Friday, May 22, 2020

Wannacry a cyber security issue - Free Essay Example

Sample details Pages: 4 Words: 1081 Downloads: 7 Date added: 2019/10/10 Did you like this example? Despite the growth of technology displaying definite significant to the society, it has been subjected to many challenges with the most conspicuous challenge being the cyber security issue.   To be in a position of defining how cyber security has negatively affected the technology industry, it serves great importance mentioning that cyber security is a set of methods made up of technologies, processes, and practices designed to safeguard networks, programs and data from attacks and damages from viruses or access by unauthorized access.   The process of ensuring cyber security needs coordinated efforts from interested stakeholders in an information system within an organization. In the course of providing a secure information system, the traditional approach concentrated most of it efforts in seeing to it that the most vital system components are protected against the biggest identified threat. Through enhancing the security details of critical components in an information system, information systems components that are thought less important are left unsecured thus exposing them to the attack by viruses.. Don’t waste time! Our writers will create an original "Wannacry a cyber security issue" essay for you Create order In many organizations, the information technology department installs antivirus to protect their organization crucial information from attack by viruses putting less attention on ways in which the whole operating system can be protected from virus attacks. Addressing the issue of operating system attacks by viruses, Wannacry can be viewed as a   cyber security issue in that it affects the Windows operating system. The most conspicuous event that qualifies the Wannacry as a cyber safety issue is that the virus first harmful effects were felt after it attacked over one hundred and fifty regions around the world. A notion that saw to it some people giving the incident the name the begging of a new era that was marked with hackers being in a position of gaining access to other users weak spots in online security. Further prove that Wannacry is a cyber security issue is proven by the fact that the major virus target was Microsoft’s Windows operating system utilizing a malicious software ransomware. Making use of the mentioned virus, Wannacry blocked users from entry to computers system and demanded that the affected user make some payments through crypto media of exchange known as bitcoin. Together with locking down users from accessing important files from their computers in many parts of Europe, Asia and fewer parts of North America,   a well-known electronic company from Japan Known as Hitachi claimed that they experienced hard times in the process of operating their emails.   Some of the complaints raised by the company are that it was not possible for them to send or receive electronic mails, opening attached files a problem that the Hitachi Company attributed to the Wannacry attack. As noted in the introduction paragraph, a cyber security issue is any occurrence that compensates the proper flow of data processing in an information system. Through taking advantage of the Windows operating system exploit called Eterbal Blue, Wannacry ruins the functionality of the software system a perspective that qualifies Wannacry as a cyber security issue.   By inhibiting users from accessing their files unless they make a certain payment via the bitcoin currency, Wannacry rendered the users to a situation in which they could not operate their laptops effectively. Also,   Eternal Blue which takes advantage of  Ã‚   Microsoft patched in security update   MS 17-010 made hackers conversant with using Wannacry virus thus could gain   access to remote computers users and install programs with malicious effects on a given user computer thus locking down the users from accessing their stored information.   For a user to in a position of obtaining his or her stored informa tion, the user was required to make some payments to a certain site.   . Accessing personal information without the authority of the person in question renders the user whose information have been accessed to a situation in which individuals privacy is exposed.   Since Wannacry virus enabled the act, it is a fact Wannacry qualifies a cyber security issue.   Even though the ruins associated with Wannacry attacks were maintained after the ransomware attacks with remediation plans, it serves great importance for organizations dealing with information technology to set an effective means of mitigating chances of cyber security.   The best way in which information Technology Company can figure out the issues of cyber security is through enhancing awareness of using the Internet safely in a whole in an organization. Following the Wannacry attack, it was proven beyond reasonable doubts that any business organization despite the complexity of its system subjected to a risk factor of a cyber attack that in one way or the other compensates the overall functionality of the group in question. As defined in the introduction section of this discussion a cyber security issue is an intentional act that jeopardizes the typical workflow within an organization. On the other hand, cyber security entails the actions aimed at ensuring that malicious users who might harm the way in which computer users carry out their data processing activities safeguard information system from access. Facts provided in the essay give a clear reference to the way in which Wannacry attack caused mishaps on different sections regions across the world.   The first notable effect that Wannacry displayed the traits of a cyber security issue is that it barricaded computers users from accessing their files.   As the discussion high lights, for a user to be in a position of accessing individual’s data, the user in question was required to pay some cash a definite site that he or she would receive an electronic mail.   In addition to denying users access to their information, through making use of Wannacry, malicious users   gained access of other people information thus exposing their privacy. In the process of ensuring data security is arrived at in a given institution, cyber security ensures that malicious users cannot access personal information. This notion is however compensated after Wannacry comes in play. By allowing malicious users gain access of personal Wannacry has proven a cyber security issue.   Despite the fact that Wannacry acting as a cyber security issue, through the application of some of some specific measures organization can mitigate chances of Wannacry and other cyber security issues. For instance ensuring all information system components are safe safeguarded from cases of attack by viruses or access by unauthorized users. In addition to initiating security measures to all elements of information system, the organization in question should see to it that computer users are taken through awareness training to that will help them mitigate chances of unsafe use of internet.

Sunday, May 10, 2020

The Voyager Mission

In 1979, two tiny spacecraft were launched on one-way missions of planetary discovery. They were the twin  Voyager spacecraft, predecessors to the  Cassini spacecraft at Saturn, the Juno mission at Jupiter, and the New Horizons mission to Pluto and beyond. They were preceded in gas giant space by the Pioneers 10 and 11. The Voyagers, which are still transmitting data back to Earth as they leave the solar system, each  carry an array of cameras and instruments designed to  record magnetic, atmospheric, and other data about the planets and their moons, and to send images and data for further study back on Earth.   Voyagers Trips Voyager 1 is speeding along at about 57,600 kph (35,790 mph), which is  fast enough to travel from Earth to the Sun three and a half times in one year. Voyager 2 is   Both spacecraft  carry a gold record greeting to the universe  containing sounds and images selected to portray the diversity of life and culture on Earth. The two-spacecraft Voyager missions were designed to replace original plans for a Grand Tour of the planets that would have used four complex spacecraft to explore the five outer planets during the late 1970s. NASA canceled the plan in 1972 and instead proposed to send two spacecraft to Jupiter and Saturn in 1977. They were  designed to explore the two gas giants in more detail than the two Pioneers (Pioneers 10 and 11) that preceded them. The Voyager Design and Trajectory The original design of the two spacecraft was based on that of the older Mariners (such as Mariner 4, which went to Mars). Power was provided by three plutonium oxide radioisotope thermoelectric generators (RTGs) mounted at the end of a boom. Voyager 1 was launched after Voyager 2, but because of a faster route, it exited the Asteroid Belt earlier than its twin. Both spacecraft got gravitational assists at each planet they passed, which aligned them for their next targets.   Voyager 1 began its Jovian imaging mission in April 1978 at a range of 265 million kilometers from the planet; images sent back by January the following year indicated that Jupiters atmosphere was more turbulent than during the Pioneer flybys in 1973 and 1974. Voyager Studies Jupiters Moons On February 10, 1979, the spacecraft crossed into the Jovian moon system, and in early March, it had already discovered a thin (less than 30 kilometers thick) ring circling Jupiter. Flying past Amalthea, Io, Europa, Ganymede, and Callisto (in that order) on March 5th, Voyager 1 returned spectacular photos of these worlds. The more interesting find was on Io, where images showed a bizarre yellow, orange and brown world with a least eight active volcanoes spewing material into space, making it one of the most (if not the most) geologically active planetary bodies in the solar system. The spacecraft also discovered two new moons, Thebe and Metis. Voyager 1s closest encounter with Jupiter was at 12:05 UT on March 5, 1979, at a range of 280,000 kilometers. On to Saturn Following the Jupiter encounter, Voyager 1 completed a single course correction on April 89 1979, in preparation for its rendezvous with Saturn. The second correction on October 10, 1979, ensured that the spacecraft would not hit Saturns moon Titan. Its flyby of the Saturn system in November 1979 was as spectacular as its previous encounter. Exploring Saturns Icy Moons Voyager 1 found five new moons and a ring system consisting of thousands of bands, discovered a new ring (the G  Ring), and found shepherding satellites on either side of the F-ring satellites that keep the rings well defined. During its flyby, the spacecraft photographed Saturns moons Titan, Mimas, Enceladus, Tethys, Dione, and Rhea. Based on incoming data, all the moons appeared to be largely composed of water ice. Perhaps the most interesting target was Titan, which Voyager 1 passed at 05:41 UT on  November 12th at a range of 4,000 kilometers. Images showed a thick atmosphere that completely hid the surface. The spacecraft found that the moons atmosphere was composed of 90 percent nitrogen. Pressure and temperature at the surface were 1.6 atmospheres and -180 ° C, respectively. Voyager 1s closest approach to Saturn was at 23:45 UT on November 12,  1980, at a range of 124,000 kilometers. Voyager 2 followed up with visits to Jupiter in 1979, Saturn in 1981, Uranus in 1986, and Neptune in 1986. Like its sister ship, it investigated planetary atmospheres, magnetospheres, gravitational fields, and climates, and discovered fascinating facts about the moons of all the planets. Voyager 2 also was the first to visit all four gas giant planets. Outward Bound Because of the specific requirements for  the Titan flyby, the spacecraft was not directed to Uranus and Neptune. Instead,  following the encounter with Saturn, Voyager 1 headed on a trajectory out of the solar system at a speed of 3.5 AU per year. It is on a course 35 ° out of the ecliptic plane to the north, in the general direction of the Suns motion relative to nearby stars. It is now in interstellar space, having passed through the  heliopause boundary, the outer limit of the Suns magnetic field, and the outward flow of the solar wind. Its the first spacecraft from Earth to travel into interstellar space. On February 17, 1998, Voyager 1  became the most distant human-made object in existence when it surpassed Pioneer 10s range from Earth. In mid-2016, the  Voyager 1  was more than  20 billion kilometers from Earth (135 times the Sun-Earth distance) and continuing to move away, while maintaining a tenuous radio link with Earth. Its power supply should last through 2025, allowing the transmitter to keep sending back information about the interstellar environment. Voyager 2 is on a trajectory headed out toward the star Ross 248, which it will encounter in about 40,000 years, and pass by Sirius in just under 300,000 years. It will keep transmitting as long as it has power, which may also be until the year 2025.   Edited and updated by Carolyn Collins Petersen.

Wednesday, May 6, 2020

Act III Scene II Consider the dramatic significance of this episode in the play Free Essays

As an audience, we can foresee the sinister turn of events which will be marked by the appearance of Don John in the latter part of this scene. Having earlier witnessed the deceitful and slanderous plot conjured up between he and Borachio during their discussion, implementation of the plan seems imminent. And yet the descent from the comedy of Benedick trying to pass off his love-sickness as toothache to the threatened tragedy of Hero’s slander is perhaps far more rapid than we might have anticipated. We will write a custom essay sample on Act III Scene II Consider the dramatic significance of this episode in the play or any similar topic only for you Order Now The earlier jovial mockery of Benedick by Don Pedro, Leonato and Claudio provides a striking contrast with the underlying malice of the deliberately ambiguous and disparaging remarks from Don John. Yet such ambiguity seduces Claudio and Don Pedro in a remarkably similar way to the double meanings and innuendo which deceived Benedick earlier on. Don John demonstrates an ability to manipulate his language in a successful bid to influence and target the weaknesses of his audience; that is, Claudio and Don Pedro. He has a shrewd understanding of the court and his insinuations about Hero play upon the tensions within it relating to honour and status. Don John opens with a customary courteous greeting before baiting both men with his declaration that he has something of interest to reveal concerning them both: ‘If your leisure served, I would speak with you / yet Count Claudio may hear; for what I would speak of concerns him.’ ‘I know not that, when he knows what I know’. With their curiosity secured, Don Pedro conveys a rather convoluted proclamation of regret and remorse for the bad news he is about to impart, ‘You may think I love you not: let that appear hereafter†¦Ã¢â‚¬â„¢ and when combined with his fallacious self-deprecation, we observe further his dexterity as their sympathy and trust is won. As he continues with his tacit allegations, Don John uses a loose and undefined disparagement ‘disloyal’ which would imply a certain reluctance to accuse Hero, yet his following remark; ‘The word is too good to paint out her wickedness’ incites the other men to affix their own condemnation of her. A dramatic irony here ensures the audience’s perception of this as a further ruse whilst for the seemingly naà ¯Ã‚ ¿Ã‚ ½ve and gullible Claudio and Don John, it makes the hurried offer of immediate visual evidence irresistible; ‘Go but with me tonight, you shall see her chamber-window entered’, a crude vaginal symbol is used to further offend the newly enamoured Claudio, who in his youthful inexperience has believed in his betrothed’s virginity. Their melodramatic exclamations in response to this, one after another, serve to indicate ironically how they, who tricked Benedick, have been no less suddenly transformed. Claudio asks rhetorically ‘May this be so?’ and vows if it is, ‘†¦should not marry her tomorrow in the congregation, where I should wed, there I will shame her’. The marked use of sibilants serves to emphasise his fury, suggesting suspicion and fear to be the other side of Claudio’s idealisation and the aggressive denunciation may arise from a personal insecurity urging him to make such a pledge. In Messina sexual relations are complicated by conventions and illusions, Claudio has already tried and found Hero guilty before even witnessing the evidence. Such a rash conviction is reminiscent of his earlier behaviour during the masked ball in Act II Scene I which gave us foresight of Claudio’s impulsive and fickle characteristics, a man so easily influenced by the ‘hearsay’ from Don John and his own irrationality and mistrust in women. Though it is easy to criticise and condemn Claudio for such tenuous judgements, one must not disregard Messina’a patriarchal society and the sense of superiority to women which regulated masculine loyalties. Such loyalty is evident in Don Pedro, who; when informed of Hero’s alleged infidelity, endorses Claudio’s vengeance by offering to ‘join with thee to disgrace her’. Such is Don Pedro’s influence and arrogance that Claudio offers to accompany his departure from Messina on the wedding day. We must now question Don Pedro’s willingness to join Claudio’s slandering of Hero which not only seems cowardly but most absurd having himself been the ‘accused’ by the same source of indictment – his rebel brother, the bastard Don John. Whilst for an audience of the twenty-first century this continued credulous behaviour might seem somewhat contrived, we must consider that Don John, a melodramatically sketched, stereotypical villain, serves a thematic and narrative function. His role is principally to expose the flaws within others, namely his brother Don Pedro and Claudio and highlight the shared immorality in his companions Conrade and Borachio as well as present themes of slander, noting, jealousy, honour, illusion and reality. Since the major complication of the play arises from Claudio’s denunciation of Hero on the basis of Don John’s trickery, and in fact therefore ‘nothing’ at all, the use of such a villain as a dramatic device is crucial. Whilst only a brief episode in the play; the significance of the latter part of this scene is paramount to future events. The timing of the episode is most significant as Shakespeare distinguishes misunderstanding and misreport from deliberate and malicious deceit. We prepare ourselves for a potentially tragic consequence yet with the benefit of dramatic irony, remain optimistic that as the title suggests, this will again prove to be ‘much ado about nothing’. How to cite Act III Scene II Consider the dramatic significance of this episode in the play, Papers