computer information for each individual machine may prove inefficient and ineffective. In addition, if an intruder disables the data collection on any given computer, the IDS on that machine will be rendered useless because there is no backup. Possible host-based IDS implementations include Windows NT/2000 Security Event Logs, RDMS audit sources, Enterprise Management systems audit data (such as Tivoli), and UNIX Syslog in their raw forms or in their secure forms such as Solaris BSM; host-based commercial products include Real Secure, ITA, Squire, and Intercepts, to name a few. 1.1. Application-Based IDSs Application-based IDSs are a special subset of host-based IDSs that analyze the events transpiring within a software application. The most common information sources used by application-based IDSs are the applications transaction log files. The ability to interface with the application directly, with significant domain or application-specific knowledge included in the analysis engine, allows application-based IDSs to detect suspicious behavior due to authorized users exceeding their authorization. This is because such problems are more likely to appear in the interaction between the user, the data, and the application. 2) Network-Based IDS (NIDS) As opposed to monitoring the activities that take place on a particular network, Network-based intrusion detection analyzes data packets that travel over the actual network. These packets are examined and sometimes compared with empirical data to verify their nature: malicious or benign. Because they are responsible for monitoring a network, rather than a single host, Network-based intrusion detection systems (NIDS) tend to be more distributed than host-based IDS. Software, or appliance hardware in some cases, resides in one or more systems connected to a network, and is used to analyze data such as network packets. Instead of analyzing information that originates and resides on a computer, network-based IDS uses techniques like packet-sniffing to pull data from TCP/IP or other protocol packets traveling along the network. This surveillance of the connections between computers makes network-based IDS great at detecting access attempts from outside the trusted network. In general, net work-based systems are best at detecting the following activities: * Unauthorized outsider access: When an unauthorized user logs in successfully, or attempts to log in, they are best tracked with host-based IDS. However, detecting the unauthorized user before their log on attempt is best accomplished with network-based IDS. * Bandwidth theft/denial of service: These attacks from outside the network single out network resources for abuse or overload. The packets that initiate/carry these attacks can best be noticed with use of network-based IDS. Some possible downsides to network-based IDS include encrypted packet payloads and high-speed networks, both of which inhibit the effectiveness of packet interception and deter packet interpretation. Examples of network-based IDS include Shadow, Snort!, Dragon, NFR, Real Secure, and Net Prowler. 3) Hybrid Intrusion Detection Systems We have examined the different mechanisms that different IDSs use to signal or trigger alarms on your network. We have also examined two locations that IDSs use to search for intrusive activity. Each of these approaches has benefits and drawbacks. By combining multiple techniques into a single hybrid system, however, it is possible to create an IDS that possesses the benefits of multiple approaches, while overcoming many of the drawbacks. 4) Network Node Intrusion Detection (NNIDS) Basically, this new type (NNIDS) works like typical NIDS, i.e., you take packets from network traffic and analyze them. But it only concerns packets which are addressed to the network node (this is where the name comes from). Another difference between NNIDS and NIDS is that NIDS run in promiscuous mode while NNIDS does not run in promiscuous mode. As not every packet is analyzed the performance of the system will not suffer to much, such systems run very fast as a rule. IDS Techniques There are four basic techniques used to detect intruders: anomaly detection, misuse detection (signature detection), target monitoring, and stealth probes. 1) Anomaly Detection Designed to uncover abnormal patterns of behavior, the IDS establishes a baseline of normal usage patterns, and anything that widely deviates from it gets flagged as a possible intrusion. What is considered to be an anomaly can vary, but normally, any incident that occurs on frequency greater than or less than two standard deviations from the statistical norm raise an eyebrow? An example of this would be if a user logs on and off of a machine 20 times a day instead of the normal 1 or 2. Also, if a computer is used at 2:00 AM when normally no one outside of business hours should have access, this should raise some suspicions. At another level, anomaly detection can investigate user patterns, such as profiling the programs executed daily. If a user in the graphics department suddenly starts accessing accounting programs or compiling code, the system can properly alert its administrators. 2) Misuse Detection or Signature Detection Commonly called signature detection, this method uses specifically known patterns of unauthorized behavior to predict and detect subsequent similar attempts. These specific patterns are called signatures. For host-based intrusion detection, one example of a signature is three failed logins. For network intrusion detection, a signature can be as simple as a specific pattern that matches a portion of a network packet. For instance, packet content signatures and/or header content signatures can indicate unauthorized actions, such as improper FTP initiation. The occurrence of a signature might not signify an actual attempted unauthorized access (for example, it can be an honest mistake), but it is a good idea to take each alert seriously. Depending on the robustness and seriousness of a signature that is triggered, some alarm, response, or notification should be sent to the proper authorities. 3) Target Monitoring These systems do not actively search for anomalies or misuse, but instead look for the modification of specified files. This is more of a corrective control, designed to uncover an unauthorized action after it occurs in order to reverse it. One way to check for the covert editing of files is by computing a cryptographic hash beforehand and comparing this to new hashes of the file at regular intervals. This type of system is the easiest to implement, because it does not require constant monitoring by the administrator. Integrity checksum hashes can be computed at whatever intervals you wish, and on either all files or just the mission/system critical files. 4) Stealth Probes This technique attempts to detect any attackers that choose to carry out their mission over prolonged periods of time. Attackers, for example, will check for system vulnerabilities and open ports over a two-month period, and wait another two months to actually launch the attacks. Stealth probes collect a wide-variety of data throughout the system, checking for any methodical attacks over a long period of time. They take a wide-area sampling and attempt to discover any correlating attacks. In effect, this method combines anomaly detection and misuse detection in an attempt to uncover suspicious activity. v IDS strength and Limitation (weaknesses) Strength of IDSs Current intrusion detection product have some strength that one must be aware of before undertaking an IDS deployment. A strong IDS Security Policy is the HEART of commercial IDS. Provides worthwhile information about malicious network traffic. Can be programmed to minimize damage. A useful tool for ones Network Security Armory. Help identify the source of the incoming probes or attacks. Can collect forensic evidence, which could be used to identify intruders. Similar to a security camera or a burglar alarm. Alert security personnel that someone is picking the lock. Alerts security personal that a Network Invasion maybe in progress. When well cond, provides a certain peace of mind. Part of a Total Defense Strategy infrastructure. Limitations of IDSs Current intrusion detection products have limitations that one must be aware of before undertaking an IDS deployment. Despite vendor claims, most IDSs do not scale well as enterprise-wide solutions. The problems include the lack of sufficient integration with other security tools and sophisticated network management systems, the inability of IDSs to assess and visualize enterprise-level threats, and the inability of organizations to investigate the large number of alarms generated by hundreds or thousands of IDS sensors. Many IDSs create a large number of false positives that waste administrators time and may even initiate damaging automated responses. While almost all IDSs are marketed as real time systems, during heavy network or host activity, IDS may take several minutes before reporting and automatically responding to an attack. IDSs usually cannot detect newly published attacks or variants of existing attacks. This can be a serious problem as 30-40 new computer attacks are posted on the Web every month. An attacker may simply wait for a new attack to be posted and then quickly penetrate a target network. IDSs automated responses are often ineffective against sophisticated attackers. They usually stop novice hackers but, improperly cond, can hurt a network by interrupting legitimate network traffic. IDSs must be monitored by skilled computer security personnel in order to achieve maximum benefits and to understand the significance of what the IDS detects. IDS maintenance and monitoring can use a substantial amount of personnel resources. Many IDSs are not failsafe; that is, they are not well protected from attack or subversion. Many IDSs do not have user interfaces that allow users to spot cooperative or coordinated attacks. v Deploying an IDSs The network intrusion detection systems are in the process of becoming a standard information security safeguard. Together with firewalls and vulnerability scanners, intrusion detection is one of the pillars of modern computer security. While the IDS field is still in motion, several classes of products have formed. Most IDS products loosely fall into network IDS (NIDS) and host IDS (HIDS). Network IDS usually monitors the entire subnet for network attacks against machines connected to it, using a database of attack signatures or a set of algorithms to detect anomalies in network traffic (or both). Alerting and attacks analysis might be handled by a different machine that collects the information from several sensors, possibly correlating IDS alerts with other data. It appears that stateful and protocol-aware signature-based network IDS is still the most widely deployed type of intrusion detection. Simplified management and the availability of inexpensive NIDS appliances together with dominance of network-based attacks are believed to be the primary reasons for that. In this brief article we will review several important mistakes companies make while planning and deploying the IDS systems. In addition to the obvious mistake (0th, I guess :-)) of not evaluating and deploying the IDS technology at all, the issues we cover often decrease or even eliminate the added value the companies might otherwise derive from running an intrusion detection systems. Since we already covered the trivial case of not using an IDS, we discuss is using it without giving it an ability to see all the network traffic. In other words, deploying the network IDS without sufficient infrastructure planning. Network IDS might be deployed on the network choke point (such as right inside or outside the firewall), on the appropriate internal network segment or in the DMZ to see important traffic. For the shared Ethernet-based networks IDS will see all the network traffic within the Ethernet collision domain or subnet and also destined to and from the subnet, but no more. For the switched networks, there are several IDS deployment scenarios which utilize special switch capabilities such as port mirroring or spanning. Additionally, one might procure an IDS integrated with a switch, such as Cisco IDS blade. When the IDS are deployed appropriately, but nobody is looking at the alerts it generates. This one is actually much more common than it seems. It is well-known that IDS is a detection technology, and it never promised to be a shoot-and-forget means of thwarting attacks. While in some cases, the organization might get away with dropping the firewall in place and configuring the policy, such deployment scenario never works for the intrusion detection. If IDS alerts are reviewed only after a successful compromise, the system turns into an overpriced incident response helper tool clearly not what the technology designers had in mind. It still helps, but isnt it better to learn about the attack from the IDS rather then from angry customers? Being the form of monitoring and network audit technology, IDS still (and likely always will, unless its intelligence improves by orders of magnitude) requires a skilled personnel to run. Network IDS is deployed, sees all the traffic and there is a moderately intelligent somebody reviewing the alert stream. No more mistakes? Far from it! What is a response policy for each event type? Does the person viewing the alerts know what is the best course of action needed for each event (if any)? How to tell normal events from anomalous and malicious? What events are typically false positives (alerts being triggered on benign activity) and false alarms (alerts being triggered on attacks that cannot harm the target systems) in the protected environment? How to gather the required context information to answer the above? Unless the above questions are answered in advance by means of a response process, it is likely that no intelligent action is being taken based on IDS alerts a big mistake by itself. All the previous pitfalls are avoided and the NIDS is humming along nicely. However, the staff monitoring the IDS starts to get flooded with alerts. They know what to do for each alert, but how quickly they can take action after receiving the 10,000th alert on a given day? Unfortunately, current network IDS systems have to be tuned for the environment. While the detailed guide for IDS tuning is beyond the scope of this article, two general approaches are commonly used. One approach is to enable all possible IDS rules and spend several days flooded with alerts, analyzing them and reducing the rule set accordingly. This route is more appropriate for internal network IDS deployment. Another solution is to reduce the rule set to only watch the risky services. This works better in a highly secure DMZ setup where all machines are carefully audited and hardened. This is simply not accepting the inherent limitations of network IDS technology. While anomaly-based IDS systems might potentially detect an unknown attack, most signature based IDS will miss a new exploit if there is no rule written for it. IDS systems have to be frequently updated with vendor signature updates. Even if updates are applied on a timely schedule, the exploits which are unknown to the IDS vendor will likely not be caught by the signature-based system. Attackers may also try to blind or evade the NIDS using many tools available for download as well as, no doubt, a large collection of non-public tools. There is a constant battle between the IDS developers and those wishing to escape detection. IDS are becoming more sophisticated and able to see through the old evasion methods, but new approaches are created by attackers. Those deploying the network IDS technology should be aware of its limitations and practice defense-in -depth by deploying multiple and diverse security solutions. References 1. The Wikipedia organization, Transport layer security, Viewed 23 June 2007, https://en.wikipedia.org/wiki/Secure_Sockets_Layer. 2. The Microsoft TechNet, United States, Viewed 27 June 2007, https://technet2.microsoft.com/WindowsServer/en/library/c22a4d3d-6335-4b9b-b344-bbae041203b41033.mspx?mfr=true. 3. The IETF organization, Dr.Taylor Independent T. wu Stanford University 13 June 2007, Viewed 25 June 2007, https://www.ietf.org/internet-drafts/draft-ietf-tls-srp-14.txt. 4. T J Hudson, and E A Young, SSL programmer Reference, Viewed 23 June 2007, https://psych.psy.uq.oz.au/~ftp/Crypto/ssl.html#HDR0. 5. The Network World, Security, Paul Szymanski network Administrator 22 Jan 2007, Viewed 23 June 2007, https://www.networkworld.com/news/2007/011807-tls3.html. 6. The Cisco Press, Ipsec, Andrew Mason 01 Oct 2004, viewed 25 June 2007, https://www.ciscopress.com/articles/article.asp?p=341484seqNum=6. 7. The AT-TLS and CS IPSec, LIN OVERBY, Viewed 28 June 2007, https://www-03.ibm.com/systems/z/security/pdf/Got_the_world_on_your_shoulders_Overby.pdf. 8. The Isoc Organization, Design and Implementation of TLS and IPSec, Nagendra Modadugu and Eric Rescorla, Stanford University, Viewed 28 June 2007, https://www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Modadugu.pdf. 9. The Linux Journal, The Security Protocol, Gianluca Insolvibile 08 Sep 2002, viewed by 01 July 2007, https://www.linuxjournal.com/article/6117. 10. The improving Network Availability, IPv4 IPv6 (IPng), viewed by 10 July 2007, https://freespace.virgin.net/fonaset.net/ipv.html. 11. The Answers.com, IPv4, Viewed 10 July 2007, https://www.answers.com/topic/ipv4?cat=technology. 12. The TCP/IP Guide, The History of IP/ Standard/ Versions, Viewed 10 July 2007, https://www.tcpipguide.com/free/t_IPHistoryStandardsVersionsandCloselyRelatedProtoco.htm. 13. The Moldova.org/IT, IPv4, Viewed 10 July 2007, https://it.moldova.org/pagini/eng/528/ 14. The American Registry of Internet Numbers, IPv4 and IPv6, viewed 10 July 2007, https://www.arin.net/media/fact_sheets/IPv4_IPv6.pdf. 15. The Network Dictionary, Protocols, Viewed 12 July 2007, https://www.networkdictionary.com/protocols/ip.php. 16. The Multi-party Authentication protocol, Ajit Ravidran, MSC distributed Multimedia System (2003/2004), Viewed 15 July 2007, https://www.comp.leeds.ac.uk/mscproj/reports/0304/ravindran.pdf. 17. The network Security and encryption, Internet security, Viewed 25 July 2007, https://www.electronics.dit.ie/staff/mdavis/Section11_InternetSecurity.pdf. 18. The McMaster University, S. Bilal Mehmood 04 April 2003, Viewed 30 July 2007, https://www.cas.mcmaster.ca/~wmfarmer/SE-4C03-03/projects/papers/Proj_Final.pdf. 19. The re-engineering protocol, Ramesh Naharathnam 04 April 2003, viewed 30 July 2007, https://www.cas.mcmaster.ca/~wmfarmer/SE-4C03-03/projects/papers/IPv6.pdf. 20. The Window security, Intrusion detection, Przemyslaw Kazienko Piotr Dorosz 23 July 2004, Viewed 31 July 2004, https://www.windowsecurity.com/articles/IDS-Part2-Classification-methods-techniques.html. 21. The Cisco Press, Intrusion Detection System, Earl Carter 15 Feb 2002, Viewed 31 July 2007, https://www.ciscopress.com/articles/article.asp?p=25334seqNum=3. 22. The Security Focus, Intrusion System Paul Innella 12 June 2001, Viewed 31 July 2007, https://www.securityfocus.com/infocus/1520. 23. The NIST Special Publication, Intrusion Detection system, Viewed 31 July 2007, https://www.21cfrpart11.com/files/library/reg_guid_docs/nist_intrusiondetectionsys.pdf. 24. The Birds-eye .net, HTTP Preethi Ramkumar, Viewed 31 July 2007, https://www.birds-eye.net/definition/h/http-hyper_text_transfer_protocol.shtml. 25. The Birds-eye.net, Internet Protocol Bruce Bahlmann, Viewed 31 July 2007, https://www.birds-eye.net/definition/acronym.cgi?what+is+IP=Internet+Protocolid=1160272098. 26. The Cheap 56k, IMAP, Viewed 31 July 2007, https://www.cheap56k.com/glossary/IMAP.html. 27. The Tech web, IMAP4, Viewed 31 July 2007, https://www.techweb.com/encyclopedia/defineterm.jhtml?term=IMAP%34. 28. The Search Exchange, POP3, Viewed 31 July 2007, https://searchexchange.techtarget.com/sDefinition/0,,sid43_gci212805,00.html. 29. The search Web Services, MIME, Viewed 31 July 2007, https://searchwebservices.techtarget.com/sDefinition/0,290660,sid26_gci212576,00.html. 30. The IBM research Journal, MIME Message Format, Viewed 31 July 2007, www.research.ibm.com/journal/sj/371/vonka3.gif. 31. The Soap wicourt gov, Step tech over view send message Gif Format, viewed 31 July 2007, https://soap.wicourts.gov/overview/StepTechOverview11.gif. 32. The its 4 sms, Receive messages Images, Viewed 31 July 2007, https://www.its4sms.com/images/email2sms-screen2.gif. 33. The SANS institute, Intrusion detection strength, Viewed 2nd August 2007, https://www.sans.org/resources/idfaq/ipe.php. 34. The Nist Gov publication, Viewed 5 Aug 2007, https://csrc.nist.gov/publications/nistbul/itl99-11.txt. 35. The VPNC.org, Viewed 31 July 2007, https://www.vpnc.org/ietf-ipsec/00.ipsec/msg02104.html. 36. The Info sec writer Text Library, Viewed 5 Aug 2007, https://www.infosecwriters.com/texts.php?op=displayid=117. 37. The email experience organization, Viewed 14 August 2007, https://www.emailexperience.org/resources/email-glossary/.
Thursday, May 7, 2020
The Romantic Era Of Beethoven - 1709 Words
Beethoven The Romantic Ludwig Beethoven grew up in an unhappy home during the late 1800s in Bonn, Germany. His alcoholic father was an angry man and Ludwig escaped his dreadful childhood in his music. At the age of twelve, Ludwig had symphonies imbedded in his mind and soul. He was a gifted composer who supported his family with his talent, he taught music and performed. Music was not enough to protect Ludwig from his abusive home life, his mother died and his fatherââ¬â¢s drinking grew worse. At nineteen years old Ludwig took over the family household. Ludwig van Beethoven was the most profound, incredible composer who lived in his music, endured endless suffering, and transitioned music from classical to the romantic era. Beethoven was growing in popularity and the officials requested Ludwig the opportunity to compose a Cantata on the death of the Holy Roman Emperor, Joseph II. Although, Beethoven cantata was not performed until ninety-four years later, a signature in Beethoven s melodic contour shape that consists of rising notes, a scale, that goes up and turns down on itself, began in his first cantata and repeated in an ongoing theme in most of all his music. Beethoven became popular in Vienna. Ludwig wrote Sonata No. 14 in C sharp minor, known as the moonlight sonata, for his young pupil, Giulietta, whom he thought he would marry. Beethoven heard ringing and humming in his ears and began to close himself off from the world as he wrote his first symphony,Show MoreRelatedThe Music Of Beethoven : The Period Of Classical And Romantic Eras1129 Words à |à 5 Pagesmost gifted and greatest composers was baptized by the name of Ludwig Van Beethoven. Born in Bonn, Germany, Beethoven was well known for expanding the ideas of symphonies, sonatas, quartets, and concertos. Moreover, the music of Beethoven paved a way, as he became one of the most predominant and influential musical figures within the transitional period of classical and romantic eras. Growing up, life wasnââ¬â¢t easy for Beethoven, he suffered from the loss of his mother at the age of 16 and his fatherRead MoreLudwig Van Beethoven : Classical And Romantic Era1095 Words à |à 5 PagesIntroduction Ludwig Van Beethoven was a classical and romantic era composer and pianist. Ludwig van Beethoven was the transition from the classical to western music. Beethoven was much taken by the ideals of the Enlightenment and by the growing Romanticism in Europe.His early work resemble Haydn and Mozart in great amount. However, his later works set stage for the choral symphonies of Romantic period. He is famous for composing 9 symphonies, 5 piano concertos, 1 violin concerto, 32 piano sonatasRead MoreLudwig Van Beethoven s Influence On The Classical Era938 Words à |à 4 PagesKnown as the most influential musician of all time, Ludwig van Beethoven was born in Bonn, Germany in 1770. Beethovenââ¬â¢s talent was noticed at a young age and he soon became a pioneer in the world of music for breaking the traditional bounds of style and form. Over the course of his life, Beethoven produced nine symphonies, seven concertos, and a total of forty-two sonatas. Although these numbers are few when c ompared to other composers such as Joseph Haydn, his work was very substantial. Ludwig vanRead MoreCharacteristics Of The Classical Era Of Music729 Words à |à 3 Pages Ludwig Van Beethoven was recognized as a great composer in western music. Beethoven was also known for creating the bridge between the classical and romantic era of music. He is known for doing this because he took key aspects of the classical era and merged them with key aspects of the romantic era. The classical era of music dates from 1775-1825. The classical music era had a lighter and more clear texture (Kamien 161). The music from this era was mainly homophonic meaning that the music hadRead MoreThe New Idea Of Romanticism1745 Words à |à 7 Pageseverything, and to value imagination and emotion over intellect and reason was a common characteristic. This era was based on a belief that people are naturally good, spontaneity and intensity of feeling are valued, that passion was noble, and political authority and firm conventions needed a revolution. Nostalgia became a topic, desire and will for personal motivation was accentuated, and this era became a profound social and cultural change that radically transformed everyday lives. Many individualsRead MoreThe Classical And Romantic Eras Of Classical Music999 Words à |à 4 Pages Ludwig Van Beethoven served as an important link between two important periods of time, the classic and romantic eras of music, and his compositio ns still stand today as a famous memorial of the past. Many people say, ââ¬ËMusic never dies!ââ¬â¢, and that statement has proven true by Beethovenââ¬â¢s Legacy, a creation of many famous compositions of classical music that still stand, untouched by history today as a sound, a true monument that represents the golden age of classical music, a trip into the ever-growingRead MoreThe Music That Have Changed The Face Of Music1375 Words à |à 6 PagesGrowing up, Beethoven was a household name. Countless studies have been released claiming classical music could increase babiesââ¬â¢ intelligence. The importance of music is vast and affects every individual in a multitude of ways. Throughout the course of history, there have been artist that have changed the face of music as we know it. Two important composers to the course of musicââ¬â¢s history are Ludwig van Beethoven and Franz Liszt. While both composers certainly have similarities in their music, thereRead MoreThe Cla ssical Era And The Age Of Enlightenment1123 Words à |à 5 PagesLudwig Van Beethoven was a musical masterpiece. He never let problems interfere with his work. He was born in the baroque period, lives a life of fifty-four years, and contributed so much romance in his life although never being married or having kids. Beethoven is well known for his work and will forever be known as a Romantic influencer. Beethoven dedicated his whole life to his music. He never let bad situations fully tear him apart from writing and playing music. The historical period that LudwigRead MoreBeethovens Sixth Symphony1173 Words à |à 5 PagesSymphony ââ¬Å"He (Beethoven) was a pivotal figure in the transition from 18th century musical classicism to 19th century romanticism, and his influence on subsequent generations of composers was profoundâ⬠Kerman and Tyson. Beethovenââ¬â¢s sixth symphony (also known as the pastoral symphony) has qualities of both the classical and romantic periods and illustrates Beethovenââ¬â¢s revolutionary ideas as well as highlights his classical influences. The programmatic nature of the piece is the dominant romantic featureRead MoreThe Romantic And Classic Ages Of European Music1015 Words à |à 5 Pagessignificance have been both consciously and subconsciously molded by the environment in which they reside and as such they may interpret and bring the world to life in the language of music. The Romantic and Classic ages of European music can be simply put as the period of time between the deaths of Ludwig Van Beethoven in 1827, and that of Gustav Mahler in 1911. Despite this convenient p artition, history has never been one to divide itself so precisely. There were certainly early makings of Romanticism
Wednesday, May 6, 2020
Carbon footprint Free Essays
Simply operating a business solely on the objective of earning a profit can potentially come back to bite you in the end. There are true cost and risk associated with the way we do business. Some companies operate with the mindset they can do whatever they want right now. We will write a custom essay sample on Carbon footprint or any similar topic only for you Order Now ââ¬Å"Iââ¬â¢ll be goneâ⬠or ââ¬Å"Youââ¬â¢ll be goneâ⬠when the bill comes due (Friedman, 2009). In respect to our future generation that effect Is going to be global climate change. We will begin to see increased health risks, decline in fresh water, rising sea levels, displaced people. Companies will see effects related to agriculture, tourism, and Insurance related costs. The potential outcome of global climate change can be compared to the collapse of GIG. Alga failed because they discounted to zero the very small, remote risk of simultaneous defaults in their investment or insurance portfolios (Friedman, 2009). The risk in fact was probably less than one percent, perhaps a great deal less ââ¬â but it happened nonetheless (Friedman, 2009). In this case Alga had the benefit of being bailed out by the government. Our planet is not so lucky and will have to be offset by he way this generation and future generations conduct business. One way In which a business can strive to become more green is by setting a goal to become carbon neutral by a specified date. This could be added to their Nilsson statement and be clearly defined, measurable, and executable (Adulators, 2011). Evaluation of their strategic planning process is also necessary. In a rapidly changing environment the steps of the planning process can be going on simultaneously. For example the cost and risk of developing a new product have to be evaluated ecologically, competitively, economically, socially, politically, and legally. A company in the pursuit of more sustainable products can help benefit the environment and the companies bottom-line. McDonaldââ¬â¢s in an attempt to address waste management switched to a new wrapper that was less bulky, cheaper, required less energy to produce, and discharged less pollution (Adulators, 2011). This strategy helped reduce waste and pollution while simultaneously lowering McDonaldââ¬â¢s production costs (Adulators, 2011). Some companies are already operating in a lean state, but are still leaving a carbon ND employee car-pooling can be promoted throughout the organization. Also companies can reduce their footprint by purchasing carbon offsets. These can be geared toward reforestation, methane digester, or wind farms for example. The fact of the matter is that a change needs to begin now. The consequences of taking no action are fare too great. We can take a page out of Denmark book. They made it a priority in 1985 to focus on energy efficiencies and renewable energy. Sixteen percent of their total energy consumption comes from wind and solar, this reared a whole new export industry (Friedman, 2009). Today Denmark does not rely at all on energy from the Middle East. A world off sustainable environment is a world of freedom. If climate change and environmental degradation ever get the better of our planet we will have to ration where we live, how we live, and how much we can use (Friedman, 2009). Now is the time to start reducing our carbon footprint. Astronomical Adulators, R (2011). Green Marketing Management. Mason: South-Western Coinage Learning. Friedman, T, L (2009). Hot, Flat, and Crowded. New York: Picador How to cite Carbon footprint, Papers
Sunday, April 26, 2020
Plastic Ocean Pollution on Ocean life in U.S
Introduction Plastics pollution is among the greatest threats to the oceans on earth. It has been found out that plastic make up about ninety percent of all litter that float on the surface of oceans, with about forty six thousand bits of plastic within every square mile (ââ¬Å"Plastic Pollutionâ⬠1).Advertising We will write a custom research paper sample on Plastic Ocean Pollution on Ocean life in U.S specifically for you for only $16.05 $11/page Learn More The reason for having the large amount of plastic in our oceans is that, plastic does not undergo biodegradation, like other forms of trash; but it instead photo-degrades with light from the sun, disintegrating into more and more little pieces, ââ¬Å"but they never really disappearâ⬠(ââ¬Å"Plastic Pollutionâ⬠1). The pieces of plastic are consumed by the living organisms that are found in the ocean. They may also disintegrate in to plastic dust, which is microscopic. The plastics are as well swept by the ocean currents, and they land in spinning vortexes referred to as ocean gyres (ââ¬Å"Plastic Pollutionâ⬠1). It is reported that the North Pacific Gyre located off the Californian Coast is ââ¬Å"home to the Great Pacific Garbage patchâ⬠(ââ¬Å"Plastic Pollutionâ⬠1). This is the biggest marine garbage site in the whole world. The floating plastic mass is two times as big as Texas and has pieces of plastic that outnumber ocean life by a ratio of 6:1 and it is not possible to completely clean up these sites (ââ¬Å"Plastic Pollutionâ⬠1). Plastics pose a great danger to the life of all ocean living organisms; be they small or big ones. More than one hundred thousand sea mammals as well as one million birds in the sea die annually and their deaths result from eating plastic materials or getting entangled in these materials (ââ¬Å"Plastic Pollutionâ⬠1). It is also important to point out that it takes about seven hundred years for th e plastics to completely degrade. This implies that even if an initiative was taken to put a halt to the use of plastics, these materials will still be there for a large number of generations, continuing to pose a threat to the human as well as marine life. However, in spite of these, there is possibility of taking particular actions to effectively deal with this problem. This paper is going to present a discussion on effects of plastic ocean pollution on marine life in the U.S. The paper is specifically going to look at how plastic ocean pollution comes about and how it affects the ocean life. The measures that are aimed at dealing with this problem are also going to be looked at. The paper will be considering some of the examples related to this problem from even other parts of the world. The conclusion section is going to present a summary of the main points in the discussion. Ocean Plastic Pollution and its Effects on Ocean Life The amount of the ocean debris is now constantly e scalating in all the oceans on earth. The research conducted by the Algalita Marine Research Foundation presented findings which indicated that from the year 1997 up to 2007, there was an increase in the amount of the plastic debris in the ââ¬Å"Central Pacific Gyreâ⬠by five times, ââ¬Å"where the baseline in 1997 showed plastic pieces outnumbered plankton on the ocean surface 6:1â⬠(ââ¬Å"The Problem of marine plastic pollutionâ⬠1).Advertising Looking for research paper on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Elsewhere, off the coast of Japan, the amount of the floating plastic particles increased by ten times in a period of one decade, beginning from the 70s up to the 80s. This amount then started increasing ten times in every after about three years in the course of the 1990s (ââ¬Å"The Problem of marine plastic pollutionâ⬠1). It is also reported that the amount of debris increased 100 fold in the Southern Ocean at the beginning of the 1990s (Copello and Quintara 1514). This rise in the amount of the debris took place at a similar period during which the global plastic fiber production had increased by four times (ââ¬Å"The Problem of marine plastic pollutionâ⬠1). When the plastics enter into the ocean they injure and kill the sea animals including the fish, sea mammals and seabirds. Ocean plastic pollution has had a great impact on a minimum of two hundred and sixty seven species across the world and these include forty three percent of all of the sea mammal species, eighty six percent of the total number of species of the sea turtles and forty four percent of the total number of the species of seabirds (Laist 99). The common impact has been death which has been resulting from entanglement, ingestion and infection among others (Laist 99). It is also reported that, in the year 2010, ââ¬Å"a California grey whale washed up dead on the shores of the Puge t Soundâ⬠(ââ¬Å"The Problem of marine plastic pollutionâ⬠p.1). Indications were given by autopsies that this animalââ¬â¢s stomach had several things which included, over twenty plastic bags, surgical gloves, golf ball and a pair of pants among other things (ââ¬Å"The Problem of marine plastic pollutionâ⬠1). The seabirds that usually obtain their food from the surface of the ocean are particularly vulnerable to swallowing the floating plastic debris. The mature seabirds engage in feeding these plastic particles to their young ones and this adversely affects the survival and growth of these chicks (Hannah 1). Some research gave out findings which indicated that about ninety eight percent of the chicks that had been sampled during the research, had plastic in their body and the amount of the plastic that was being swallowed was ever increasing in the course of time (Auman 240). Since insistent organic pollutants within the ocean environment get attached on the pl astic debrisââ¬â¢ surface, it has been established that the ocean floating plastics build up these pollutants and carry them through the sea currents (ââ¬Å"The Problem of marine plastic pollutionâ⬠1).Advertising We will write a custom research paper sample on Plastic Ocean Pollution on Ocean life in U.S specifically for you for only $16.05 $11/page Learn More The moving and floating debris do facilitate transportation of the invasive ocean species as well (David 808). On an increasing level, studies give an indication that the ocean organisms that take in plastics that are coated with poisonous materials can have these substances get absorbed into their body systems (David 808). The plastic debris is contributing towards having the human food chain getting polluted. For instance, in research conducted in the ââ¬ËPacific Gyreâ⬠by researchers on a voyage in the year 2008, it was found that fish are taking in plastic particles. Out of th e six hundred and seventy two fish that were caught in the course of the voyage, about thirty five percent of them had swallowed plastic particles (The Problem of marine plastic pollutionâ⬠1). Following a study that was conducted in North Carolina coast in which one thousand and thirty three seabirds were collected, the findings indicated that ââ¬Å"individuals from 55% of the species recorded had plastic particles in their gutsâ⬠(Derraik 846). These researchers got evidence which showed that some of the birds from the sea chose specific colors as well as shapes of the plastics, possibly mistaking these materials for some prey items (Derraik 845). It has also been found that the sea birds that have ingested large amounts of plastics experience a decrease in the amount of food consumed and this limits their capacity ââ¬Å"to lay down fat deposits, thus reducing fitnessâ⬠(Derraik 845). Other negative effects that are brought by the ingestion of the plastic material s include reduced feeding stimulus, reproductive failure, blocking of the secretion of the gastric enzyme and delayed ovulation among other effects (Derraik 845). Moreover, among the small birds and fish, ingesting plastic debris can cause a reduction in the food uptake, and may bring about internal injuries and eventually death as result of damages made on the intestinal tract (Derraik 848). However, the level of harm will vary from one species to the other. Dealing With Plastic Ocean Pollution Efforts have been made to put in place international legislation aimed at promoting conservation of oceans. For instance, there was setting up of the ââ¬Å"1972 Convention of the Prevention of Marine Pollution by Dumping Wastes and other Matterâ⬠(Derraik 847). Perhaps the most significant legislation put in place to deal with the escalating problem regarding ocean pollution is the ââ¬Å"1978 Protocol to the International Convention for the Prevention of Pollution from Shipsâ⬠(De rraik 847). This legislation had recognition that the vessels present a major and manageable cause of pollution into the ocean environment (Derraik 847).Advertising Looking for research paper on environmental studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More The ââ¬Å"Annex V of MARPOLâ⬠is found to be the main worldwide authority that controls ocean debris ship sources. It became effective beginning from the year 1988. It ââ¬Å"restricts at sea discharge of garbage and bans at sea disposal of plastics and synthetic materials such as ropes, fishing nets, and plastic garbage bags with limited exceptionsâ⬠(Derraik 847). Of greater significance, Annex V is applicable to all of the watercraft, the small leisure vessels included. It is reported that over seventy nine nations across the world have engaged in ratifying the Annex V. The signatory nations are supposed to take appropriate initiatives to ensure that they undertake its complete implementation (Derraik 848). However, there is still widespread ignoring of legislation and estimates are made that, ships dispose of about six and a half million tones of the plastics each year (Derraik 848). For instance, taking the case in Australia, it was found out that about thirty percen t of the ships did not fulfil MARPOL regulations on discarding plastics. The legislation that is put in place at the national level can actually also be very helpful. The individual nations can turn out to be effectual through their own legislation (Derraik 848). This may involve laws that call for having degradability measures or which support recycling. In the United States of America, the 1987 ââ¬Å"Plastics Pollution Research and Control Actâ⬠(Derraik 848) did not just take up Annex V, but broadened its use to the United States vessels as well. The ocean carriers are supposed to take up these regulations that forbid discarding the plastic materials at the ocean. However, the greatest hardship when considering legislation is to essentially undertake its enforcement in the worldââ¬â¢s oceans, which is a very large area. Therefore, it is important that the nations that are neighbours work jointly so that they can make sure that there is compliance with Annex V by all the vessels (Derraik 848). The plastics sector in the United States of America, through the guidance provided by ACC (American Chemical Council), engages in spending large amounts of money every year in order to persuade the people who make policies as well as the people living in such places as California, that the solutions to the problem of plastic ocean pollution is found in the anti-litter crusades which attribute the liability ââ¬Å"for marine debris on individual behaviorâ⬠(The Problem of marine plastic pollutionâ⬠1). However, they have just committed small amounts of money to the public education but a large amount to supporting polices which promote higher levels of plastics utilization (The Problem of marine plastic pollutionâ⬠1). As on one hand increasing public education with an aim of preventing littering is of great importance, on the other hand, suitable litter management fails to deal with the unsustainable utilization of the resources which are involve d in the production of ââ¬Å"packaging and single use disposable goodsâ⬠(ââ¬Å"The Problem of marine plastic pollutionâ⬠1). Moreover, while the quantity of the disposable products as well as packaging goes on increasing, managing litter by offering public education and cleaning up of the streets as well as waterway calls for having substantial and constant financing. Ensuring there is prevention of the creation of disposable products, to the highest level possible, cuts down the expenditure on litter management. Prevention is found to be good for the environment as well as being cost-effective (The Problem of marine plastic pollutionâ⬠, 1). It is also important to point out that education is a very strong tool that can be used in dealing with the problem of ocean pollution, especially when discussions about this problem is carried out in schools. The young people may not just engage in changing habits without any difficulties, but they would as well be in a positi on to transfer the awareness they have acquired to their family members as well as to the community at large. In this case, they will be serving as being agents of change. Because the sources of pollution that are land-based offer greater inputs of plastics into the seas, in case a community turns out to have awareness about the problem, this can indeed bring in a great difference. Education holds great power that can not be undermined in any way and it can play a more important role towards realizing positive results than applying stringent laws, like the one applied in New York, referred to as ââ¬Å"Suffolk County Plastic Lawâ⬠(Derraik 848). This law prohibited some ââ¬Å"retail food packagingâ⬠but the law did not succeed in bringing down the level of the roadside as well as beach litter (Derraik 848). Financial incentives may also be required and it is pointed out that ââ¬Å"no effort to conserve biological diversity is realistic outside the economics and public po licies that drive the modern worldâ⬠(Derraik 848). There also exist some aspects that are more complex regarding plastic ocean pollution. Since it could be viewed as being ââ¬Å"side-effectsâ⬠of advancement, the nations that are going through economic development and growth will look for their growth share, exerting more ââ¬Å"pressure on the environmentâ⬠(Derraik 848). There is no likelihood that nations like those ones would engage in taking any measure to bring down the level of utilizing plastics as well as their disposal in the sea water, if such a move would negatively affect any short-term economic benefit they my acquire. This is true especially when it is considered that even the developed countries themselves do not care and are even still not able to show compliance with Annex V requirements (Derraik 848). One way of dealing with this problem effectively is by setting up and using the photodegradable as well as biodegradable plastics. For instance, the Navy of the United States of America engaged in working on a biopolymer that was very promising for ââ¬Å"the fabrication of marine-disposable trash bagsâ⬠(Derraik 848). However, it is unlucky that the impact of the ultimate degradation products of these materials is yet to be known; there is a risk of replacing one problem with another (Derraik 848). Therefore researches were being conducted, for instance, with an intention of monitoring polymer degradation in ââ¬Å"natural waters under real-life conditionsâ⬠¦and assess the impact of degradation products on estuarine benthosâ⬠(Derraik 848). Conclusion Plastic ocean pollution currently poses a great danger to marine life. Plastics are widely used across the world and they now easily find their way into the ocean or they are sometimes dumped directly by ships. Plastic form just about ninety percent of all litter which float on the oceansââ¬â¢ surface. Large amounts of plastics exist because these materials do no t undergo biodegradation, like other forms of wastes. At the present, the amount of the ocean debris is ever increasing in all the available oceans. When plastics find their way into the ocean, they bring in adverse effects to the marine life including fish, sea mammals and seabirds; through either injuring them or even killing them. In the case of the occurrence of death to these animals, this commonly results from entanglement, ingestion and infection. Since ocean pollution in general, and plastic ocean pollution specifically, is turning out to be a big problem on an increasing level, there is need to take appropriate measures to deal with it effectively. One of the measures that need to be taken is that, ocean carriers need to obey all the international as well as national laws which prohibit discarding the plastic materials at the ocean. The problem here is that, oceans touch a number of countries and one country can not be able to achieve its goal of avoiding plastic ocean poll ution alone. The neighboring nations need to come together and operate as a team, and especially in regard with complying with Annex V. Moreover, there is need to educate people about how important it is to avoid plastic ocean pollution in order to save the marine life. Educating the young people in school can actually be helpful. These young people can be used as agents of change when they are encouraged to go out and pass the message to the wider community. The power that education holds is far much greater than the strict laws that may be put in place and can help in dealing with this problem more effectively. Works Cited Auman, Heidi, et al. ââ¬Å"Plastic ingestion by Laysan Albatross Chicks on Sand Island, Midway Atoll, in 1994 and 1995.â⬠Albatross Biology and Conservation, 1.1 (1997): 239-244. Print. Copello, Sofia and Quintara Flavio. ââ¬Å"Marine Debris Ingestion by Southern Giant Petrels and its Potential Relationships with Fisheries in the Southern Ocean.â⬠Ma rine Debris Bulletin, 46 (2003): 1513-1515. Print. David Barnes, ââ¬Å"Biodiversity: Invasions by Marine Life on Plastic Debris.â⬠Nature, 6883.1 (2002): 808-809. Print. Derraik, Jose G. ââ¬Å"The pollution of the marine environment by plastic debris: a review.â⬠Marine Pollution Bulletin, 44.1 (2002): 842 ââ¬â 852. Print. Hannah Nevins et al, ââ¬Å"Seabirds as indicators of plastic pollution in the North Pacific,â⬠presented at the Plastic Debris, Rivers to Sea Conference, Sept. 8, 2005, Redondo Beach, California. Plastic Debris Project Laist, David. ââ¬Å"Impacts of marine debris: entanglement of marine life in marine debris including a comprehensive list of species with entanglement and ingestion records,â⬠in Coe, J.M. Rogers, D.B. (eds), Marine Debris: Sources, Impacts, and Solutions: New York: Springer-Verlag, 1997. Pp. 99-139. Print. Plastic Pollution, 2013. Web. http://www.takepart.com/oceans/index.html. The Problem of marine plastic pollution, 20 13. Web. https://www.cleanwater.org/problem-marine-plastic-pollution. This research paper on Plastic Ocean Pollution on Ocean life in U.S was written and submitted by user Sharon Church to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Subscribe to:
Posts (Atom)