Tuesday, October 29, 2019

PRINCESS DIANA Essay Example | Topics and Well Written Essays - 500 words

PRINCESS DIANA - Essay Example Being a free soul, she loved music and dancing. Also, she was quite fond of the popular culture and even after her divorce, later in 1982, she maintained her celebrity image amongst the masses. She was also deeply indulged in charitable causes including HIV AIDS, homeless and especially children with needs. Her leadership skills developed over time eventually and after consistent mentoring by Stephen Twigg, her personality transformed from that of a suicidal woman trapped in royalty to courageous women world stage performer. Furthermore, James Hewitt and Oliver Hoare turned out to be quite positive influence on her personality and helped her move forward. However, having met Hasnat Khan, she found a renewed sense of companionship and confidence in herself which transformed her leadership skills (Morton 1994). As a human being, Lady Diana was quite generous and kind. She was often found spending time in hospitals, old folk homes and various institutions. It is also said that her soul was dissatisfied and distressed, and devoting her time to Charity helped her with the healing process. She was also quite nurturing in nature as she spent a lot of time with her sons and taught them about the life outside the palace. Also, she reflected her celebrity image not just in Britain but also globally as she actively participated in charitable events around the globe including the Red Cross. During her marriage, she was acquainted to about 100 charities as Patron or President. She was also quite creative in character, and her interest and fascination with music led toward accomplishing various titles and awards. She motivated people by spreading a positive aura and sense of affection amongst others, especially the less well off. People responded with gratefulness and an even higher sense of affection toward her. Not only did they reciprocated her contributions with immense acknowledgement but also they gave her a very high

Sunday, October 27, 2019

Analysis of Honeynets and Honeypots for Security

Analysis of Honeynets and Honeypots for Security Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and they operate on these rules. That is why anomaly detection is limited only to the set of available rules. Any activity that is not in alignment with the given rules and signatures goes under the radar undetected. Honeypots by design allows you to take the initiative, and trap those bad guys (hackers). This system has no production value, with no authorized activity. Any interaction with the honeypot is considered malicious in intent. The combination of honeypots is honeynet. Basically honeypots or honeynets do not solve the security problem but provide information and knowledge that help the system administrator to enhance the overall security of his network and systems. This knowledge can act as an Intrusion detection system and used as input for any early warning systems. O ver the years researchers have successfully isolated and identified verity of worms exploits using honeypots and honeynets. Honeynets extend the concept of a single honeypot to a highly controlled network of honeypots. A honeynet is a specialized network architecture cond in a way to achieve Data Control, Data Capture Data Collection. This architecture builds a controlled network that one can control and monitor all kind of system and network activity. 1.1 Information Security Information Security is the protection of all sensitive information, electronic or otherwise, which is owned by an individual or an organization. It deals with the preservation of the confidentiality, integrity and availability of information. It protects information of organizations from all kinds of threats to ensure business continuity, minimize business damage and maximize the return on investment and business opportunities. Information stored is highly confidential and not for public viewing. Through information security we protect its availability, privacy and integrity. Information is one of most important assets of financial institutions. Fortification of information assets is essential to ascertain and maintain trust between the financial institution and its customers, maintain compliance with the law, and protect the reputation of the institution. Timely and reliable information is compulsory to process transactions and support financial institution and customer decisions. A financial institutions earnings and capital can be adversely affected, if information becomes known to unauthorized parties is distorted or is not available when it is needed [15]. 1.2 Network Security It is the protection of networks and its services from any unauthorized access. It includes the confidentiality and integrity of all data passing through the network. It also includes the security of all Network devices and all information assets connected to a network as well as protection against all kind of known and unknown attacks. The ITU-T Security Architecture for Open System Interconnection (OSI) document X.800 and RFC 2828 are the standard documentation defining security services. X.800 divides the security services into 5 categories and 14 specific services which can be summarized as Table 1.1 OSI X.800 Summary[8] â€Å"1. AUTHENTICATION The assurance that the communicating entity is the one that it claims to be. Peer Entity Authentication Used in association with a logical connection to provide confidence in the identity of the entities connected. Data Origin Authentication In a connectionless transfer, provides assurance that the source of received data is as claimed. 2. ACCESS CONTROL The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). 3. DATA CONFIDENTIALITY The protection of data from unauthorized disclosure. Connection Confidentiality The protection of all user data on a connection. Connectionless Confidentiality The protection of all user data in a single data block Selective-Field Confidentiality The confidentiality of selected fields within the user data on a connection or in a single data block. Traffic Flow Confidentiality The protection of the information that might be derived from observation of traffic flows. 4. DATA INTEGRITY The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay). Connection Integrity with Recovery Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted. Connection Integrity without Recovery As above, but provides only detection without recovery. Selective-Field Connection Integrity Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed. Connectionless Integrity Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided. Selective-Field Connectionless Integrity Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified. 5. NONREPUDIATION Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. Nonrepudiation, Origin Proof that the message was sent by the specified party. Nonrepudiation, Destination Proof that the message was received by the specified party.† [1] [8], [9], 1.3 The Security Problem System security personnel fighting an unending battle to secure their digital assets against the ever increasing attacks, verity of attacks and their intensity is increasing day by day. Most of the attacks are detected after the exploitations so there should be awareness of the threats and vulnerabilities that exist in the Internet today. First we have to understand that we cannot say that there exists a perfect secure machine or network because the closest we can get to an absolute secure machine is that we unplugged the network cable and power supply and put that machine in to a safe. Unfortunately it is not useful in that state. We cannot achieve perfect security and perfect access at the same time. We can only increase the no of doors but we cannot put wall instead of doors. In field of security we need to find the vulnerably and exploits before they affect us. Honeypot and honeynet provides a valuable tool to collect information about the behavior of attackers in order to design and implement better defense. In the field of security it is important to note that we cannot simply state that what is the best type of firewall? Absolute security and absolute access are the two chief points. Absolute security and absolute access are inverse to each other. If we increase the security access will be decrease. There should be balance between absolute security and absolute defense, access is given without compromising the security. If we compare it to our daily lives we observe not much difference. We are continuously making decisions regarding what risks we are ready to take. When we step out of our homes we are taking a risk. As we get into a car and drive to our work place there is a risk associated with it too. There is a possibility that something might happen on the highway which will make us a part of an accident. When we fly and sit on an airplane we are willing to undergo the level of risk which is at par with the heavy amount we are paying for this convenience. It is observed that many people think differently about what an acceptable risk would be and in majority cases they do go beyond this thinking. For instance if I am sitting upstairs in my room and have to go to work, I wont take a jump straight out of the window. It might be a faster way but the danger of doing so and the injury I would have to face is much greater than the convenience. It is vital for every organization to decide that between the two opposite poles of total security and total access where they need to place themselves. It is necessary for a policy to articulate this system and then further explain the way it will be enforced with which practices and ways. Everything that is done under the name of security must strictly agree to the policy. 1.4 Types of Hacker Hackers are generally divide into two major categories. 1.4.1 Black Hats Black hat hackers are the biggest threat both internal and external to the IT infrastructure of any organization, as they are consistently challenging the security of applications and services. They are also called crackers, These are the persons who specialize in unauthorized infiltration. There could be Varity of reasons for this type of penetration it could be for profit, for enjoyment, or for political motivations or as a part of a social cause. Such infiltration often involves modification / destruction of data. 1.4.2 White Hats White hat hackers are similar to black hat hackers but there is a important difference that is white hat hackers do it without any criminal intention. Different companies all around the world hire/contact these kinds of persons to test their systems and softwares. They check how secure these systems are and point out any fault they found. These hackers, also known as ethical hackers, These are the persons or security experts who are specialize in penetration testing. These types of people are also known as tiger teams. These experts may use different types of methods and techniques to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to bypass security to gain entry into protected areas, but they do this only to find weaknesses in the system[8]. 1.5 Types of Attacks There are many types of attacks that can be categorized under 2 major categories Active Attacks Passive Attacks 1.5.1 Active Attacks Active attacks involve the attacker taking the offensive and directing malicious packets towards its victims in order to gain illegitimate access of the target machine such as by performing exhaustive user password combinations as in brute-force attacks. Or by exploiting remote local vulnerabilities in services and applications that are termed as holes. Other types of attacks include Masquerading attack when attacker pretends to be a different entity. Attacker user fake Identity of some legitimate user. Replay attack In Replay attack, attacker captures data and retransmits it to produce an unauthorized effect. It is a kind of man in middle attack. Modification attack In this type of attack integrity of the message is compromise. Message or file is modified by the attacker to achieve his malicious goals. Denial of service (DOS)attack In DOS attack an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. TCP ICMP scanning is also a form of active attacks in which the attackers exploit the way protocols are designed to respond. e.g. ping of death, sync attacks etc. In all types of active attacks the attacker creates noise over the network and transmits packets making it possible to detect and trace the attacker. Depending on the skill level, it has been observed that the skill full attackers usually attack their victims from proxy destinations that they have victimized earlier. 1.5.2 Passive Attacks Passive attacks involve the attacker being able to intercept, collect monitor any transmission sent by their victims. Thus, eavesdropping on their victim and in the process being able to listen in to their victims or targets communications. Passive attacks are very specialized types of attacks which are aimed at obtaining information that is being transmitted over secure and insecure channels. Since the attacker does not create any noise or minimal noise on the network so it is very difficult to detect and identify them. Passive attacks can be divided into 2 main types, the release of message content and traffic analysis. Release of message content It involves protecting message content from getting in hands of unauthorized users during transmission. This can be as basic as a message delivered via a telephone conversation, instant messenger chat, email or a file. Traffic analysis It involves techniques used by attackers to retrieve the actual message from encrypted intercepted messages of their victims. Encryption provides a means to mask the contents of a message using mathematical formulas and thus make them unreadable. The original message can only be retrieved by a reverse process called decryption. This cryptographic system is often based on a key or a password as input from the user. With traffic analysis the attacker can passively observe patterns, trends, frequencies and lengths of messages to guess the key or retrieve the original message by various cryptanalysis systems. Chapter 2 Honeypot and Honeynet 2.1 Honeypot Is a system, or part of a system, deliberately made to invite an intruder or system cracker. Honeypots have additional functionality and intrusion detection systems built into them for the collection of valuable information on the intruders. The era of virtualization had its impact on security and honeypots, the community responded, marked by the fine efforts of Niels Provos (founder of honeyd) Thorsten Holz for their masterpiece book â€Å"Virtual Honeypots From Botnet Tracking to Intrusion Detection† in 2007. 2.2 Types of Honeypots Honeypots can be categorized into 2 main types based on Level of interaction Deployment. 2.2.1 Level of interaction Level of interaction determines the amount of functionality a honeypot provides. 2.2.1.1 Low-interaction Honeypot Low-interaction honey pots are limited in the extent of their interaction with the attacker. They are generally emulator of the services and operating systems. 2.2.1.2 High interaction Honeypot High-interaction honeypots are complex solution they involve with the deployment of real operating systems and applications. High interaction honeypots capture extensive amount of information by allowing attacker to interact with the real systems. 2.2.2 Deployment Based on deployment honeypot may be classified as Production Honeypots Research Honeypots 2.2.2.1 Production Honeypots Production honeypots are honeypots that are placed within the production networks for the purpose of detection. They extend the capabilities of the intrusion detection systems. These type of honeypots are developed and cond to integrate with the organizations infrastructure and scope. They are usually implemented as low-interaction honeypots but implementation may vary depending on the available funding and expertise required by the organization. Production honeypots can be placed within the application and authentication server subnets and can identify any attacks directed towards those subnets. Thus they can be used to identify both internal and external threats for an organization. These types of honeypots can also be used to detect malware propagation in the network caused by zero day exploits. Since IDSs detection is based on database signatures they fail to detect exploits that are not defined in their databases. This is where the honeypots out shine the Intrusion detection systems. They aid the system network administrators by providing network situational awareness. On basis of these results administrators can take decisions necessary to add or enhance security resources of the organization e.g. firewall, IDS and IPS etc. 2.2.2.1 Research Honeypots Research honeypots are deployed by network security researchers the whitehat hackers. Their primarily goal is to learn the tools, tactics techniques of the blackhat hackers by which they exploit computers network systems. These honeypots are deployed with the idea of allowing the attacker complete freedom and in the process learn his tactics from his movement within the system. Research honeypots help security researchers to isolate attacker tools they use to exploit systems. They are then carefully studied within a sand box environment to identify zero day exploits. Worms, Trojans and viruses propagating in the network can also be isolated and studied. The researchers then document their findings and share with system programmers, network and system administrators various system and anti-virus vendors. They provide the raw material for the rule engines of IDS, IPS and firewall system. Research Honeypots act as early warning systems. They are designed to detect and log maximum information from attackers yet being stealthy enough not to let attackers identify them. The identity of the honeypot is crucial and we can conclude that the learning curve (from the attacker) is directly proportional to the stealthiest of thehoneypot .These types of honeypots are usually deployed at universities and by the RD departments of various organizations. These types of honeypots are usually deployed as High-Interaction honeypots. 2.3 Honeynet The concept of the honeypot is sometimes extended to a network of honeypots, known as a honeynet. In honeynet we grouped different types of honeypots with different operatrating systems which increases the probability of trapping an attacker. At the same time, a setting in which the attacker explores the honeynet through network connections between the various host systems provides additional prospects for monitoring the attack and revealing information about the intruder. The honeynet operator can also use the honeynet for training purposes, gaining valuable experience with attack strategies and digital forensics without endangering production systems. The Honeynet project is a non-profit research organization that provides tools for building and managing honeynets. The tools of the Honeynet project are designed for the latest generation of high interaction honeynets that require two separate networks. The honeypots reside on the first network, and the second network holds the tools for managing the honeynet. Between these tools (and facing the Internet) is a device known as the honeywall. The honeywall, which is actually a kind of gateway device, captures controls, and analyzes all inbound and outbound traffic to the honeypots[4]. It is a high-interaction honeypot designed to capture wide-range of information on threats. High-interaction means that a honeynet provides real systems, applications, and services for attackers to interact with, as opposed to low-interaction honeypots which provide emulated services and operating systems. It is through this extensive interaction we gain information on threats, both external and internal to an organization. What makes a honeynet different from most honeypots is that it is a network of real computers for attackers to interact with. These victim systems (honeypots within the honeynet) can be any type of system, service, or information you want to provide [14]. 2.4 Honeynet Data Management Data management consist of three process Data control, data capture and data collection. 2.4.1 Data Control Data control is the containment of activity within the honeynet. It determines the means through which the attackers activity can be restricted in a way to avoid damaging/abusing other systems/resources through the honeynet. This demands a great deal of planning as we require to give the attacker freedom in order to learn from his moves and at the same time not let our resources (honeypot+bandwidth) to be used to attack, damage and abuse other hosts on the same or different subnets. Careful measures are taken by the administrators of the honeynet to study and formulate a policy on attackers freedom versus containment and implement this in a way to achieve maximum data control and yet not be discovered or identified by the attacker as a honeypot. Security is a process and is implemented in layers, various mechanisms to achieve data control are available such as firewall, counting outbound connections, intrusion detection systems,intrusion prevention systems and bandwidth restriction e tc. Depending on our requirements and risk thresholds defined we can implement data control mechanisms accordingly [4]. 2.4.2 Data Capture Data Capture involves the capturing, monitoring and logging of allthreats and attacker activities within the honeynet. Analysis of this captured data provides an insight on the tools, tactics, techniques and motives of the attackers. The concept is to achieve maximum logging capability at all nodes and hence log any kind of attackers interaction without the attacker knowing it. This type of stealthy logging is achieved by setting up tools and mechanisms on the honeypots to log all system activity and have network logging capability at the honeywall. Every bit of information is crucial in studying the attacker whether its a TCP port scan, remote and local exploit attempt, brute force attack, attack tool download by the haacker, various local commands run, any type of communication carried out over encrypted and unencrypted channels (mostly IRC) and any outbound connection attempt made by the attacker [25]. All of this should be logged successfully and sent over to a remote location to avoid any loss of data due to risk of system damage caused by attackers, such as data wipe out on disk etc. In order to avoid detection of this kind of activity from the attacker, data masking techniques such as encryption should be used. 2.4.3 Data Collection Once data is captured, it is securely sent to a centralized data collection point. Data is used for analysis and archiving which is collected from different honeynet sensors. Implementations may vary depending on the requirements of the organization, however latest implementations incorporate data collection at the honeywall gateway [19]. 2.5 Honeynet Architectures There are three honeynet architectures namely Generation I, Generation II and Generation III 2.5.1 Generation I Architecture Gen I Honeynet was developed in 1999 by the Honeynet Project. Its purpose was to capture attackers activity and give them the feeling of a real network. The architecture is simple with a firewall aided by IDS at front and honeypots placed behind it. This makes it detectable by attacker [7]. 2.5.2 Generation II III Architecture Gen II honeynets were first introduced in 2001 and Gen III honeynets was released in the end of 2004. Gen II honeynets were made in order to address the issues of Gen I honeynets. Gen II and Gen III honeynets have the same architecture. The only difference being improvements in deployment and management, in Gen III honeynets along with the addition of Sebek server built in the honeywall. Sebek is a stealthy capture tool installed on honeypots that capture and log all requests sent to the system read and write system call. This is very helpful in providing an insight on the attacker [7]. A radical change in architecture was brought about by the introduction of a single device that handles the data control and data capture mechanisms of the honeynet called the IDS Gateway or marketing-wise, the Honeywall. By making the architecture more â€Å"stealthy†, attackers are kept longer and thus more data is captured. There was also a major thrust in improving honeypot layer of data capture with the introduction of a new UNIX and Windows based data. 2.6 Virtual Honeynet Virtualization is a technology that allows running multiple virtual machines on a single physical machine. Each virtual machine can be an independent Operating system installation. This is achieved by sharing the physical machines resources such as CPU, Memory, Storage and peripherals through specialized software across multiple environments. Thus multiple virtual Operating systems can run concurrently on a single physical machine [4]. A virtual machine is specialized software that can run its own operating systems and applications as if it were a physical computer. It has its own CPU, RAM storage and peripherals managed by software that dynamically shares it with the physical hardware resources. Virtulization A virtual Honeynet is a solution that facilitates one to run a honeynet on a single computer. We use the term virtual because all the different operating systems placed in the honeynet have the appearance to be running on their own, independent computer. Network to a machine on the Honeynet may indicate a compromised enterprise system. CHAPTER 3 Design and Implementation Computer networks, connected to the Internet are vulnerable to a variety of exploits that can compromise their intended operations. Systems can be subject to Denial of Service Attacks, i-e preventing other computers to gain access for the desired service (e.g. web server) or prevent them from connecting to other computers on the Internet. They can also be subject to attacks that cause them to cease operations either temporarily or permanently. A hacker may be able to compromise a system and gain root access as if he is the system administrator. The number of exploits targeted against various platforms, operating systems, and applications increasing regularly. Most of vulnerabilities and attack methods are detected after the exploitations and cause big loses. Following are the main components of physical deployment of honeynet. First is the design of the Deployed Architecture. Then we installed SUN Virtual box as the Virtualization software. In this we virtually installed three Operating System two of them will work as honey pots and one Honeywall Roo 1.4 as Honeynet transparent Gateway. Snort and sebek are the part of honeywall roo operating system. Snort as IDS and Snort-Inline as IPS. Sebek as the Data Capture tool on the honeypot. The entire OS and honeywall functionality is installed on the system it formats all the previous data from the hard disk. The only purpose now of the CDROM is to install this functionality to the local hard drive. LiveCD could not be modified, so after installing it on the hard drive we can modify it according to our requirement. This approach help us to maintain the honeywall, allowing honeynet to use automated tools such asyumto keep packages current [31]. In the following table there is a summry of products with features installed in honeynet and hardware requirements. Current versions of the installed products are also mention in the table. Table 3.1 Project Summary Project Summary Feature Product Specifications Host Operating System Windows Server 2003 R2 HW Vendor HP Compaq DC 7700 ProcessorIntel(R) Pentium ® D CPU 3GHz RAM 2GB Storage 120GB NIC 1GB Ethernet controller (public IP ) Guest Operating System 1 Linux, Honeywall Roo 1.4 Single Processor Virtual Machine ( HONEYWALL ) RAM 512 MB Storage 10 GB NIC 1 100Mbps Bridged interface NIC 2 100Mbps host-only interface NIC 3 100Mbps Bridged interface (public IP ) Guest Operating System 2 Linux, Ubuntu 8.04 LTS (Hardy Heron) Single Processor Virtual Machine ( HONEYPOT ) RAM 256 MB Storage 10 GB NIC 100Mbps host-only vmnet (public IP ) Guest Operating System 3 Windows Server 2003 Single Processor Virtual Machine ( HONEYPOT ) RAM 256 MB Storage 10 GB NIC 100Mbps host-only vmnet (public IP ) Virtualization software SUN Virtual Box Version 3 Architecture Gen III Gen III implemented as a virtual honeynet Honeywall Roo Roo 1.4 IDS Snort Snort 2.6.x IPS Snort_inline Snort_inline 2.6.1.5 Data Capture Tool (on honeypots) Sebek Sebek 3.2.0 Honeynet Project Online Tenure November 12, 2009 TO December 12, 2009 3.1 Deployed Architecture and Design 3.2 Windows Server 2003 as Host OS Usability and performance of virtualization softwares are very good on windows server 2003. Windows Server 2003is aserveroperating system produced byMicrosoft. it is considered by Microsoft to be the cornerstone of itsWindows Server Systemline of business server products. Windows Server 2003 is more scalable and delivers better performance than its predecessor,Windows 2000. 3.3 Ubuntu as Honeypot Determined to use free and open source software for this project, Linux was the natural choice to fill as the Host Operating System for our projects server. Ubuntu 8.04 was used as a linux based honeypot for our implementation. The concept was to setup an up-to-date Ubuntu server, cond with commonly used services such as SSH, FTP, Apache, MySQL and PHP and study attacks directed towards them on the internet. Ubuntu being the most widely used Linux desktop can prove to be a good platform to study zero day exploits. It also becomes a candidate for malware collection and a source to learn hacker tools being used on the internet. Ubuntu was successfully deployed as a virtual machine and setup in our honeynet with a host-only virtual Ethernet connection. The honeypot was made sweeter i.e. an interesting target for the attacker by setting up all services with default settings, for example SSH allowed password based connectivity from any IP on default port 22, users created were given privi leges to install and run applications, Apache index.html page was made remotely accessible with default errors and banners, MySQL default port 1434 was accessible and outbound connections were allowed but limited [3]. Ubuntu is a computeroperating systembased on theDebianGNU/Linux distribution. It is named after theSouthern Africanethical ideology Ubuntu (humanity towards others)[5]and is distributed asfree and open source software. Ubuntu provides an up-to-date, stable operating system for the average user, with a strong focus onusabilityand ease of installation. Ubuntu focuses onusability andsecurity. The Ubiquity installer allows Ubuntu to be installed to the hard disk from within the Live CD environment, without the need for restarting the computer prior to installation. Ubuntu also emphasizesaccessibilityandinternationalization to reach as many people as possible [33]. Ubuntu comes installed with a wide range of software that includes OpenOffice, Firefox,Empathy (Pidgin in versions before 9.10), Transmission, GIMP, and several lightweight games (such as Sudoku and chess). Ubuntu allows networking ports to be closed using its firewall, with customized port selectio Analysis of Honeynets and Honeypots for Security Analysis of Honeynets and Honeypots for Security Chapter 1 Introduction Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. They have the dynamic database of available rules and signatures and they operate on these rules. That is why anomaly detection is limited only to the set of available rules. Any activity that is not in alignment with the given rules and signatures goes under the radar undetected. Honeypots by design allows you to take the initiative, and trap those bad guys (hackers). This system has no production value, with no authorized activity. Any interaction with the honeypot is considered malicious in intent. The combination of honeypots is honeynet. Basically honeypots or honeynets do not solve the security problem but provide information and knowledge that help the system administrator to enhance the overall security of his network and systems. This knowledge can act as an Intrusion detection system and used as input for any early warning systems. O ver the years researchers have successfully isolated and identified verity of worms exploits using honeypots and honeynets. Honeynets extend the concept of a single honeypot to a highly controlled network of honeypots. A honeynet is a specialized network architecture cond in a way to achieve Data Control, Data Capture Data Collection. This architecture builds a controlled network that one can control and monitor all kind of system and network activity. 1.1 Information Security Information Security is the protection of all sensitive information, electronic or otherwise, which is owned by an individual or an organization. It deals with the preservation of the confidentiality, integrity and availability of information. It protects information of organizations from all kinds of threats to ensure business continuity, minimize business damage and maximize the return on investment and business opportunities. Information stored is highly confidential and not for public viewing. Through information security we protect its availability, privacy and integrity. Information is one of most important assets of financial institutions. Fortification of information assets is essential to ascertain and maintain trust between the financial institution and its customers, maintain compliance with the law, and protect the reputation of the institution. Timely and reliable information is compulsory to process transactions and support financial institution and customer decisions. A financial institutions earnings and capital can be adversely affected, if information becomes known to unauthorized parties is distorted or is not available when it is needed [15]. 1.2 Network Security It is the protection of networks and its services from any unauthorized access. It includes the confidentiality and integrity of all data passing through the network. It also includes the security of all Network devices and all information assets connected to a network as well as protection against all kind of known and unknown attacks. The ITU-T Security Architecture for Open System Interconnection (OSI) document X.800 and RFC 2828 are the standard documentation defining security services. X.800 divides the security services into 5 categories and 14 specific services which can be summarized as Table 1.1 OSI X.800 Summary[8] â€Å"1. AUTHENTICATION The assurance that the communicating entity is the one that it claims to be. Peer Entity Authentication Used in association with a logical connection to provide confidence in the identity of the entities connected. Data Origin Authentication In a connectionless transfer, provides assurance that the source of received data is as claimed. 2. ACCESS CONTROL The prevention of unauthorized use of a resource (i.e., this service controls who can have access to a resource, under what conditions access can occur, and what those accessing the resource are allowed to do). 3. DATA CONFIDENTIALITY The protection of data from unauthorized disclosure. Connection Confidentiality The protection of all user data on a connection. Connectionless Confidentiality The protection of all user data in a single data block Selective-Field Confidentiality The confidentiality of selected fields within the user data on a connection or in a single data block. Traffic Flow Confidentiality The protection of the information that might be derived from observation of traffic flows. 4. DATA INTEGRITY The assurance that data received are exactly as sent by an authorized entity (i.e., contain no modification, insertion, deletion, or replay). Connection Integrity with Recovery Provides for the integrity of all user data on a connection and detects any modification, insertion, deletion, or replay of any data within an entire data sequence, with recovery attempted. Connection Integrity without Recovery As above, but provides only detection without recovery. Selective-Field Connection Integrity Provides for the integrity of selected fields within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted, or replayed. Connectionless Integrity Provides for the integrity of a single connectionless data block and may take the form of detection of data modification. Additionally, a limited form of replay detection may be provided. Selective-Field Connectionless Integrity Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified. 5. NONREPUDIATION Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. Nonrepudiation, Origin Proof that the message was sent by the specified party. Nonrepudiation, Destination Proof that the message was received by the specified party.† [1] [8], [9], 1.3 The Security Problem System security personnel fighting an unending battle to secure their digital assets against the ever increasing attacks, verity of attacks and their intensity is increasing day by day. Most of the attacks are detected after the exploitations so there should be awareness of the threats and vulnerabilities that exist in the Internet today. First we have to understand that we cannot say that there exists a perfect secure machine or network because the closest we can get to an absolute secure machine is that we unplugged the network cable and power supply and put that machine in to a safe. Unfortunately it is not useful in that state. We cannot achieve perfect security and perfect access at the same time. We can only increase the no of doors but we cannot put wall instead of doors. In field of security we need to find the vulnerably and exploits before they affect us. Honeypot and honeynet provides a valuable tool to collect information about the behavior of attackers in order to design and implement better defense. In the field of security it is important to note that we cannot simply state that what is the best type of firewall? Absolute security and absolute access are the two chief points. Absolute security and absolute access are inverse to each other. If we increase the security access will be decrease. There should be balance between absolute security and absolute defense, access is given without compromising the security. If we compare it to our daily lives we observe not much difference. We are continuously making decisions regarding what risks we are ready to take. When we step out of our homes we are taking a risk. As we get into a car and drive to our work place there is a risk associated with it too. There is a possibility that something might happen on the highway which will make us a part of an accident. When we fly and sit on an airplane we are willing to undergo the level of risk which is at par with the heavy amount we are paying for this convenience. It is observed that many people think differently about what an acceptable risk would be and in majority cases they do go beyond this thinking. For instance if I am sitting upstairs in my room and have to go to work, I wont take a jump straight out of the window. It might be a faster way but the danger of doing so and the injury I would have to face is much greater than the convenience. It is vital for every organization to decide that between the two opposite poles of total security and total access where they need to place themselves. It is necessary for a policy to articulate this system and then further explain the way it will be enforced with which practices and ways. Everything that is done under the name of security must strictly agree to the policy. 1.4 Types of Hacker Hackers are generally divide into two major categories. 1.4.1 Black Hats Black hat hackers are the biggest threat both internal and external to the IT infrastructure of any organization, as they are consistently challenging the security of applications and services. They are also called crackers, These are the persons who specialize in unauthorized infiltration. There could be Varity of reasons for this type of penetration it could be for profit, for enjoyment, or for political motivations or as a part of a social cause. Such infiltration often involves modification / destruction of data. 1.4.2 White Hats White hat hackers are similar to black hat hackers but there is a important difference that is white hat hackers do it without any criminal intention. Different companies all around the world hire/contact these kinds of persons to test their systems and softwares. They check how secure these systems are and point out any fault they found. These hackers, also known as ethical hackers, These are the persons or security experts who are specialize in penetration testing. These types of people are also known as tiger teams. These experts may use different types of methods and techniques to carry out their tests, including social engineering tactics, use of hacking tools, and attempts to bypass security to gain entry into protected areas, but they do this only to find weaknesses in the system[8]. 1.5 Types of Attacks There are many types of attacks that can be categorized under 2 major categories Active Attacks Passive Attacks 1.5.1 Active Attacks Active attacks involve the attacker taking the offensive and directing malicious packets towards its victims in order to gain illegitimate access of the target machine such as by performing exhaustive user password combinations as in brute-force attacks. Or by exploiting remote local vulnerabilities in services and applications that are termed as holes. Other types of attacks include Masquerading attack when attacker pretends to be a different entity. Attacker user fake Identity of some legitimate user. Replay attack In Replay attack, attacker captures data and retransmits it to produce an unauthorized effect. It is a kind of man in middle attack. Modification attack In this type of attack integrity of the message is compromise. Message or file is modified by the attacker to achieve his malicious goals. Denial of service (DOS)attack In DOS attack an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. TCP ICMP scanning is also a form of active attacks in which the attackers exploit the way protocols are designed to respond. e.g. ping of death, sync attacks etc. In all types of active attacks the attacker creates noise over the network and transmits packets making it possible to detect and trace the attacker. Depending on the skill level, it has been observed that the skill full attackers usually attack their victims from proxy destinations that they have victimized earlier. 1.5.2 Passive Attacks Passive attacks involve the attacker being able to intercept, collect monitor any transmission sent by their victims. Thus, eavesdropping on their victim and in the process being able to listen in to their victims or targets communications. Passive attacks are very specialized types of attacks which are aimed at obtaining information that is being transmitted over secure and insecure channels. Since the attacker does not create any noise or minimal noise on the network so it is very difficult to detect and identify them. Passive attacks can be divided into 2 main types, the release of message content and traffic analysis. Release of message content It involves protecting message content from getting in hands of unauthorized users during transmission. This can be as basic as a message delivered via a telephone conversation, instant messenger chat, email or a file. Traffic analysis It involves techniques used by attackers to retrieve the actual message from encrypted intercepted messages of their victims. Encryption provides a means to mask the contents of a message using mathematical formulas and thus make them unreadable. The original message can only be retrieved by a reverse process called decryption. This cryptographic system is often based on a key or a password as input from the user. With traffic analysis the attacker can passively observe patterns, trends, frequencies and lengths of messages to guess the key or retrieve the original message by various cryptanalysis systems. Chapter 2 Honeypot and Honeynet 2.1 Honeypot Is a system, or part of a system, deliberately made to invite an intruder or system cracker. Honeypots have additional functionality and intrusion detection systems built into them for the collection of valuable information on the intruders. The era of virtualization had its impact on security and honeypots, the community responded, marked by the fine efforts of Niels Provos (founder of honeyd) Thorsten Holz for their masterpiece book â€Å"Virtual Honeypots From Botnet Tracking to Intrusion Detection† in 2007. 2.2 Types of Honeypots Honeypots can be categorized into 2 main types based on Level of interaction Deployment. 2.2.1 Level of interaction Level of interaction determines the amount of functionality a honeypot provides. 2.2.1.1 Low-interaction Honeypot Low-interaction honey pots are limited in the extent of their interaction with the attacker. They are generally emulator of the services and operating systems. 2.2.1.2 High interaction Honeypot High-interaction honeypots are complex solution they involve with the deployment of real operating systems and applications. High interaction honeypots capture extensive amount of information by allowing attacker to interact with the real systems. 2.2.2 Deployment Based on deployment honeypot may be classified as Production Honeypots Research Honeypots 2.2.2.1 Production Honeypots Production honeypots are honeypots that are placed within the production networks for the purpose of detection. They extend the capabilities of the intrusion detection systems. These type of honeypots are developed and cond to integrate with the organizations infrastructure and scope. They are usually implemented as low-interaction honeypots but implementation may vary depending on the available funding and expertise required by the organization. Production honeypots can be placed within the application and authentication server subnets and can identify any attacks directed towards those subnets. Thus they can be used to identify both internal and external threats for an organization. These types of honeypots can also be used to detect malware propagation in the network caused by zero day exploits. Since IDSs detection is based on database signatures they fail to detect exploits that are not defined in their databases. This is where the honeypots out shine the Intrusion detection systems. They aid the system network administrators by providing network situational awareness. On basis of these results administrators can take decisions necessary to add or enhance security resources of the organization e.g. firewall, IDS and IPS etc. 2.2.2.1 Research Honeypots Research honeypots are deployed by network security researchers the whitehat hackers. Their primarily goal is to learn the tools, tactics techniques of the blackhat hackers by which they exploit computers network systems. These honeypots are deployed with the idea of allowing the attacker complete freedom and in the process learn his tactics from his movement within the system. Research honeypots help security researchers to isolate attacker tools they use to exploit systems. They are then carefully studied within a sand box environment to identify zero day exploits. Worms, Trojans and viruses propagating in the network can also be isolated and studied. The researchers then document their findings and share with system programmers, network and system administrators various system and anti-virus vendors. They provide the raw material for the rule engines of IDS, IPS and firewall system. Research Honeypots act as early warning systems. They are designed to detect and log maximum information from attackers yet being stealthy enough not to let attackers identify them. The identity of the honeypot is crucial and we can conclude that the learning curve (from the attacker) is directly proportional to the stealthiest of thehoneypot .These types of honeypots are usually deployed at universities and by the RD departments of various organizations. These types of honeypots are usually deployed as High-Interaction honeypots. 2.3 Honeynet The concept of the honeypot is sometimes extended to a network of honeypots, known as a honeynet. In honeynet we grouped different types of honeypots with different operatrating systems which increases the probability of trapping an attacker. At the same time, a setting in which the attacker explores the honeynet through network connections between the various host systems provides additional prospects for monitoring the attack and revealing information about the intruder. The honeynet operator can also use the honeynet for training purposes, gaining valuable experience with attack strategies and digital forensics without endangering production systems. The Honeynet project is a non-profit research organization that provides tools for building and managing honeynets. The tools of the Honeynet project are designed for the latest generation of high interaction honeynets that require two separate networks. The honeypots reside on the first network, and the second network holds the tools for managing the honeynet. Between these tools (and facing the Internet) is a device known as the honeywall. The honeywall, which is actually a kind of gateway device, captures controls, and analyzes all inbound and outbound traffic to the honeypots[4]. It is a high-interaction honeypot designed to capture wide-range of information on threats. High-interaction means that a honeynet provides real systems, applications, and services for attackers to interact with, as opposed to low-interaction honeypots which provide emulated services and operating systems. It is through this extensive interaction we gain information on threats, both external and internal to an organization. What makes a honeynet different from most honeypots is that it is a network of real computers for attackers to interact with. These victim systems (honeypots within the honeynet) can be any type of system, service, or information you want to provide [14]. 2.4 Honeynet Data Management Data management consist of three process Data control, data capture and data collection. 2.4.1 Data Control Data control is the containment of activity within the honeynet. It determines the means through which the attackers activity can be restricted in a way to avoid damaging/abusing other systems/resources through the honeynet. This demands a great deal of planning as we require to give the attacker freedom in order to learn from his moves and at the same time not let our resources (honeypot+bandwidth) to be used to attack, damage and abuse other hosts on the same or different subnets. Careful measures are taken by the administrators of the honeynet to study and formulate a policy on attackers freedom versus containment and implement this in a way to achieve maximum data control and yet not be discovered or identified by the attacker as a honeypot. Security is a process and is implemented in layers, various mechanisms to achieve data control are available such as firewall, counting outbound connections, intrusion detection systems,intrusion prevention systems and bandwidth restriction e tc. Depending on our requirements and risk thresholds defined we can implement data control mechanisms accordingly [4]. 2.4.2 Data Capture Data Capture involves the capturing, monitoring and logging of allthreats and attacker activities within the honeynet. Analysis of this captured data provides an insight on the tools, tactics, techniques and motives of the attackers. The concept is to achieve maximum logging capability at all nodes and hence log any kind of attackers interaction without the attacker knowing it. This type of stealthy logging is achieved by setting up tools and mechanisms on the honeypots to log all system activity and have network logging capability at the honeywall. Every bit of information is crucial in studying the attacker whether its a TCP port scan, remote and local exploit attempt, brute force attack, attack tool download by the haacker, various local commands run, any type of communication carried out over encrypted and unencrypted channels (mostly IRC) and any outbound connection attempt made by the attacker [25]. All of this should be logged successfully and sent over to a remote location to avoid any loss of data due to risk of system damage caused by attackers, such as data wipe out on disk etc. In order to avoid detection of this kind of activity from the attacker, data masking techniques such as encryption should be used. 2.4.3 Data Collection Once data is captured, it is securely sent to a centralized data collection point. Data is used for analysis and archiving which is collected from different honeynet sensors. Implementations may vary depending on the requirements of the organization, however latest implementations incorporate data collection at the honeywall gateway [19]. 2.5 Honeynet Architectures There are three honeynet architectures namely Generation I, Generation II and Generation III 2.5.1 Generation I Architecture Gen I Honeynet was developed in 1999 by the Honeynet Project. Its purpose was to capture attackers activity and give them the feeling of a real network. The architecture is simple with a firewall aided by IDS at front and honeypots placed behind it. This makes it detectable by attacker [7]. 2.5.2 Generation II III Architecture Gen II honeynets were first introduced in 2001 and Gen III honeynets was released in the end of 2004. Gen II honeynets were made in order to address the issues of Gen I honeynets. Gen II and Gen III honeynets have the same architecture. The only difference being improvements in deployment and management, in Gen III honeynets along with the addition of Sebek server built in the honeywall. Sebek is a stealthy capture tool installed on honeypots that capture and log all requests sent to the system read and write system call. This is very helpful in providing an insight on the attacker [7]. A radical change in architecture was brought about by the introduction of a single device that handles the data control and data capture mechanisms of the honeynet called the IDS Gateway or marketing-wise, the Honeywall. By making the architecture more â€Å"stealthy†, attackers are kept longer and thus more data is captured. There was also a major thrust in improving honeypot layer of data capture with the introduction of a new UNIX and Windows based data. 2.6 Virtual Honeynet Virtualization is a technology that allows running multiple virtual machines on a single physical machine. Each virtual machine can be an independent Operating system installation. This is achieved by sharing the physical machines resources such as CPU, Memory, Storage and peripherals through specialized software across multiple environments. Thus multiple virtual Operating systems can run concurrently on a single physical machine [4]. A virtual machine is specialized software that can run its own operating systems and applications as if it were a physical computer. It has its own CPU, RAM storage and peripherals managed by software that dynamically shares it with the physical hardware resources. Virtulization A virtual Honeynet is a solution that facilitates one to run a honeynet on a single computer. We use the term virtual because all the different operating systems placed in the honeynet have the appearance to be running on their own, independent computer. Network to a machine on the Honeynet may indicate a compromised enterprise system. CHAPTER 3 Design and Implementation Computer networks, connected to the Internet are vulnerable to a variety of exploits that can compromise their intended operations. Systems can be subject to Denial of Service Attacks, i-e preventing other computers to gain access for the desired service (e.g. web server) or prevent them from connecting to other computers on the Internet. They can also be subject to attacks that cause them to cease operations either temporarily or permanently. A hacker may be able to compromise a system and gain root access as if he is the system administrator. The number of exploits targeted against various platforms, operating systems, and applications increasing regularly. Most of vulnerabilities and attack methods are detected after the exploitations and cause big loses. Following are the main components of physical deployment of honeynet. First is the design of the Deployed Architecture. Then we installed SUN Virtual box as the Virtualization software. In this we virtually installed three Operating System two of them will work as honey pots and one Honeywall Roo 1.4 as Honeynet transparent Gateway. Snort and sebek are the part of honeywall roo operating system. Snort as IDS and Snort-Inline as IPS. Sebek as the Data Capture tool on the honeypot. The entire OS and honeywall functionality is installed on the system it formats all the previous data from the hard disk. The only purpose now of the CDROM is to install this functionality to the local hard drive. LiveCD could not be modified, so after installing it on the hard drive we can modify it according to our requirement. This approach help us to maintain the honeywall, allowing honeynet to use automated tools such asyumto keep packages current [31]. In the following table there is a summry of products with features installed in honeynet and hardware requirements. Current versions of the installed products are also mention in the table. Table 3.1 Project Summary Project Summary Feature Product Specifications Host Operating System Windows Server 2003 R2 HW Vendor HP Compaq DC 7700 ProcessorIntel(R) Pentium ® D CPU 3GHz RAM 2GB Storage 120GB NIC 1GB Ethernet controller (public IP ) Guest Operating System 1 Linux, Honeywall Roo 1.4 Single Processor Virtual Machine ( HONEYWALL ) RAM 512 MB Storage 10 GB NIC 1 100Mbps Bridged interface NIC 2 100Mbps host-only interface NIC 3 100Mbps Bridged interface (public IP ) Guest Operating System 2 Linux, Ubuntu 8.04 LTS (Hardy Heron) Single Processor Virtual Machine ( HONEYPOT ) RAM 256 MB Storage 10 GB NIC 100Mbps host-only vmnet (public IP ) Guest Operating System 3 Windows Server 2003 Single Processor Virtual Machine ( HONEYPOT ) RAM 256 MB Storage 10 GB NIC 100Mbps host-only vmnet (public IP ) Virtualization software SUN Virtual Box Version 3 Architecture Gen III Gen III implemented as a virtual honeynet Honeywall Roo Roo 1.4 IDS Snort Snort 2.6.x IPS Snort_inline Snort_inline 2.6.1.5 Data Capture Tool (on honeypots) Sebek Sebek 3.2.0 Honeynet Project Online Tenure November 12, 2009 TO December 12, 2009 3.1 Deployed Architecture and Design 3.2 Windows Server 2003 as Host OS Usability and performance of virtualization softwares are very good on windows server 2003. Windows Server 2003is aserveroperating system produced byMicrosoft. it is considered by Microsoft to be the cornerstone of itsWindows Server Systemline of business server products. Windows Server 2003 is more scalable and delivers better performance than its predecessor,Windows 2000. 3.3 Ubuntu as Honeypot Determined to use free and open source software for this project, Linux was the natural choice to fill as the Host Operating System for our projects server. Ubuntu 8.04 was used as a linux based honeypot for our implementation. The concept was to setup an up-to-date Ubuntu server, cond with commonly used services such as SSH, FTP, Apache, MySQL and PHP and study attacks directed towards them on the internet. Ubuntu being the most widely used Linux desktop can prove to be a good platform to study zero day exploits. It also becomes a candidate for malware collection and a source to learn hacker tools being used on the internet. Ubuntu was successfully deployed as a virtual machine and setup in our honeynet with a host-only virtual Ethernet connection. The honeypot was made sweeter i.e. an interesting target for the attacker by setting up all services with default settings, for example SSH allowed password based connectivity from any IP on default port 22, users created were given privi leges to install and run applications, Apache index.html page was made remotely accessible with default errors and banners, MySQL default port 1434 was accessible and outbound connections were allowed but limited [3]. Ubuntu is a computeroperating systembased on theDebianGNU/Linux distribution. It is named after theSouthern Africanethical ideology Ubuntu (humanity towards others)[5]and is distributed asfree and open source software. Ubuntu provides an up-to-date, stable operating system for the average user, with a strong focus onusabilityand ease of installation. Ubuntu focuses onusability andsecurity. The Ubiquity installer allows Ubuntu to be installed to the hard disk from within the Live CD environment, without the need for restarting the computer prior to installation. Ubuntu also emphasizesaccessibilityandinternationalization to reach as many people as possible [33]. Ubuntu comes installed with a wide range of software that includes OpenOffice, Firefox,Empathy (Pidgin in versions before 9.10), Transmission, GIMP, and several lightweight games (such as Sudoku and chess). Ubuntu allows networking ports to be closed using its firewall, with customized port selectio

Friday, October 25, 2019

Big Cats in Asia Essay -- Animal Research

The relationship between human beings and the environment has always been in conflict. Our world these days is based on the economy and the ambitious interest people have in leaving nature behind. Nowadays, business is growing and so is the population, people’s priority is to make as much money as possible, but do they really care about the environment around them? Our greediness for money has led us to destroy forests and animal niches. However, there might still be hope for animals that were taken from their habitat to start over again, in a very slow process by stopping deforestation and increasing conservation areas. This essay is focused on the conflicts between the Siberian tigers human modified environment they now live in, and how this has been affecting them periodically to the point of becoming endangered, and how people around the world are trying to help by restoring their habitat. Tigers in crisis news write â€Å"almost all wild Siberian tigers live in the Southeast corner of Russia in the Sikhote-Alin mountain range east of the Amur River. Their range also includes northeastern of China and the Korean peninsula, and as far west as Mongolia. It is consider critically endangered species with the primary threats to its survival in the wild being poaching and habitat loss from intensive logging and development. It is estimated that the wild population of Siberian tigers at around 350-450 tigers†. (Introduction). Like Ruth Ashby said, â€Å"Once there were eight sub species of tigers today there are three of them†(22) Tigers occupy just 7% of their historic range due to the increase of population over the average global rate across the majority of the tiger’s habitat, therefore current tiger habitat extents through one of the mo... ...rticles/Killed%20for%20Cure%20-%20Trade%20in%20Tiger%20Bone.pdf>. O'Brien, T. G., Kinnaird, M. F. and Wibisono, H. T. (2003), Crouching tigers, hidden prey: Sumatran tiger and prey populations in a tropical forest landscape. Animal Conservation, 6: 131–139. doi: 10.1017/S1367943003003172 Sandberg, L. Anders, and Tor Sandberg. A Practical Environmental Education. Climate Change: Who's Carrying the Burden? : the Chilly Climates of the Global Environment Dilemma. Ottawa, ON: Canadian Centre for Policy Alternatives, 2010. 195-96. Print. Siberian Tiger at Tigers in Crisis." Tigers in Crisis - Information About Earth's Endangered Tigers. Web. . Wittier, John Greenleaf. "The Worship of Nature." The Complete Poetical Works of John Greenleaf Whittier. H.E.S ed. Boston: Houghton Mifflin, 1894. 141. Print. Reprinted

Thursday, October 24, 2019

Book Review Essay

The novel is about a wolf called Faolan that survives with a friend of his, Edme. There is another wolf called the Prophet that tries to send out wolves to kill Faolan and Edme. They try to find a shelter to try to hide but end up getting spotted by a wolf. They run away and escape from the wolf. After getting away they go out and find the Prophet. They confront him ask ask him why he wants to kill them and he jumps at them and they finally kill the Prophet. The book is associated with the other five Wolves of the Beyond books Lone Wolf, Shadow Wolf, Watch Wolf, Spirit Wolf, and Star Wolf.  I would give the book a 2 because I like the Wolves of the Beyond books. They explain how the wolves survive and how they hunt their prey. The book shows how they grow up and learn to hunt and communicate with the others. I also like how the author makes it feel like something is going to happen like a fight scene. The book also continues the story of the main character, Faolan and gives the wolf a characteristic for each book the author makes. The novel is about a wolf called Faolan that survives with a friend of his, Edme. There is another wolf called the Prophet that tries to send out wolves to kill Faolan and Edme. They try to find a shelter to try to hide but end up getting spotted by a wolf. They run away and escape from the wolf. After getting away they go out and find the Prophet. They confront him ask ask him why he wants to kill them and he jumps at them and they finally kill the Prophet. The book is associated with the other five Wolves of the Beyond books Lone Wolf, Shadow Wolf, Watch Wolf, Spirit Wolf, and Star Wolf.  I would give the book a 2 because I like the Wolves of the Beyond books. They explain how the wolves survive and how they hunt their prey. The book shows how they grow up and learn to hunt and communicate with the others. I also like how the author makes it feel like something is going to happen like a fight scene. The book also continues the story of the main character, Faolan and gives the wolf a characteristic for each book the author makes.

Wednesday, October 23, 2019

Fast Food Nation Essay

Summary: All Americans effect the huge growth of fast food but adolescents play even more of a vital role in than the average consumer. Not only do teenagers consume fast food, but they work for it and steal from it because they are attracted to it the most. The fast food industry provides the easiest way for young people to get started and continue to succeed in our â€Å"Fast Food Nation. † Our country loves fast food, there is speedy service with cheap tasty food in over one million restaurants world wide. Though we all love it, we do not like the stories behind it. In 2004, Americans spent over 110 billion dollars on fast food, that’s more than higher education, computers, computer software and new cars combined (Scholosser, 3). Teenagers provide a huge role in the fast food industry. Teenagers work at these restaurants, eat at these restaurants, are objects of advertisements by these restaurants and steal from these restaurants more than any other age group. Ever since the age of three more than 75 percent of American children can recognize the face of Ronald McDonald. Since our nation is currently being raised around fast food it is only inevitable that as children grow, they only become more of a part of it everyday. The average American child begins to work around the age of 16 doing low wage low labor jobs. At anytime a teenager can walk into any fast food restaurant and apply for a job. Fast food restaurants prefer to employ teenagers because they are easily trained, less expensive to tend to than adults and are easier to control. Also since most teenagers still live at home they can afford to work for wages too low to even support an adult. â€Å"No other industry in the United States had a workforce so dominated by adolescents. About two-thirds of the nations fast food workers are under the age of twenty† (Scholosser, 68). Working in McDonalds is not difficult, but just tedious and long. Since most fast food restaurants are run my machines, it is up to these 17 year-old employs to push buttons and say commands. All Burger King wants is for things to get done faster, not how much effort is put into work, so teenagers feel working at Taco Bell or KFC won’t be as difficult as it will a strain. Any teenager working behind the counter at any fast food restaurant is given less respect than animals at the pet store. .†.. she hates the job and is desperate to quit. Working at the counter she has to deal with rude remarks and complaints. She is often yelled at by strangers angry that their foods taking to long or that something is wrong with their order. One elderly woman threw a hamburger at her because there was too much mustard on it† (Scholosser, 81). Though rudeness is a downside to a fast food job, there are perks for kids who do not need a lot. Many of the 200 dollar a week salary is used for teenage spending; clothes, nights out, cars and other desirable things. Teenagers run and continue the fast food work force every day, not because they have to but because it’s the best option available to them. Though we may not like the way the food is cooked or served; the way it tastes is still great. McDonalds makes a huge profit off of everything; soda fries and sandwiches all profit so largely, and teenagers are one of the most popular customers. A medium soda in McDonalds is $1. 29, it cost McDonalds $4. 25 per gallon of soda syrup, only about 9 cents worth of syrup is used in a medium drink, giving McDonalds almost a 95% profit. Soda consumption among teenagers has doubled within the past 20 years, reaching an average of twelve ounces of soda a day per child. (Scholosser, 54). With French fries McDonalds buy them frozen for 30 cents a pound, then sells them reheated in oil for 6 dollars a pound, pure profit pulled from the hands of teenagers. McDonalds makes billions upon billions of dollars annually by selling things for such a low price but really making the largest profit possible. Recently, fast food restaurants have become more attractive to armed robbers than a clothing store or gas station. Since fast food industries do almost all of their business in cash, others rely on credit card transactions. Robbery in fast food chains is not uncommon at all, even when most of it happens by their own employees, underage teenagers who are desperate for money. Though most of these robberies occur early in the morning or late at night when few people are working. â€Å"The typical employee stole about $218 a year and according to industry studies, about two thirds of the robberies at fast food restaurants involve current or former employees. † (Scholosser, 84). Employees have low pay, high turnover and know the restaurant, why not steal? McDonalds is already a billion dollar industry, many of the people think, its not going to hurt their business, they won’t even notice. However these robberies have led to deaths and injuries, and make teenagers realize what horrible conditions they are working in. All Americans effect the huge growth of fast food but adolescents play even more of a vital role in than the average consumer. Not only do teenagers consume fast food, but they work for it and steal from it because they are attracted to it the most. The fast food industry provides the easiest way for young people to get started and continue to succeed in our â€Å"Fast Food Nation. â€Å"

Tuesday, October 22, 2019

Geography of Pakistans Provinces and Capital Territory

Geography of Pakistan's Provinces and Capital Territory Pakistan is a country located in the Middle East near the Arabian Sea and the Gulf of Oman. The country is known as having the sixth largest population in the world and the second largest Muslim population in the world after Indonesia, is a developing nation with an underdeveloped economy and it has a hot desert climate combined with cold mountainous areas. Most recently, Pakistan has experienced severe flooding that has displaced millions and destroyed a large part of its infrastructure. The country of Pakistan is divided into four provinces and one capital territory for local administration (as well as several federally administered tribal areas). The following is a list of Pakistans provinces and territory, arranged by land area. For reference, population and capital cities have also been included. Capital Territory 1) Islamabad Capital Territory Land Area: 906 sq kmPopulation: 805,235Capital: Islamabad Provinces 1) Balochistan Land Area: 347,190 sq kmPopulation: 6,565,885Capital: Quetta 2) Punjab Land Area: 205,345 sq kmPopulation: 73,621,290Capital: Lahore 3) Sindh Land Area: 140,914 sq kmPopulation: 30,439,893Capital: Karachi 4) Khyber-Pakhtunkhwa Land Area: 74,521 sq kmPopulation: 17,743,645Capital: Peshawar Sources Central Intelligence Agency. (19 August 2010). CIA - The World Factbook - Pakistan. Retrieved from: https://www.cia.gov/library/publications/the-world-factbook/geos/pk.html Wikipedia.org. (14 August 2010). Administrative Units of Pakistan - Wikipedia, the Free Encyclopedia. Retrieved from: http://en.wikipedia.org/wiki/Administrative_units_of_Pakistan

Monday, October 21, 2019

10 mejores y 10 peores estados para hacer negocios

10 mejores y 10 peores estados para hacer negocios Para los  hispanos  que residimos en Estados Unidos es importante conocer cules son los mejores y los peores estados para hacer negocio por una razà ³n muy simple: somos el grupo con el porcentaje ms alto de emprendedores. Y es que 11 de cada 100 tienen un negocio, siendo la presencia latina especialmente notable en  empresas de limpieza, jardinerà ­a, reformas de viviendas, eventos y negocios que requieren licencias profesionales. Muchos de los negocios son pequeà ±os y en realidad son una forma de autoempleo, particularmente entre los migrantes mexicanos y entre los mexicano-americanos que son dueà ±os de aproximadamente 800 mil negocios de este tipo. Est claro que los negocios son importantes para la comunidad latina, tanto para la ya asentada como para la recià ©n llegada y eligen esa opcià ³n como los que no tienen otro remedio porque llegan con una  visa E-2  que debe ser renovada perià ³dicamente  o una  green card por inversià ³n. Por esta razà ³n conviene conocer en cules de los 50 estados de Estados Unidos existe una regulacià ³n y un clima econà ³mico y empresarial que favorece la creacià ³n y el crecimiento de los negocios. Por ello este artà ­culo comprende: Lista general de los 10 mejores estados para hacer negociosLista general sobre los 10 estados en los que es ms complicado y dificultoso sacar adelante un negocioY lista de los 5 estados que los empresarios latinos prefieren para desarrollar su idea de negocio, que no siempre coincide con el listado general. Son muchas las listas que se hacen anualmente sobre los mejores y peores estados para hacer negocio. Aquà ­ seguimos la de Forbes, por su amplitud y metodologà ­a, pero en general puede decirse que hay pocas variaciones entre los diferentes listados. Se han valorado factores como: potencial econà ³mico para el futuro, regulacià ³n sanitaria y de contratacià ³n, disponibilidad de trabajadores, calidad de vida, clima econà ³mico y costo para hacer negocios. Los 10 mejores estados para emprender Utah, destacando en potencial de crecimiento (poblacià ³n: 2,963,000)Carolina del Norte, que sobresale en regulacià ³n favorable para los negocios (poblacià ³n: 9,992,000)Nebraska, tambià ©n con un excelente clima regulatorio (poblacià ³n: 1,877,600)Dakota del Norte, con un buen clima econà ³mico, influenciado por los hidrocarburos (poblacià ³n: 744,600)Colorado, el estado nà ºmero 1 en normas laborales (poblacià ³n: 5,397,200)Texas, el estado con el mejor clima econà ³mico (poblacià ³n: 27,187,700)Virginia, el mejor estado desde el punto de vista regulatorio (poblacià ³n: 8,355,200)Indiana, el mejor despuà ©s de Virginia en regulacià ³n (poblacià ³n: 6,608,900)Dakota del Sur. el estado con menor costo para hacer negocios (poblacià ³n: 856,200)Washington, un estado con excelentes perspectivas de crecimiento (poblacià ³n: 7,108,400) Los 10 peores estados para hacer negocios En esta lista se empieza con el menos malo de los top 10 para acabar con el que califica como el peor, es decir, Virginia Occidental. Nueva Jersey, sà ³lo en un estado es ms caro hacer negocio (poblacià ³n: 8,947,700)Vermont, es caro hacer negocios y mucha regulacià ³n (poblacià ³n: 626,500)Hawaii, un estado para vivir pero no para hacer negocios (poblacià ³n: 1,424,900)Alaska, un estado muy caro (poblacià ³n: 738,000)Rhode Island, sà ³lo califica bien en calidad de vida (poblacià ³n: 1,056,900)Nuevo Mà ©xico, el estado con mayor porcentaje de hispanos (poblacià ³n:2,085,300)Maine, destaca por su lado positivo, la calidad de vida (poblacià ³n: 1,331,600)Mississippi (poblacià ³n: 2,995,700)Virginia Occidental, el estado que peor califica en oferta de trabajadores y regulacià ³n (poblacià ³n: 1,844,900). Los mejores y los peores para los emprendedores latinos Los empresarios hispanos en Estados Unidos destacan en la creacià ³n de pequeà ±as empresas e incluso en las que su objetivo es el autoempleo y tienen un à ºnico empleado: el propio emprendedor. Por ello, prefieren estados donde las regulaciones laborales, de salud y de seguridad le sean favorables para sacar adelante su pequeà ±o negocio. Por estas razones, en las encuestas estos son los cinco estados preferidos por los empresarios latinos para hacer negocio: TennesseeOregà ³nUtahPennsylvaniaTexas Curiosamente, tres de los estados con una amplia presencia latina como son California, Nueva York y Florida, no aparecen en ninguna lista entre los mejores para hacer negocios. A tener en cuenta antes de fundar un negocio Los ciudadanos americanos y los residentes permanentes legales podrà ­an tener acceso a subvenciones para negocios, tanto de carcter federal como estatal o incluso local. Es importante informarse sobre posibles ayudas para prà ©stamos, subvenciones, asistencia local y condiciones para calificar para contratar con el gobierno en la pgina oficial del Small Business Administration, que tiene una versià ³n en espaà ±ol. Adems, todos los empresarios en potencia debe tener en cuenta que es importante familiarizarse sobre las formas jurà ­dicas que se le puede dar al negocio para crear una empresa. Puede haber diferencias importantes a la hora de pagar impuestos o de proteccià ³n ante la ley.   Asimismo, considerar familiarizarse con el sistema de franquicias si les gustarà ­a lanzarse al mundo del emprendimiento pero no se sienten seguros porque no conocen bien las regulaciones. Y, finalmente, antes de empezar a hacer gastos, conviene realizar si es posible un buen plan de negocios y contabilizar todos los gastos que puedan surgir, tales como abogado, contable, licencias, alquileres, seguros mà ©dicos, impuestos, derechos de los empleados, salarios mà ­nimos, etc.

Sunday, October 20, 2019

Asking Questions for Advanced Classes

Asking Questions for Advanced Classes Speaking skills include the ability to listen, and that means asking meaningful questions. In class, teachers often take over the task of asking probing questions, but sometimes the students dont quite enough practice in this essential task in any conversation. This lesson plan focuses on helping students improve their question-asking skills to move beyond just basic questions. Students - even higher level students - often run into problems when asking questions. This is due to a number of causes: i.e., teachers are the ones that usually ask questions, the inversion of the auxiliary verb and subject can be especially tricky for many students. This simple lesson focuses on helping higher (intermediate to upper intermediate) level students focus on some of the more difficult question forms. Aim Improving speaking confidence when using question difficult question forms Activity Intensive review of advanced question forms followed by student gap question exercises. Level Intermediate to upper intermediate Outline Focus on auxiliary verb usage by making a number of statements in tenses the students are familiar with. Ask students to identify the auxiliary verb in each case.Ask a student or students to explain the underlying scheme of the object question form (i.e., ? word Auxiliary Subject Verb). Have students give a number of examples in different tenses.Review the question forms of some of the more difficult tenses and constructions such as: conditionals, used to, present perfect continuous, past perfect, etc.Split students up into pairs. Distribute worksheet and ask students to ask an appropriate question for the given answer taking turns.Follow-up check of questions either by circulating through the student pairs or as a group.Ask students to each take the second exercise (one for Student A the other for Student B) and complete the gaps by asking their partner for the missing information.Solidify question forms by quickly playing a verb inversion game using the various tenses (i.e., Teache r: I live in the city. Student: Where do you live? etc.) Exercise 1: Ask an Appropriate Question for the Response It was really rather wet and windy with temperatures well below normal.Since eight oclock this morning.I was cleaning up.Id buy a new house.She cant be at home, I tried to call her a few minutes ago.Why dont you go shopping?For about 2 years. Exercise 2: Ask Questions to Fill the Gaps With the Missing Information Student A The last few weeks have been very difficult for my friend ______. He discovered that he hadnt insured his car after his car was stolen __________. He immediately went to his insurance agent, but she told him that he had only bought ____________, and not against theft. He became really angry and ________________, but, of course, he didnt do that in the end. So, he hasnt been driving for the past two weeks, but ___________ to get to work. He works at a company about 15 miles from his home in __________. It used to take him only twenty minutes to get to work. Now, he has to get up at ___________ in order to catch the seven oclock bus. If he had more money, he would ___________. Unfortunately, he had just spent most of his savings on an _____________ before his car was stolen. He had a wonderful time in Hawaii, but he now says that if he hadnt gone to Hawaii, he wouldnt be having all these problems now. Poor guy. Student B The last few weeks have been very difficult for my friend Jason. He discovered that _______________ after his car was stolen three weeks ago. He immediately went to his ___________, but she told him that he had only bought a policy against accidents, and not ________. He became really angry and threatened to sue the company, but, of course, he didnt do that in the end. So, he hasnt been ___________ for the past two weeks, but has been taking the bus to get to work. He works at a company about __________ from his home in Davonford. It used to take him ____________ to get to work. Now, he has to get up at six oclock __________________________. If he had more money, he would buy a new car. Unfortunately, he had just __________________ on an exotic vacation to Hawaii before his car was stolen. He had a wonderful time in Hawaii, but he now says that if _______________, he wouldnt be having all these problems now. Poor guy.

Saturday, October 19, 2019

Business plan for mobile convenience store Coursework

Business plan for mobile convenience store - Coursework Example However, due to its projected expansive nature, the business will cover regions such as Al Falah, Al Shamkha and Yas. The business will be expected to expand outside Abu Dhabi Emirate in future catering to embrace domestic customers. Mobile Baqala is a convenient retail store that provides merchandising business to retailers at convenience location without been required to go for long distances to find physical markets for goods and services that they need. The business is mainly designed to stock a variety of consumable items such as soft drinks eggs and milk amongst other products that are used by customers on a daily basis. It has been pointed out that most families experience difficulties in accessing basic commodities especially in areas such as Al shamka thus the need for such kind of a business. Apparently, majority of societal members have had problems in making their daily purchases of consumable items especially around Al Falah, Al Shamkha and Yas. As such, the population has agreed that such areas are of high suitability for the store and more perfect to stock a variety of both local and imported produce. Mobile Bagala is meant to operate as mobile store within the United Arab Emirates and some parts of Abu Dhabi as a grocery revolutionary storey that moves like a mobile unit in different locations. The business is planned to be unique in nature with effective and efficient design serving both local population and visitors. Having embraced a strategy to serve customers around the clock, the business is projected to achieve its objective as the future leading grocer in the United Arab Emirates serving the Arab population with a consistent supply of daily consumables. Besides, the business is designed with an initiative that would ensure consistency in supply of products to customers while creating job openings around its trading zones. Having engaged the

Friday, October 18, 2019

Divorce and Remarriages Essay Example | Topics and Well Written Essays - 2000 words

Divorce and Remarriages - Essay Example For the divorce option to be accepted the church need to consider the divorce’s ground according to scriptures. The main grounds for divorce according to the New Testament are on either desertion by an unbeliever or sexual sin features (Adams 1986, p.24).   These features comprise of sexual sin like homosexuality, incest, bestiality and adultery. In the case one of the partners violates the intimacy and unity of marriage by any of the sexual sins, thereby forsaking the covenant responsibility the faithful member is left in a very difficult situation. Under such condition, the bible permits the release of the faithful partner via divorce. After divorce has occurred the faithful partner is free to remarry if at all the divorce took place on biblical grounds. However, in case of people divorce on other grounds, they have sinned against both their partners and God. In mark 10:11-12, if these partners remarry, they will be considered to have committed an act of adultery. Paul made an explanation for this and proposed any person who divorces sinfully should remain unmarried for the rest of their life unless either of them reconciles with her or his partner (Cherlin 1992, p.54). The Jesus’ teachings on the issues of divorce should be read repeatedly in both the church and at home. It should be done in every part of the world in the essence of spreading the gospel. The society has witnessed an increase in the number of remarriages and divorces in the present days. The main reason of this problem facing the society is that people tend to ignore the instructions that are provided in the bible. Some people also tend to listen to what other men think about the teachings of Jesus rather that reading for themselves in the bible (House & Laney 1990, p.76).  

Meteorology assignment Example | Topics and Well Written Essays - 250 words

Meteorology - Assignment Example Review the sounding data available from the online repository to estimate the value of CAPE just prior to the occurrence of the Angus tornado. The atmosphere was predisposed to wards severe weather since the Environment Canada had issued tornado warnings for several communities in the area as a line of severe thunderstorms with embedded tornadoes moved into the Lake Simcoe region. On Tuesday at around 5:20 pm, a cold front spawned a number of strong to severe thunderstorms across the southern Ontario. This was said by the environmental of Canada in the storm summary early on Wednesday. i. Suppose lightning was observed in Angus, and that you had a clear line of sight from York University to it. How long would it take for you to hear the thunder corresponding to the Angus lightning? State any assumptions required for this estimation. After the storms, several thousands of homes and businesses I Angus were without power. More than 24 hours, customers in Ontario were still not having electricity. The thunderstorm went out in the following sequence, at 8:47 a.m., the first severe thunderstorm went out, then 10:54 a.m., 2:25 p.m., 2:37 p.m., 3:03 p.m. - 4:54 p.m. then the tornado warning replaces severe thunderstorm warning. According to Environment Canada, the tornado was associated with severe thunderstorm. It was accompanied by large hail, wind gusts greater than or equal to 50kts, or tornado. In other words, it was an Ordinary Cell Thunderstorm. http://www.theweathernetwork.com/news/articles/tornado-rips-through-angus-ontario-several-homes-damaged-no-major-injuries-reported/29754/. The tornado is approximated to travel at a wind speed of between 180-220 km/hr. and with limited wind shear. http://globalnews.ca/video/1475249/return-home-timing-uncertain-for-tornado-victims-in-angus. Tornadoes are very destructive as from the video link above, it led to the death of several people for instance the severe

Pros and cons Essay Example | Topics and Well Written Essays - 250 words

Pros and cons - Essay Example The pros of the chosen plan would be important: a) there are no competitors nearby; the specific coffee bar would be the only serving gourmet coffee in-house; b) since no competitor exists in the area, new customers would be easily attracted while existing customers would be interested in enjoying their coffee while tasting their favorite gourmet food, which would be also offered in the coffee bar along with baked goods and pastries. The cons of opening a coffee bar instead of carrying cookbooks and food magazines in the adjacent space would be the following: the costs for setting up a coffee shop can be high. The second plan could be realized with a quite low investment, just for adding 1-2 bookcases and shelves for putting the books/ magazines involved. The opening of a coffee bar would be the most appropriate use for the particular adjacent space. The average profit of such shop is at least $50,000 (SBDC 2012) which means that the startup costs could be easily covered approximately in 5 years since the business establishment, a fact that would eliminate the cons of the specific plan compared to the second plan

Thursday, October 17, 2019

Recycle (Indiana State recycle center) Essay Example | Topics and Well Written Essays - 750 words

Recycle (Indiana State recycle center) - Essay Example The center later turned into an educational center and a community-wide recycling center (ISU). Following the lecture about the recycling processes and the coverage of the recycling at Indiana University, I learnt that many materials, which I viewed as non-usable, are valuable resources that can be recycled for further use. Some of the materials that I discovered to be recyclable include news papers, old books, cardboards, waste paper, glass containers, plastic films and bags, metallic beverage cans, bottles and plastic containers. Before the lecture, I did not know that empty bottles – after using the contents they contain – could be used for a better course. Since the lecture, I started collecting all waste materials, and taking them to the neighboring recycling center – where they recycle all that is recyclable and effective dispose what they cannot recycle (Braungart and McDonough 47). Through the lecture on the recycling at Indiana University, I discovered t hat the heavy pressure on the production resources of the world could be reduced through recycling. For example, he explained that iron and aluminum deposits are reducing continually, but went further to explain that the waste cans that are disposed at the garbage collection area can be used to substitute the diminishing resource inputs. He gave us an example of plastic cans, demonstrating that the disposed cans are usually as good as new; therefore, through recycling these disposed containers, canning companies can reduce their costs of operation. Therefore, from the lesson, I learnt that recycling has many advantages, including that it reduces the pressure on production resources, reduces the impacts of waste disposal and reduces the costs of doing business – particularly in the area of sourcing for inputs (ISU). During the lecture, the agent from the recycling center explained the long term effects of recycling, including that it reduces the impacts caused by pollution on the environment. One example he used, made it clear to me that recycling is a channel for safeguarding the future of humanity. For example, when plastic cans and the waste materials from the health center are incinerated, they produce toxic smoke, which increases the rate of ozone layer depletion – which increases the levels of global warming. But in the case that these waste materials are not taken through the process of incineration, which uses a lot of energy and in some cases pollution-causing smoke, the waste can be recycled for newer use, over and over again. The recycling of the waster reduces the costs of producing new plastic cans and other plastic products; it reduces the energy levels consumed by industrial plants, and reduces the pollution caused by inappropriate waste material (ISU). Therefore, in the long term, the benefits of recycling reinforce the availability of resources, increase the sustainability of the environment and improve the profitability of differ ent enterprises. Through the lecture, I learnt that recycling can be practiced by all people, young and aged; poor and rich, as well as those in business and those that use the recyclable materials at home. For example, among the young, spoilt toys can be recycled for new plastic, and among the aged, many waste items like spoilt computers and vehicles can be surrendered for recycling. Among the poor, simple materials like paper bags

Defining oral history Essay Example | Topics and Well Written Essays - 2000 words

Defining oral history - Essay Example and development it is important to stay up to date with the current affairs from around the world not only to have a strong footing but to remain in the growing competition. The authenticity of this statement doesn’t need any more strengthening than the fact that the life of today’s man is centered on the pros and cons of the day. That too, if only he is cognizant enough to begin with. Every single individual has the right to rise to their destiny in their own inimitable style, to embrace the uncertainty of life appreciating the miracle of being alive by giving importance to small things because however small they may be, they can be a hurdle in his quest to become the person he wants to be. How to know what thorns to avoid? Which tumors to kill? Which memories to devour? This is where conceptive approach comes into play. The world today has all of us webbed together by the strings of communication. A global village, it is being called. In order to survive here SAYS Rebecca (2007), being with-it is crucial. Cellular devices, televisions, World Wide Web every single device is targeting at maximum acquisition of knowledge and information. Ethics, virtues and morality make life live-able but to thrive, a proper hold of tactics gives an upper hand. Sitting in a third-world country but knowing the prevailing circumstances in developed countries and infected countries like Syria, Iraq, Afghanistan gives a certain amount of enthusiastic self-confidence. Not only that but the ability to adapt to a foreign land without feeling vulnerable. Political, diplomatic and monetary consciousness solidifies our roots. Our customs, culture and every day technological improvements have transformed us into something that we believe is us based on the set standards of the society. We fail to perceive ourselves for what we really are and instead bank on the fact that if the society accepts us we have accomplished the mission. But we cannot be blamed; it is the need of the day to

Wednesday, October 16, 2019

Recycle (Indiana State recycle center) Essay Example | Topics and Well Written Essays - 750 words

Recycle (Indiana State recycle center) - Essay Example The center later turned into an educational center and a community-wide recycling center (ISU). Following the lecture about the recycling processes and the coverage of the recycling at Indiana University, I learnt that many materials, which I viewed as non-usable, are valuable resources that can be recycled for further use. Some of the materials that I discovered to be recyclable include news papers, old books, cardboards, waste paper, glass containers, plastic films and bags, metallic beverage cans, bottles and plastic containers. Before the lecture, I did not know that empty bottles – after using the contents they contain – could be used for a better course. Since the lecture, I started collecting all waste materials, and taking them to the neighboring recycling center – where they recycle all that is recyclable and effective dispose what they cannot recycle (Braungart and McDonough 47). Through the lecture on the recycling at Indiana University, I discovered t hat the heavy pressure on the production resources of the world could be reduced through recycling. For example, he explained that iron and aluminum deposits are reducing continually, but went further to explain that the waste cans that are disposed at the garbage collection area can be used to substitute the diminishing resource inputs. He gave us an example of plastic cans, demonstrating that the disposed cans are usually as good as new; therefore, through recycling these disposed containers, canning companies can reduce their costs of operation. Therefore, from the lesson, I learnt that recycling has many advantages, including that it reduces the pressure on production resources, reduces the impacts of waste disposal and reduces the costs of doing business – particularly in the area of sourcing for inputs (ISU). During the lecture, the agent from the recycling center explained the long term effects of recycling, including that it reduces the impacts caused by pollution on the environment. One example he used, made it clear to me that recycling is a channel for safeguarding the future of humanity. For example, when plastic cans and the waste materials from the health center are incinerated, they produce toxic smoke, which increases the rate of ozone layer depletion – which increases the levels of global warming. But in the case that these waste materials are not taken through the process of incineration, which uses a lot of energy and in some cases pollution-causing smoke, the waste can be recycled for newer use, over and over again. The recycling of the waster reduces the costs of producing new plastic cans and other plastic products; it reduces the energy levels consumed by industrial plants, and reduces the pollution caused by inappropriate waste material (ISU). Therefore, in the long term, the benefits of recycling reinforce the availability of resources, increase the sustainability of the environment and improve the profitability of differ ent enterprises. Through the lecture, I learnt that recycling can be practiced by all people, young and aged; poor and rich, as well as those in business and those that use the recyclable materials at home. For example, among the young, spoilt toys can be recycled for new plastic, and among the aged, many waste items like spoilt computers and vehicles can be surrendered for recycling. Among the poor, simple materials like paper bags