Tuesday, May 26, 2020

The World Is Your Oyster - 1246 Words

â€Å"The world is your oyster† was my former English substitute teacher favorite quote by Shakespeare. She was a traveler – passing plenteous borders of geographical areas to seek a new job, life, and opportunities. She settled a while and moved the following months to different places based on what her heart yearns for. I remember giving her a Thailand travel guidebook for her farewell gift the day before she left Indonesia to Bangkok. I did not understand the meaning of that phrase, until I took the decision to fly 8367 miles apart from my home country for an educational purpose. Yet, it was one of the cleverest decisions I had ever made in my eighteen-year-old life. I plugged my white tangled earphone on my ears while sitting on the front right aisle row. The melody accompanied me until my eyes closes gently as I heard the plane taking off the ground. I kept on staring at my green covered passport and boarding pass from Taipei to Seattle written in the destination section slipped on the first page. It was my first experience of moving alone to a new city where I did not know a single soul, and it felt somehow wrong. A part of my soul was exhilarated, but a sense of horrifying dread was shoring upon. I jumped out of my seat and locked myself a while in lavatory space. I stared at the person standing reflected in the mirror. She looked anxious, jittery with darker tone bulging under her eyes. â€Å"I am going to be okay†, I told myself softly. I was conflicted with my own fearsShow MoreRelatedSaving Nature S Jewel : A Look Into Restoring The Population Of Eastern Oysters1245 Words   |  5 PagesSAVING NATURE’S JEWEL: A LOOK INTO RESTORING THE POPULATION OF EASTERN OYSTERS IN THE CHESAPEAKE BAY STEPHANIE HWANG ANNAPOLIS, MARYLAND â€Å"He was a bold man that first ate an oyster.† – Jonathan Swift, Irish Satirist INTRODUCTION Imagine you are sitting on a wooden rocking chair on a balcony overlooking a pristine body of water, slowly swaying back and forth. In the distance, you can see trees border the other shoreline and a small island placed haphazardly in the center of the water. Looking upRead MoreThe Effect Of Ocean Acidification On Some Of The World s Sea Life1113 Words   |  5 Pages(dependent variable). Other Variables are the Time that the oyster shell is in the Hydrochloric Acid and also the original mass of the oyster shells. Hypothesis – An explanation of what you believe the outcomes of the experiment will be, with justification for your decision. If the Hydrochloric Acid effects the oyster shell then it should decrease because the Hydrochloric Acid will erode the oyster shell. I think the mass of the Oyster shells in grams will decrease steadily. Materials – A listRead MoreHuman Trafficking : A Global Issue1280 Words   |  6 Pagesare never to be blamed for human trafficking; people are generally deceived into the labor trafficking world and it happens every day. In order to really understand the issue, a true definition was needed so that it could be recognized and properly addressed. Back in 2000, the United Nations Office on Drugs and Crime defines human trafficking as keeping humans by threat, force, or deception (Oyster). And although this hideous act of crime has in recent years since been defined, again, human laborRead MoreI Am More Enthusiastic About Service Learning1573 Words   |  7 Pageswith were very generous and allowed flexibility in my schedule. Supporting my time, they understood my dedication to volunteer at events and allowed me to work at a time that was best for me. The â€Å"Tragedy of the Commons† tackled the problems the world faced, together as one whole. The word â€Å"commons† is due to the fact that everyone that lives on planet Earth utilizes the environmental resources and therefore it is common. The article speaks loud to address the dangers of overly used environmentalRead MoreMushroom Varieties And Their Uses1134 Words   |  5 Pagesleast half a dozen varieties of mushrooms readily available. Some of the varieties that you can purchase are Crimini which are small brown mushrooms, Portobello which are a larger version of the Crimini, White Mushrooms, Shitake or Wood Mushrooms, Oyster, Enoki, Chanterelles and Truffles. Mushrooms can be cooked whole, quartered, sliced or chopped. The Crimini are good in stews, sauteed or stir fried with other vegetables. They are also good served with steak or other types of meat. The PortobelloRead MoreDna Fingerprinting Is Not All The Title1533 Words   |  7 PagesWhat if you knew your own body has the potential to send you to jail? You would probably be more careful when going out in public and would probably start overanalyzing every aspect of your everyday behavior. However, this question is not a matter of your physical body having the potential to send you to jail through your actions. It is a matter of biological aspects of your body and how they can reveal secretive information about you. You may have heard the phrase â€Å"No two fingerprints are alike†Read MoreAnalysis Of William Cullen Bryants Thanatopsis979 Words   |  4 Pagesthat far corner of your life for some time, waiting for the right moment to take your life. Death cannot be avoided. Since the beginning of time, people have many different ways of going about the idea of death and what the afterlife may hold for them, whether they’ll be reunited with family and friends or if they’ll be reincarnated or, maybe nothing at all. This is true for writers, poets and artists. William Cullen Bryant’s â€Å"Thanatopsis†, Kansas’ â€Å"Dust in the Wind† and Blue Oyster Cult’s â€Å"Don’t FearRead MoreAn Evil and Erie Find in The Pearl by John Steinbeck Essay1377 Words   |  6 Pagesto look for good oysters that hadn’t been opened yet. He had collected about a bucket when he spotted a massive oyster that wasn’t with the others. He was very anxious to get to the canoe and open the oyster to see if there was a pearl. When Kino was able to get back on the canoe, he showed Juana the massive oyster and her eyes popped at the size of it. They start to open the pearl and they see this massive pearl in the i nside of it. Kino knew this was the pearl of the world that everyone wasRead MoreAnalyzing Emily Windsnap And The Castle Of The Mist883 Words   |  4 Pagesthey show Mother Nature’s creativity. They come in different colours such as green,red,and yelllow. They also come in different shapes and sizes. B- Butterflies are beautiful insects! There are approximately 20,000 species of butterflies in the world. Each species has different coloured wings. For example,a Monarch butterfly has orange black wings ,while a Tiger Swallowtail is yellow black wings. Butterflies also have unique line designs on their wings. They come in different shapes and sizesRead MoreIdentify Four Products You Purchase Essay925 Words   |  4 PagesIdentify if they are manufactured abroad, etc. Do proceeds from the companies’ sales benefit the global population? If so, how? Answer: A few items my family has purchased are Keebler Zesta ® oyster crackers, Snapple ® Half n’ Half Lemonade/Tea, shrimp, and Starbucks coffee. Keebler manufactures their Zesta ® oyster crackers in Battle Creek, MI. Keebler is a part of the Kellogg Company. Kellogg Company does have a global reach. A part of their sustainability commitment is responsible sourcing. â€Å"By

Friday, May 15, 2020

Physician Assisted Suicide Should Be Legal Under Certain...

Physician-Assisted Suicide should be legal under certain circumstances Kayanna Johnson Florida State University College of Medicine, Tallahassee, Florida, USA The purpose of this paper is examine the use of Physician-Assisted Suicide (PAS) in certain patients in a bid to support its legalization in all states. In this paper I will argue that the use of PAS in patients who are terminally ill, in non-terminally ill patients who undergo intolerable pain, or in patients who are terminally or non-terminally ill who fear a loss of dignity and control over their body in the end stages of life is permissible. I will first define PAS and VAE and attempt to characterize suicide. I will then concentrate on the different historical views of PAS over†¦show more content†¦It is these same increases that have generated a fear for unnecessarily prolonged, costly, painful, and, undignified deaths. The fear of this unnecessarily long process has led to the increase in calls for legalization of PAS from patients who are not willing to undergo such a process. With PAS being illegal in most states and the recent shift in medicine to a focus on patient autonomy the question must be asked, â€Å"Should PAS be legalized?† The opponents of PAS make many interesting points, some of which will be discussed, but I will propose arguments to these objections in order to show that PAS should be legalized in certain situations. Definition of PAS and VAE PAS is the physician’s act of providing a patient with the medical means necessary for suicide (Bernat, Gert, and Mogielnicki, 1993). PAS requires for the physician to assent to a competent patient’s rational request for the necessary medical means for committing suicide. In this case, death is not caused directly by the physician’s actions, but rather indirectly. Therefore, a suicide is termed PAS if the physician’s participation is necessary but insufficient for death. VAE is when the physician agrees to a competent patient’s rational request for the physician to administer the necessary medical means to cause death which usually follows immediately after the act. In VAE, the physician is directly causing death, therefore, is killing the patient. Since a death by VAE is a direct result of the

Wednesday, May 6, 2020

The United States Faces Excessive Mass Incarceration

The United States faces excessive mass incarceration. We have the largest prison population in the world and the second highest incarceration rate per-capita (1 in 100 citizens is behind bars). While you are certainly familiar with these statistics, I would like to emphasize that using incarceration as the primary response to social problems, as is happening today in the United States, impacts the incarcerated, their families and neighborhoods, as well as costing Maryland taxpayers millions of dollars annually. We must enact policies that downscale the prison population. The best approach is to shift resources away from the incarceration and punishment of certain inmate categories, such as nonviolent drug offenders, investing instead in their rehabilitation. Though correction systems have historically favored punishment over ‘softer’ rehabilitation, most nonviolent, drug-related offenders would benefit more from rehabilitation than incarceration. Today, in great part as a consequence of the War on Drugs, our prisons house over half a million drug offenders, representing over one-half of the federal inmate population in the United States, an increase of 790 percent since 1980. It is time for new leadership on the War on Drugs which has cost billions of dollars and has caused the endangerment of inmates’ and correctional officers’ lives due to mass incarceration. Do we wish to continue being the most punitive developed country in the world? Instead of implementing m andatoryShow MoreRelatedThe Black Disadvantage in the United States1655 Words   |  7 PagesThe Black Disadvantage in the United States Racial profiling, higher risks of incarceration, poverty, unemployment, more student debt; these are just some of the issues that African Americans face in the United States today. The statistical facts show that African Americans Face an uphill battle compared to White Americans. A good portion of the financial inequality that exists is due to the trickle down of white financial ancestral inheritance which was able to amass overtime unlike theRead MoreCriminals Must Be Punished For Breaking The Laws Of The Land1489 Words   |  6 Pagesthe system of incarceration. Jails have functioned in our society to protect citizens, or those who obey the constitution. For years, our jails were able to separate criminals from obedient citizens as well as punish criminals for their wrong doings. In the past, people have questioned whether this system was effective or not. Now, we have shifted our focus onto how much longer our jails will exist due to our lack of resources. The longer we wait to find a solution to mass incarceration the harder theRead MoreAfrican American Men And The United States Prison System1422 Words   |  6 PagesAfrican American Men and the United States Prison System There is a racial connection between the United States criminal justice system and the overrepresentation of black men in the United States prison system. There are over 2 million people in the U.S. prison system exceeding that of any other nation and represents 25% of the world’s prisoners (The Sentencing Project, 2016). According to Prison Policy Initiative, African American communities are the most impacted with African American men representingRead MoreRacial Profiling Is A Special Case Of Discrimination800 Words   |  4 Pagess ethnicity. This is where the term â€Å"Driving while Black† came to light in 1989. Such actual unconventional policies exist in many police departments. Uncovering it often depends on the testimony of the officer. In New Jersey, Black and Hispanic state troopers have testified that they were forced to engage in profiling by their commanders (Prejudice Institute, 2001). Racial profiling often goes hand and hand with other practices by law enforcement, often the defining moments of the life or deathRead MoreIncarceration Of The United States Essay2335 Words   |  10 PagesEven though the United States makes up just 5% of the world’s population, it houses 25% of the world’s prison population† (Walmsley, 2009). The United States prides itself in being a worldwide leader in just about every category; however, being the world leader in incarceration rights might not be something the United States would be proud about. Incarceration rates in the United States have grown at alarming rates in the past forty years specifically and it has resulted in major overcrowding issuesRead MoreThe Criminal Justice System Across The Country Essay2029 Words   |  9 Pageswho have committed offenses against the law. Compared to some of the harshest regimes in the world, the United States has a harsh history of mass incarceration. American prisons m aintain nearly 25 percent of the world’s prison population. Of the nearly 2.3 million incarcerated, 1 million are African Americans (NAACP). The poverty-stricken in America, especially those who are persons of color, face a greater risk of incarcerated for minor offenses than their white counterparts. People charged and orRead MoreThe Great Technological Evolution And Emergence Of Social Media1573 Words   |  7 PagesIn the wake of the terrorist attacks on September 11, 2001, the United States went into defensive mode, increasing surveillance and dismantling privacy rights. The Patriot Act was hastily passed just a month later in October 2001 and it severely limited the privacy of Americans and gave unprecedented power to the government and private agencies to track innocent Americans, turning regular citizens into suspects.5 In addition, the great technological evolution and emergence of social media that occurredRead MoreThe New Jim Crow: Mass Incarceration of the Racial Undercaste3337 Words   |  14 Pagesprevalent in the United States, specifically those related to racial discrimination. One specific issue that I have developed interest and research in is that of institutionalized racism, specifically in the form of mass incarceration, and what kinds of effects mass incarceration has on a community. In this paper, I will briefly examine a range of issues surrounding the mass incarceration of black and Latino males, the development of a racial undercaste because of rising incarceration rates, womenRead MoreThe War on Drugs: a Losing Battle?1626 Words   |  7 Pagesmilitary aid and military intervention undertaken by the United States government, with the assistance of participating countries, and the stated aim to define and reduce the illegal drug trade (Levine, Harry Ph.D.). A â€Å"drug-free world,† which the United Nations describes as a realistic goal , is no more attainable than an â€Å"alcohol free world.† In which no one has talked about with a straight face since the repeal of the Prohibition in the United States in 1933 (Nadelmann). This a logical statement whenRead MoreThe Death Penalty Is Justified1956 Words   |  8 PagesAmerica, stems back to before the United States gained freedom from Britain. The formation of the death penalty as a punishment was taken by the colonists from the British. It has been under constant pressure from abolitionists since the day that it was established as a punishment. However, it was not until the nineteenth century when abolitionist movements began to influence the states on the issue of the death penalty to see the form of punishment abolished. Slowly states began to change the laws on

Tuesday, May 5, 2020

Top 5 fundamentals of Computer Security

Question: Discuss about the Top 5 fundamentals of Computer Security . Answer: Basic Network Diagram Of Home Network Along With Identification And Labelling Of The Workstations And The Other Devices Description Of The Home Network System The above network diagram is presently in vogue in my home. I have a main server connected to a router which is further connected to an internet service provider. My server is connected to six other devices, laptop of my father which he uses for official purposes, a printer cum scanner, a mobile phone and three other computers used by various people at home either for project making or book reading or simple internet surfing. Whenever anyone wants to log into the laptop or any other computer he or she has to log in the password which authenticates one to start using the device. All the devices have separate passwords and the passcode of the laptop is not known to anyone else but for my father since it has important confidential data stored. If any one of us wants to use it, then it is he who opens the lock of the system. However other computer systems are also protected by a password but the laptop uses a password at the confidential folder also. Only my mobile phone has got the acce ss to the computer system. Anybody cannot access the system. Adequate firewalls are also installed and the anti-viruses are run once a month or if there is a requirement then the same is run as per need. Passwords are not changed frequently. If a security issue is ever felt it is only then that the passwords are changed. Also the passwords of all the systems are different but easy to remember. Steps Of A Trojan Based Attack A Trojan is a malware and not a virus that is often camouflaged in the form of a justifiable software package. It enables the hackers and the other unauthorized entities to enter into the system of other users. Once the virus gets triggered, it gives full access to the hackers to overview and keep a track of whatever is happening in the system network, pilfer the important data and obtain backdoor entry to the entire network (Komando 2013). They are able to perform functions such as deletion, blocking, and copying of information from the hacked system for ones own malicious intents. The said virus disturbs the entire systems performance. Trojans, however cannot reproduce itself automatically (Symantec.com, 2013). An example of one such attack was seen in the year 2011 when the Japanese Government complained of their servers and computers f the Parliament being attacked by Trojan Horse Virus. This happened due to a negligent act of a politician who happened to click on an email attachment which was a spam. The government suspected that it was act by the Chinese who must have got access to important information and passwords within spick of a time till they could log off from the system (Russel, 2011). One such malicious act had occurred in the UK which lead to leakage of the drawing of the revolutionary wind turbine blades by its competitors who were the supposed hackers of the same. This led to a loss to the company as the competitor ended up manufacturing the same at a lower price. Thus the steps to attack using Trojan is very simple. Steps For Minimizing Avenues Of A Trojan Based Attack A Trojan based attack can be avoided or minimized if some careful steps are undertaken. The user has to be very careful before he downloads any file in his system. The origination and the data of the file to be downloaded should be known. Even though the person giving you the file for downloading is a known and a trusted one yet the same should be verified again as it may happen that the person providing with the file is himself unaware of any such malware. If there lies a little bit of a suspicion, the file should be checked such as its headings and what it flashes in the form of an advertisement. Also one can verify the information of a file before downloading it with help of available virus scanners (Lo, 2006). Further one should open up all the concealed extensions of a file before downloading it. This would enable one to know that a file which reads as amy.jpeg is actually amy.jpeg.exe which is a Trojan. Another way to minimize the Trojan based attack is by disabling features which downloads or previews file and folders as a routine affair. This is the most convenient method although yet to be safe from these attacks one should ensure that manual downloading and previewing is done. For example auto DCC get in mIRC is an auto-downloading and previewing feature which should always be kept disabled. One of the most common routes that these Trojan attackers take is by convincing people to open web addresses that they ask for or describe some false benefits about pre-formulated programs which basically are Trojans. Also one common mistake which all users do is that they overtly believe in the anti-virus programs. Users should understand the fact that they are backups which helps basically when something unlawful and harmful has already become a part of your system(Meier et.al. 2003). Describe The Approach To Both Workstation/Device And Network Level Security From A Trojan Based Attack The workstations as well as networks all have become prone to security risks with regards data stored and the functions that these workstations and the networks are expected to perform due to too much exposure to the internet. Even though dependence over the internet has increased tremendously over the last few decades yet one cannot afford to compromise with regards the accessibility of the information to any unknown person. A systematic approach has to be followed to ensure that the devices and the network are well protected from such hackers. A network security is more important as many systems are connected to each other and if the hacker enters a network then he can have access to various systems that are linked (Paquet, 2013). The most sought after security approach for any computer system or the networking system is that the system should deploy three important things i.e. maintenance of confidentiality of data, integrity checks , authorization of usage. Who would have access to the companys insight and data which is indispensable in nature should be picked up very carefully. Further it should also ensures that integrity is maintained. Users who are permitted to access and change sensitive data and information do not misuse their rights. It is very crucial that information of an organization is divided according to its importance. Data which should be secured should be stored and accessed only by those who are highly trusted. The custody of the data should be given as per its importance. This way it is easy for the organizations to fix responsibility in case of any mishaps. Data should be classified into various types and depending on the same security levels should imbibed into the system (intelligentedu.com, 2012). Data that is not of much importance, little or no effort is required for protecting the same from the Trojan attackers. Some data have restricted approach and if it falls into unwanted hands may have unruly impact upon the organization Some data are classified as confidential and some as secret in nature. The later requires greater security as its leakage may lead to graver damage as compared to the former. Further the number of people who get access to secret information is much less than the former. Another high level security is required for data which is termed as top-secret data. Companies even go to the extent of spending money so as to ensure its secrecy and security is maintained. Another form of classification of approach for ensuring security from the Trojan attackers are administrative and technical. Administrative policy for security maintenance of data is basically policy driven. The hackers may be a part of the organization as an employee and one would be unaware of the same. Thus adequate checks should be done of people before hiring them and also regular checks of hired employees should also be in place. Role change and transfers should be a part of the policy so as to understand if there is any loop holes. Trojan is nothing but a technology and to fight it successfully technology is the best solution. A full proof technical control system should be inculcated into a companys security program. The controls imbibed should be strong enough for safeguarding the information from the possible hackers. Some famous security controls are firewalls, intrusion prevention system, smart cards and biometric authentication devices. Thus these help to secure both single workstations as well as entire network (Daly 2009). The Three Security Problems The three security problem with regards workstations and the networks are : Web Cookies: The web cookies do not carry viruses and Trojans however if the cookies are not deleted and kept open then hackers or unauthorized users may have access to saved password sessions which may be harmful. This leads to very critical privacy issue (Bhardwaj Singh, 2011). Host sharing: This is one of the easiest ways for the Trojan attackers to get into your network system. Business houses who have a website of their own and that website is connected to the internal server or the host server is prone information security risks. Each site has a dedicated space in the server and unknowingly the Trojan may also take a space to reside and then attack over the confidential and the secret data. Outdated server applications: Business houses should update their servers and applications on a timely basis as the system hackers continuously keep on developing new hacks so as to disrupt the systems and networks and derive valuable information from the system thus harming the users. Thus the business house who simply rely on their old system without updating it on a regular basis are prone to such security issues (Pierce, 2012). Measures To Counter These Security Problems Web cookies should be encrypted on a regular basis and should have a preset time for expiry of these web cookies. The administrator should put in a rule in place that the every time a crucial information is being accessed by the authorized users they are to login and re-login. This provides better safety to the data. In the case of host sharing problem the website of a business house should not be linked to the host server. The accessibility of the host server should be limited as the important data is always stored here. The third security problem can be easily resolved if the administrator keeps oneself updated with the existing and the probable host malwares which may affect the system and ensure that programs updating applications are run from time to time (Eckel, 2009). Protection- PREVENTION DETECTION + RESPONSE Security Software Audit logs Scans the data and takes backups Anti-spyware programs Trojan infections are detected Anti spyware programs which are purchased help to remove these infection Auto run should be disabled Automatic installation of unwanted files Microsoft recommends how to disable the auto download facility Awareness with regards the spam mails Spam mails should be reported Deletion of spam mails Security Principle Essential For Maintaining Security Of Home Network Against Trojan One of the most sought after security principle which is most essential for maintaining security of home network against Trojan malware is to secure the VPN of your home network. For ensuring that the VPN is secured one of the most common ways adopted by network users are encryption of data and verification of self. An easy accessible network is more prone to Trojan malware. So as to ensure that the same is prevented timely review of the encrypted data on the server and the VPN software should be done. Usage of a firewall will also be helpful in separating the VPN network from others (Berry 2012). Summary Of Approach Adopted For Solving The Problem Of Home Network From The Attack Of Trojan On understanding the said malware in detail I have understood that the same could be countered by ensuring that the data accessibility of the network at home should be secured by a password which is very strong. Further the same should be changed on a timely basis so that the hacker finds it difficult to get inside the network. The VPN system should be verified and checked regularly by technicians who are expert and trusted professionals. Further timely backup of data and updation of application software on a continuous basis should be made a part of the system. The users should be educated with regards the spam mails and the fact that they should not entertain any of it as it may lead to destruction of the entire system in place. Important data should be protected by passwords and accessibility of the same should be permitted only via repeated logins by each new user. Updated firewalls and anti viruses should be in place too so as to secure the system from the problem of Trojan attackers. Summarization Of What Is Learnt On summarizing the entire write up I have learnt that to ensure that ones important data is not misused, adequate security walls should be instilled into the home network as well. Hackers can hack not only networks of organizations but also ones personal network installed in ones house. Trojan is found to be more dangerous than any other malware because of its nature to behave as a legitimate software program. This malware can easily disinfect ones network if not made aware of. Further emails should also be checked and viewed very carefully. Auto runs though may seem to be an easy way out yet these should be disabled at the earliest. Last but not the least, trying to save cost on installing anti-virus may lead to incurring a heftier loss for me, thus I have learnt that anti-virus ad firewalls should be made a part of my home network at the earliest and it should be updated regularly and not occasionally. References Berry, M., 2012, Network Security: Top 5 fundamentals, viewed on 03rd Aug 2016, https://www.itmanagerdaily.com/network-security-fundamentals/ Bhardwaj, M., Singh, G.P., 2011, Types of Hacking and their counter measure, International Journal of Educational Planning and Administration, vol. 1, no.1, pp. 43-53 Daly, C., 2009, Netwrok Security Threats and Solutions, viewed on 03rd Aug 2016, https://www.slideshare.net/Colin058/network-security-threats-and-solutions-1018888 Eckel, E., 2009, 10 ways to avoid viruses and spyware, viewed on 03rs Aug 2016, https://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/ intelligentedu.com, 2012, Chapter 18: Threats, Attacks, Hackers Crackers, viewed on 03rd Aug 2016, https://www.intelligentedu.com/computer_security_for_everyone/18-threats-attacks-hackers-crackers.html Komando, K., 2013, 5 ways hackers attack you (and how to counter them), viewed on 03rd Aug 2016, https://www.usatoday.com/story/tech/columnist/komando/2013/07/19/hacker-attack-trojan-horse-drive-by-downloads-passwords/2518053/ Lo, J., 2006, Trojan Horse Attacks, viewed on 03rd Aug 2016, https://www.irchelp.org/irchelp/security/trojan.html Meier, J.D., Mackman, A., Vasireddy, S., Dunner, M., Escamilla, R., Murukan, A., 2003, Chapter 2: Threats and countermeasures, Improving Web Application Security : Threats and Counter measures, Microsoft Corporation Paquet, C., 2013, Network Security Concepts and Policies, viewed on 03rd Aug 2016, https://www.ciscopress.com/articles/article.asp?p=1998559 Pierce, T., 2012, 5 Network Security Issues and Solutions, viewed on 03rd Aug 2016, https://www.calibersecurity.com/5-network-security-issues-and-solutions/ Russel, J., 2011, Japanese Government hit by Chinese Trojan Horse attack, viewed on 03rd Aug 2016, https://thenextweb.com/asia/2011/10/25/japanese-government-hit-by-chinese-trojan-horse-attack/#gref Symantec.com, 2013, Trojans and other security threats, viewed on 03rd Aug 2016, https://www.symantec.com/connect/articles/security-11-part-2-trojans-and-other-security-threats