Sunday, December 29, 2019

Women in Combat-Arms A Case for the Status Quo Ante - Free Essay Example

Sample details Pages: 5 Words: 1352 Downloads: 7 Date added: 2019/08/15 Category Security Essay Level High school Tags: Women in Combat Essay Did you like this example? Women in Combat-Arms: A Case for the Status Quo Ante Combat-arms units that are mixed-gender perform worse than all-male units by almost every metric. This is a factual, but controversial statement. Despite the controversy, it should be kept in focus throughout any discussion of gender-integration of combat-arms units. Don’t waste time! Our writers will create an original "Women in Combat-Arms: A Case for the Status Quo Ante" essay for you Create order It is an uncontroversial statement to say that women are valuable and productive members of society. Any reasonable person, male or female, would have to concur. The controversy arises when we begin to assign roles to women that constrain their area of productivity or societal contribution. Indeed, we need not assign anything at all in order to generate consternation; we need only assert those roles which have been considered traditional up to the present day. It may be helpful when doing so to examine why those roles came about, at least regarding our subject: women serving in combat roles by being integrated into combat-arms units. Combat Arms units in the US Army should not be coed because sex-integration negatively impacts esprit-de-corps, morale, and mission readiness. Women have played an important part in the United States armed forces since the Revolutionary War. They have served in many roles, many of which were non-combat-arms. These roles included logistics, communications, administration, and most famously: nursing. In 2016, Department of Defense (DoD) policy changed to allow women, who comprise about 15% of the military, to be eligible to serve in combat-arms units (Task and Purpose, 2017). In order to illustrate why this policy is potentially harmful to the militarys warfighting capabilities, an honest discussion of the physical differences between the sexes is called for. A yearlong study conducted by the United States Marine Corps (USMC) yielded confirmation of long-recognized differences between the sexes in areas that directly affect combat task performance. The study contrasted mixed-gender squads against all-male squads. One of the significant discoveries was that the mixed-gender squads were less lethal than their counterparts. This was due to mixed-gender squads performing worse with various weapons-systems typical to an infantry team (M4, M249, M203). These squads not only scored lower in basic marksmanship; they moved slower and generally performed worse in combat drills that featured tactical movement with the afore-mentioned weapons (Peralta, 2015). The females generally had a more difficult time moving with the weapons and associated gear required for the combat infantry mission. A potential explanation for these difficulties lies in the physical differences between the sexes. According to the Marine Corps study; females have a higher percentage of body fat: 24% for females and 20% for males. On average, females possess 15% less anaerobic capacity, and 10% less aerobic capacity than males. This means that the top 10% of female overlapped with the bottom 50% of males. Even more concerning than that, however, is that female Marines were 6 times more likely to be injured in training than their male counterparts (Peralta, 2015). The discrepancies in average performances and injury rates is partially explained by more physiological facts. The average female Marine was more than 4 inches shorter, had 37 fewer pounds of muscle, and had nearly 6 pounds more fat than a male. They also were measured to have only 55% of the upper body strength and 70% of the lower body strength of a male Marine (Peralta, 2015). These differences have been recognized and codified in the differing physical testing standards the military uses to evaluate their servicemembers. Every branch of the U.S. Armed Forces has lower standards for passing on their respective physical fitness test for females (Fumento, 2016). The military is supposed to be a meritocracy. Because of the unique nature of its mission, the military has the legal ability to discriminate based on physical condition and fitness in ways that civilian or other governmental agencies are not able. This is because the ability to successfully prosecute a war requires the best, most fit, most disciplined Soldiers, Sailors, Airmen, and Marines available. In order to fit females into roles formerly closed to them, the DoD must simultaneously enact policies that ignore important differences between males and females (open combat-arms to females) and keep in place physical testing standards that acknowledge those differences vis-? -vis lower standards for females (Simons, 2018). This schizophrenic policy and the cognitive dissonance that seems to have resulted from it breeds confusion, mistrust, and resentment. These feelings are not conducive to building and maintaining effective warfighting units (Klimas, 2016). The usual arguments cited against integrating combat-arms units can be made again: there will be romantic entanglements and competition for the affection and attention of the females. These entanglements will lead to pregnancies. We know these things occur on a regular basis because we see them happening in non-combat-arms units that are currently gender-integrated. The means by which the DoD attempts to mitigate these problems creates further complications. Separate sleeping quarters, for example, presents serious logistical challenges; and can be very expensive. The Navys current program to refurbish its submarines is a contemporary example. Separate quarters also prevents the sort of bonding that occurs between servicemembers of the same gender (Klimas, 2016). In the midst of the debate over whether or not the new policy is tenable and practical, few people are talking about what seems to be a lack of enthusiasm for this experiment on the part of women themselves: they are not signing up. The vehemence with which advocates for the change demand it would suggest that there would have been a rush to fill these slots by females. The opposite seems to be the case (Scoti, 2016). The Sergeant Major of the Army (the highest-ranking enlisted member of the Army and advisor to the Secretary of the Army) recently put out a call for female Soldiers to step up and sign up for combat-arms jobs (Tan, 2016). If this radical policy is expensive, causes morale and esprit-de-corps problems, decreases the effectiveness of combat-arms units, and is not being embraced by those it was meant to benefit; then should it be in place (Donnelly, 2016). The military should not be the place for social experimentation. While it is often referred to as a microcosm of society; to a great degree, the military is a bastion against societal change. It is so because war will always place a demand for disciplined, fit Soldiers who can close with and destroy the enemy. Policies that allow for females to serve in combat-arms units sabotage the ability of the nation to fulfill the requirements of that demand. They endanger national security by placing political concerns over mission-readiness and warfighting capability. According to the Presidential Commission on the Assignment of Women in the Armed Forces: Any unnecessary distraction or any dilution of the combat effectiveness puts the mission and lives in jeopardy. Risking the lives of a military unit in combat to provide career opportunities or accommodate the personal desires or interests of an individual, or group of individuals, is more than bad military judgment. It is morally wrong. References Donnelly, E. (2016). Statement for the Record: Executive Summary. Center for Military Readiness, Senate Armed Services Committee. Retrieved from https://cmrlink.org/data/sites/85/CMRDocuments/ExecSummDonnellySASCStatement_020216.pdf Fumento, M. (2016). A Weighty Argument Against Women in Combat. The American Conservative. Retrieved from https://www.theamericanconservative.com/articles/a-weighty-argument-against-women-in-combat/comment-page-1/ Herres, R. (1992). The Presidential Commission on the Assignment of Women in the Armed Forces (Report to the President). Washington, DC: Government Printing Office. Klimas, J. (2016). Integrating Women Into Combat Reduces Effectiveness, Harms Unit Cohesion. The Washington Post. Retrieved from https://www.washingtontimes.com/news/2015/mar/19/problems-women-combat-cant-be-mitigated-report/ Peralta, E. (2015). Marine Corps Study: All-Male Combat Units Performed Better Than Mixed Units. The Two-Way: Breaking News From NPR. Retrieved from https://www.npr.org/sections/thetwo-way/2015/09/10/439190586/marine-corps-study-finds-all-male-combat-units-faster-than-mixed-units Scoti, C. (2016). After All That, Few Female Soldiers Sign Up For Combat. The Fiscal Times. Retrieved from www.thefiscaltimes.com/2016/08/02/After-All-Few-Women-Soldiers-Sign-Combat Simons, A. (2018). Women Dont Belong In Combat: Opposing View. USA Today. Retrieved from https://www.usatoday.com/story/opinion/2015/08/26/women-combat-ranger-school-sex-editorials-debates/32415995/ Tan, M. (2016). SMA: Army Needs Female Soldiers to Step Up for Combat Jobs. The Army Times. Retrieved from https://www.armytimes.com/news/your-army/2016/08/01/sma-army-needs-female-soldiers-to-step-up-for-combat-jobs/ TIMELINE: A History of Women in the U.S. Military. (2017). TIMELINE: A History of Women in the U.S. Military. Task and Purpose. Retrieved from https://taskandpurpose.com/timeline-history-women-us-military/

Saturday, December 21, 2019

The Cold War And The Soviet Union - 973 Words

The Cold War was a state of economic, diplomatic, and ideological discord among nations without armed conflict. The Cold War was between the United States and the USSR because these were the two major powers after WWII. Basically, the Cold War was a series of proxy wars that had taken place back in time involving surrounding countries. One of the main causes for Cold War was that the Soviet Union was spreading communism and the United States didn’t like that so they were trying to contain communism. However, in the end they failed. Many events took place in other countries. In Korea, Vietnam, Latin America, and China, communism took over; however, before it did, major wars had taken place. The cold war between the U.S. and the Soviet Union worsened the condition of countries involved. The Cold War broke countries into two parts that turned against each other, the United States and the Soviet Union used these countries to fight their war and caused a big disturbance to daily l ife, and the Communist States fought the Non-Communist States; however, the end results of these wars only caused more damage in these countries. The Cold War affected the countries involved by splitting them into two parts that turned against each other. Korea, Vietnam, and China were greatly affected by the Cold War; these countries had split into two parts because of their beliefs in communism. The north part of the country was the communist side and the south part was non-communist. The Cold WarShow MoreRelatedThe Cold War And The Soviet Union1233 Words   |  5 PagesThe Cold War is unique among war’s to be not a war between states, but a war between ideologies. The United States and other allies defend social democracy capitalism, as the pinnacle of freedom and equality; and the Soviet Union though communism was the pinnacle of equality. These ideologies manifested themselves through the superpowers, which caused the conflict between them. Both the United States, and the Soviet Union are to blame for the outbreak of the Cold War. The United State’s missionRead MoreThe Cold War And The Soviet Union1697 Wo rds   |  7 PagesThe Cold War, in fact didn’t take place in the winter season, but was just as dangerously cold and unwelcoming, as it focused on two contrasting powers: the U.S. and the Soviet Union. After World War 2, the Cold War influenced capitalist U.S. and communist Soviet Union to engage in disagreements causing many disputes having to use military, economic and humanitarian aid. With different goals, the contrasting powers prove through the Marshall Plan, the Cuban Missile Crisis, and SALT that communismRead MoreThe Cold War And Soviet Union840 Words   |  4 PagesThere are many theories and opinions of how the cold war started. Some believe that the cold war was the result of the belligerence of Joseph Stalin and the insecurity it caused in the United States and the West. Others believe the primary responsibility for the cold war derives from the hardline policies of the United States. (Viewpoints Article: the Soviet Union Start the Cold War) I believe The Cold War was triggered by the theory of two superpower countries in a race for dominance in the worldRead MoreCold War And The Soviet Union859 Words   |  4 PagesAMS2270 Cold War This essay will discuss about cold war, including the background, beginning, progress and ending. As we know, cold war is a struggle between U.S. with NATO and Soviet Union with WTO from 1947 to 1991. It is a significant event in history, and it influence the almost all of world, it directly lead to the radical change of eastern Europe and the breakup of the USSR. In 1946 February, George.F.Kennan wrote a â€Å"Long Telegram†, it clearly said the strategy of containing Soviets and itRead MoreThe Cold War On The Soviet Union1230 Words   |  5 PagesThe Cold War’s effect on the Soviet Union Shortly after the World War 2 ended, the United States and its North Atlantic Treaty Organization allies entered the cold war with the Soviet Union. Germany was divided in half and later, the Berlin Wall was constructed as a physical boundary between the Soviet controlled East Germany and NATO controlled West Germany. This standoff continued until the Soviet Union dissolved in 1991. The cold war had a huge influence on the world stage, but also had a majorRead MoreThe Cold War And The Soviet Union1391 Words   |  6 Pageswake of World War II as the decades-long force of Germany’s reign came to its conclusion, an extensive repositioning of authority among the world’s top powers began. The war wielded devastating consequences for most countries involved and effectively diminished the dominance Britain and France once employed across the globe. Out of this devastation rose the two new dominating forces of the world who were triumphant in the aftermath of the war: the U nited States and the Soviet Union. The United StatesRead MoreThe Cold War And The Soviet Union Essay965 Words   |  4 PagesThe Cold War was a period in world history marked with increased tensions primarily between the United States and the Soviet Union. Both countries desired to expand their ideologies across the globe, the U.S. urging capitalism and democratic elections and the Soviets promoting communism. After the allies had obtained victory in World War II, the Yalta Conference was held. Joseph Stalin, the leader of the Soviet Union, wanted to expand his sphere of influence into Eastern Europe and demanded thatRead MoreThe Cold War And The Soviet Union1343 Words   |  6 PagesAbstract: As one of the most important events in 20th century, the Cold War had a very deep influence for the human-being civilization and it changed the world structure . The United States and the Soviet Union ,the two poles, became enemies from friends after the World War II. They adopt hostile attitude towards each other and criticized the the opponents’ social systems. To find out who provoked the Cold War, the US, the Soviet Union, the United Kingdoms ,Roosevelt, Truman ,Stalin, and ChurchillRead MoreThe Soviet Union And The Cold War1038 Words   |  5 PagesAfter a series of events during the time of World War II, tensions between the United States and the Communists such as the Soviet Union and China, developed into a military and political conflict such as the Cold War. During the Cold War, which went on for 50 years, the Soviet Union and the United States competed to expand their economical and political influence. Although, the United States military has increased in size and it’s strategy. The United States power today is highly supreme when itRead MoreThe Cold War And The Soviet Union1710 Words   |  7 PagesUnited States and the Soviet Union were allies, jointly triumphant in World War II, which ended with total victory for Soviet and American forces over Adolf Hitler s Nazi empire in Europe. However, within just a few years, wartime allies became mortal enemies, locked in a global stru ggle: military, political, economic, and ideological, to prevail in a new Cold War. The Cold War was a time of extreme tension between the Union of Soviet Socialist Republics (USSR), or the Soviet Union and the United States

Friday, December 13, 2019

Negative Effects of Computer Usage on Eye Sight Free Essays

Although the computer has crucial importance in our lives but still it has some negative effects upon our health. It effects the eyesight of an individual if there is maximum exposure to the computer screen. It might develop the long or the short sightedness if the frquency of the use is high. We will write a custom essay sample on Negative Effects of Computer Usage on Eye Sight or any similar topic only for you Order Now It may results in headache relatively for the larger time span and in turns effect the brain cells of the human being. It incorporates a wide variety of the knowledge in itself and when the viewer come across the new phrases and techniques,it definitely demands and requires time and thus in turn result in the stress condition which is not good for the health of the human being. Distance of the screen of the computer from the eye also have the negative symptoms as the particular level being defined by the doctor is not been followed. In children it is flourishing more day by day as they are more exposed to the entertainment side of the computer and that is games which are being installed in the computer. Eyes of the children gets affected when they put a load on their eyes while focussing on a particular task and it may effect their eye sight. It is necessary not to work constantly on the computer. It is important to take the short breaks so that the effect of continously looking at the screen could get minimized. It is quite important to preserve the vision by taking different eye exercises. Continous and the frequent use of the computer sometimes results in the vision that is blur and the things doesnot look as they are in real. In short while using the computer it is necessary to follow the instructions of the doctor and have regular check ups of the eyes. How to cite Negative Effects of Computer Usage on Eye Sight, Essay examples

Thursday, December 5, 2019

Sources of Finance Disney

Question: Discuss about theSources of Financefor Disney. Answer: Introduction Many different sources of finances are available for the business enterprises for the purpose different activities. Finance sources can be selected using the amount of finance required for particular business activity and also time period for which capital is required plays an important role. While looking for the external sources of finance it is important to check the risk associated with sources of finance that has been selected. Leverage amount is also to be considered in every source of finance before selecting any option. In this report, discussion will be made on various sources of finance available to Disney for the purpose of expansion. Sources of Finance for Disney As per sources of generation there are two main sources of finance, Internal and External. Internal sources of finance can be retained profits, owners capital and sale of fixed assets. External sources of finance can be bank loan or overdraft, issue of common or preferred shares, leasing, hire purchase, and trade and issue of bonds or debentures (Mayo, 2011). In order to finance for expansion purpose, Disney must look for external sources of finance as expansion programs requires huge investment and it is not possible to generate that much amount from current business that helps in expansion project. External source of finance is the method used in business to generate the funds from various sources outside the business context. Shareholders Capital It is one of the most frequently used sources of finance and most of stock exchange listed companies make use of them. In this method, company makes an initial public offer for their common shares at fixed price that can either at discounted price or premium price. These shares can be taken by the public and they become shareholders after the allocation have been made to them. In other words all the shareholders that have invested in the common shares issued by the company become the owners of the company. In this source of finance company is not bound to pay the leverage amount but to maintain the creditability company pays the dividend to their shareholders from the profit left after deduction of all expenses. The major disadvantage of generating the funds through issue of common shares is that it takes months to complete the process of issue of shares and public invest only in those companies that high rate of return and maintains low risk. This source of capital is permanent in n ature and only requires to repayment at the time of wide up of company or repayment of issued capital. Disney Company is already listed on the stock exchange and it requires expanding the business, so it is easy for the company to generate the required amount through making the right issue or IPO for fresh shares. Financial Loan from Banks or Financial Institution It is most easy and expensive source of finance as it links directly to the source person. Here source of finance are banks and other financial intuitions that sanction the required funds on the basis of credibility of company and various other aspects (Rigby, 2011). This source of finance is expensive because it requires payment of interest at fixed rate of interest at regular interval. Disney Company needs finance for the expansion of business activities at any other location or any other country, so it requires large amount of finance at lowest interest rate with flexible tenure period. As the creditability of Disney Company was maintained, so it is easy for the company to finance the loans from the banks at low interest rate if possible. Debentures and Bonds Issue of debentures or bonds is another way of finance the capital but requires payment of fixed rate of interest known as coupon rate. In this source of finance funds can be raised through issuing the debentures or bonds in the market. These bonds can also be issued in the favor of financial institution in lieu of equivalent amount of loans (Megginson and Smart, 2008). Bonds can be divided as secured or unsecured. Secured bonds are those bonds that charge on the asset of the company and carries low interest rates where as unsecured bonds are those that issued at high interest rate but they have no charge on assets of company. Disney Company can raised debt capital through issue of bonds of equivalent value that is required for investment in expansion program. Conclusion It can be concluded that there various sources of finance available to the Disney Company and it is the duty of finance manager to chose the best alternative through making the analyzing of the all the available sources of finance. References Mayo, H. B. 2011. Basic Finance: An Introduction to Financial Institutions, Investments, and Management. Mason: Cengage Learning. Megginson, W. L. and Smart, S. B. 2008. Introduction to Corporate Finance. Mason: Cengage Learning. Rigby, G. 2011. Types and Sources of Finance for Start-up and Growing Businesses. Britain: Harriman House.

Thursday, November 28, 2019

The Lady with the Dog and The Garden Party Essay Example

The Lady with the Dog and The Garden Party Essay In daily life, one is constantly presented with obstacles, challenges, and opportunities. It is what One does with these occurrences that defines One’s character. In order for change to occur within a person, acceptance is necessary. ‘The Garden Party’, written by Katharine Mansfield and ‘The Lady With the Dog,’ written by Anton Tchekhov were short stories that focused on the outcome of the choices One makes based on prior experiences. The two stories had one main theme in common: acceptance. In the stories both of the main characters experience substantial change and they are different at the end of the story than they were at the beginning. Within their stories, Mansfield and Tcherkhov write about how key events in One’s life can influence the acceptance of change. Their writings tell a story of the importance of letting go of pre conceived ideas, and they both conclude with the realization of acceptance in the lives of their characters. The main characters of the short stories come from different worlds, one innocent and childish, and one harsh and unforgiving, but both characters experience a similar journey towards acceptance. The journey of Moscow-born Dmitri Gurov, Tchekhov’s character, begins by explaining his passion for women. When describing Gurov’s relationship with his wife, Tchekhov managed to communicate the deep set issues of Gurov as he â€Å"[c]onsidered her unintelligent, narrow, inelegant, was afraid of her, and did not like to be home.†(pg #) One can gather from the description of the woman that he loves that Gurov does not have a lot of respect for her. Gurov â€Å"[h]ad begun being unfaithful to her long ago- had been unfaithful to her often, and, probably on that account, almost always spoke ill of women, and when they were talked about in his presence, used to call them the lower race.† (pg #)These quotes establish Gurov as misogynistic, but it is important to consider that he did not start off We will write a custom essay sample on The Lady with the Dog and The Garden Party specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Lady with the Dog and The Garden Party specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Lady with the Dog and The Garden Party specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Sunday, November 24, 2019

Network Security Problems Analysis Essay

Network Security Problems Analysis Essay Network Intrusion Analysis Essay Example Network Intrusion Analysis Essay Example The problem of selection of reliable data sources for the process of digital forensics investigation is particularly relevant nowadays, with each type of computer-related crime relying on a specific set of such sources. In particular, in the case of network intrusion, user accounts, operation and intrusion detection systems, as well as the logs of Internet providers are the most useful sources of information. For malware installation, the investigators are likely to find the evidence that they require by analyzing system data, the storage of intrusion detection system, and the information provided by a virtual machine. Finally, in the case of insider file deletion, the investigation has to rely on hard disks and network storages as the primary sources of useful data. Common Network Security Problems Computer-related crimes are among the consequences of mass computerization of the society. The integration of modern information technologies in almost all areas of human activity has led to the fact that many traditional crimes (e.g. appropriation, theft, fraud, counterfeiting, etc.) are being committed with the help of computers. Crimes associated with the use of computer technology present a serious threat to any company or individual. In order to identify the offenders responsible for this damage, a special procedure called digital forensics investigation is conducted. On the contrary to the usual process that involves the gathering of evidence by questioning the witnesses, it relies on the information obtained from the digital sources. However, the quality and reliability of the gathered data may vary depending on the situation, which may affect the course of the investigation. As a result, the problem of selection of data sources for solving a computer-related crime becomes esp ecially relevant. Therefore, the following research focuses on identification of the most valuable data sources that can be used in different cases of computer-related crimes (network intrusion, malware installation, and insider file deletion). Additionally, it classifies them in terms of their usefulness to investigators. The network intrusion is the process of unauthorized access to the network that is mostly conducted with a malicious intent. The risks of such an activity are related to the devastating effects of the loss of time and money as a result of damage or theft of the important information and resources. The attackers can gain access to the network by exploiting vulnerabilities in software, hardware, or even attack by using such refined techniques as guessing other users’ logins and passwords. An attacker that gains access to the network becomes the source of the four following types of threats: Data theft; Identity theft; Data loss and data manipulation; Termination of service. In case of such an event, it is possible to distinguish several data sources that are of the most significant value for the digital forensics investigation. They include user accounts, the operation system itself, the intrusion detection system, and the records kept by the providers of web services. User Accounts The user accounts provide the most valuable information for the digital forensics investigation. In particular, the security measures of the majority of private networks involve the use of complex passwords that are to be changed regularly, the constant update of the list of registered users, and the limited amount of the incorrect attempts to enter the system. As a result, the possibility of the intrusion is lowered since it is impossible to log in to the network by using a fake account. Still, in case such an event has occurred, the audit of the existing user accounts may allow to identify the source of the intrusion, i.e., a particular account used by the attacker, thus narrowing the field of search. In turn, this information may provide investigators with hints regarding the ways of obtaining access to network, the timeline of the event, i.e., the time of logging in and out, the ways of misusing the account data, and so on. In other words, this data source defines the direction o f the entire process of investigation (Fichera Bolt, 2013). As a result, in terms of network intrusion, user accounts and the results of their audit are the most valuable of the listed sources of information. Operation System The information that is collected from the operation system, i.e., live system data, is also of high value for the digital forensics investigation. By reviewing it, it is possible to define the following details of the intrusion. First of all, the analysis of the system logs may provide the information on the password that the attacker used to access the network. In turn, this allows to define whether the user account was hacked or the password to it was simply stolen. Next, the analysis of system data may give insight into the nature of manipulations performed by the attacker within the network. In particular, the criminal may pursue specific goals by obtaining access to it. For example, in the case of a single event of data theft, the system logs are likely to contain the information on copying certain files. On the other hand, in case the offender’s primary goal was data manipulation or termination of the system (the events that usually require several intrusions), it is li kely that certain software will be altered or replaced to utilize the weaknesses of the system and simplify the consequent intrusions. For example, the attacker may replace the original application layer protocol with a modified one that allows remote access to the system, which means that the intrusions will be occurring on a regular basis (Casey, 2010). As a result, the information on the nature of manipulations within the system may help define the motives of the crime, thus simplifying the process of identification of the attacker. All these facts allow to rank the aspect of system data second in the list of the most valuable sources for the digital forensics investigation. Indeed, its analysis allows to discover the files and systems that were altered as a result of intrusion, as well as define the way used by the attacker to access the network. Intrusion Detection System Intrusion Detection System (IDS) is a hardware or software designed to detect the facts of unauthorized access to a computer system or network or their unauthorized management. IDS provides an additional level of security of computer systems by alerting the administrators of any abnormalities in the work of the network. The typical IDS includes a sensor subsystem for collecting the events related to the security of the protected system, analytical subsystem designed to detect attacks and suspicious activity on the basis of sensor data, and storage providing the accumulation of primary events and analysis. In most cases, the analysis preformed by IDS is based on the principle of signature matching: the system refers to the dictionary of the known attack signatures. In case any part of the attack pattern complies with the existing signature, the system makes an attempt to halt it and warns the administrator of a threat. However, in order to achieve the maximum efficiency of this method , it is necessary to replenish the dictionary of the signatures on a regular basis. At the same time, the attack patterns used by the offenders are becoming more sophisticated, meaning that even the newest signatures cannot guarantee complete protection of the network. In turn, this results in an increased amount of false alarms on the part of IDS (Casey, 2010). Still, the data from the storage of IDS, namely the alarms, can be useful for investigation, provided it is sorted. By filtering all the false alarms, it is possible to use the remaining information for the analysis of the less developed system logs and search for the clues on the nature of the attack. In particular, the use of IDS data makes it possible to obtain additional details about the connection used by the attacker and thus prevent the consequent attempts of intrusion. In some cases, it also allows to pinpoint the direction of the traffic, thus simplifying the process of identification of the attacker. However, such an analysis requires comprehensive knowledge of operation systems and hacking techniques, as well as the presence of logs of diagnostic tools. As a result, IDS can be placed on the third place in terms of its value to the digital forensics investigation of network intrusion: it provides useful information that may affect the course of investigation significantly, but its identification and isolation from the pool of unnecessary data requires great efforts on the part of investigators. The Records of the Providers of Web Services In order to organize and conduct their attacks on networks, the offenders must use web services (the Internet connection, messengers, etc.). As a result, by turning to the providers of these services, it is possible to acquire the information on the timeline of their use by the hackers at the time of event. Nevertheless, providers may collect such data as names and e-mail addresses of their clients as well as their payment information, e.g. data on credit cards and bank accounts. In the case of Internet providers, it is also possible to obtain IP addresses of the potential offenders at the time of the event, in case the dynamic IP is used. All this information can be employed to prove either involvement or non-involvement of the potential offenders in the act of network intrusion. However, each of the providers has a different policy regarding the consumers’ data collection, meaning that it is difficult to obtain consistent information in this way. Moreover, there is no guaran tee that the obtained information is reliable. As a result, the records of the providers of web services are ranked fourth and last in terms of their value to the digital forensics investigation. Malware Installation Malware is any software designed to gain unauthorized access to the resources of the computer or network. Currently, there are tens of thousands of such programs, with the new ones being created on a regular basis. Malware may cause serious damage to corporate networks, email systems, and web sites by using their different vulnerabilities. Its installation may result in the following negative effects: The interference to the processes of the infected system (the block of antivirus software and administrative functions of the operating system as well as the sabotage of the computer-controlled processes); The installation of another malicious software (either by downloading it from the network or unpacking another malicious program already contained within the file); Theft, fraud, extortion, and spying on the user (theft of accounts of various services and payment systems as well as key logging); Other illegal activities (an unauthorized access to the resources of the computer, the organization of DDoS-attacks, etc.) (Sikorski Honig, 2012). In the case of malware installation, such data sources as the operation system itself, IDS, and virtual machine are of the highest usefulness for the digital forensics investigation. Operation System The volatile data collected from the running operation system, specifically the one obtained at the time of malware installation, allows to conduct a search for hidden files that were integrated into the system by malware. In this regard, the alternate data streams present the highest value for investigators. Moreover, the analysis of such components of the system as drivers and applications as well as the executed services and processes may help identify the type of malware and its source (Sikorski Honig, 2012). The usefulness of this data becomes even higher in case investigators were able to discover the fact of malware installation before it was finished. The primary reason for that is the fact that they may collect and analyze the data on it without alerting the criminal. As a result, the process of identification of the offender is simplified. At the same time, the discovery of the fact of malware installation often requires a comprehensive analysis of the potentially infected system. As was mentioned before, new types of malware are being developed regularly, meaning that even the use of the most advanced diagnostic tools does not guarantee the absence of false alarms or critical failures, for example, the malware is not detected until it causes irreparable damage to the system (Casey, 2010). Nevertheless, all the above mentioned facts allow to consider the operating system as the most valuable source of information for the digital forensics investigation of the malware installation case. Intrusion Detection System As was mentioned before, IDS identifies and blocks threats, including malware, on the basis of signature matching principles. As a result, the data obtained from its storage may be used to identify the type of malware as well as the attack pattern used by the offender. Moreover, after obtaining the volatile data collected from the running operation system, it is possible to compare it with the existing signatures in the dictionary of IDS and define whether the installed malware has any specific features, for example, downloader, dropper, etc. (Sikorski Honig, 2012). In turn, this information may provide evidence on the goals of the attacker. At the same time, there is no guarantee that the log of IDS will be free of false alarms or that the system will detect the attempt to install malware. Moreover, comparing signatures and volatile data, the amount of information may be overwhelming, which may slow the process of investigation (Marshall, 2008). Considering the mentioned issues as well as the fact that IDS can be used to its full extent only after the analysis of the volatile system data, it is possible to rank it as the second useful source of information for the digital forensics investigation of the malware installation case. Virtual Machine In the case of malware installation, investigators often have to examine the principles of operation of the harmful software and determine the potential threat that it contains by using a virtual machine. It is a software and/or hardware system that emulates the hardware of a target platform and executes the programs for a target platform on the host platform. It can also virtualize a particular platform and create the environments that isolate programs and even operating systems from each other on its basis (Barrett Kipper, 2010). The virtual machine allows to examine the behavior of malware in different conditions and gives an opportunity to return to any stage of the malware installation process as well as change its pace. In turn, it may provide evidence on the type of files that the program tries to modify or delete, the information that it tries to collect as well as the final destination of the stolen data (Sikorski Honig, 2012). As a result, it may provide insight either in to the motives of the attacker or his location, thus speeding the process of investigation. At the same time, the virtual machine cannot always act as a perfect replica of an operating system. As a result, the likelihood of it being discovered by the attackers increases, meaning that they will take safety measures, thus slowing the process of investigation. Moreover, it may not always provide a sufficient environment for the analysis (Barrett Kipper, 2010). Considering all these facts, it is possible to rank it third in the list of the most useful data sources for the digital forensics investigation of the malware installation case. Insider File Deletion Insider file deletion is a threat that emanates from the people within the organization, such as its current and former employees, contractors, and business partners that have information on security practices within it as well as the data and computer systems. Insiders may have passwords that give them legal access to the system. Moreover, they are often familiar with the data and intellectual property of the organization as well as the methods used to protect them. As a result, they can circumvent the entire security system. Physical proximity to the data means that insiders do not need to break through the organizational network by passing the outer perimeter firewalls. Due to the fact that they often have a legitimate access to the information, the file deletion performed by the insiders is difficult to track and prevent (Probst et al., 2010). In this case, such data sources as hard disk drives and network storages are most useful for the digital forensics investigation. Hard Disk Drive Considering that the insider file deletion is usually aimed at non-volatile data, which is not deleted after the shutdown of the system, it is clear that the hard disk drive will be the primary target of the attackers. Despite the fact that the file has been removed completely, i.e., deleted from recycle.bin, only the information regarding its storage sector, path, and create/modify date is erased from the system drive. By using the forensic software, it is possible to recover it, thus nullifying the damage done by the insider and, which is most important, obtaining the evidence on the motives and time of the crime, namely by reviewing the contents of the target file and the time of the deletion (Marshall, 2008). At the same time, the recovery is possible only within a short period of time since the required file data can be overwritten by the system. Moreover, the insider may use specific software to overwrite the mentioned data immediately, meaning it cannot be recovered (Probst et al., 2010). Nevertheless, due to its nature of a primary target, a hard disk drive is the most useful data source for the digital forensics investigation. Network Storage The network storage can be used as a data source in case the deleted file was previously shared with other users. In general, the algorithm of its recovery is based on the search of previous versions of this file. The information obtained from it serves similar purposes. However, in case of network storage, the challenges faced by investigators are more significant due to the overwhelming amounts of information in comparison to that stored on the hard disk drive. Moreover, as in the previous case, the insiders may delete the file permanently or erase the parts of network storage that contain the corresponding information (Lillard et al., 2010). As a result, it ranks second in terms of usefulness to the digital forensics investigation. A significant variety of computer crimes presents a wide array of data sources that can be used during the process of investigation. The types of these sources as well as their usefulness vary depending on the nature of a crime. Still, it is possible to classify them in terms of their value for each specific case, which was demonstrated in the research. However, it should be noted that in most cases, the usefulness of the described data sources depends on the skills and equipment possessed by the investigation team. Moreover, in some cases, for example, the insider file deletion, the preventive measures taken by the attackers can render any of the available data sources useless. As a result, it is clear that the process of digital forensics investigation must be improved on a regular basis to follow the pace of development of the contemporary information technologies.

Thursday, November 21, 2019

Analysis of Lincoln's Second Inaugural Address Essay

Analysis of Lincoln's Second Inaugural Address - Essay Example However, the speech was also intended to try to bring together the two warring halves of the nation that was still involved in the last-gasp efforts of the South to secede from the union. As a result, only about half of the population truly recognized Lincoln as their leader and commander in chief. In this speech, Lincoln attempts to use rhetoric to bring the nation back together again, emphasizing how both North and South had benefited from the slave market and how both North and South should now take up the expense of rebuilding the nation that had been ripped apart over the issue. In making this argument, Lincoln strips away the North’s ability to sanctimoniously condemn the South for profiting off others’ suffering at the same time that Lincoln removes the South’s ability to deny all responsibility for the cost of the war. Within Lincoln’s speech, one can identify all three of the essential elements, exigence, audience and a set of constraints, which L loyd Bitzer suggests are required to create rhetorical communication. Like many of his public speeches, Lincoln kept his second inaugural address short and to the point, presenting a cogent rhetorical argument that addresses the exigence of reuniting the warring factions, the audiences of both North and South and the set of constraints in realizing that human nature would stand in the way of progress. The speech clearly outlines Lincoln’s foundational ideas regarding the Reconstruction he envisioned happening once the war was officially over by releasing both North and South of their objections to working together. The exigence, as it is described by Baxter, emerges as the impending end of the war and national response to the necessary rebuilding of the South. Many of the cities and towns had been destroyed, farmlands were now graveyards and the large plantations had been stripped of more than half of its labor force and required to hire