Friday, October 25, 2019
Fredrick Douglass Essay example -- Biography Biographies Bio
Frederick Douglass, an abolitionist who altered America's views of slavery through his writings and actions. Frederick's life as a slave had the greatest impact on his writings. Through his experience as a slave, he developed emotion and experience for him to become a successful abolitionist writer. He experienced harsh treatment and his hate for slavery and desire to be free caused him to write Narrative of the Life of Frederick Douglass. In his Narrative, he wrote the story of his miserable life as a slave and his fight to be free. His motivation behind the character (himself) was to make it through another day so that maybe one day he might be free. By speaking out, fighting as an abolitionist and finally becoming an author, Douglass's transformation from a slave into a man. In a preface of Douglass' autobiography, William Lloyd Garrison writes, "I am confident that it is essentially true in all its statements; that nothing has been set down in malice, nothing exaggerated, nothing drawn from the imagination; that it comes short of the reality, rather than overstates a single fact in regard to SLAVERY AS IT IS."(Garrison, 34). The significance of this statement validates and promises that Douglass' words are nothing but the truth. This made the narrative more marketable to the white audience and people were listening. Douglass realized that he did not need assurance from white people to be respected. That's why he addressed his master for all the wrong things done to him. Slaves are looked as not human. Douglass completes his journey from slave to man when he creates his own identity. He speaks out, fighting as an abolitionist and finally becoming an author. Douglass tells his story not simply as a search for fr... ...e torture and pain of slavery, he had an excellent reason to fight for the abolitionist movement. He became successful in his fight against slavery. His works documented the rise of a slave to a free man, to a respected speaker, to a famous writer and politician. In his narrative, Douglass simplifies his experience to that of other slaves showing the cruelty, psychological and physical struggle of slaves. Douglass went through several life changes, from being a slave to having freedom. He went from the south to the north, from a young man to a well known and respected speaker. This man helped America come to terms with slavery which was an important factor in the abolitionist movement. Works Cited Frederick Douglass, Narrative of the Life of Frederick Douglass, An American Slave, Written by Himself (New York, N.Y.: W.W. Norton and Company, 1997).
Thursday, October 24, 2019
Information security system
What is the OSI security architecture? Ans) A Systematic way of defining the requirements for security and characterizing the approaches to satisfying them is generally defined as ââ¬Å"OSI security architectureâ⬠. This was developed as an international standard. Focuses of OSI Security Architecture: 1) Security attacks ââ¬â action that compromises the security of information owned by an organization. 2) Security mechanism ââ¬â designed to detect, prevent, or recover from a security attack. ) Security service ââ¬â intended to counter security attacks. 1. ) What the difference between passive and active security threats? Ans) Passive Threats makes attempt to learn or make use of information from the system but does not affect any system resources whereas active threats involve modification of the data stream. So in passive attack a hacker intrudes your system, and waits for some valuable information. In an active attack a hacker tries to get the valuable information by using his abilities rather than depending on the stupidity of the victim.Example for passive attack: A key logger which sends the input given by the victim to a hacker via a network (LAN). Example for Active attack: Using Brute force to crack the password of a system. 1. 5) List and briefly define categories of security service Ans) The major categories of security service are namely: Confidentially: The protection of data from unauthorized disclosure by encryption and decryption-preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.Authentication: The assurance that the communicating entity is the one that it claims to be. The problem of authorization is often thought to be identical to hat of authentication; many widely adopted standard security protocols, obligatory regulations, and even statutes are based on this assumption. Integrity: The assurance that data received are exactly as sent by an authorized entity.End user will receive what is sent-guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity Access control: The prevention of unauthorized use of a resource means this service controls that have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do.Ability: Time for access-ensuring timely and reliable access to and use of information Availability: The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. Nonrepudiation: Provides protection against denial by one of the entities involved in Chapter 2: 2. 2) How many keys are required for 2 people to communicate via a symmetric cipher? Ans ) Only one key is required for 2 people to communicate via a symmetric cipher. The key distribution will send the same k ey/ single key for encryption and ecryption process. . 9) List and briefly defines three uses of a public key cryptosystem Ans) Encryption/decryption: The sender encrypts a message with the recipient's public key. Digital signature: The sender ââ¬Å"signsâ⬠a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message. Key exchange: Two sides cooperate to exchange a session key. Several different approaches are possible, involving the private key(s) of one or both parties. 2. 10) What is the difference between private key and a secret key?Ans) Secret key is used in symmetric encryption. Both sender and receiver have obtained copies of a secret key in secure fashion and keep the key secured. The private key is used with public key in asymmetric encryption. The sender will send encryption document with the receiver public key, then the receiver will decrypt the document with h is/ her private key. The ââ¬Å"private keyâ⬠is not shared with anyone. The secret key must be transmitted to or shared with all parties by a method outside the communications link it is intended to secure. 2. 13) How can public key encryption be used to distribute a secret key?Ans) Several different pproaches are possible, involving the private key(s) of one or both parties. One approach is Diffle-Hellman key exchange. Another approach is for the sender to encrypt a secret key with the recipient's public key. The key distribution uses the asymmetric encryption to send secret key to the receiver by her/ his public key. Then the receiver will use his/ her private key to decrypt to get her/ his secret key. Problem: 2. 9)Construct a figure similar to figure 2. 9 that includes a digital signature to authenticate the message in the digital envelope. Sol) We can Show the creation of digital envelope as a solution.
Wednesday, October 23, 2019
A management meeting Essay
Locate and book room/s with suitability for the meeting (teleconference facilities, IT equipment etc). Ideally, 1 large room with 3 smaller meeting rooms for the group activities later in the day. Seating would need to be arranged as there will be people on teleconference, they will need to hear anything being said in the meeting. 2. Send out meeting invites to all attendees. This would list the venue, date and time, speaker, contact details. An agenda of the meeting would be the best way to send out these details as it lists all that information and lets attendees knows how the meeting will be run. 3. Any travel/accommodation for interstate attendees would need to be arranged. Also the same for the guest speaker (if needed). Transfers to and from the airport would be advisable. 4. They would need to ensure if there are any special requirements for the attendees (dietary, mobility, language etc.) and make special arrangements if anything is required ââ¬â Vegetarian food, wheel ch air access, interpreter etc. 5. Arrange IT equipment to be made available for presentation. This could be either through your company if they have the available resources. If not, they may be available already in the meeting rooms you have booked or you could us a 3rd party. 6. Lunch will need to be ordered. Again this may be able to be arranged with the meeting rooms you have booked or you can organize a local caterer. At the same time you could organize refreshments for afternoon tea (and morning tea if required). 7. Ensure all stationary available and if not it will need to be ordered. This could also be for group training later in the day. Butcher paper, whiteboards etc. could all be used if itââ¬â¢s a brainstorming session. 8. Name tags could be organized if managers do not know each other and also may help the presenter for the group meetings. 9. On the day of meeting, all IT equipment should be tested prior to the meeting taking place. Room should be set up according to needs and re-arranged if itââ¬â¢s not correct. 10. A chairperson would need to be selected to run the meeting. The CEO will be the chairperson for this meeting. As the chairperson, they would need to ensure the meeting runs on time, stays on topic and stick to the agenda. 11. The chairperson (the CEO in this case) would need to select a minute taker ââ¬â this could be a PA orà someone else from the company. It would be helpful if they have taken minutes before or at least are capable of recording a high level of detail at a high pace. They could either take 12. minutes in short form at the meeting and expand on it after or type directly to a PC in the meeting and print out directly after the meeting to be review. 12. Prior to the meeting, the CEO and selected minute taker would need to sit down and discuss what will be spoken about in the meeting, the order of events and just a brief overview of all the key points that will need to be recorded. This way the minute taker knows what they should be focusing on when making notes. 13. Once the meeting is finalized the minutes of the meeting will need to be read through and expanded into a format that can be distributed to all attendees and anyone who may benefit from them. It would be best for the CEO and the minute taker to go through these soon after the meeting to ensure the notes are correct and no key points or discussion points are left off. Once they have had a chance to go through the notes ââ¬â the minute taker can put into a format which the company uses and can then look at distributing via email, fax or mail. This is also best to be done as soon as they can so it is fresh in everyoneââ¬â¢s mind. The minutes from this meeting (and others) should be stored electronically so they can be referenced to in future meetings if needed. 14. All the bookings/arrangements need to be checked off to ensure they are still booked/on time and that no problems are going to arise. This could be done by either the CEOââ¬â¢s PA or generally it would be organized and checked by the Marketing department for the company as they deal with these things on a day to day basis. They would need to call the caterers, travel agents, taxi companies, audio visual people and meeting facility to ensure everything is ok ââ¬â this needs to be done around 2 days before. Any earlier and there could be problems between when you call and the actual function ââ¬â any later and if any problems arise it could be too late to make alternative arrangements. 15. From the minutes of the meeting, reports may need to be created to be handed out to relevant employees of the firm. These may have the same details as what is in the minutes but in a more condensed format. It may also include graphs if figures/dates were mentioned and tables to make it easier to understand. They could also include any tasks that haveà been assigned so people know who needs to be followed up.
Subscribe to:
Comments (Atom)