Wednesday, February 19, 2020

Response Article Example | Topics and Well Written Essays - 750 words

Response - Article Example There are quite a number of benefits that can be derived from online dating sites such as aspects related to privacy and security. Geographically dispersed people can date each other and the choice of the desired match is wide. There are likely chances that if you search patiently, you will get your match. More interestingly, online dating removes unfavorable elements such as fear and confidentiality is guaranteed. However, there are also certain disadvantages of online dating. It exposes other people to cyber bullies and the victims may live under constant fear which can eventually lead to psychological distress. Online dating can also promote multiple sexual activities which in turn exposes the people involved to health risks. In my own opinion, I think community dating sites are essential during the contemporary period. They help people to get perfect matches and the other benefit is that these sites are easy to use and maintain. During the contemporary period, it can be seen that organizations are operating in environments that are characterised by stiff competition. Likewise, advertising is also gaining prominence since it can be observed that companies use this communication strategy to attract customers to buy their products. However, some companies are manipulating advertising through creation of weasel images that are far from the truth. As such, I concur with Lutz who suggests that some advertising messages are manipulative and they are meant to deceive the customers into buying the products offered. For instance, the sincerity of advertisements used in marketing alcoholic beverages in particular is questionable. From my own perspective, alcohol is not good to our health. No matter how much effort is put to portray alcohol consumption in a positive light, I think this beverage remains detrimental to our health. It is just a marketing gimmick by marketers of brands like Heineken and Tusker to present their brands

Tuesday, February 4, 2020

Network Security Assignment Example | Topics and Well Written Essays - 2000 words

Network Security - Assignment Example Information security entails the adoption of specific measures that are supposed to prevent the unauthorized access, manipulation, use or the denial of access to any data, information, or capabilities that will ensure confidentiality (Douligeris and Serpanos, 2007). All these measures should be implemented to ensure the security of all the resources within the organization. Organizations nowadays have greatly relied on the various network technologies that ensure efficient data communications between different departments, at the same time ensuring that communication channels are secure. The expansion of an organization results into more resources being acquired in terms of new computers, printers, telephones, communication channels, hardwares and software’s and also the adoption of sophisticated network architectures. This results into an increased concern for information security within the organization to ensure that only the authorized personnel access the resources. Quest ion 1. The question describes the main security issues, the principles of public key encryption, and the role of certification authority as follows: Security issues facing the expansion of the organization Expansion of the organization will result into a rise in the demand of various resources. More hardware and software will be acquired, more people will be employed, and the network architecture to be used and various protocols will change to meet the organizational needs. Various security issues will arise; in physical security, all the tangible assets within the organization such as computers (both personal and laptops), network printers, telephones, storage media, people, network cables, and servers will face a security threat. Indeed, each of the organizations assets faces a security threat from within (internal) and from outside the organization (external). Security issues that will arise from within the organization (internal attacks) include access attacks such as eavesdropp ing (listening to a conversation that one is not part of) by fellow employees or through wireless networks, and snooping (looking through information files). Others include interception of transit information, unauthorized access to computers by employees, computer attacks by viruses, worms, Trojans, internal hackers and theft of hardware from within the organization (Maiwald, 2003). External attacks include hackers and cyber terrorists, and malware. The organization needs to address the measures that will be used to ensure security of both information, physical hardware, internal and external attacks are checked. Internal threats from employees are both intentional and accidental, where an employee can eavesdrop on another employee, hence gaining access to some information during conversation. In addition, employees can forge passwords of their colleagues and hence gain access to their computers, use, modify, and transfer information to other unauthorized members outside the organi zation. Moreover, employees may bring external or foreign insecure hardware into the organization, resulting into virus infection and transmission. Lastly, employees could steal portable small size hardwares from the organization. Information and communication within the organization will be affected in one way or another. There might be lots of network traffic caused by attacks on