Monday, December 23, 2019

Cause and Effect of Stress in Young Children - 1162 Words

Determining Causes and Effects- Draft Version Jacqueline C. Winfield Professor Leverett Butts English Composition- ENG 115 Friday, November 22, 2012 Young children are not always the first people we think of when it comes to the stress factor. We tend to believe that they are living in their best years, however with changes in economic situations such as parents not remaining married, being exposed to violence, and even feeling the need to belong a child can become overwhelmed. According to Wikipedia contributors, stress in young children can be beneficial to proper growth and development if it is not persistent (2013). Stress in young children should be monitored by caregivers, teachers, and others to prevent youth from†¦show more content†¦This increases the needs for medical doctors and researchers to aid in children’s well-being. Stress can make one over-aggressive causing children to become more violent. This possibly will increase the rates in bullying in schools at present to domestic abuse in the future. Post-Traumatic Stress Disorder (PTSD) is define as a mental condition that can affect a person who has had a very shocking or difficult experience and that is usually characterized by depression, anxiety, etc.( Merriam- Webster, 2013). When PTSD is not diagnosed for a long period it harms the brain causing impaired brain circuit formation resulting in small brain size in younger children (Wikipedia, 2013). Another effect of stress in youth is obesity. It has been an ongoing problem in past years. With the increasing demand of fast food chains it has become a quick fix for people to over indulge in horrible eating habits. With fast food restaurants’ remanding open late night and the famous value menu we are losing our youth to chubbiness. Between the factors of PTSD and obesity a child may become withdrawn. When this happens it can increase suicide rates. Children who are withdrawn may struggle in school, have frequent mood changes, feel neglect, and generally inadequate to their peers. As shown in the graph below, children make up 50% of people affected byShow MoreRelated Effects Of Being A Foster Care On Children And Adolescents1219 Words   |  5 PagesMackenzie Murphy English Composition 101 Dr.Kom Kunyosing Cause and Effect Essay November 16, 2015 Effects of being in foster care on children and adolescents Being in foster care can either have a positive effect on someone or it could have a very negative effect on someone. In my case, it not only had a positive effect but it also had some downfalls. Most often times children/adolescents are placed in foster care because it is a safer environment for themRead MoreThe Effects of Poverty on Children Essay1217 Words   |  5 Pages When analyzing children growing up in poverty a lot of factors come into play such as their physical, psychological and emotional development. To grow up in poverty can have long term effect on a child. What should be emphasized in analyzing the effects of poverty on children is how it has caused many children around the world to suffer from physical disorders, malnutrition, and even diminishes their capacities to function in society. Poverty has played a major role in the functioning of familiesRead MoreFailing Expectations On Future Generations960 Words   |  4 Pagesnegative decision because children develop stress and unstable futures; nevertheless we can solve the issues of divorce by visiting marriage counselors, communicating with one another, and partaking in trail marriages Growing up with divorced parents can have a negative effect on children. â€Å"It diminishes children’s future competence in all five of society’s major or tasks institutions: family, school, religion, marketplace and government† (Fagon and Churhill 1). Children growing up with divorcedRead MoreThe Effects Of Divorce On Children And Children1548 Words   |  7 Pages The Effects of Divorce on Children Mikele J. King Medaille College Abstract The current divorce rate suggests that one out of every two marriages will end in divorce. This paper is a critical literature review that explores the hypothesis that divorce has detrimental effects on children. Six different risks have been suggested to cause the differences in an increased need for help between divorced family children and two-parent family children: parental loss, economic loss, more lifeRead MoreDivorce : Why It Affects Children More Than Adults872 Words   |  4 PagesDivorce: Why It Affects Children More Than Adults In today’s world many things affect children way more than it will adults. Children, while younger, are more vulnerable than adults are, and they have more potential to become â€Å"corrupted†. Divorce is one of the many occurrences that definitely affects children way more than adults. Divorce affects the adults with money issues, loss of a partner, and the lifestyle of the adult and with over â€Å"fifty percent of marriages† (Corcoran 1997) ending in divorceRead MoreThe Effects Of Stress On Infants And Young Children1711 Words   |  7 Pagesour environment shapes us is through stress, either experienced directly or indirectly. Stress is a complex physiobiological response that can have enduring biological, emotional, and behavioral consequences (Lupien et al, 2009). A fetus is sensitive to hormonal and other physiological indicators of stress within the womb and exposure to stress carries on after conception and continues to affect emotional and cognitive functioning of infants and young children. Similar to many other psychologicalRead MoreEffects of Non-Normative Life Events on Preschool and Middle Aged Children; Cognitive and Socioemotional1627 Words   |  7 PagesEffects of Non-Normative Life Events on Preschool and Middle Aged Children; Cognitive and Socioemotional. This paper is intended to answer the question of what the effects are of non -normative life events on preschoolers and middle childhood aged children; cognitively and socioemotionally. This is very dear to me as I have two young children as well as older step children that have dealt with medical conditions with their father and I, as well as divorce with my older step children. ManyRead MoreThe Effect on Smoking Cigarette Banned in Public Essays1282 Words   |  6 Pagesrisk of dangerous drugs that cause the disease to the body of smokers and people who live nearby. Currently, there are many more smokers are aware of the adverse effects of smoking. But the number of smokers is still increasing. Especially worrisome and continue to cause adverse effects in both polite society and the environment. Smoking is much more to keep the population down to health problems and premature death. Of death, with smoking rates higher than other causes of death combined, includingRead MoreDivorce : The Effect On Children1084 Words   |  5 PagesHalterman Professor Tausch CTI 102 D Written Communication 4 October 2014 Divorce: the Effect on Children In today’s society, divorce has become a normal occurrence. Married couples today are getting divorces due to many different reasons; conflicts in the marriage, a loss of romantic feelings, perhaps a spouse is having an affair, or other types of problems. Most divorces have children that are really young and due to their age, they do not have any idea how to deal with this type of situationRead MoreAll around the world domestic violence is a threat to all different types of families, including1000 Words   |  4 Pagestypes of families, including children and adults. â€Å"It is estimated that approximately 3 million incidents of domestic violence are reported each year in the United States† (Feinstein). The most common victims of domestic violence are women, and children. Organizations that offers protection for victims includes: National Network to End Domestic Violence, Survivor Network, and National Council on Child Abuse and Family Violence. Domestic violence can have negative effects on people causing; emotional

Sunday, December 15, 2019

A Fine Balance Characters Free Essays

4 Characters: Dina, Ishvar, Om, Maneck. Ishvar is Om’s nephew. Dina is widowed. We will write a custom essay sample on A Fine Balance: Characters or any similar topic only for you Order Now Maneck college student. Dina Shroff, who was raised by her strict brother after her father died she meets Rustom Dalal. The couple fall in love and marry, but on their third wedding anniversary Rustom is killed in a bicycle accident, leaving Dina alone. Rustom’s aunt teaches Dina to sew her eyesight begins to fail, so she is forced to find another way to make money Her friend Zenobia introduces her to Mrs Gupta, who offers her some tailoring piece work She hires Ishvar Darji and his nephew Omprakash, originally from a small village, to do the work. Ishvar’s father wanted a better life for his sons and so sent them to a neighbouring town to learn to be tailors They became the apprentices of Muslim tailor Ashraf Ishvar was seventeen, racial hatred of Muslims reached boiling point and any homes or shops belonging to Muslims were burnt to the ground Ishvar and his brother Narayan saved Ashraf’s shop by claiming it belonged to them, leaving Ashraf forever in their debt. Narayan returned to the village and set up a successful tailor business for lower caste people He married and had a son. His business was very successful and it gave him enough money to build a proper house All was going well until Narayan discovered that the elections were being fixed by Thakur Dharamsi, a powerful land owner Narayan confronted Thakur, who had him tortured Not satisfied with just killing Narayan, Thakur decided to punish his whole family. Narayan’s wife, daughters and parents were tied up and burnt alive in their home. Omprakesh and Ishvar were the only ones to escape they continued working in their tailor shop, but were forced out of business when a ready-made clothing shop opened in the town. Maneck. He grew up in a mountain village, where his father was the proud owner of the local village store and inventor of a popular drink, Kohlah Cola Maneck was sent to college and became good friends with the student president, Avinash Avinash led an uprising against the conditions and became involved in politics When the Emergency was declared, Avinash had to go into hiding, leaving Maneck alone His mother then arranged for him to move in with Dina Dalal The four are quite happy for almost a year, but then the Emergency starts to impact their lives. The tailor’s shack is demolished in a government beautification program, forcing them to live on the streets After two months they bribe their way out and persuade Dina to let them move in with her. Ishvar decides it is time for Om to find a wife, so they return to Ashraf’s town There they bump into Thakur, who recognises the pair Ashraf is beaten to death and Ishvar and Om are given compulsory vasectomies Thakur visits them as they are recovering from the operation and arranges on a medical pretext to have Om’s testicles removed. Ishvar’s legs become infected and have to be amputated. Maneck finishes his college course and returns home His father’s business is failing due to cheap imports of commercial soda, and Maneck decides to leave, taking a job in the Middle East. Dina finds herself all alone. A Beggarmaster who had been protecting her from her landlord’s bailiffs is murdered, leaving her vulnerable; she reluctantly returns to live with her brother. Eight years later, Maneck returns home for his father’s funeral. Maneck reads some old newspapers and discovers that Avinash was found dead by the side of a railway track and Avinash’s three teenage sisters hanged themselves because their parents could not afford their wedding dowries. Maneck decides to visit Dina She explains that Ishvar lost his legs and that the tailors are now beggars Maneck leaves Dina’s house, pretending not to recognize the tailors in the street, and heads for the railway station where he steps in front of a train. How to cite A Fine Balance: Characters, Papers

Saturday, December 7, 2019

Computer Security for Attack Experiences - myassignmenthelp.com

Question: Discuss about theComputer Security and other Issues for Attack Experiences. Answer: Attack Experiences A friend described to me an instance when the bank he was working for was hit by a cyber attack two years ago. The criminals posed as clients, who wanted to open a bank account. They persuaded the accounts opening officer to plug in a disk drive in to his computer so that he could download the clients documents and images. The flash disk was infected with a virus which quickly spread to the other computers in the organization, attempting to hijack core banking credentials and other information. The attack did not inflict any type of damage since the IT department was fast in arresting its spread. At the same time, the bank was hesitant to divulge any details because they feared it would affect the trust customers had in them. The attack was mainly successful because the customer service agent was not following the company policy regarding the use of disk drives, regardless of whether they were personal or from third parties. The company could have blocked disk drive access from the computers to further ensure that people who failed to follow policy did not hurt the companys interests. The computers which were affected by the attack were quarantined and taken off the network, as IT auditors ascertained the extent of the spread. Thereafter, an antivirus capable of neutralizing the threat was procured and applied on the infected computers, as well as the network. The security system used by the company was also reviewed. Had the employee in question and other received thorough training on the danger that such devices posed, it is likely that the attack could have been prevented. The attack could also have been prevented through the use of software that blocks disk drive access to the computer, requiring the customers to bring their documents in hard copy or have photos taken at the bank. Ransomware Attacks The Wannacry, Petya and NotPetya ransomware attacks have recently hit the global computer networks, affecting systems from Ukraine to the United States and Australia. The attacks were able to get into the computer systems of government bodies and companies, lock them and demand payment to reopen them or decrypt data they held. The payment demand was in terms of bitcoins, to reduce the chances of being tracked down. The ransomware was highly successful, at least in terms of how fast and wide they spread. It was aided in this by the fact that it was highly sophisticated, the tools used to make it being stolen from the NSA. They used the vulnerabilities found in Microsoft Windows to bypass security systems, and used emails as one of the tools of spreading, making its pace fast and not easily detectable. According to information released by Kaspersky after the third attack, NotPetya, all companies were advised to update their security systems and operating systems. This was based on the belief that vulnerabilities which had since been fixed (before the attack) were used to hijack computers. Users were also warned not to open any emails they found suspicious while reviewing their security setup frequently. The perpetrators of the attacks demanded a payment in bitcoins be sent to them o that they could then give the victim a code to decrypt the files in their computers. Kaspersky and other computer systems security companies soon issued decryption tools to get rid of the ransomware. The decryption tool would roll back the effects of the ransomware, though this is an extensive process owing to the complex nature of the attack itself. Zero-Day Attacks The ransom ware described above Wannacry, Petya and others can also qualify as being zero-day attacks. The attacks were able to find vulnerabilities in Windows operating systems, which had not been patched before. The vulnerabilities were discovered by research going into years, and initially performed by the NSA. The NSA later lost these tools and information on the vulnerabilities, which were then used to fashion highly complex hacking tools in the form of the afore-mentioned ransomware. Other software has also come under attack. For instance, adobe flash player was the victim of attacks which had discovered a weakness in its code, which was then exploited before a patch could be developed by the company. The malware was discovered by actions of hackers who must have spent a considerable amount of time examining the code looking for possible loopholes to exploit. In early 2017, FireEye discovered an attack used to attack computer systems using vulnerabilities in Microsoft office. This attack was addressed in conjunction with Microsoft to coordinate a response. In 2015, FireEye also discovered an attack directed at Windows to steal credentials, the malware would hijack the system and encrypt data with a financial objective. To defend against zero-day attacks, computer services companies such as Adobe and Microsoft frequently release patches so as to address any vulnerability. Upon release, it is the duty of the user or company to ensure the patches have been run. Organizations can also do frequent checks on their computer systems with the aim of discovering any vulnerabilities, or attacks being perpetrated with the use of these vulnerabilities. Antivirus comparison Antivirus Provider Features Mcfee Mcfee (free) Norton bit defender Firewall Yes Yes Yes Yes antispam Yes Yes Yes Yes parental control NO Yes Yes Yes Backup NO NO Yes no Currently, I use a free antivirus, AVG it has a few features which I admire, and work for me. The antivirus I use is light on the computer. It does not affect the normal operations of the computer, though it extends the switch off time and reboots too. It has capabilities to protect against many forms of malware, including phishing and other malicious attacks, while also having an easy-to-reach support center. It does not have a parental control or backup mechanism, which I think is a disadvantage. I have to run back-up manually, as opposed to Norton which enables this remotely. I would recommend Norton to users. It costs around 50 dollars for an annual subscription. It has several features which I think are great to have on a computer, while the price is not prohibitive. The free Mcfee also comes with several features, all for free. It is important to note that free antivirus has several limitations, especially when it comes to online protection. Again, Norton is best equipped to handle such threats. Blowfish Blowfish has held the reputation as one p0of the few whose code has never been cracked, since it was first launched in 1993. Blowfish has several strengths apart from this. Blowfish is designed to use a 448-bit key. The key can be cracked. However, it would take an impractical amount of resources, including time and equipment to break it. According to some estimates, millions of years would pass before the code is cracked. The only other avenue is trying lucky numbers, which is not an effective method of trying to break the code. By comparison, most browsers use keys which are either 40-bit or 128 bit. While the 128-bit key is considerably strong and hard to break, the 40bit key can be cracked through the use of a personal computer, and within hours. While other block ciphers are patented and sold, Blowfish is free, meaning that it is easier to access and use. This has helped enhance its spread among users around the world. Blowfish has its weaknesses. It is an old code, having been designed in the pre-2000 era. It was not made for some of the modern threats that computer advances have brought about. The creator of the tool has since been able to create a replacement, Twofish. The cipher is more difficult to crack, especially in instances where previous versions of Blowfish, such as the 40 and 64-bit version were susceptible to attack. The cipher is used currently to secure browsers among other security applications. Key Management Life Cycle Key Management Life Cycle diagram Destruction Archival Expiration Rotation Monitoring Deployment Backup CREATION The Key Management Life Cycle includes the steps outlined in the diagram and better annotated below. A key should be valid depending on its length. The longer it is, the longer the lifespan. Both the organization and the user have a shared responsibility to secure the keys. Creation - A key is generated by the key manager or a trusted third party. The attributes of the key are then stored in a special database, which is also encrypted. A keys activation happens automatically or manually, or it can be timed to activate at a point in time. Backup This involves storing a copy of the key in case of future loss or other instances. The process also includes encryption and storage. Deployment Deployment refers to the time when the key is being applied to secure the device in question. Prior to deployment, the key is additionally tested to ensure operations are compatible with other system properties, and avoid data loss or theft. Monitoring Monitoring the key is necessary to assess its success for the role it is supposed to perform. Rotation During rotation, the key encrypts all the data it should, this process is intensive and very important. Expiration Key rotation completion may signal the start of the end for use of the key. This also depends on the life cycle of encrypted information. Highly sensitive data also force keys to be in operation for a shorter time. Archival Archival of the key happens after it has been expired. This is done to for record keeping and for future instances when the encrypted information may be needed Removal form service the life of a key ends when it is destroyed, deleted or terminated. Network Firewall Comparison Fortinet Cisco FireEye Rule-based or application-aware Application-aware Application-aware Application-aware stateless or stateful filtering stateless stateless stateful Content filtering yes yes no IDS/IPS IPS IDS IDS Costs 1195 1500 9600 In view of the information outlined below, Cisco may be the best buy. It has a recognized name in the market and offers competent support. While FireEye also does the same, its price range is too high; though it could also be attributed to the value it brings the user, in terms of enhanced security, ease of use and ability to understand t more swiftly than the other two options. Case Project 8-5: Cloud Computing Benefits Cloud computing benefits Cloud computing is becoming more common in organizations. It allows for efficiency, while saving costs, especially since organizations no longer need to have physical servers to store and process information Vendors features and costs Vendor IaaS PaaS SaaS Storage Amazon EC2 (Elastic Cloud Compute) Amazon Web Services* Amazon Web Services* S3 (Simple Storage Service) Google n/a Google App Engine (Python, Java, Go) Google Aps Google Cloud Storage HP Enterprise Services Cloud Compute Cloud Application Delivery HP Software as a Service Enterprise Services Cloud Compute IBM SmartCloud Enterprise SmartCloud Application Services SaaS products SmartCloud Enterprise object storage Cloud computing and storage of learning material Cloud computing and storage can be applied in the storage and processing of academic material such as lectures and notes. The information would be quickly accessed by both lecturers and the students through protected accounts to the system. Cloud computing is feasible in this case because it may not be possible to store the information locally and have students access it through an intranet or specific computers. It is therefore important for the school to enhance efficiency by adopting cloud computing.