Thursday, December 26, 2019
Madness In Hamlet Essay - 869 Words
Confused to Deathâ⬠¦? Baffled by the unconventional events taking place in the castle of Elsinore, Denmark, the ordinary commoner might see the royal family as disturbed and in need of an intervention. In Shakespeares Hamlet, the main character, Hamlet, decides to fake his own derangement in order to prove his uncle Claudius guilty of the murder of his brother, King Hamlet. To avoid anyone discovering him, he maintains his crazy act in front of his own love interest, Ophelia, perplexing her to the point of lunacy. One of the main contributors to Opheliaââ¬â¢s authentic madness is Hamletââ¬â¢s pretense of insanity, leading to both Hamlet and Opheliaââ¬â¢s ultimate defeat. From the ââ¬Å"big-pictureâ⬠point of view, it may seem that Hamlet has genuinely goneâ⬠¦show more contentâ⬠¦In contrast to Hamlet, Ophelia did in fact go crazy for many reasons, one being Hamletââ¬â¢s madness. After ââ¬Å"going mad,â⬠Hamlet taunts Ophelia numerous times when he says things like, ââ¬Å"I could interpret between you and your love,/ if I could see the puppets dallyingâ⬠(â⦠¢.â⦠¡). It is Hamletââ¬â¢s statements that leave Ophelia embarrassed and confused, which eventually lead her to madness. She becomes so distressed by the thought of Hamletââ¬â¢s incapability to love her back. When Ophelia went mad, even a gentleman just passing by noticed how ââ¬Å"she speaks things in doubt,/ that carry but half sense. Her speech is nothingâ⬠(â⦠£.â⦠¤). When Ophelia loses it, she really goes insane. Her words only make sense ââ¬Å"halfâ⬠of the time as if she is only half there in her brain as well. Ophelia is pitied by most people who come into contact with her and when she dies, Gertrude justifies Opheliaââ¬â¢s death by saying that she was ââ¬Å"incapable of her own distressâ⬠(â⦠£.â⦠¦). The amount of pity that Ophelia received is so much that ââ¬Å"Poor Opheliaâ⬠is mentioned twice in act fo ur. While Opheliaââ¬â¢s madness becomes a pity party, Hamletââ¬â¢s madness is seen as strange and unusual. Ophelia became mad because of her confusion inflicted by Hamlet. Both charactersââ¬â¢ actions, out of madness or not, lead to their ultimate defeat. Observing Hamletââ¬â¢s behavior, Ophelia says that he is acting ââ¬Å"as if he had been loosed out of hellâ⬠(â⦠¡.â⦠). Confused about his strange acts, she even wondered if he had been possessed. WhatShow MoreRelatedThe Pretended Madness of Hamlet in Hamlet Essay761 Words à |à 4 PagesIn Shakespeareââ¬â¢s Hamlet, the main character Hamlet is believed to have gone insane after the death of his father. There is much evidence in the play that causes one to believe that Hamlet is in fact crazy. However, there are also indications to the contrary, Hamlet only feigns madness for the purpose of carrying out his mission. He rehearses his pretend madness first with Ophelia for even if he fails to convinc e her , that failure would not cause him any harm. The language he uses is clearlyRead MoreEssay on Hamlet Madness Analyzed630 Words à |à 3 Pages16, 2012 AP Literature Free Response 2001. One definition of madness is ââ¬Å"mental delusion or the eccentric behavior arising from it.â⬠But Emily Dickinson wrote ââ¬Å"Much madness is divinest sense to a discerning eye.â⬠Novelists and playwrights have often seen madness with a ââ¬Å"discerning eyeâ⬠. Select a novel or play in which as characterââ¬â¢s apparent madness or irrational behavior plays an important role. Then write a well-organized essay in which you explain what this delusion or eccentric behavior consistsRead More Shakespeares Hamlet - Observations of Madness Essay2629 Words à |à 11 PagesHamlet: Observations of Madness One of the most analyzed plays in existence is the tragedy Hamlet, with its recurring question: Is Hamletââ¬â¢s antic disposition feigned or real? In truth, this question can only be answered by observing the thoughts of the main characters in relation to the cause of Hamlet real or feigned madness. In the tragedy Hamlet, each of the main characters explains Hamlets madness in their own unique way. To discover the cause behind the madness ofRead More Madness and Insanity in Shakespeares Hamlet Essay3091 Words à |à 13 PagesHamlet and Insanity à à à à William Shakespeareââ¬â¢s creation of the character of Hamlet within the tragedy of that name left open the question of whether the madness of the protagonist is entirely feigned or not. This essay will treat this aspect of the drama. à George Lyman Kittredge in the Introduction to The Tragedy of Hamlet, Prince of Denmark, explains the lack of success with Hamletââ¬â¢s pretended insanity, and in so doing he implies that the madness is entirely feigned and not real:Read MoreHamlet Relationships And Madness Essay1246 Words à |à 5 PagesRelationships and Madness A few of the characters within the play Hamlet showed signs of madness. The characters went mad due to the antagonizing relationships they had with other characters; the madness within the play created a chain reaction among the characters. In the end, the charactersââ¬â¢ madness led to their own and others untimely demise. Claudiusââ¬â¢ jealousy of Hamlet senior began his downward spiral to madness. Claudiusââ¬â¢ lust for Queen Gertrude, his brotherââ¬â¢s wife, led to him killing Hamlet seniorRead MoreHamlet and Opheliaââ¬â¢s Madness Essay674 Words à |à 3 PagesThe Tragedy of Hamlet, Prince of Denmark is one of Shakespeareââ¬â¢s most tragic plays. Most of the characters in this play suffered a heartbreaking death, although, all of the characters faced anger, regret, madness or distress. Madness was a reoccurring theme in this play, two characters portrayed this more than others. Ophelia and Hamlet faced similar fates, with similarities and differences along the way, all to do with their madness. Hamlet and Ophelia were two young people in love and were supposedlyRead MoreEssay A Study of Madness in Hamlet1843 Words à |à 8 PagesStudy of Madness in Hamlet I think that one of the most poignant themes of Hamlet is the presentation and importance of madness. We first see a glimpse of madness with Hamlet who pretends to be mad, using it as a cunning mask while he battles with his own mind and conscience over the idea of revenge. There is also the character of Ophelia who turns mad with grief when she hears of her fathers death. Although while Hamlet is holding up this pretence of madness he slowly Read MoreHamlet, Madness or Sanity Essay953 Words à |à 4 PagesHamlet, Madness or Sanity Hamlet, by William Shakespeare, is about a young prince who wants revenge when he learns about the murder of his father. As the play begins, Hamletââ¬â¢s character appears to be a normal, sane person. Moving through the acts Hamletââ¬â¢s personality changes from normal to depressed. There are hints of insanity that try to convince people Hamlet is ââ¬Å"madâ⬠. Others might say that Hamlet is faking madness to pursue his goal of revenge. First, he sees a ââ¬Å"ghostâ⬠that tells Hamlet whoRead MoreHamlet- Truly Mad, for Freigned Madness? Essay1237 Words à |à 5 PagesHamlet Essay- Truly Mad, for Feigned Madness ? Throughout Shakespeareââ¬â¢s play, Hamlet, the main character, Hamlet, must seek revenge for the murder of his father. Hamlet decides to portray an act of insanity, as part of his plan to murder Claudius. Throughout the play, Hamlet becomes more and more believable in his act, even convincing his mother that he is crazy. However, through his thoughts, and actions, the reader can see that he is in fact putting up an act, he is simply simulating insanityRead More Insanity in Shakespeares Hamlet - The Madness of Hamlet Essay2270 Words à |à 10 PagesThe Madness of Hamlet à William Shakespeare, in the tragedy Hamlet, designed two characters who exhibit symptoms of madness: Ophelia and the prince. Hamlet states his own madness as intentional, purposeful, for the carrying out of the ghostââ¬â¢s admonition. But does Hamletââ¬â¢s pretended insanity actually touch on real, actual insanity from time to time, or is it consistent? Phyllis Abrahms and Alan Brody in ââ¬Å"Hamlet and the Elizabethan Revenge Tragedy Formulaâ⬠consider the madness of the hero
Wednesday, December 18, 2019
Mariah, by Che Husna Ashari - 807 Words
Mariah by Che Husna Azhari Introduction Mariah is a short story written by Che Husna Azhari who is a prominent Malaysian writer of literature. She received a degree from Tunku Khurshiah College, Seramban in 1973, and her A Levels from Oxford College of Further Education in 1975. In 1979, she received a degree from Brunel University of West London in Polymer Technology. In 1985, Che Husna was awarded a PhD in Response Engineering from Brunel University of West London. Che Husna is a Professor at the Faculty of Engineering and Built Environment, at Universiti Kebangsaan Malaysia, specializing in non-metallic materials processing. She also serves as the Director of the Center for Corporate Planning and Communications at that university.â⬠¦show more contentâ⬠¦In this story, issue of polygamy is not a big issue. However, the issue of polygamy is important in this story when it is about Cik Yam decision, whether she want to give permission or not to let the polygamy between herself and Mariah. Character Mariah A beautiful widow Usually wears Baju Kebaya Sells Nasi Berlauk in Molo Admired by men in her village Pak Imam A pious man Respected by all people in the village Husband of Cik Yam Friend of Che Gu Leh Fell in love with Mariah Cik Yam Wife of Pak Imam Characterized as perfect wife based on the sentence ââ¬Å"The Imam looked at his wife with obvious pride. There was not a living man in Molo who did not envy him for having such a devoted wife.â⬠Barren according to Pak Imam ââ¬Å"Why couldnââ¬â¢t his wife bear children like other women? Some women, it seemed, have the fecundity of rabbits, but not his wife.â⬠- Very devoted and loyal to Pak Imam A former politician. Plot The story begins with the exposition of the main character who is Mariah as the beautiful Nasi berlauk seller. It describes how Mariahââ¬â¢s beautiful figure appears as she walks as in ââ¬Å"all eyes were transfixed on a figure coming through the entrance. It was the figure of a woman. She was delicately balancing two huge basins on her head, her hips swaying gaily to and fro with the rhythm of the balancing. That particular
Tuesday, December 10, 2019
Implementation Of A BYOD System In Aztek â⬠MyAssignmenthelp.com
Question: Discuss about the Implementation Of A BYOD System In Aztek. Answer: Project Review The project involves implementation of a BYOD system in Aztek which is a financial organization from Australia. The company is facing financial challenges and is looking for saving IT costs by allowing personal devices of new employees to be used for the purpose of business. Thus, the company has decided to adopt BYOD systems but this approach is likely to modify the security posture or the organization. To remain safe from cybersecurity risks, company would need to strengthen its security systems to suit the security needs after BYOD adoption. The project would involve development and implementation of BYOD scheme(ACHS, 2013). With implementation of the BYOD scheme, some regulatory policies and procedures have to be followed. Australian Capital Territory of Australia is one of the main areas where regulatory policies are defined. At the organizational level, policy based surveillance can track employee communication such that the management would know how employees are using their systems and if their usage patterns are secure for Aztek (GILBERT, 2014). There are also some laws at the state, federal and territory levels that have to be followed when concerning employment in the organization. At the organizational level, Aztek can install access control systems on the devices used by users such that the employee communication can be tracked and monitored. This would help Aztek ensure that the confidential data of the company is not shared by employees outside the company. A cover surveillance can be launched on employees which would allow company to track the suspected employee after 14 days notice given(APM Group Ltd, 2017). NSW Act is one such act which is created for governance of employee management practices. As per this act, employee activities can be tracked including sending and receiving of files or messages but only on the official accounts. The personal accounts and the resources used by employees may not be tracked(Afaq, et al., 2014). Another useful act is Telecommunications (Interception and Access) Act 1979 . This act talks of the interception by companies on the employee communication between two employees which is done without the knowledge of both employees. The act allows employers to see the content that is being exchanged but not the related personal information such as email addresses, communication time, and the metadata. The way this interception can be carried out is highlighted in the section 5F of the telecommunications act. This provides protection to the employers but only to some extent (Berg, 2010). A usage policy can be created for IT assets in the BYOD scheme which is formulated as per the rules defined in the regulatory acts which would include considerations of types of surveillance, methods of tracking, and span of interception The Privacy Act (APP 5) suggests following statements can be included in such a policy (Alali Yeh, 2012): The company must have the right to see the content that is being transferred between two employees using official emails Employer must not record any personal communication happening between employees through informal methods like chat Employees must be aware of the information that is open for the employer to see. Certain procedures and access rules can be defined for personal communication The company should have defined procedures that would be used for reporting data inside or outside the organization (GILBERT, 2014) Security Posture of Aztek With the introduction of the BYOD devices in the Aztek IT network, the security posture of the company would be modified as the private devices of the users would now be connected to the critical infrastructure of the organization. There would be added risks because of addition of BYOD which would change this posture. Thus, the company needs to make considerations for these risks while defining security management strategies for the IT systems of Aztek (Avdoshin Pesotskaya, 2011). Finance industry poses some barriers to implementation of BYOD as security risks are higher in the cases. To manage these risks, industries and regulatory bodies in various countries have identified certain security procedures and Aztek needs to follow them for enhance protection. However, regulatory bodies also has certain mandates that would make it difficult for Aztek to keep a high level of control over the mobile devices used by its employees especially when they would be used outside the corporate network. The companies in the finance industry use certain protection measures for BYOD devices such as (Oracle, 2009): Securing Mobile Devices: Earlier, company had given mobile phone devices to its employees and these devices were procured from the same manufacturer and thus, had same make and features. This made it easy for Aztek to create a unified interface for controlling all the devices remotely and establish standard usage procedure. With BYOD devices in the IT infrastructure of the company, the device configurations make and features would not remain same but would vary significantly and thus, a single unified system cannot be used for controlling or securing these devices(ACHS, 2013). The company would need to consider the change device portfolio while defining security strategies for mobile systems which would be more challenging. The earlier system used for security by Aztek would no longer be able to support the multiple devices belonging to different users who could be having different settings used and applications installed. The current device management system of Aztek would not be su fficient as it would not be able to manage the vulnerabilities and thus, a new measure is needed (Bodicha, 2005). Aztek can lock the mobile devices for personal uses such that employees would not be able to misuse those posing threats to the security of companys infrastructure. However, this would discourage employees from using their devices if they would not have freedom of usage of their own deice. Thus, a new approach that is acceptable to both employers and employees has to be arrived at(Bhatta, 2008). Some risks can be faced predominantly in case BYOD devices are used as the part of IT infrastructure of Aztek such as lost or stolen devices, physical access gained by a non-company person, lack of awareness of security implications leading to misuse of devices by employees, and more. If the devices are lost or stolen, any one getting the device can use it for connecting to the company network through VPN which would make it also possible for the user to gain access to the confidential information of the organization which can be dangerous for the company. In such cases, security can be enhanced with pass encryption but even that can be cracked at certain stage(APM Group Ltd, 2017). Thus, the company needs to have a system in place which allows remote wiping of the device from the company network so that the user would not be able to connect to organizational applications remotely. This would reduce the chances of damage from the stolen device(Rule Works, 2017). There could also be instances that attackers get the device in hand inside or off the office premises in which case, the risk would be even more. In the case, the device used is old then the security threat would rise even more. As the device has been chosen for office use by employee, the company would not have any control over the device age, specifications or configuration settings unless a BYOD policy defines a minimum configuration that a device must have to be used for the official purpose by the employees(CDC, 2006). When employees are using their own personal devices, they want to have more control over it than the company which is why they may change the settings suggested by company to enjoy freedom of usage. This can result into disabling of some essential security feature thereby increasing risk to the employer. An employer may not have the awareness of the change and can fall prey to security hassles because of reduced protection level(Campbell, 2005). Some key measures can help company enhance its security posture with the use of BYOD devices such as: Identification of risk scenarios for each device considering its configuration Use of device management for enforcing security policies(Afaq, et al., 2014) Using industrial security standards like data encryption, remote wiping, and communication interception Establishing a baseline for installation of software and use of operating systems on the mobile devices used by employees(Chan, Lam, Chan, Cheung, 2008) Managing Application related Risks: If malicious software applications get installed in the mobile devices due to some mistake of an employee or by others having access to the device, it would risk the security posture of the company as the hacker can launch attack on the critical infrastructure of the company by connecting through VPN using the device. Every device that is configured in the corporate network must be protected with an anti-virus and anti-malware for which the company can include mandatory measures for their installation in the company policy(Alali Yeh, 2012). Moreover, it is essential that the devices are managed well by the users failing which the company would face larger risks. Compartmentalization of the company data on devices can help reduce risks further (HP Enterprise, 2015). Managing mobile environment: The mobile devices must be updated and patch regularly by the users. However, users may not be very particular about such needs and thus, company needs to take the responsibility by sending notifications, updates and reminders to the employees using BYOD devices for regular updates. This would make the environment safer for the company as the updates would patch any new vulnerability as per the increasing threat scenarios(Curtis Carey, 2012). A supportive usage policy may be defined by Aztek for the use of mobile devices by employees for the official purpose which would define patching as mandatory procedure to be followed in certain time. Moreover, self-service solutions given to employees for patching or getting support from technical staff of the organization can also help further(Avdoshin Pesotskaya, 2011). Risk Assessment The framework used for managing security in the cyberspace defines certain practices that are cost-effective, reusable, performance based and cost effective. These practices have been identified by a team of security experts and industry professionals working on security systems(Paschke, 2014). The framework presents a mechanism that can be used for defining the security posture of Aztek, exploring the target state of the company network, prioritizing improvement opportunities, assessing security systems and communicating the security risks to company stakeholders(Delhi Government, 2014). Aztek managers can create a checklist which could be based on the security categories, functions and industry references for the management of security posture of the company. Some examples of the security functions are asset protection, intrusion detection, data recovery, risk identification and risk response planning. Certain security categories can be identified for inclusion in security policies such as access control. Asset management and intrusion detection(Berg, 2010). There can also be some sub-categories within these such as threat notification under intrusion detection and data protection under access control. All these security themes if taken care in security measures can enhance the security posture of Aztek(EY, 2013). The security framework defines some tiers of security that define different protection levels such as: Tier 1: At this level, the company would have the partial protection with each device covered but there would not be any integration of the risk based programs and neither processes in the company nor the processes would be formalized(Bhatta, 2008) Tier 2: Risk management processes are formalized at this stage and activities have priorities based on the security needs and impacts (Paschke, 2014) Tier 3: The risk management processes and procedures are all formalized and repeatable security measures that can be taken by the company would be defined. The methods defined would be consistent with the level and would help in strengthening the security posture of the company by providing better protection(Health and Safety Authority, 2006) Tier 4: The company would adapt to the required changes in the security systems in this stage as per the changed security posture and levels of threats that the company would be exposed to. At this level, security processes are integrated and the security practiced become the part of organizational culture(Elky, 2006) The framework can be used by Aztek for other purposes such as reviewing the security practices and policies already used in the company such that scope for improvement can be defined. The framework would be used as a guide for communicating the risks to the stakeholders as well as for enforcement of the policies(Bodicha, 2005). Security Profile Review: The security posture of the company would be reviewed in order to understand the practices that company is using for detecting threat, protecting its IT systems, responding to risks and recovering from security challenges(Rule Works, 2017). The current structure of the company is used as per the traditional system of the organization where the devices were connected and were all owned by the company. However, the current need of the company is to alter the security management structure to adapt to the needs of BYOD devices to enhance its level of protection(John Snow, Inc., 2010). Establishing security program: Aztek can use following steps for establishing security systems: Developing the objectives of security measures and scope of the same for the IT systems of Aztek(Security Awareness Program Special Interest Group, 2014) Prioritising the objectives defined based on the current IT security needs of the company Studying the probable threats to the current system and it vulnerabilities. Aztek can use personal and financial data of the company customers to identify potential loss of data. vulnerabilities would become dangerous for the company when company employees would try connecting their devices to companies applications in an insecure environment and thus, such threats have to be studied for understanding impacts and possible response measures to be taken(Campbell, 2005). The security profiling of Aztek would help define risk categories and risk sub-categories such as identity thefts, financial frauds, and unauthorized access(NCSU, 2017). Each of these categories of risks can have different impacts on the organization as explained below: Identity Thefts: A stolen data of customers and the company can be misused by the stealer as it can be used for launching an attack on the company or on the accounts of the customers to gain access to the financial data of the users and use identity details to misuse it. This can damage the reputation of the company and thus, lead to loss of trust in customers (La Trobe University, 2017). Financial Fraud: Attackers can use the opportunity to modify the financial data which would hide some figures such that the money can be taken by the attacker without the user getting to notice the reduction in account balance. It is only when the amount grows big enough that the user would get the notice of it(CDC, 2006). Once attacker gets to use the credentials of user accounts, direct monetary gains can also be achieved. This can be threatening not just to Aztek but to the entire financial industry as the customers would lose money and thus, trust in financial systems(Chan, Lam, Chan, Cheung, 2008). Unauthorized Access: Unauthorized access by hackers to the user accounts can lead to launch of cyber attacks like DDOS which would cause disruption in service provisions by blocking the same for the genuine users thereby affecting the service capabilities of the company(Curtis Carey, 2012) Aztek can study the profiles of stakeholders for identifying the target profiles that can get affected most by specific categories of risks and these profile users needs to be communicated about the probable threats with steps to remain safe(Engine Yard, Inc., 2014). Various stakeholders and the responsible communication that must be sent to them are listed in the table below: Risk Category Stakeholders Requirements Identity Thefts Employees Users Personal information of users and employees need to be protected from getting stolen or leaked (European Commission , 2010) Records alteration Management Employees Users Customer and users data has to be managed securely without any allowance to user or any other third party person to make modifications without the proper approval of the customer and the company officials(GILBERT, 2014) Unauthorized access Customers Management Customer credentials should be kept safe such that they do not get leaked and misused by a hacker or unauthorized user (HP Enterprise, 2015) Financial fraud General Consumers Finance companies Investors Fraud patterns can be identified and analyzed to understand how the industry is getting affected by the security threats and mutual steps must be taken to identify best protection measures that must be shared and used for increasing security posture of all the companies in the finance industry(Health and Safety Authority, 2006) The security gaps in Aztek would be identified assessed and priorities would be created for improvement steps for each gap(Veracode, 2017). Risks can be given priority based on the cost benefit analysis of the suggested improvement and impact of the risk exploitation. The gas would include the existing vulnerabilities in the IT systems and applications of the organization. These could include lack of monitoring and lack of security awareness in the employees (NIST, 2014). A security plan would be projected for managing risk in each category and sub-category(IBM Global Technology Services , 2011) Opportunity Identification: Company staff can explore the practices used by industry companies for securing their IT systems including those using BYOD schemes. With this exploration, best security practices that have worked well with BYOD schemes can be identified and used for the enhancement of the protection of Aztek. Some of the best practices used in the finance industry include(Infrascale, 2014): A layered security infrastructure can be used that identifies trusted methods of access from the untrusted methods of access to the company systems through mobile devices(John Snow, Inc., 2010). Control mechanisms may be used on the mobile devices such as authentication when employees are connecting to critical resources of Aztek(WatchGaurd, 2013). The company should have an awareness and training program launched to tell employees about risks, their impacts and protective measures(NIST, 2014) Data Security One major risk that finance industry faces is the loss of the data of the organization and its customers. With proper policies defined for managing different types of access systems such as remote or wireless access, privacy settings, codes of conduct, social media access, ad incidence response plans(MYOB, 2016), risks of losing data can be reduced. Devices can be directly or indirectly secured from these threats using measures like encryption, remote wiping, authorization, sandboxing, and inventory securing. Employees must be provided with sufficient training so that they can identify vulnerabilities and take steps for securing their devices(Paschke, 2014). Another risk that BYOD environment is increased exposure to the data through the end point devices connected to the system. End point protection measures have to be used with BYOD devices which would need different protection techniques than those used with traditional systems. Two major risks faced by the finance industry are data leakage and productivity reduction because of the use of BYOD(Microsoft Asia News Center, 2016). Thus, Aztek needs a mechanism that allows tracking the activities at the end point and provide authorization systems for remote data access. If an end point device faces a threat such as after getting stolen, a remote wiping feature can be used such that the device is disconnected with the system which would not allow user to connect with company systems any more. This would protect the unauthentic user for gaining access to the confidential data of Aztek(NCSU, 2017). The methods people use for accessing data and applications on BYOD devices can also affect the security and thus, company must have a way to check the access methods and define some data protection strategies for overcoming these challenges such as(National Treasury, 2011): Employee activities in the cyberspace can be monitored for understanding how they are using company systems and the data through the use of activity logs and usage records(Office of the Privacy Commissioner of Canada, 2015). Protecting devices with pass word authentication is the responsibility of the employee using the network and he or she must protect the companys sensitive data from getting leaked through the device(OECD, 2008) A minimum level of control over the access gained by the employees must be defined such that the company can enforce security standards on them. These control mechanisms would be applied to the end user devices when they would be used company applications or accessing data such that they are protected(WatchGaurd, 2013). Training can be given to employees on secure use of devices and on security aspects such as data storage, administration, encryption, authentication, patching, antivirus protection incident management, application management, asset management, and inventory control (Office of the Privacy Commissioner of Canada, 2015). Conclusions The aim of this paper was to explore the case of Aztek which is a financial organization to identify changes in security posture and finding measures that can be used by the company to enhance protection. It was found that the company uses a security structure that is more suitable to an IT infrastructure that is wholly owned by the company and thus, new strategies are required with addition of end point devices as the company is planning to implement BYOD scheme in it. The study of the security posture suggests that the risk of leaking data, loss of control over devices and risking unauthentic access by attackers would be major concerns for the company with BYOD scheme. A cybersecurity framework can be used to develop security management strategies that are suitable for the end point protection. This would include security management methods like surveillance, device management, policy enforcement, and employee awareness to give them responsibility for protection of devices. References ACHS. (2013). RISK MANAGEMENT QUALITY IMPROVEMENT HANDBOOK. EQuIPNational . Afaq, S., Qadri, S., Ahmad, S., Siddique, A. B., Baloch, M. P., Ayoub, A. (2014). Software Risk Management In Virtual Team Environment. INTERNATIONAL JOURNAL OF SCIENTIFIC TECHNOLOGY RESEARCH , 3(12), 270-274. Alali, F., Yeh, C.-L. (2012). Cloud Computing: Overview and Risk Analysis. Journal of Information Systems, 26(2), 13-33. APM Group Ltd. (2017). DEFINING RISK: THE RISK MANAGEMENT CYCLE. Retrieved September 14, 2017, from https://ppp-certification.com/ppp-certification-guide/52-defining-risk-risk-management-cycle36 Avdoshin, S. M., Pesotskaya, E. Y. (2011). Software Risk Management: Using the Automated Tools. Russian Federation. Berg, H.-P. (2010). Risk Management: Procedures, Methods and Practices. Salzgitter, Germany: Bundesamt fr Strahlenschutz. Bhatta, G. (2008). Public Sector Governance and Risks: A Proposed Methodology to do Risk Assessments at the Program Level . Asian Development Bank . Bodicha, H. H. (2005). How to Measure the Effect of Project Risk Management Process on the Success of Construction Projects: A Critical Literature Review . The International Journal Of Business Management, 3(12), 99-112. Campbell, D. (2005). Risk management guide for small business. Global Risk Allianz. CDC. (2006). CDC Unified Processes Practice Guidance for Risk Managment. CDC. Chan, A., Lam, P., Chan, D., Cheung, E. (2008). Risk-Sharing Mechanism for PPP Projects the Case Study of the Sydney Cross City Tunnel. Surveying and Built Environment, 67-80. Curtis, P., Carey, M. (2012). Risk Assessment in Practice. COSO. Delhi Government. (2014). HAZARD, RISK AND VULNERABILITY ANALYSIS. New Delhi: Delhi Government. EY. (2013). Bring your own device - Security and risk considerations for your mobile device program. EY. Elky, S. (2006). An Introduction to Information System Risk Management. SANS Institute. Engine Yard, Inc. (2014). Security, Risk, and Compliance. Engine Yard. European Commission . (2010). Risk management in the procurement of innovation. European Commission . GILBERT, P. L. (2014). Surveillance of workplace communications:What are the rules? TOBIN. Health and Safety Authority. (2006). Guidelines on Risk Assessments and Safety Statements . Dublin: Health and Safety Authority. HP Enterprise. (2015). Cybersecurity Challenges, Risks, Trends, and Impacts: Survey Findings. MIT. IBM Global Technology Services . (2011). Security and high availability in cloud computing environments. IBM Corporation. Infrascale. (2014). BYOD Program Best Practices for Data Protection Security . Infrascale. John Snow, Inc. (2010). Developing a Risk Management Plan. USAID. La Trobe University. (2017). Video 4: Project Risks. Retrieved September 14, 2017, from https://lms.latrobe.edu.au/mod/book/view.php?id=2493632chapterid=201714 Microsoft Asia News Center. (2016, June 7). Malware Infection Index 2016 highlights key threats undermining cybersecurity in Asia Pacific: Microsoft Report. Retrieved from Microsoft News: https://news.microsoft.com/apac/2016/06/07/malware-infection-index-2016-highlights-key-threats-undermining-cybersecurity-in-asia-pacific-microsoft-report/ MYOB. (2016, September 13). Protecting your confidential information. Retrieved from MYOB: https://myob.com.au/myob/australia/myob-security-recommendations-1257829253909 National Treasury. (2011). Public Sector Risk Management Framework. Republic of South Africa. NCSU. (2017). Risk Management . Retrieved September 14, 2017, from https://agile.csc.ncsu.edu/SEMaterials/RiskManagement.pdf NIST. (2014). Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology. OECD. (2008). Malicious Software (Malware): A security Threat to Internet Economy. OECD. Office of the Privacy Commissioner of Canada. (2015). Is a Bring Your Own Device (BYOD) Program the Right Choice for Your Organization?: Privacy and Security Risks of a BYOD Program. Office of the Privacy Commissioner of Canada. Oracle. (2009). Managing Risk with Project Portfolio Management in the Oil and Gas Industry During an Economic Downturn . Oracle. Paschke, C. (2014). Bring Your Own Device Security and Privacy Legal Risks. Information Law Group. Rule Works. (2017). The risk management cycle. Retrieved September 14, 2017, from The risk management cycle Security Awareness Program Special Interest Group. (2014). Best Practices for Implementing a Security Awareness Program. PCI. Veracode. (2017). APPLICATION SECURITY SOFTWARE. Retrieved May 19, 2017, from https://www.veracode.com/products WatchGaurd. (2013). BYOD: Bring Your Own Device or Bring Your Own Danger? WatchGaurd.
Tuesday, December 3, 2019
World War II From Normandy to Hitlers Eagles Nest an Example by
World War II: From Normandy to Hitlers Eagles Nest Stephen Ambroses book on E Company of the 506th Regiment of 101st Airborne of the US Army tackles the World War II experiences of the many enlisted personnel and officers of Easy Company. From their training stage at Camp Toccoa, Georgia to the realization of their ultimate victory which was the seizure of Hitlers Eagles Nest in Germany, one of the last strongholds of the German SS during the war. Need essay sample on "World War II: From Normandy to Hitlers Eagles Nest" topic? We will write a custom essay sample specifically for you Proceed This story of heroism and bravery are filled with adventures and tragedies that have given readers a comprehensive insight on the life of being in the frontline of a battle and being a mere individual witnessing the compassion and at the same time the wickedness of human beings. It all started in 1942 when a number of young abled men joined the Army to be part of a prestigious rank, being a paratrooper. Many were enticed to enlist in this unit because of the alluring financial compensations. The Army offered $50 every month for the hazardous duty pay. At that time, this amount of money was considered as a bounty. Over 130 soldiers who were mostly at the age of 19 and above took a painstakingly training regimen under the supervision of Captain Sobel. At first, it was not easy for E company to bond as a consolidate group. They had leadership issues with their immediate superiors and they seemed to clash with one another when they got exhausted and got in trouble. More so, their trainin g focused on enhancing their infantry skills such as map reading, utilization and maintenance of various warfare weapons and learning about communication. More importantly, they had to earn their wings in order to be fully recognized as a paratrooper. Because of this, E company took several trainings on learning how to successfully jump from airplanes. However, the highlight of their training was their regular run to the topmost part of Curahee. It was in this place the E company showed their camaraderie and their potential in being the best paratrooper unit in the US Armed Forces. Mount Curahee posed as a significant part in each of the lives of E company. Ironically, the term Curahee was derived from the Native American culture which means We Stand Alone Together. This statement clearly embodies the totality of the experiences of all the members of E company during World War II. In the book, it was vividly described how members of Easy Company transformed from being ordinary men to soldiers of courage bravery and gallantry. After they have finished all their training at Camp Toccoa and at Uppotery England, the faith of their survival was at the hands of the men on their sides who were all earnestly focused on ending Hitlers reign to terror and going back home alive to their families and friends. Easy Companys first major military was the invasion of Normandy or more famously known as D-Day. The 506th Regiment had to be dropped behind enemy lines with hopes of blocking the Germans line of supplies and after that they had to work their way to Utah beach were other Allied troops were convening. By June 6, 1944, Easy Company was under a new command due to unfavorable circumstances. The moment they landed in Normandy, Lieutenant Dick Winters became the company commander. Under Winters leadership, initially several E company men were unsure of whether he could fil l a crucial military position. Also, Winters good boy persona was also questioned because most of the men were expecting to have a typical leader, manly and tough commanding officer. But Winters proved to his men that he is a competent leader who can effectively lead Easy company to Germany. After D-Day, E company was sent to Holland for the Operation Market Garden which failed and caused some casualties to the group. Then they held the line at Bastogne in Belgium where the famous Battle of the Bulge under General Patton took place. From here, they finally reached the enemys territory. It was during these times that Winters and the rest of Easy Company have proved their significance in the war and their immense capability in being effective fighters. In Germany, Easy Company had witnessed the devastating effects of war when they saw series of concentration death camps where millions of Jews were killed. Finally, they reached the town of Berchtesgaden. This was their last stop until the war ended in 1945. Some of the men of Easy Company stayed with the Army while others went back to the US and lived as ordinary working citizens. But before they separated to fulfill their respective destines, the remaining soldiers of Easy Company realized that they have an unusual bond with one another. Probably, it was the scars from the battles and the solidarity of their group amidst turbulence that glued them together from the beginning until the end of the war. As stated in the first page of the book, But we in it shall be r emembered; We few, we happy few, we band of brothers; For he to-day that sheds his blood with me, Shall be my brother (cited in Ambrose, 1992, p. 10). Overall, Amborse was able to write historical account but made with a personal touch. He managed to tell the story of Easy Company without sounding like a boring history textbook or a documentary. More so, Ambrose successfully relived the experiences of the men of Easy Company with many excerpts on living survivors from group. This made the book more accurate and more interesting to read. Furthermore, the manner that the book was written was very detailed and descriptive. Readers just cant help themselves to feel the intensity of the battles during World War II. They can really feel while reading that they are being brought back in time. Even though, Easy Company had many outstanding characters, Ambrose was able to revive each of the mens account of heroism and downfalls into text. Ambroses perspective and descriptions were very graphic that made the story of brotherhood of the men of Easy Company more interesting. As readers, read through line by line, they can really imagine the scenario that the soldiers were in and the emotions that they were feeling such as determination and sheer fear. Most importantly, Ambrose successfully retold the Easy Companys distinctive World War II narrative in a chronological manner that aided readers to comprehend how they have become a Band of Brothers. Ambroses E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest is a great book companion that can help the modern society to be more appreciative of the freedom and democracy that we are currently experiencing which were fruits of labor of the many soldiers who risked their lives during World War II to restore peace and order. Reference Ambrose, S. E. (1992). E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest. New York: Simon & Schuster.
Subscribe to:
Comments (Atom)