Saturday, May 23, 2020
Reading Comprehension for Presidential Elections
This reading comprehension focuses on Presidential elections. Its followed by key vocabulary relating to the US elections system. Presidential Elections Americans elect a new president on the first Tuesday in November. Its an important event that happens once every four years. Currently, the president is always elected from one of the two main parties in the United States: the Republicans and the Democrats. There are other presidential candidates. However, it is unlikely that any of these third party candidates will win. It certainly hasnt happened in the last one hundred years. In order to become the presidential nominee of a party, the candidate must win the primary election. Primary elections are held throughout each state in the United States in the first half of an election year. Then, the delegates attend their party convention in order to nominate their chosen candidate. Usually, as in this election, its clear who will be the nominee. However, in the past parties have been divided and choosing a nominee has been a difficult process. Once the nominees have been selected, they campaign throughout the country. A number of debates are usually held in order to better understand the candidates points of view. These points of view often reflect their partys platform. A party platform is best described as the general beliefs and policies a party holds. Candidates travel the country by plane, bus, train or by car giving speeches. These speeches are often called stump speeches. In the 19th century, candidates would stand on tree stumps to deliver their speeches. These stump speeches repeat the candidates basic views and aspirations for the country. They are repeated many hundreds of times by each candidate. Many people believe that campaigns in the United States have become too negative. Each night you can see many attack ads on the television. These short ads contain sound bites which often distort the truthà or something the other candidate has said or done. Another recent problem has been voter turnout. There is often less than 60% turnout for national elections. Some people dont register to vote, and some registered voters dont show up at the voting booths. This angers many citizens who feel that voting is the most important responsibility of any citizen. Others point out that not voting is expressing an opinion that the system is broken. The United States maintains an extremely old, and some say inefficient, voting system. This system is called the Electoral College. Each state is assigned electoral votes based on the number of senators and representatives that state has in Congress. Each state has two Senators. The number of representatives is determined by the states population but is never less than one. The electoral votes are decided by the popular vote in each state. One candidate wins all of the electoral votes in a state. In other words, Oregon has 8 electoral votes. If 1 million people vote for the Republican candidate and one million and ten people vote for the Democratic candidate all 8 electoral votes go to the Democratic candidate. Many people feel that this system should be abandoned. Key Vocabulary to electpolitical partyRepublicanDemocratthird partycandidatepresidential nomineeprimary electiondelegateto attendparty conventionto nominatedebateparty platformstump speechattack adssound biteto distort the truthvoter turnoutregistered votervoting boothElectoral CollegeCongresssenatorrepresentativeelectoral votepopular vote
Tuesday, May 12, 2020
Essay about Principle of Fairness in Political Obligations
Political Science-II Political Obligations and Issues of Fair Play: A Critical Analysis Submitted By: Abhishek Choudhary (2034) Table of Contents Introduction Modern theories in the pursuit of explaining the provenance of political obligations tend to display a warranted skepticism of traditional consent theories. Twentieth century political philosophers expended much of their energy in drawing attention to the utter absurdity of such theories by attacking the idea that citizens in nation-states undertake obligations as a result of deliberate consensual acts, a premise not very hard to disprove. This lack of coherence provided by traditional theories on political obligations have compelled theoristsâ⬠¦show more contentâ⬠¦SOURCES OF DATA The paper has used primary sources such as original versions of treatises by political thinkers, as well as secondary sources like articles and books written as explanations of original theories. NATURE OF PROJECT The author has utilized both descriptive and analytical instruments in the course of the paper. The examination of normative theories occurs in a descriptive fashion at the beginning of each chapter, but the author endorses these with analysis thereafter. MODE OF CITATION The NLS Guide to Uniform Legal Citation has been followed. HLA Hart AND the Genesis of the principle of fair play ââ¬Å" Although earlier Greek and Latin philosophers, in the tradition of Socrates, appealed to something resembling the principle of fair play, the classic formulation of the principle is the one H. L. A. Hart gave it in his seminal paper ââ¬Å"Are There Any Natural Rights?â⬠.3â⬠He formulated the concept thus: ââ¬Å"A third important source of special rights and obligations which we recognize in many spheres of life is what may be termed mutuality of restrictions, and I think political obligation is intelligible only if we see what precisely this is and how it differs from the other right-creating transactions (consent, promising) to which philosophers have assimilated it.â⬠In another section, Hart goes on to explain the specialShow MoreRelatedIssues with the Stakeholders Theory885 Words à |à 4 Pagesbetween the stakeholders and non-stakeholders. For example, any group who might be involved in affecting the companyââ¬â¢s achievements might be considered as a stakeholder according to the theory. But stakeholders should be a group of people with moral obligations towards the corporations and also the holder of the stakes. 3. The problem of adjudicating between stakeholders: In the theory of stakeholders, Freeman did not mention any solutions about the problem of adjudicating between the stakeholders. AllRead MoreJohn Locke And Jean Jacques Rousseau Essay1583 Words à |à 7 Pagesindividuals in a state of nature, and create a society by establishing a contract whereby they agree to live together in harmony for their mutual benefit, after which they are said to live in a state of society, including concepts such as equality, fairness and equal distribution. During the Enlightenment of the 17th and 18th centuries, was when philosophers contributed to the social contract theory, as this was a time marked within history to be a time when intellectuals first began to explore establishedRead MoreThe Philosophy Of Social Justice1507 Words à |à 7 Pages Equality, fairness, and equal distribution are concepts that are embedded in social justice. Individuals living in harmony for mutual benefit living in a state of society are set out by social contract. This paper will firstly show, the background of the philosophy of social justice. Then it will focus on John Rawls Theory of Justice. Secondly, It addresses the stages of the Theory of Justice, It then historical nature of social justice in conjunction with western philosophy. Lastly it will lookRead MoreRole of Integrity in Dworkins Philosophy of Law1352 Words à |à 5 Pagesintroduced by Dworkinââ¬â¢s philosophy of law which will allow me to analyse how integrity might help judges when faced with a hard case. However, not everyone believes that the principle of integrity does in fact help judges when faced with hard cases therefore I also aim to analyse Hartââ¬â¢s rule of recognition against Dworkinââ¬â¢s principle of integrity. Law of integrity: Dworkin who was a positivist, developed his theory by attacking other theories and then identified how his theory does not fall prey to theRead MorePolitical Philosophy Is The Issue Of Political Obligation1834 Words à |à 8 PagesOne of the central issues in political philosophy is the issue of political obligation. This concerns the presence, the nature and especially the foundation of a particular relationship between government and its citizens. Philosophical Anarchism challenges this relationship. In this endeavor it differs from the position of Political Anarchism, which has as its main goal not only the moral devaluation but also the decline of the state. Conversely, the main method of philosophical anarchism is theRead MoreThe Law Of Obligation Is A Private Law1672 Words à |à 7 PagesIntroduction Throughout history, the law of obligation has held such prodigious value in the face of private law. Being the heart of both Contract and Tort law, it is a pervasive phenomenon of our social life. Both Tort and Contract law protect the rights, and ââ¬Ëthat protection cannot be legitimately compromised to achieve the aim of just distributingââ¬â¢ . This proposition may be true in the late 19th century, in the present time, however, the law of obligation has been ââ¬Ëbuilt on the law of its predecessorsRead MoreThe Function of a Social Contract1676 Words à |à 7 Pageswere the contract of citizenship and the contract of community. The contract of citizenship was tackled in Crito. He regarded it as a contract made by each individual citizen with the state or law. If a man is to remain in a political society he will have to accept its obligations for he has enjoyed it privileges and benefits. The contract of community was covered in Republic Book II. This theory is based on the assumption the man is an egoist. With this assumption of à ¡Ã ¥every man for himselfà ¡Ã ¦ it isRead MoreEssay on What is the Function of a Social Contract?1637 Words à |à 7 Pageswere the contract of citizenship and the contract of community. The contract of citizenship was tackled in Crito. He regarded it as a contract made by each individual citizen with the state or law. If a man is to remain in a political society he will have to accept its obligations for he has enjoyed it privileges and benefits. The contract of community was covered in Republic Book II. This theory is based on the assumption the man is an egoist. With this assumption of à ¡Ã ¥every man for himselfà ¡Ã ¦ it isRead MoreAnalysis Of John Stuart Mill s Veil Of Ignorance And The Classic Social Contract Theory Essay1399 Words à |à 6 Pages attempts to enhance the classic utilitarian views of John Stuart Mill, as well as the classic social contract theories of Thomas Hobbes and Jean Jacques Rousseau. Secondly, this evaluation posits how Rawlsââ¬â¢ ââ¬Å"veil of ignoranceâ⬠and ââ¬Å"difference principleâ⬠might apply to the socioeconomic issue of access (or, lack thereof) to health care in the United States. Specifically, this section relates these components to the United States Affordable Care Act (ACA), otherwise known as ââ¬Å"Obamacareâ⬠. FinallyRead MoreRelation between Politics and Justice1318 Words à |à 5 Pagesââ¬Ëjusticeââ¬â¢ and ââ¬Ëpoliticsââ¬â¢. In such a context, what are we referring to? Justice paradoxically must be defined for the purposes of criminal law yet it cannot be defined due to its complexity, rather it may be understood in several different realms; as fairness, as responsibility and as good. Justice aims to work in maintaining the exercise of authority through the vindication of reward or punishment. Politics refers to the public life, it is being ââ¬Ëof citizens of the stateââ¬â¢ or ââ¬Ëbeing involved, employed
Wednesday, May 6, 2020
Case Closed A short Story Free Essays
Jackie dropped her blue fountain pen and relaxed her aching wrist. She had been reading and adding to the notes of her clientââ¬â¢s case for the last two hours. It was taking place the next day and she hadnââ¬â¢t even read halfway through yet. We will write a custom essay sample on Case Closed: A short Story or any similar topic only for you Order Now Laying back in the comfy black office chair she let out a long yawn and stretched out her legs under the desk. Her neck and back were as stiff as a board and she let out a low moan as she turned her head from side to side. Jackie loved her job as a lawyer. Eating, sleeping and drinking her work she would often receive criticism telling her that there was more to life than just work and that you where supposed to work to live not live to work. She was so bored of hearing it. Thatââ¬â¢s why she lived alone, she was able to get on with extra work and block people out. She knew that they just didnââ¬â¢t understand how passionate she was about her job. Well for most aspects of it. She hated doing all the written work and the notes on the cases. After hours of relentless writing, her skinny arm felt as if it was about to drop off. She slowly unhinged her sore arms and stretched up towards the ceiling letting out another deep yawn. She new she would need motivation if she was going to continue with her work. She rose from her warm, moulded seat and dragged herself over to her immaculate, open plan kitchen. Although Jackieââ¬â¢s job took up most of her life she had always been a bit of a clean freak. She couldnââ¬â¢t bear the sight of untidiness and she always found herself putting things away and cleaning up. Her indolent arms reached up to the wooden shelf and she grabbed a wine glass. Filling the glass up to the brim Jackie took a long gulp and returned back to her study. As she sat back down in her cosy chair she was disturbed by the irritating ring of her telephone. Sighing and reluctantly getting up again, she walked across the room to the phone and clearing her sore throat she picked it up. ââ¬Å"Hello?â⬠No answer. ââ¬Å"Hello?â⬠she repeated herself rolling her exhausted eyes. Still silence. Slamming the phone down she returned back to her desk feeling annoyed that someone had disturbed her. She took another sip of her wine and unwillingly picked up her fountain pen again. Jackie sat in her warm office in deep concentration. She had no longer sat down that she was bothered again. But this time it wasnââ¬â¢t her annoying telephone. The noise that filled her ears made her jump out of her skin. It sounded like a lost soul shrieking from the depths of hell. It was her car alarm. Jackie strided through the narrow hallway and wrenched open the front door causing a gust of icy wind to hit her and enter the house. She cautiously walked down the footpath, biting her dry lips, her once warm feet slapping against the smooth glacial pavement. Pushing her tangled curly hair out of her face she bent down and checked underneath her car. Nothing. She glanced across the drive and not wanting to catch a cold for her big day tomorrow she hopped back up the footpath and back into her heated house. Turning the heating up on the wall she returned back to her work filled desk. She picked up her glass and stopped. The glass that she had left on the desk to go and investigate her car alarm going off had been half full. Now it was empty. She stood up, heart racing and stared around the room. She looked back at the glass suspiciously and rubbed her weary eyes. ââ¬Å"Iââ¬â¢m going madâ⬠she muttered to herself. Jackie tried to dismiss that somebody had drank from her glass but she couldnââ¬â¢t stop thinking about the fact she was sure she hadnââ¬â¢t drank it all. She glided over to the front door and pulled across the top lock. She felt slightly easier and safer now. Positioning herself in her chair she went to begin her work. Again she stopped. Her fountain pen that she always kept on top of the mountainous piles of work had gone. Puzzled, Jackie began moving her papers out of the way and searching the whole desk work top for the pen. Giving up and becoming very stressed out because of all her disturbances she furiously got up again and went in search of another pen. She stomped in to the kitchen opened the white sliding draw looking for a biro or something of that sort that she could carry on scrawling her notes with. With no look she slammed the drawer shut and spun back around to have a look in the sitting room. She froze. There was her fountain pen propped up against her porcelain vase on the corner table. The hairs on the back of Jackieââ¬â¢s neck stood up. She was positive she hadnââ¬â¢t even been in the sitting room all night. She attentively moved across the room towards the pen. When she got there she stopped for a moment and just looked at it, it had been balanced against the vase. She was so bewildered that her heart started to race. She heard a deep breathing sound coming behind her. She couldnââ¬â¢t move as her legs had gone numb with terror. Slowly she turned her head but before she could catch sight of her intruder she felt a sharp pain in the back of her head. Jackie fell forward knocking over the vase and hitting her face against the solid wall. She fell to the floor in a state of shock. The stranger dragged Jackie up by her long, blood-soaked hair. Without thinking she grabbed the manââ¬â¢s thick, hairy arm and sunk her teeth deep into his flesh. His grip loosened on her hair and she stumbled across the room falling against her desk. Hitting the floor again Jackie began to crawl towards the door in hope to get away from the attacker. She lunged for the handle and tried to turn it. It didnââ¬â¢t move. She remembered she had locked it minutes before. Frantically trying to unlock it she could hear him breathing behind her. The lock clicked open but it was too late. She felt another piercing blow to her head, then darkness. Jackie woke up with a start. The pain in her head was unbearable. She was trying to catch her breath but she couldnââ¬â¢t, her lungs felt as if they were about to explode. She attempted to sit up, but hit her head on what seemed like a wooden surface that was inches in front of her face. She was terrified; she needed to know where she was. She hated not being in control of situations. She tried to move her arms. They were pressed tightly to her sides. She was in some sort of box. She let out a long, high pitched scream. Little did she know that there was no chance any living person would ever hear her. How to cite Case Closed: A short Story, Papers
Case Closed A short Story Free Essays
Jackie dropped her blue fountain pen and relaxed her aching wrist. She had been reading and adding to the notes of her clientââ¬â¢s case for the last two hours. It was taking place the next day and she hadnââ¬â¢t even read halfway through yet. We will write a custom essay sample on Case Closed: A short Story or any similar topic only for you Order Now Laying back in the comfy black office chair she let out a long yawn and stretched out her legs under the desk. Her neck and back were as stiff as a board and she let out a low moan as she turned her head from side to side. Jackie loved her job as a lawyer. Eating, sleeping and drinking her work she would often receive criticism telling her that there was more to life than just work and that you where supposed to work to live not live to work. She was so bored of hearing it. Thatââ¬â¢s why she lived alone, she was able to get on with extra work and block people out. She knew that they just didnââ¬â¢t understand how passionate she was about her job. Well for most aspects of it. She hated doing all the written work and the notes on the cases. After hours of relentless writing, her skinny arm felt as if it was about to drop off. She slowly unhinged her sore arms and stretched up towards the ceiling letting out another deep yawn. She new she would need motivation if she was going to continue with her work. She rose from her warm, moulded seat and dragged herself over to her immaculate, open plan kitchen. Although Jackieââ¬â¢s job took up most of her life she had always been a bit of a clean freak. She couldnââ¬â¢t bear the sight of untidiness and she always found herself putting things away and cleaning up. Her indolent arms reached up to the wooden shelf and she grabbed a wine glass. Filling the glass up to the brim Jackie took a long gulp and returned back to her study. As she sat back down in her cosy chair she was disturbed by the irritating ring of her telephone. Sighing and reluctantly getting up again, she walked across the room to the phone and clearing her sore throat she picked it up. ââ¬Å"Hello?â⬠No answer. ââ¬Å"Hello?â⬠she repeated herself rolling her exhausted eyes. Still silence. Slamming the phone down she returned back to her desk feeling annoyed that someone had disturbed her. She took another sip of her wine and unwillingly picked up her fountain pen again. Jackie sat in her warm office in deep concentration. She had no longer sat down that she was bothered again. But this time it wasnââ¬â¢t her annoying telephone. The noise that filled her ears made her jump out of her skin. It sounded like a lost soul shrieking from the depths of hell. It was her car alarm. Jackie strided through the narrow hallway and wrenched open the front door causing a gust of icy wind to hit her and enter the house. She cautiously walked down the footpath, biting her dry lips, her once warm feet slapping against the smooth glacial pavement. Pushing her tangled curly hair out of her face she bent down and checked underneath her car. Nothing. She glanced across the drive and not wanting to catch a cold for her big day tomorrow she hopped back up the footpath and back into her heated house. Turning the heating up on the wall she returned back to her work filled desk. She picked up her glass and stopped. The glass that she had left on the desk to go and investigate her car alarm going off had been half full. Now it was empty. She stood up, heart racing and stared around the room. She looked back at the glass suspiciously and rubbed her weary eyes. ââ¬Å"Iââ¬â¢m going madâ⬠she muttered to herself. Jackie tried to dismiss that somebody had drank from her glass but she couldnââ¬â¢t stop thinking about the fact she was sure she hadnââ¬â¢t drank it all. She glided over to the front door and pulled across the top lock. She felt slightly easier and safer now. Positioning herself in her chair she went to begin her work. Again she stopped. Her fountain pen that she always kept on top of the mountainous piles of work had gone. Puzzled, Jackie began moving her papers out of the way and searching the whole desk work top for the pen. Giving up and becoming very stressed out because of all her disturbances she furiously got up again and went in search of another pen. She stomped in to the kitchen opened the white sliding draw looking for a biro or something of that sort that she could carry on scrawling her notes with. With no look she slammed the drawer shut and spun back around to have a look in the sitting room. She froze. There was her fountain pen propped up against her porcelain vase on the corner table. The hairs on the back of Jackieââ¬â¢s neck stood up. She was positive she hadnââ¬â¢t even been in the sitting room all night. She attentively moved across the room towards the pen. When she got there she stopped for a moment and just looked at it, it had been balanced against the vase. She was so bewildered that her heart started to race. She heard a deep breathing sound coming behind her. She couldnââ¬â¢t move as her legs had gone numb with terror. Slowly she turned her head but before she could catch sight of her intruder she felt a sharp pain in the back of her head. Jackie fell forward knocking over the vase and hitting her face against the solid wall. She fell to the floor in a state of shock. The stranger dragged Jackie up by her long, blood-soaked hair. Without thinking she grabbed the manââ¬â¢s thick, hairy arm and sunk her teeth deep into his flesh. His grip loosened on her hair and she stumbled across the room falling against her desk. Hitting the floor again Jackie began to crawl towards the door in hope to get away from the attacker. She lunged for the handle and tried to turn it. It didnââ¬â¢t move. She remembered she had locked it minutes before. Frantically trying to unlock it she could hear him breathing behind her. The lock clicked open but it was too late. She felt another piercing blow to her head, then darkness. Jackie woke up with a start. The pain in her head was unbearable. She was trying to catch her breath but she couldnââ¬â¢t, her lungs felt as if they were about to explode. She attempted to sit up, but hit her head on what seemed like a wooden surface that was inches in front of her face. She was terrified; she needed to know where she was. She hated not being in control of situations. She tried to move her arms. They were pressed tightly to her sides. She was in some sort of box. She let out a long, high pitched scream. Little did she know that there was no chance any living person would ever hear her. How to cite Case Closed: A short Story, Papers
Saturday, May 2, 2020
Information Systems Management Management
Question: Identify the common ways hackers use to gain access to systems and SECONDLY to analyse and evaluate the methods and systems that are being used to block the attacks and defend the systems. Answer: Information Systems security is pretty important these days since all of the information is stored on computer systems and networks which are accessed by many people who make changes to the saved information and add or modify or delete the information. Information Systems of businesses and corporates are of crucial importance since they contain all of the companys data regarding the employees, employees details, business deals, strategies etc., and if the information system gets compromised then all of the information of the company will get leaked and thus pose a risk for the companys future (Bosworth and Kabay, 2002). There may be several purposes of hacking into information systems. Lets take a look at them one by one: Hacking to disrupt the companys working or to steal data: Often rival companies and business hire hackers to hack into other companys information systems and get vital information about their strategies and plan of actions etc (Schifreen, 1994). Hacking for fun: Sometimes there are some hackers who do it just for fun, they will hack into an information system and play with the content and then leave them. Though there is less risk of data loss in this case but there is a significant modification done by hackers which then results in risks for the future developments to be taking place in the company. Hacking to Prove: There are also hackers who do hacking to show some top organizations who claim their security systems to be unhackable that their systems can be hacked. Though this does less to no harm to the organisation since the organisations pay the hacker later on to let the organisation about the vulnerability he/she exploited and the ways to fix it (Nf, 2001). Therefore, some hackers make an earning from it. Sometimes, hackers amongst themselves bet on who will hack a particular organisations information system. And thus the information systems get hacked. Hacking to steal money: In some cases where the information systems of banks are hacked, the hacker not only wants to get access the information system but also tries to steal money by transferring them into his / her account. Hackers may also hack an organisations information systems to sell that information to the companys rivals and earn money through it (Orlov, 2012). Hacking for status: Some hackers may also hack information system to get a status and position among the fellow hackers. Hacking in competition / war: Sometimes, the rivalry of two nations or regions also comes into the hacking arena, where hackers from two countries try to hack into the systems and destroy data of the other country. One such example is the hacking war which was prevalent in Indian and Pakistanis hackers in the year 2013 where hackers from both the nations would hack into the websites and information systems of the other nation and then would leave a mark of their group or country on the hacked website or the system. Above mentioned were the main reasons why hacking of information takes place and it also highlights the potential threats that the victims may face after the hacking takes place. In some cases it is good since the hacker lets the organisation know about its information systems weakness while in other cases it is pretty harmful since the hacker may use the information for his / her own personal benefits or may sell the data to earn money from it. Based on the reasons of hacking mentioned above. The hackers can be divided among three basic categories: Black Hat hackers: Black hat hackers are the ones who hack into information systems to harm the organisation and steal data or money from the information system. White Hat hackers: White hat hackers are the hackers, which some large organisations employ in their organisation to protect their information systems from outside hackers. White hat hackers try to make the information systems security foolproof so that no black hat hacker can gain unauthorized access to the information system and steal data or money (Joe and Ramakrishan, 2014). Grey Hat hackers: Grey hat hackers are the ones which lie somewhere between the black hat hackers and the white hat hackers. They hack into the systems without the permission of the administrator but do not steal any data. They do it mostly for fun or if they want they would ask the organisation to pay them money to tell the organisation about a potential exploit which helped them to hack into the system. Some recent hacking attempts and hackings: Operation Aurora: Operation Aurora which happened in the year 2009 was a cyber-attack series on top IT organisations in the world including the likes of Google, Yahoo, Adobe, Rackspace etc from June 2009 to December 2009. This attack was done by a group of hackers called the Elderwood Group based in Beijing (China). It is said to have been supported by the Peoples Liberation Army in China. After the hacking attempts stopped Google quit the Chinese market and later revealed about the attacks in a blog post. Truecaller Hack: Truecaller which is a mobile application which gets the information of an unknown number which calls on your mobile phone so that you know if you want to pick up a particular call or not was hacked in the year 2013 (Agwu, 2013). The database of true caller was hacked due to which the private information of thousands of customers was compromised. Truecaller was hacked by a group of hackers called the Syrian Electronic Army or SEA. Ebay Hack: In February-March 2014, Ebay was hacked by some unknown hackers due to which the records of over 233 million customers and users was stolen including usernames, phone numbers, passwords and even physical addresses of the users. Sony Pictures Entertainment: On November 14, 2014, Sony Pictures Entertainments data was hacked by a group of hackers who called themselves Guardians of Peace also called GoP and asked the banning of the movie The Interview which was based on the assassination of a leader from North Korea named Kim Jong-un. And it was alleged that the North Korean government sponsored the attack, but the North Korean government denied from taking any responsibility of the attacks (Fischetti, 2011). The attacks compromised private of Sony, including its employees details, details about the employees families etc. The above mentioned hacks were some of the largest hacks of Information Systems to have been taken place in the past few years in which a large amount of data and information was compromised. And as seen from the above examples that whenever a hacking of large scale is planned, it never happens that only a single person is behind the hack, there is always a group of hackers who denote themselves by some name who are behind hacks involving large scale data. Now lets take a look at the ways the hackers adopt / use to hack into information systems of organizations (Anon, 2000). There are several ways and exploits and every day some or the other new exploit comes out into the open and then get fixed, so it would not be possible to cover all the hacking methods into a single paper. But we will cover the most commonly used ways of hacking into this paper. Also other hacking methods are most of the times some variations of the common ways of hacking. Reasons for Information System getting hacked There are several reasons due to which an information system may get hacked. Below are some of them Web Applications which are vulnerable: The information system may be running applications which are vulnerable for use on the web. Some administrators may not be security aware. Security patches which are out of date. Every day new threats arise on the web, thus it is necessary that the organisation applies security patches which are up-to-date (Ghosh, 2004). Missing passwords or easily guessable passwords: Use of passwords which can be easily guessed or no passwords for privileged accounts are also a reason for information system getting hacked. Methods used for Hacking I. Using privileged accounts In many It companies there are many privileged accounts which are very powerful in terms of the authority they have as compared to other accounts. The first hack mentioned above, Operation Aurora, took place due to the privileged accounts of the companies not being secured. And these accounts are not often recognized by Identity Access Management systems (IAM). Thus no automated way is there to control and manage the privileged accounts. Some examples of privileged accounts are: Service Accounts: The service accounts have privilege login usernames / IDs and passwords. Super-user / Admin login accounts: These are the account of the users who have the highest authority and are used to make significant changes into the system, install applications, remove applications, add users etc (Wilson, 2004). Application to application: Some information systems sun applications which need to interact with some other application either on the same system or on some application outside the home system, in such cases, the IDs and passwords can be stolen while the data is being transferred from one application to the other. If privileged accounts are hacked then there is nothing more the hacker needs to do in order to gain access to the system. All he / she needs to do is to login and steal data or make changes to the data, add users, install bots, or Trojans etc. and gain full access to the system. To stop compromising privileged accounts the following steps can be taken: Finding Keys: These involve carrying a thorough audit and analysis of the whole network and information system and get the exact location where the privileged accounts reside in the system (Lewis, 2012). And then keeping a check that the security of these accounts is maintained by changing the passwords on regular intervals and that sufficient number of checks are there so as to login into these accounts. Closing Security holes: Any security hole should be fixed immediately without any delay so that the hackers do not get any chance to get into the system. Securing the External Entities: Making sure that the external entities are well secured. Ensuring that the systems outside the home organisation with which the home system is connected or connects timely to get data or transfer data such as cloud partners etc. are secured and they follow the security guidelines. II. Trojan Horse / Virus / Worms Trojan horse are programs which dont do the harm themselves but they open the doors or vulnerabilities for the hackers to install ad run some virus or external application such as spywares or malwares into an information system. Trojan horses allow the hackers to gain access to an information system and then make changes to the system. Trojan horses are propagated through .exe files (Ghosh, 2004). Most of the developers of Trojan horses send the .exe file attached to mails to the targets which when clicked install the Trojan on the target computer and then the computer on which the Trojan is installed also works as a server and spreads the Trojan to other computers on the network called botnets. Some ways to protect a system from Trojans are as follows: Do not open mails from unknown senders or mails from weird email ids, especially the ones which contain link to some external application program or have an attached .exe file with them (Joe and Ramakrishan, 2014). Do not use pen drives or flash drives which have come from some other systems in the information system, since they may contain Trojans. III. Distributed Denial of Service (DDoS) Distributed Denial of Service or DDoS is a superset of Denial of Service attack. In distributed denial of service, a web server or the information system is flooded with many number of pings within a single second on some open ports and after several minutes or hours the web server or the information system gets down due to the heavy amount of traffic it receives due to the pings and requests (Gupta, Joshi and Misra, 2010). In most of the cases big and large systems recover easily from such DDoS attacks. Ways to secure the information system from DDoS attacks: Do not keep unused ports open on the web server or on the information system. Since hackers use the open ports to launch a DDoS attacks, thus it is advisable to close any open ports which are not used on the system. Use not-so-used ports. There are several ports which are common to several applications and thus the hacker knows that those ports will be open. One way to secure a system from DDoS is to use non-conventional ports so that the hackers are not able to find out opne ports easily. Use some scripts in python which will filter out the bad traffic and only let the legit traffic reach to the ports (Gupta, Joshi and Misra, 2010). Specialized DDoS mitigation appliances: There are dedicated DDoS appliances available which help a system from getting down from DDoS attacks. On the ISP level: There are several ISPs which themselves block the illegitimate traffic (bad traffic) and thus prevent the systems from DDoS attacks. Cloud Provider: There are several cloud based hosts which do not let the illegitimate traffic to reach the system as they filter out the bad traffic at their servers only. Examples of such a cloud host is Cloudflare, Maxfront CDN etc. III. Packet Sniffing There are programs and applications called packet sniffers which steal the data travelling over a network (Rupam, Verma and Singh, 2013). Often the usernames and passwords etc. travel over the network which can be sniffed by packet sniffers used by hackers. Ways to protect system and network from Packet Sniffing: Change default passwords and use WPA2 encryption always since WPA2 is almost next to impossible to hack. Use long passwords and passwords which cannot be easily guessed for the routers and modems (Ansari, Rajeev and Chandrashekar, 2002). Use SSL i.e. Secure Socket Layer for all the data transfers taking place on the network. Use VPNs i.e. Virtual Private Network. When using VPN the data can be seen only at the receiving end and the senders end and thus no one can sniff the data travelling in between the two ends. IV. Cross Site Scripting / SQL Injection In cross site scripting the user or the hacker inserts some malicious code which maybe java/ JavaScript code from the client side which upon reaching the server application runs on the server side and sends the information back to the hacker. One way to submit codes to the server is through comments on sites or through contact forms on the websites which are directly connected to the information system servers (Fox, 2012). This way the attacker gets information about the server and then hacks into the server. SQL injection also works the same way as XSS. IN SQL injection the user / client injects an SQL code which then executes on the server side and sends the results back to the hacker. The only way to prevent XSS and SSL injection attacks is by doing proper sanitization of all the users submitted comments and queries to ensure that none of them contains any code which may run on the server side and send back the data to the user / hacker (Singh, 2012). In this paper we have covered a lot of the aspects of Security and Hacking of Information systems but there have been many a things which have gone unreported since Information Systems security is a very vast topic. References Agwu, E., 2013. Cyber Criminals on the Internet Super Highways.International Journal of Online Marketing, 3(2), pp.56-74. Anon, 2000. Protect against Internet intruders and hackers.Network Security, 2000(1), p.3. Ansari, S., Rajeev, S. and Chandrashekar, H., 2002. Packet sniffing: a brief introduction.IEEE Potentials, 21(5), pp.17-19. Bergeron, B., 2000. It may be fast but is it safe? Ways to protect your DSL system from hackers.Postgraduate Medicine, 108(1). Bosworth, S. and Kabay, M., 2002.Computer security handbook. New York: John Wiley Sons. Descy, D., 2006. Protecting your Computer from Viruses.TechTrends, 50(4), pp.3-4. Fischetti, M., 2011. Data Theft: Hackers Attack.Sci Am, 305(4), pp.100-100. Fox, D., 2012. Cross Site Scripting (XSS).Datenschutz Datensich, 36(11), pp.840-840. Ghosh, S., 2004. The Nature of Cyber-attacks in the Future: A Position Paper.Information Systems Security, 13(1), pp.18-33. Joe, M. and Ramakrishan, B., 2014. Enhancing Security Module to Prevent Data Hacking in Online Social Networks.Journal of Emerging Technologies in Web Intelligence, 6(2). Lewis, N., 2012. Access rights protect access to your data or lose it: serious misconceptions about information security.Computer Fraud Security, 2012(11), pp.8-10. Nf, M., 2001. Ubiquitous Insecurity? How to Hack IT Systems.Information Security: An International Journal, 7, pp.104-118. Orlov, V., 2012. CYBER CRIME: A THREAT TO INFORMATION SECURITY.Security Index: A Russian Journal on International Security, 18(1), pp.1-4. Rupam, Verma, A. and Singh, A., 2013. An Approach to Detect Packets Using Packet Sniffing.International Journal of Computer Science Engineering Survey, 4(3), pp.21-33. Schifreen, R., 1994. How hackers do it.Network Security, 1994(10), pp.17-19. Singh, T., 2012. Detecting and Prevention Cross Site Scripting Techniques.IOSRJEN, 02(04), pp.854-857. Wilson, P., 2004. Tips to stop your users from being phished.Network Security, 2004(9), pp.5-9.
Subscribe to:
Posts (Atom)