Monday, September 30, 2019

Antigone Interpretive Essay Essay

The play, Antigone, written around 422 B.C. by the author Sophocles, is the first of the three Theban plays written by this author. Although it was the first written, Antigone is the third in the series coming after the plays Oedipus Rex and Oedipus at Colonus. This play follows the story of a girl, Antigone; and the king of the city of Thebes, Creon, who both have different beliefs about Antigone’s dead brother Polyneices. Creon makes a rule that no one can bury Polyneices because he was a traitor to the city and attacked it with an enemy army. So as an insult to him, he will not permit his burial. Antigone, on the other hand, believes that even though what he did is wrong, that family is family and she has a right to bury him. She does so, defying Creon’s law, but gets caught in the act and Creon sentences her to death. With this decision, he refuses to let go of, we see Creon’s contradictory opinions: on loyalty, by wanting what is best for the city yet he kil ls their princess, he kills his own son’s bride to be; he pays more attention to himself and what he says is best for the city, rather than his own family, especially his wife. The first example of Creon’s contradictory opinions is his belief that everything he does is for the best of the city. As this quote from Creon states, â€Å"I say to you at the very outset that I have nothing but contempt for the kind of governor that is afraid, for whatever reason, to follow the course that is best for the state; and as for the man who sets private friendship above the public welfare- I have no use for him, either.† (1/20-24/1027) he states his belief in the safety of the city and its people, no matter what the cost is. So once Creon becomes aware of what Antigone has done, he stands by his word and orders her killed, thinking that if he lets her go the people will see him as weak and breaking his word, saying the good of the people comes first, above all else. What he doesn’t realize is that the opposite is true. The people become outraged with him because they feel that Antigone had a right to bury her brother as family, and because she is th eir princess. Nevertheless, Creon doesn’t listen to anyone, and has his guards lock her in a stone vault, with some food, so as to say he did not kill her but she died of starvation. From this act, this is the beginning of his spiral downward, and loss of respect from his own family. Soon after hearing what his father has done to his bride to be, Haemon, Creon’s son, rushes to the castle, to try to persuade his father  to spare her life. He feels she has really done no wrong. As usual, though, Creon does not listen to reason, even by his own son, as seen in this quote, â€Å"I will carry her far away, out there in the wilderness, and lock her living in a vault of stone. She shall have food, as the custom is, to absolver the state of her death. And there let her pray to the gods of hell: they are her only gods† (3/142-146/1045). After the argument with his father, Haemon flees the castle and isn’t seen until much later. Close to the end of the play, Creon finally realizes his wrongs only to find out it was too late. He goes to the tomb of Antigone to free her, only to find she hanged herself and Haemon at her feet crying. When Creon tries to apologize for his wrongs, now that he knows what he has done, Haemon, in a rage, ignores his father’s plea and takes his sword and strikes his father. Creon manages to narrowly escape the blade, which causes Haemon to become so enraged, he takes his sword and ends his own life in front of his father, and he dies there with Antigone. The third and final thing to happen to Creon, because of his opinions on loyalty, is that he neglects his own wife. While Creon is away trying to right his wrongs, his wife returns home to the castle, where she is informed by the messenger of what Creon has done. The messenger tells her how he sentenced Antigone to death, how Haemon tried to reason him but he didn’t listen. And worst of all, how their own child swung at Creon and then took his own life. All of this news is too much of a shock for her, so she leaves to her quarters without a word, which the messenger finds a bit suspicious, so he follows to make sure she is ok. At this time, Creon returns with the body of his son in arms, and talks with the choragus about all the grief he has gone through in this day. Then, suddenly the messenger returns with even worse news, which Creon doesn’t believe could be worse than what has already happened. The messengers tells him that his own wife took her life, â€Å"She stood before the altar, and her heart welcomed the knife her own hand guided, and a great cry burst from her lips for Megareus dead, and for Haemon dead, her sons; and her last breath was a curse for their father, the murderer of her sons. And she fell, and the dark flowed in through her closing eyes.† (Exodus/112-117/1060). From this, Creon cannot bear it any longer and asks if everyone else is dead, where his death is, but he is doomed to live with all he has done, still as king of the city. From all that Creon has learned in this play, from losing respect from the  people, to being cursed by his closet family, we can learn that sometime what we think is best, may not be right, or may not be the best for everyone, or even yourself. I believe the message Sophocles was trying to convey to us, is that we must all learn to care for the well-being of everyone by listening to advice offered, and listening to the opinions of those you are trying so hard to protect.

Sunday, September 29, 2019

Nursing admin

Possible Causes a. In order to Improve the process In dealing with this specific Incident changes must be made to implement a new process in order to better deal with these situations in the future. The first step would be to develop a team that is specifically trained to handle these emergent situations. Each member should have a specific role designated to them to know their specific tasks that should be handled during the emergency response.Once the team is developed, special training should be given to better educate the team members In dealing with these patients. Once each member Is confident In their training and knowing their role, the team will be ready and prepared to handle any future situations. B. To organize a team that would be the first responders for all emergent situations, the team would include a leader, facilitator, recorder, time keeper, and team members. The leaders would be the primary URN and primary physician on the given case.The facilitator of this team wo uld be the ICC nurse. The recorder and time keeper would be the same person being one of the unit staff members, not necessarily a URN but could be the charge nurse or resource nurse. The team member included could be the respiratory therapist who could help assists with necessary task if not preoccupied with a respiratory distress patient. In addition to these team members, I would include a security officer to be present and on standby for these patients that are combative and a possible threat to themselves or others.In this specific case the security team could have helped assist with the patient leaving the scene. C. Unfortunately, the staff Is currently uneducated on how to deal with these types of patients and incidences. This is causing them to have negative attitudes towards the patient's only rather accelerating the behavior of the patients. The staff does not know the correct steps to take in order to diffuse the situation. By not knowing what to do, there is too much lag time creating too much time for the situation to further escalate.Another problem that added to the situation escalating was having no security guards present at the time of Incident, causing opportunity for the patient to escape the hospital and disappear. D. Patient arrived at DE due to possible stroke Admitted with lack of knowledge of cause of symptoms Rapid response due to patient outburst Staff responds with negative attitude and lack of knowledge on how to address Mr†¦ X Mr†¦ X flees the hospital County police find Mr†¦ X at home Mr†¦ X admitted to same acute unit Staff avoids Mr†¦ X e.As stated previously in â€Å"letter a†, to improve the process and decrease the risk of this situation happening again a team should be implemented who is specifically trained in dealing with these situations. The emphasis should be placed on training and education for the staff and team members so this situation of staff not knowing how to respond or deal with this patient, will not happen again. A unit protocol should also be set in place, so that the staff does not have questions regarding how to deal with these patients in the future when this situation reoccurs. AAA.Improvement Plan In order to best be prepared in case this situation should happen again, a plan should be developed and in place so there is no questions as to whom should respond and what tasked should be taken. First there should be a team established and trained to be prepared for these situations. At the first sign of an emergent situation arising, the primary nurse should notify the charge nurse of events are age overhead so the entire team is alerted immediately. All of the members of the team should rapidly respond to the page and report to the location of the incident.Once all assemble the team members should assume their roles, the leaders would be the primary URN and primary physician on the given case. The facilitator of this team would be the ICC nurse. The r ecorder and time keeper would be the same person being one of the unit staff members, not necessarily a URN but could be the charge nurse or resource nurse. The team member included could be the respiratory expiratory distress patient. And the security team should be present and close in proximity.The team leaders should be taking control of the situation by giving verbal orders of steps necessary to diffuse the situation. The respiratory therapist should be taking care of oxygen and breathing treatments if necessary and assisting the team with any other necessary tasks. The unit staff member who is designated as the recorder and time keeper should be taking detailed notes of each task and order that is being carried out. Each team member should be all hands in throughout the entire mime until the situation is diffused or the primary MD orders for the team to discontinue treatment.Since the team has been thoroughly trained, their attitude will be more accepting of the patient and th ey will be proactive with approaching the patient due to the fact that they know which steps to take and skills in handling these patients. Once the situation in diffused and handled, the recorder should chart all the details that occurred during the response and the team should debrief regarding how things were dealt with and improvements that could be made. AAA. Implementation In order to implement this plan, a team must be developed that is specifically trained to handle these emergent situations.Each member should have a specific role better educate the team members in dealing with these patients. The members should be educated in detail regarding the plan and how to carry it out. It should be clear to all individuals on what their specific role is and each task they are responsible to implement. AAA & AS. Plan Measurement & Evaluation of In order to measure and evaluate if the plan would be effective a â€Å"mock† emergency could be staged in order to gage and evaluate h ow the team members react and successfully carry out the process.To be measurable, the response time could be recorded in order to evaluate how long the team takes to respond to the emergency and how long it takes to secure and safely treat the patient. Evaluations on each team member could be done and reviewed in order to make further corrections if necessary. After each emergent situation a debriefing could be held to discuss the outcomes and areas that need to be improved in order to better the process each time. B. Unit Protocol 1). No staff member should approach the patient by themselves, always have second staff member present at all times. ). At first sign of behavioral outburst, call security team in for backup. 3). Call team overhead to alert all members at first signs of emergency, in order to initiate first steps of the developed process. 4). Never attempt to restrain the patient before or during behavioral episode without consulting MD first. 5). Do not risk putting you rself in way of harm of physical danger if patient in combative, allow security team or police office to handle extreme cases of behavioral episodes.

Saturday, September 28, 2019

A Song Analysis by Walt Whitman

The poem, A Song, by Walt Whitman appears in Leaves of Grass. This edition collection of poems appeared in 1867. It is the workshop for the other versions that followed. â€Å"A Song† is not as well-known as some of Whitman’s other songs. This one like many of his poems celebrates comradeship and nature. It appears in the Calamus section of the 1867 book. It does not appear in later additions. The poem praises the soldiers who fought for America’s freedom. The emphasis on comradeship grows throughout the four stanzas. It starts with life-long love grows to manly love and ends with high-towering love. He uses lots of images from nature as well including â€Å"trees along the rivers,† â€Å"along the shores,† â€Å"all over the prairies. † This emphasis of the water is no coincidence as ships and those that worked on them fascinated Whitman. He loved ride the ferries and spend time along the East River in New York state. His patriotic side shines through this poem too with phrases like â€Å"the continent indissoluble,† â€Å"divine magnetic lands,† â€Å"O Democracy. † His ideals of a united nation present in the poem, contrast with the country as it really was, with racial problems and disputes between the North and South. This ideal grew out of his visits with wartime veterans after seeing the harm that segregation did to the country. At very young age, this ideal emerged through his friendship with Tom Paine, who wrote Common Sense. Whitman wrote this poem shortly after the Emancipation Proclamation produced the freedom that many questioned could ever occur. Keats, Bryant, and Emerson inspired much of his poetry and followed their examples especially in his newer editions of Leaves of Grass. In â€Å"A Song,† music tries to ring through the words. Whitman was a master at matching images with musical sounds. The reader can almost hear the river through the trees or the song of the prairies. In the poem, his love for music reaches out to people. Music is universal and brings people of all races together. Whitman seems to say that through song all nations can achieve these things. By replacing the â€Å"I† in this poem with songs or song, the reader sees how important song and music became to Whitman. Whitman was largely self-taught learning his trade as a teenager. He worked in a print shop. He learned much about journalism and grew to love writing in all its forms. Among other things, he was a schoolteacher, a journalist, an editor. He also wrote fiction and essays.

Friday, September 27, 2019

Cosmetic Surgery Essay Example | Topics and Well Written Essays - 1500 words

Cosmetic Surgery - Essay Example Cosmetic surgery does not only improve one’s appearance but also makes a person happier and more confident since society values beautiful people. In fact, a research indicate that attractive people, both male and female, are more regarded and treated more positively( Olson and Marshuetz ,2005). They have better chances of getting hired, earning higher incomes, achieve higher marks, have better social skills and are even less prone to commit crimes ( p.502). In cases where one is not born with natural external beauty, cosmetic surgery can play a crucial role in changing the situation. The bottom line is that self confidence is a huge factor in being successful and a beautiful appearance adds to one’s confidence. With the availability of cosmetic surgery , there is now a quick and good chance to change one’s beauty and ultimately live a more confident and happier life. Pleasant looks has been linked to encouraging reactions from other people, including plain liking or passionate fondness, promotion and success in career, judgments and punishing in legal settings, and several others. Commonly, appearance is more strongly connected to assessment and consequences for women than for men. Contemporary cultures across the globe socialize women to internalize an onlooker’s perception on their physical bearing, and hence to endure more embarrassment and misery over bodies that do not match the cultural model. In reaction to this, women are more probable suffer from eating disorders in an attempt to manipulate their appearance (Davis, 2002). Thus, there is a higher incidence of eating disorders in women since they are more conscious of their physical appearance especially when looking for a mate. It is common nowadays for men and women to try several procedures for improving physical attractiveness as methods for drawing the attention, and retaining passionate partners. Some resort to extreme physical exercise or

Thursday, September 26, 2019

Effective Customer Care for Business Success Coursework

Effective Customer Care for Business Success - Coursework Example This is the more reason that the customer care provider should be dynamic in dealing with different customers and must know how to handle each in a unique way. Communication, therefore, becomes vital in addressing each customer’s needs effectively. TASK 1: Developing a plan for the management of customer contact for EcoJET Airways (i) Identify three EcoJET target markets and briefly explain why you have identified each as a target market. A target market for a particular business is a group of customers who have a common relationship with each other. Some of the commonalities shared by such customer groups include but not limited to sharing similar demographic characteristics, residing or working in the same location, using the product/service for the same reason among others. For EcoJET Airways, one of the target markets may be identified as the business class travellers class of customers mainly because these customers travel for the same reason as part of carrying out busin ess activities between the three cities of Sydney-Melbourne-Brisbane or they could be classified as a target market because of the fact that they travel business class as a specific product/service offered by EcoJET Airways. These business travellers may also be staying in any of the three states, therefore, qualifying as a target market for the airline by virtue of common place of residence. The Airline provides various services to clients in this particular market including bus shuttle service from airport to CBD, Business travel lounge facilities, Use of mobile phone in-flight, In-screen entertainment with live access to major financial and business pay television channels (Lecture 1, p.18). Another market segment for EcoJET Airways are groups of customers flying across the three states at the same hours mainly 9am arrivals and between 5pm and 7pm departures. This is a perfect market niche for the airline because the customers use the air travel services at common times of day or night perhaps as a consequence of their work schedules or dictated by the hours of business around the three cities. Customers from the regional markets outside the three major cities could be another class of customers, which EcoJET Airways is trying to reach through the cooperative arrangement with Rural Express. This is a potential target market because the customers are non-city dwellers who wish to travel to either of the cities to carry out personal business, shopping, or for other different reasons. One of the airline’s policies is to promote sustainable air travel through minimization of emissions. Customers who subscribe to this, thus accepting to pay a carbon offset fee, may be classified as a target market for the firm; as opposed to another category which does not subscribe to the policy. (ii) Question TWO a. Skills which would benefit EcoJET staff in identifying and satisfying customer needs and expectations In identifying customer needs and expectations, commun ication is key and proper planning for it should involve carrying out adequate research about customer requirements ahead of meeting them, products or services on offer to suit needs identified and preparation for questions and clarifications. One of the ways communication can take place between the customer and promoter of the product/service is through non-verbal communication that involves the use of body language such as facial expressions, gestures, hands/ body movements, different

Literature review Essay Example | Topics and Well Written Essays - 1250 words - 6

Literature review - Essay Example In order to identify the relationship between employee satisfaction and its direct influence on employee performance, it is important to establish the levels of motivation, such as payment, promotion and reward, need in development, the level of freedom and stress, understand how employees perceive business environment, in a friendly manner or like a hostile surrounding. The idea of employee’s performance dependence on the level of job satisfaction was followed from the number of theories (Christen, Iyer & Soberman, 2005). Motivation to perform certain tasks is natural while the work itself is fulfilling. Jose and Mampilly (2012) observed employees’ engagement as positive work- related motivational state where they wished to contribute to work assignment that would lead to organizational success. Moreover, they state that in the modern business environment, the best practices are supposed to provide more opportunities for motivation improving through training of additional skills, attitudes and behavior of employees (Jose & Mampilly, 2012). In addition, employees’ motivation to work is supported by investment in staff development, where people see that their skills and abilities facilitate reaching of the organizational objectives. Shahzadi et al (2014) explains employees’ motivation from the point of view of the need tha t helps employees to attain assured targets. It is also procedure of different physiological and psychological wants that stimulates employee’s behavior to obtain certain performance. Motivated employees are more responsive of the definite organizational goals (Shahzadi et al, 2014). Therefore, motivational approach leads to the right organizational direction and successful accomplishments of business practices. It is established (Abadi et al, 2011) that money is the most fundamental factor that motivates employees,

Wednesday, September 25, 2019

Servant leadership Essay Example | Topics and Well Written Essays - 2000 words

Servant leadership - Essay Example The authoritarian leadership style denotes a centralized decision making approach where the final decision is taken by the topmost executive. The participative leadership style indicates that employees should be included within the decision making process. Employees are able to influence the decision making approach, and simultaneously the responsibility of team members also increases. The laissez-faire leadership approach is the least observed within an organizational system. There are similarities between servant leadership and participative leadership styles. In the current scenario there is a wide range of firms following the servant leadership approach. The servant leadership style is valued by many organizations so as to strengthen employee relationships. The organization selected for this particular study is Prince’s Court. This is a healthcare provider that aims at providing family-centered and quality healthcare to individuals. The study will summarize the implementat ion of the service leadership approach within the chosen organizational framework. The servant leadership concept suggests the primary role of a leader is to extend support towards team members or to serve them appropriately. This approach does not believe in exercising power over other team members, but distributes power amongst all individuals. It is an ancient philosophy and is closely knitted with the concept of participative leadership approach. A servant leader possesses certain priorities such as enabling, encouraging and supporting subordinates to address specific goals or objectives. This eventually leads to distribution of power and responsibility amongst employees. It can be considered as a participative decision making style, where all team members contribute their opinions or ideas (Mello, 2011). Servant leadership approach is not only confined to employee related behavior but its objective is to alter hierarchical relationship between team members

Tuesday, September 24, 2019

The Government and Economy Term Paper Example | Topics and Well Written Essays - 1750 words

The Government and Economy - Term Paper Example In the event a person was to come across the document for first time – having a wealth of sociology, they would immediately classify the document as being one of the many inquiries that have been made with regards to a certain special field in sociology. There are a number of attributes about the author that stand out with regards to this definition. From a sociological point of view, a reader may be tempted to think that the author had a well or improved view of modern Sombart has made or placed forth a very strong statement with regards to the fact that the entire era of modern capitalism and all the aspects related to this differs from earlier industrial epochs. This is mainly with regards to something far deeper than the mere methods of conducting business and other activities. He has gone forward to point out and present details that prove the dominant motive or main cause for doing business has undergone changes. The controlling purpose and main cause of modern business has become to increase the various volumes and also to enlarge the power of capital. In this case, capital is being enlarged for its own sake, and also for the sake of the social power it confers. This has been established as the main standard or purpose of modern business and economic lives (Congress). ... It is important to note that the basic portions set forth were clearly and positively based and founded on various human principles as opposed to the implicit capitalistic principles. It is important to note that Wealth of Nations was never authored or engineered with capital assumptions in mind. The occurrences or activity were as a result of the various services related to capital and those that are directly associated with capital. These formed the basis of the books which was to assess the goals of economics in part. Contrary to this attribute about the authoring of the book, the author had also assumed that the various economic activities and occurrences in their entirety were, as a matter or principle of course, a means or way of putting people in possession or giving out power with respect to the various means of life. Additionally, to state or put across the same fact or truth in a little different way, Smith went ahead and assumed that the entire value and concepts contained therein are attached to varying economic activities was a matter that was to be decided and settled by their effects on consumption (Jewell, 1982). That is to mean, instead of attributing the production of wealth in the forefront, as being the most important measure with regards to economic processes, the author evidently, at least through his fundamental theory, regarded or attributed the production of wealth as a minute or mere incidence to the consumption and utilization of wealth. The author’s whole moral philosophy was that the ultimate or vital evaluator of all creation and utilization; that is, the individual process, as it was assessed, analyzed and synthesized on the grounds of moral philosophy, was reviewed to be the tribunal of, or associated to the last

Sunday, September 22, 2019

Who Should Be Responsible For Policing The Internet Essay

Who Should Be Responsible For Policing The Internet - Essay Example Even an innocent research in search engines can turn out to be an accidental sexual offense. Aggressive marketing ploys of many pornography websites trick online users to visiting porn sites using hot links, pop ups with lewd photographs, or trapping users by bouncing them from porn site to porn site, making it hard to leave. The chat rooms are also favourite hangouts of determined paedophiles. These online predators share information with other paedophiles usually in a network, on how to seduce or â€Å"groom† a victim. They constantly roam chat rooms for possible victims. Online predators use social networking sites such as Myspace or Tagged as a way to meet potential victims. Paedophiles also frequent Usenet newsgroups to post and exchange illicit materials and even to discuss various approaches to victimize. The internet is safe haven for many computer child molesters because of the internet’s accessibility, affordability and user anonymity. Several research studies have underlined harm exposure to pornography among children poses. Dr. John Money of Johns Hopkins University presented a theory on sexual deviance in his 1986 book Lovemaps. According to Dr. Money, â€Å"sexual deviance can be traced to experiences in childhood (Laaser, 2000, quoted in Cothran, 2004, p.34).† Many clinical psychologists support that pornography causes violence among children. They point to the possibility of desensitization of children. It is general fact that children model what they often see and hear. Exposure to obscene materials may result to children â€Å"accepting and carrying such sexual preferences to adulthood (Laaser, 2000, quoted in Cothran, 2004, p. 34).† Sexual addiction also causes alarm. Sex as an addiction almost always begins with viewing soft-porn material and gradually shifts to hard-core. Laaser (2000, quoted in Cothran p. 35) says that â€Å"for substance or activity to be addictive it must create a chemical tolerance.

Saturday, September 21, 2019

The Status of Women In the New Testament Essay Example for Free

The Status of Women In the New Testament Essay When assessing the history of womens role and position in society, it is notably the period of the New Testament which proved to be a major turning point in the status of women, and was the starting point for the near-equality experienced in todays society. Graham Stanton observes that The status of women was markedly inferior to that of men throughout the ancient world, including Judaism.1 Thus, by looking to the society preceding that of Christ, one can only understand what a profound influence Christ had on the previous Jewish and Greek customs of women. The society in which Jesus lived was strongly patriarchal; the worth and dignity of women was not recognized, the womens role was domesticated, to be a faithful wife and mother, and women who stepped outside this role were vilified. Women had almost no role at all in the wider arena of social life, in politics and religious affairs 2. By looking to the Old Testament the earliest evidence of such a society is indicated in the Book of Job, and arguably the Old Testament is a record of the mistreatment of women by men. Women were considered to be the cause of evil doing, a temptation to men, and a hindrance to his spiritual life. If my heart has been enticed by a woman, or if I have lurked by my neighbors door, then may my wife grind another mans grain, and may other men sleep with her. ( Job 31:10 -11) Better is the wickedness of a man than a woman who does good; It is a woman who brings shame and disgrace (Sirach 42:14) This patriarchal society which had no time for women in discussions, decisions or pleasures, left women as objects to fulfill the mens sexual desires and produce children, they lived their lives under the control of men, mainly their fathers and husbands. This belief came about from what was stated in Exodus 20:17, that a woman was a possession of the husband, You shall not covet your neighbours house; you shall not covet your neighbours wife Indeed in Jewish religious and social law, women, slaves and minors were often placed in the same category. The religious authorities had little respect or liking for women, the Rabbis were fearful of women as they were seen as a source of sexual temptation. Additionally, the Shema was not to be recited anywhere, where you could hear a womans voice or see her legs or her hair. However, there were exceptions to this 1st century treatment of women, E. Schussler Fiorenza argues that Although in rabbinic Judaism women are categorized with children and slaves for legal and religious purposes, the biblical stories about women indicate that women were not perceived as minors or slaves in everyday life. Such examples she uses are women including Ruth, Esther, Hannah, all of who are seen to have typical female roles and behavior, yet, they are not perceived as minors or slaves in everyday life.3 Certainly Deborah is also an important figure for the raising of the female status in the Old Testament, she was a Judge and was consulted by the Israelites over several issues, and it can be understood that the majority of her rulings were correct. In the face of threat created by Jabin, the Canaanite king, she roused Barak to lead the Israelites into battle, and ultimate victory. Thus she was clearly a heroine. Certainly then, as J and K Court observe, womens status was relative and could depend on various factors: family, employment, or religious background, and Jesus preaching and teachings of equality for all could only be possible in so far as such notions of equality are conceivable in the context of Jewish life and faith.4 However, through the scriptures of the Old Testament God asks his people to act compassionately toward those around you (Deuteronomy 24:17-22) but no account can be found of men respecting the human rights of women, thus they over look Gods commands. Such a corrupt system, constantly producing injustice and fear, was in true need of a change. Jesus overturned the social and cultural mores of this day and challenged legalistic traditions. 5 He showed no discrimination to others and treated all persons with respect, regardless of their race, sex, age, physical condition, political preference, economic status, or educational level. 6 He told all persons, You have worth and value, and there is rejoicing in heaven when you as an individual become part of My family (Luke 15:1-10). For God created both men and women in his image, both equal and complete, God created man in his own image, in the image of God he created him; male and female he created them. (Genesis 1:27). He did not separate one from the other in the ruling of the world for one cannot function without the other, It is not good for the man to be alone. I will make a helper suitable for him. (Genesis 2:18). It is this concept which Jesus tried to revive in his teachings. Throughout the New Testament, there are many references to women that demonstrate how Jesus reacted differently to women, and how he promoted the status of women. Jesus talks to women even though they are outcasts-much to the surprise of his disciples, as he was offending all the normal conventions.7 Jesus presents women as worthy and faithful through acts of forgiveness and numerous miracles performed on them. He also removes from women the domestic image that society had previously molded them into, and presents them as disciples equal to men, as shown in Luke 10:38-42 where Jesus favors the sister Mary who sat at the Lords feet listening to what he said rather than her sister Martha who was pre-occupied with the traditional female obligation of house work. Also in Luke 11:27-28 Jesus states Blessed rather are those who hear the word of God and obey it rather than the woman who brings life into the world, here again specifically telling women they are bound to no duty except to that of the Lord. Jesus, within this passage is shown to view women as equal to men, he makes no distinction, since Jesus main concern is to teach those who are willing to learn. This is a radical move away from Jewish thought, since up until this point it was unheard of within Judaism for a religious teacher to teach women. It is the evangelist Luke, who seems to show the most interest in women using Jesus positive references to women which were so different to the views at the time and including many unique stories of Jesus encounters with women in his Gospel that the other evangelists omit. Luke 18:1-8 shows a man in a superior position as a Judge supposedly working for what is true and Godly, however, with no sense of true loyalty or justice, compared to a widow with real faith, totally committed to God. It is only through the Judges selfish need does he see that she gets justice. By putting this story in of two contrasting characters, Luke must obviously be aware of womens hard deal in society, and also aware of some mens response to the superior positions that they hold in the first Century world. Thus this story is used to illustrate the faithful and faithless. Most of the references to women in the Gospels are there to portray positive examples of persons with great faith. Jesus welcomed the inclusion of women as disciples with the understanding that they could respond with obedience and commitment to the word of God. Luke 8:1-3 states by name women who followed Jesus in Galilee and to Jerusalem where they were present as faithful and active servants at the crucifixion. The three women were named as Mary Magdalene, Joanna, and Susanna, who had apparently left everything and became disciples of Jesus as a result of the healing they had received from him, and followed him until the end. As Fiorenza states, the women are thus characterized as true disciples of Jesus who have left everything and have followed him on the way, even to his bitter end on the cross. 8 All four Gospels report that it was the women disciples who first saw and believed Jesus resurrection, however in Luke 24:10-11 the male disciples did not believe them. Mark too, shows that in the New Testament writings the status of women has been improved. Just as in the beginning of the Gospel of Mark, he presents four leading male disciples who hear Jesus call to discipleship, so at the end of his Gospel he presents four leading women disciples. He mentions them by name which is demonstrating their importance, since one has previously noted from the story of Bethany (14:1-11) that the author of Marks Gospel did not always see it necessary to include the name. It is significant that in this passage of Mark 14:9 where Jesus pronounces that wherever the gospel is preached in the whole world, what she has done will be told in memory of her. This is in reference to the anointing of Jesus in Bethany by a woman. This verse shows to a reader two things, firstly that from the start Jesus treated women as equals since he is willing to identify and make clear the great act that the woman has performed. Secondly it shows to one that although Jesus realised the great act the woman had performed, the author of the gospel did not believe it was worth noting the name of the woman. Certainly Fiorenza believes the name of the faithful disciple has been lost since she was a woman.9 Hence, again highlighting what the early status of women was, even in the Christian world. Also in Marks Gospel it is included the idea that Mary Magdalene was the first human to have Jesus appear to her (Mark 16:9). Mark writes; He appeared first to Mary Magdalene but when they heard that he was alive and had been seen by her they would not believe it. Therefore, here clearly one can argue that although Jesus himself accepted women and believed them to be equal. Nevertheless, 16:9 demonstrates that despite the fact his male disciples would like to believe they followed Jesus and all he taught them, they evidently did not for they refused to believe Mary Magdalene, thus one can state from studying Marks Gospel that the author was indeed keen to encourage women into apostolic and ministerial leadership, which was a drastic change to the status of women. This is the radical difference in Jesus ministry, and the gospels will not let the Christian Church forget this, although as Stanton observes, the early church did not always follow his teaching regarding women. However, this serves only to establish the increasing likelihood that Jesus teachings were authentic. 10 Jesus uses his power and authority to try to bridge the gap between men and women in society by his acts of compassion. He is not afraid to be touched by a ritually unclean woman who is suffering from a hemorrhage, or when he brings a widows dead child back to life in Luke 7:11-17 which shows Jesus genuine compassion for women as he shows with men and children alike, his heart went out to her 7:13 and he raised her son from the dead. Jesus challenged the Jewish mentality that women as witnesses to Jesus preaching had no value or significance by drawing women to be apart of his discipleship and thereby giving a value to their presence and making them effective witnesses to his life and message. And it was Finallythe women who, drawing close to the dramatic events of his crucifixion and death, when all the disciples deserted him and fled.'(Matthew 26:56) and when Peter denied him, followed him and were present at his crucifixion, death and burial11 they are portrayed as dedicated and f aithful follows who have been able to see through their suffering. The one woman who even at the time of Jesus birth through to today holds a superior position in the church is Mary mother of Jesus. Mary is shown as a dedicated and obedient disciple of Jesus, She agreed to accept Jesus birth and to be obedient to Gods will while knowing well that this would place her in a position of being a social outcast.12 The Gospel writers support her and highlight her considerable strength and bravery from the beginning of the Gospel- Jesus birth, through to his death at the end of the Gospel. It is telling that Luke compared to Matthew tells the birth story from Marys point of view rather than Josephs, as we have seen Luke is strongly aware of the difficulties which beset women in New Testament society and hugely supports Mary mother of Jesus who he feels represents the faithful and long suffering women and disciple. In the second century document called The Gospel of Mary, written about Mary Magdalene there are indications towards the role that she carried with the disciples that is ignored in her presentation in the New Testament. We find Mary Magdalene consoling the disciples after Jesus ascension Do not weep and do not sorrow and above all do not be indecisive. His grace will be with you and will protect you. Peter turns to her and says: Sister, we know that the Saviour loved you more than other women. Tell us those words of his, which you remember and know, not us. 13 This shows Mary holding a somewhat authoritative position towards the disciples and the passage indicates Mary had a personal relationship with Jesus outside that with the disciples, of such an authoritative position that she holds, however, was omitted or not specified in the New Testament, although the Gospels did write that Jesus accepted her for who she was and with her past, however, they failed to specify the closeness to which their relationship is suggested to be, and it can be deduced that she (and conceivably other women) had a much more significant role in the early church than is presented in the New Testament documents themselves. The evangelists throughout the different gospels are expressing their views about the role of women through the mouth of Jesus and his encounters with them. However, these views however honest they may seem considering the society they are writing for and are apart of, may still be somewhat constrained when deciding whether to write of a wom en having a greater and closer relationship with Jesus than men, would seem ridiculous and absurd to the people at that time. As Graham Stanton observes, the early church soon after Jesus time on earth did not always follow Jesus example in its treatment of women. Indeed it could be said that Paul and other later New Testament authors reverted back to a more Jewish approach to women and therefore distanced the early Church away from all that Jesus had done to promote the status of women. However, although it is true to say the Pauline teachings imply that in the worshipping congregation women should not have an authoritative teaching role, thus they should not have an equal status with men within the church. Nevertheless some of the teachings still keep the theme that in the kingdom of God any person baptized is a part of Jesus Christs kingdom and can no longer be differentiated from another Baptised believer, therefore all are a apart of one unity in Christ. Paul has thus understood Jesus essential message that all are welcome into Gods kingdom: There is neither Jew not Greek, slave nor free, male nor fema le, for you are all one in Christ Jesus.'(Galatians 3:28) However, he also establishes some rules that seem to diminish women but are actually aimed at creating order and dignity in the church. Although Paul clearly expresses his view that all people are equal in Jesus, in a letter to Timothy concerning the worship of men and women he does not deny the different roles both women and men should play, emphasizing clearly womans role of bearing children and prohibiting women to teach and lead a congregation or to have authority over a man'(1.Timothy 2:12). It is later in his instruction to the Corinthians that Paul places restriction on what women can do: women should remain silent in the churches. They are not allowed to speak he then states that A man ought not to cover his head, since he is the image and glory of God; but the women is the glory of man. For man did not come from woman, but woman from man; neither was man created for woman, but woman for man. For this reason the woman ought to have authority on her head because of the angels. (1.Corinthians 11:7-10) Pauls rules about the conditions for worship, although they may seem sexist, actually reflect the times. Women were usually covered apart from their heads and hands, however, to avoid distraction when worshipping it would be customary to cover their heads, so the only focus would be solely the Lord. Even though Paul has rules inside the equality of worship, he still stands by the view that In the Lord, however, there is neither woman without man nor man without woman. For as woman came from man. So also man is born woman, and everything comes from God.'(1 Corinthians 11:11-12)14 But it is passages such as Now as the Church submits to Christ, so also wives should submit to their husbands in everything (Ephesians 5:24) that have caused the most controversy and have been taken as literally wives being the husbands possession. For in traditional Western marriage services today the words I obeyARE often no longer included. It has been noticed that the Pauline and Petrine writers seek to limit womens leadership roles within the Christian community to roles that are culturally and religiously acceptable. However, ironically, these claims cannot allege the authority of Jesus. The status of women in modern times has a great deal to do with Paul and other later authors teaching. Certainly the practice of women covering their head before they went into churches was a common practice up until the II World War. This shows the long lasting effect of Pauls teachings in the church on the status of women. It is important that when looking at the texts written about Jesus teaching shortly after Jesus crucifixion that they must not be taken necessarily at face value, they must be interpreted in their cultural setting, so they may seem obscure to our standards and values in the twenty-first century. Even today, although huge developments have happened to the status of women since Jesus time, women are still thought in some countries to be of less social standing than their male counterparts, it is only in the developed countries that equal rights for men and women have been fought. There has been great dispute over the acceptance of women priests in the Church in the Western World. The argument against there being women priests within the Church of England, found much of its weight from the later New Testament authors, and much of what Jesus had taught was ignored. The main emphasis of the argument was placed on the idea that male and female were created to be equal but different, many against the ordination of women would have used this beginning to base the development of the role of priests as a male responsibility. Moreover, many scholars use the passage from 1Timothy:2:8-15, I permit no women to teach or to have authority over men; she is to keep; silent, to suggest that women should not be in a position to teach with authority in the Church. They argue that Christ was male and chose male apostles and that females cannot form legitimate succession or play the crucial part in the sacrificial and sacramental acts of the Eucharist. 15 Peter Vardy argues that just as Christians misapplied Jesus essential message to the Jews, similarly Christian Churches and individuals have done the same to women Women in terms of the Roman Law were considered inferior to men, and it was the Roman law which became the basis of the churches law. Women were also considered to be responsible for bringing sin into the world and for being a continuous source of seduction, and they were considered to be ritually unclean because of their monthly blood flow, thus almost as definition to the Roman Law and understanding women could not be ordained simply because they were a woman, as it would be inappropriate for an inferior, sinful and unclean person to represent God. It was such strong feelings as these that became so deeply imbedded in the Churches thinking in past centuries that have remained up until today. The Church of England is currently paving the way for women bishop however there is strong opposition and splits within the church and so it could take another twenty years before a woman is made a bishop in Britain. Passages in the Bible emphasize the order of creation of men and women and reflect the household code of their positions in the family and home. Therefore although some traditionalists still believe that women have a different role from men and are subordinate to men by God, through the creation, others maintain that before God all are equal16. For women to be equal in the Christian church the very fact that circumcision was to be replaced by baptism was a very important factor. Since women now could become equal and have the same status as men did before God. Fiorenza REF? believes this generated a fundamental change in women, not only in their standing before God but also in their ecclesial social status and function. She bases this argument on the fact that previously in Judaism women could never be viewed as equal since they could not be fully initiated into the religion due to circumcision. Therefore although much of the New Testament writings show women to be subordinate to man , the actual initiation into the Church is balanced. The sense of oppression that women have felt for centuries in both religious and everyday life seems to have stemmed from the very roots of religion, in the creation story and also from the misinterpretation of Jesus words in the Bible Feminist groups both within and outside the church have accused the church of propagating a negative view of women.17 The Feminist Movement has developed today as a result of the injustices women have suffered in the past and their desire for equal rights and opportunity in the future in all aspects of life. Mary Wollstonercraft applied the principle of natural rights to women arguing that women have equal worth with men and therefore have the same rights. Today it is seen as an act of discrimination for women not to have the freedom to be ordained; the last few decades have witnessed increasing sensitivity regarding womans rights and the need to redress injustices committed in the past. This new freedom has opened up new roles in all fields of work. The church although slow and reluctant to incorporate a true evaluation of women (Galatians. 3:28) into its institutions and rituals has finally succumbed. The position of women in the church reflects the changes in society and so today women find themselves challenging men in all walks of life. In conclusion, the status of women in the New Testament has a great deal to do with how the individual authors of each book viewed women. Certainly the Gospels indicate to the reader that Jesus wished to depict women as having just as many rights as men in the eyes of God. Furthermore, he showed that he himself saw women as equal beings to men, since he allowed them to become his disciples, as in the case of the Galilean women. So the gospels project them as being Jesus true disciples. The period of the New Testament marks a significant change in the role and attitude to women, which seems to have been initiated by Jesus. It was this dramatic change in attitude to women (although the early church did not always reflect these teachings) that has finally become the standard to which modern day women aspire and society have accepted. People are welcomed by Jesus irrespective of race, status, or gender, and those who are called to leadership are chosen on the basis of Gods gracious spirit not on accidents of birth.18 1 The Gospels and Jesus Graham Stanton, 1989, p102 2 The Puzzle of the Gospels Peter Vardy and Mary Mills, Fount 1995 pg170 3 In Memory of Her E. Schussler Fiorenza 1983, pg 109 4 The New Testament World J. and K. Court, Prentice-Hall, 1990 5 Equal to Serve G.G. Hull 1989, pg85 6 Ibid 7 Puzzle of the Gospels Peter Vardy and Mary Mills, 1995, pg173. 8 In Memory of Her E. Schussler Fiorenza 1983 9 ibid pg 316 10 The Gospels and Jesus Graham Stanton, OUP (1989) pg202 11 Mary Magdalene and Many Others Carla Ricci, BURNS OATES (1994), pg144 12 The Puzzle of the Gospels Vardy and Mills, pg175 13 May Magdalene and Many Others Carla Ricci, pg147 14 information from Pauls teaching on the Ministry of Women P. Nelson, Whittles Publishing (1996) 15 The New Dictionary of Christian Ethics and Pastoral Theology IVP(1996) pg 595. 16 Paul and the Eschatological woman R. Scroggs. Pg266 17 Dictionary of Christian Ethics and Pastoral Theology pg380 18 Oxford dictionary of the Bible W.R.F. Brownig. Pg 398

Friday, September 20, 2019

Benefits of Network Management Tools

Benefits of Network Management Tools 1. Introduction These are the various network management tools used by network manager to verify network connection, monitor network packets, analyse captured packets, troubleshoot network connectively failure, diagnosing network slow performance and identify source of incident in order to make the network available 24 hours seven days a week. 1.1 Benefits of Network Management Tools Network manager benefits from network monitoring tools in so many ways as described below Easy migration from old legacy application to new technologies For example when network administrator is migrating form a legacy IOS based application to LWAPP using Airwave Management Platform software tool for wireless network management, net work administrator is provided with centralized control for Wi-Fi networks where roaming data and information as well as historical data are kept as airwave gives a common platform to manage the devices. This is beneficial to the network manager because it makes it easy for migration from old legacy applications to new technologies and makes it easy to monitor the network usage all the time Quick identification of network or server failure when the server of a portion of the network is down, before users get to notice the failure network administrator receives a warm and rectified the fault and providing the network manager with means of monitoring and providing network availability round-the-clock. Using network-monitoring tool like ipMonitoring with attributes such as such as reporting, user tracking, access point configuration management and rogue AP discovery, network administrator is able to monitor any networked device on the corporate intranet and TCP/IP LAN and receive alerts immediately depending the administrators configuration of receiving alerts; this can be received through alarm, e-mail, or third-party software when a connection fails. Diagnosis and troubleshooting, Network monitor can be used to diagnose why the server computer is not communicating with the clients computers on the network on a local area network, for example network administrator can configure network monitor to capture all the frames on the network, this includes source and destination address of the computer sending and receiving frames, protocols used as well as part of message sent. Net work administrator analyses this information to locate the source of problem on the network and troubleshoots it. Checking for connectivity of a computer online for example using ping command to check if a computer is online helps network manager for example when user calls and said they can logon to networked computer to troubleshoot and diagnose the network manager uses ping to find out if the computer in on the network or not. This is beneficial to the administrator because it helps him to identify where the problem is originating. 1.2 Structure of management information Structure of management information is a network component used in network management which is used in simple network management; its main role is to define set of module identity, object type and notification type. Structure of management information shows how related managed objects such as object names, types of data that can be stored in an object and how its transmission over the network for example action done to retrieve vale of an object with codes 2. Use Datagram Protocol User datagram protocol is a transport layer protocol that is used to send packets to computers in networked environments. User Data Protocol has the following advantages over Transport Control Protocol Connectionless When communicating with two computers on the network, user data protocol doesnt negotiate connection between the two client computers but just transfers data as its received No Connection State User data protocol doesnt maintain and doesnt keep track of any parameters such as buffers sent, congestion control and rate which data is transfer for example when used in server environment, user data protocol is able to support more active clients if a particular application is run over it because it doesnt acknowledge packets being sent or received. Small packet header over head User data protocol has got a smaller header of 8bytes of overhead making it faster in transferring data Unregulated send rate, user data protocol doesnt have congested control mechanism and data is sent at rate, which it has been generated by the application in use for example taking into account the CPU, clock rate at the source of data. 2.1 Applications layer protocol used by User data protocols as Transport layer protocol Domain Name Service Is a database like that converts the computers fully qualified domain name that are easy to be remembers such as www.yahoo.com into IP address such as 201.171.25.0. 6 that are then used by computers to connect/ communicate with each other Steaming multimedia This is the continuous transfer of video, voice and digital data that is received and showed/displayed in real time for example podcast and webcast Routing protocol Routing protocol is used to determine which path to be used to sent/ transmit data packets across a network. 2.2 Reasons why UDP is preferred over TCP Domain Name Service User data protocol is preferred over transport control protocol because its used by DNS for name queries and because the information exchange between UDP and DNS is small in size for example the packet size sent through UDP is not greater than 512 bytes. Streaming multimedia Streaming multimedia its used by UDP because it compresses audio files in to small packets of data that makes it easy to transmit and continuously streaming and transmitting audio files whenever their audio data drops. This doesnt break or cause delay on audio broadcast. The streamed data is sent by the server application to the client application stores the stream data the then displays the data received in real time or playing the voice streamed files as soon as its buffered. Routing protocol On routing protocol, User data protocol is preferred because routing table updates are sent periodically and some of the data is lost a long the way and updates need to be resent so its up to date on network layer which is impossible with transport control protocol 2.3 Controversial use of UPD in multimedia applications The use of user data protocol for streaming multiple media application is controversial because user data protocol doesnt have congestion control which is much needed to prevent the network from going into a state in which less or no work can be done, for example if a users sends high bit rate video are sent without using congestion control, user will be unable to see the video messages because of the packet overflow at the router. 2.4 Adaptive congestion control scheme One scheme that would force the use of adaptive congestion control is real time communication scheme which has building reliability into applications that will force the use of congestion control, for example in mobile application where congestion control is built though the application run over user data protocol, it acknowledges and retransmit packets that get loss during transmission Applications that perform congestion control user the network more efficiently for example with bits rates being controlled, the network will not go into a state where it can not be used 2.5 Advantage of Adaptive congestion scheme Better performance of the network for example in the case of video when small bit are sent and controlled, the performance improves as the bandwidth will be enough to support bit rates It ensures that all packets sent reach destination 3. Exchange between Dhcp Server and Client Computers DHCP Server and Client Computers See Appendix (i) For clients to receive IP addresses from dhcp servers TCP/IP need to be con figured to get IP addressed automatically on the TCP/IP properties dialogue box. Dhcp client computers that are configured to obtain IP address automatically request and receive IP configuration upon booting the client computer. Dhcp clients get IP addresses and other configuration each time the client computers are started and join the network. Dhcp server assigns IP address to a client from a predefines scope for a given duration of time and if that duration expires the IP address is released to the scope and can be assigned to another client but if the duration is longer than the lease time, the client requests for and extension before the lease expires. 3.1 Router and Components A router is a device that connects one or more computer to create a network environment for example a modem. A router has the following major components Input port Is the point is direct connection for physical link and it is the point at which incoming packets enters the port. Input port provides functions such as performing the data link layer encapsulation and encapsulation, a route lookup and sending packets to output port via switching fabric as well as proving quality of service guarantees input port classify the in a predefined service level Output port Output ports stores packets that are forward via the switching fabric and transmits or schedule packets for service on an output link performing both the reverse data link and physical link functionality as done in input port Switching Fabric This connects input ports and output ports Routing processor Executes routing protocols, creates and forward routing tables which is used in packet forwarding and performs management functions within the router. 3.2 Internet Protocol version 4 Internet protocol version 4 is the protocol that is widely in use in most corporate networks and it uses network layer protocol and its used as internetwork layer protocol on the internet 3.3 Internet protocol version 6 Internet protocol version 6 is the update version of internet protocol version 4 with much more address space. Its mostly used on the internet bone in Asian countries. Protocol Structure of an IPV4 header See Appendix (i) Protocol Structure of an IPV6 header See Appendix (iii) Due to the depletion of internet protocol version four and lager routing tables, internet version 4 has been updated to version 6 that provides better security, more address space. This has made internet version 6 more advantageous in some ways as discussed below. Internet protocol version 6 address space 3.4 Advantages of internet version 6 Internet protocol version 6 has got more address space as compared to internet version 6 for example version 6 has got 128-bit address space which allows for flexible creation of multilevel, hierarchical and routing infrastructure which is not that possible with internet protocol version 4 Internet protocol version 6 has got in built security which is standard and mandate, its offered in all implementation and has no changes the application, for example security features such as authentication on packet signing , data encryption and end-to end DHCP, DNS and IPv6 mobility is provided for in security model. 4. Wired Equivalent Privacy WEP is the short term for Wired Equivalent Privacy for a security protocol used in wireless local area network that operates at a data link layer and has a security that can be turned of and on again as defined in 802.11b standards. This standard has been set by the Institute of Electrical and Electronics Engineering The main aim of Wireless Equivalent Privacy was to provide security via 802.1wireless network where data is sent from one end point to another. For example Key security features of WEP was meant to offer the following Confidentiality Wireless Equivalent Privacy is used to prevent data transmitted on the network from being eavesdropped by some whom the information is not meant to be communicated. Unauthorised access to wireless network Wireless Equivalent Privacy used to prevent unauthorised access to the network Data integrity, to prevent the alteration of data being transmitted 4.1 Advantages of Wired Equivalent Privacy WEP uses a 2.4 gigahertz radio frequency which provides clear signal for its lower than other frequencies and can travel through wall without affecting frequency. WEP is relatively cost effective for example the cost of a router and Wi-Fi card is normally below  £55 which makes it cost effective for both big corporations, and home users 4.2 Disadvantages of Wireless Equivalent Privacy Static encryption key which is used by all the devices on the network make it very easy for packets to be intercepted and crack what the key is making it very vulnerable to hackers. For example when a router is set up on the network, the encryption used by the router is then used by almost all the device on the network Weak keys made it easier for it to guessed and cracked when used at the access point Initialisation vector in WEP is also ways reused, for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined 4.3 Difference between WEP and WPA Wireless Equivalent Privacy standard 802.11 and Wireless Fidelity Protected Access are different in so many ways for example WEP uses 128bit with 24 integrity value, while WPA used 128 bite with a 48 bit integrity value. WPA has features such as Temporarily Key Integrity Protocol which dynamically changes the keys used for encryption while Key in WEP are static and is shared by all device on the network. The combined used of 48bit integrity values and TKIP, AES makes WPA more security strong as compared to WEP. Weak keys made it easier for it to guessed and cracked when used at the access point. Initialisation vector in WEP is also ways reused for example if a user who connects with WEP to access wireless network uses the same key over and over changes, this key can easily be cracked. WEP has its algorithms sent in plaintext which makes it a lot easier for key streams to be determined These weaknesses among others called for a better standard to be adopted which will provide wireless network with better security and this led to the improvement of 802.1 to WPA. 4.4 Wireless Fidelity Protected Access WPA stands for Wireless Fidelity Protected Access for local area network base on the specification of 802.11. This standard was designed to improve on the security weakness of Wired Equivalent Privacy. 4.5 Advantages of WPA WPA provides added authentication features to basic WEP which provides for stronger encryption mechanisms. The added features includes Advanced Encryption standards protocol as used in WPA2, Temporary key Integrity Protocol as used in WPA. When use in windows 2003 environment, WPA provides the strongest wireless security. WPA has back ward compatibility for older applications that use WEP this doesnt call for upgrade. The use of 802.1x Radius servers provides administrators with means of auditing and logging incidents. 4.6 Disadvantages of WPA The set up of the pre-shared key is difficult and it not beneficially to home users with less technical knowledge. It has more over head as compared to WPE. Its incompatible with pre 1998 windows operating systems and doesnt support older firmware. Its major fall is the denial of service attacks which can leave the whole network shutdown due to constant different keys that are generated and interpreted by the network as some kind of attack. 4.7 Comparing WPA and WEP features WPA has enhanced featured that is based on WEP standard. The features in WAP include temporarily key integrity protocol and 802.1 x. This features provides dynamic key integrity and mutual authentication to most wireless local area networks 48-bit initialisation vectors Like Wireless Equivalent Protocol, Temporal Key Integrity Protocol uses the RC4 stream cipher provided by RSA security for frame body decryption and CRC for each frame before transmission but the difference here is that WPA has added feature Temporal Key Integrity Protocol that uses a 48bit initialisation vectors that has reduced the re-use of initialisation vectors. This has brought about data confidentiality. While WEP encryption is based on 128bit with 24 integrity value, which means the keys are of smaller size and integrity value making it easy for hackers to crack the keys as the initialisation vector seeds to WEP algorithm coded, this feature has been enhanced by the 48 bit integrity vector in WPA. Data Encryption When data packets are sent, it encrypted separately with RC4 cipher stream, generated by b4 bit RC4 key, the key consist 24 bit initialisation vector Pre-Packet key Construction and Distribution WPA generates a new encryption key automatically for each client, for example WPA uses unique and different key for each 802.11 frames and avoid the use of same key as in WEP. This automatic key generation makes it impossible for WPA keys to be cracked by hackers While in WEP the same key is shares by all the devices on the network is static which means due it its unchanging nature, its a lot easy for the shared key to be modified Message Integrity codes The use of Michael prevents against attacks and forgeries, WPA uses a secrete 648bite authentication key that will be shared only between the source and destination where during the process of authentication tagging function takes place and message integrity code. For forgeries to be identified, the destination receiver inputs source into verification predicate and creates another tag code and it this both matches then the message is considerers authentic is created to detect bit flipping and changes to the source and destination. Unlike WEP that uses 4 byte integrity check value to the standard payload. The receiving client calculates the integrity check value and if the values do match then there is a chance that frames were not tempered with and in case data Counter mode/ CBC-MAC This is a data confidentiality protocol used for packet authentication and data encryption. For confidentiality for example CCMP uses the advanced encryption standards in counter mode and for encryption and data integrity CCMP deals with Cipher Blocking Chaining Message Authentication Code making this standard more secure as compared to WEP which has got no encryption mode EAP encapsulation over LAN, this is the key standard use n key exchange that is not used in WEP for example this protocol allows for a four way key handshake as well as a group key handshake while in WEP there is only a two way key handshake. The IEEE802.1x as used in WPA2 provided a sure means of authenticating and controlling user traffic to secure networks 5. A Disaster Recovery Plan Is the process of restoring access to the main business applications, data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.1 Major steps in disaster recovery process Notification procedure This is the action taken by disaster team members as soon as emergency occurs. In the notification stage, systems can be restored functions on a limited basis. For example in a data centre when database team leader receives alert on his/her computer that a file within the database is corrupt, this alert can be sent to the team assessment team either automatically by the system or mailed to the assessment team to analyse the damage Analyse the extent of the damage The analysis of the damaged cause should be done as soon as possible to determine the level of damage to the applications for example if it a power outrage has occurred in the data centre, the analysis should be able to detailed the applications affected, origin of the incident, work areas that have been affected and if there is another source of power to run the database the this can be powered on for example in case there is UPS backup while further investigation in the outrage is carried Activation of the plan Depending on the damage cause by disaster and the out come of analysis, the disaster recovery team can make a decision to activate the plan. For example in the case of data centre if the entire database server is down, the team looks at the possible way that the system can be restored with a minimal time, planning for team communication procedures, then the respective team leaders will notify staff members about and start working on their respective tasks to restore the system as agreed by the team members. Execution stage Recovery process at this stage can be looked at under Sequence of Recover activities and Recovery procedures and depending on what has been defined in the data recovery plan for example in case of ordering database, this can be done manually while recovery process is done Sequence of Recovery activities Recover process should be carried out according the priority of each disaster and level of disaster damage from the results got from the analysis. For example if the database sever is recovered and this is the main critical business system, then this should be restored first before other servers and all the disaster recovery team should carried out the restoration process as in the disaster recovery plan,. If the business has to be transferred to another site then the critical files associated with the service has to be transferred depending on the plan. For example a plan to transport IT equipment and important data files. Recovery process This includes having access to the damaged IT equipment in case of the data centre this could database servers, corrupt files, informing users of the applications, getting backup if its not in house, restoring critical systems such operating systems, SQL database, testing the system before if goes operational and connecting the system on the network and informing uses of the application of the success of the restoration. Rebuilding process Ones the recovery process has been usefully, the disaster team recovery embarks on the process of transferring all the data recovered back to the original system, or may be totally system that can best support the functionality of data service being offered. The disaster recovery team will continue to monitor for any reoccurrence of incidents, make the necessary network and infrastructure connections, bring down the contingency system upon which the application was running and when the all system is stable the data centre staff can be able to use the original system after full restoration of data Update the disaster recovery plan If new procedures are find out during the process of recovery, it‘s updated on the recovery plan documentation which will be used again in case the same disaster occurs again 5.2Business Continuity and Disaster Recovery Plan The IT business continuity and disaster recovery plan for the IT department that I currently work in seeks to deal with the how best to handle emergency in the event of disasters and how best to minimise risk of damage, provide emergency services and recover to normalcy of service operations The Business Continuity Institute defines business continuity planning as â€Å"A holistic management process that identifies potential impacts that threaten an organisation and provides a framework for building resilience with the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities† 5.3 Aims of Business Continuity Planning Preventing a disaster At the initial planning stage, the critical areas of service operation of Information Technology is identified, for example within the Information Technology department where I work, servers for crucial systems, hot sites and training of the disasters team leaders are laid down. This initial planning stage is carried out with the aim of minimising the impact of disasters on Information technology resources and services; this also ensures that the department is able to recover as fast as possible from a disaster. Continuity The procedure of running a Information services using minimum resources during a disaster, this prevents the organisation from being put out of services both internally and externally. For example running applications for only crucial systems to continue operation while recovery is on the process Recovery The procedures that are required to restore all systems and resources are identified. This helps in bring all the resources and system to full operation, for example backing up data from off site centre. 5.4 Contingency Plan activation The activation of the organisations IT service continuity plan can be started at any time. The decision of activating the plan will be the sole responsibility of Estates and Security department with the assistant of officer in charge and contingency plan can not be started without the instruction being issued by Estates and security department with assistance from the Officer in charge. In case emergency occurs during business working hours, members of disaster recovery team will be gathered and depending on the level and mature or damage the Information technology team will be contacted If the emergency occurs out of business working hours, security is required to call the head of security or his/her deputy who will get in touch with the disaster recovery team with the help of the officer in charge and then the decision to initiate the Information communication technology business continuity plan If the team leaders are not available in the event of the emergency the deputy will take the responsibility and in the event where both the team leader and deputy are not available, next person on the list takes responsibility. 5.5 Emergency Management Team Team leader: Head of information Technology department who is responsible for over seeing all the information system services Deputy team leader: Systems Manager Responsible for all the systems applications such as the servers, back up and liaison between the off sites third party centres Team member: Database Administrator Responsible for; Internal databases and well as internal sites Ensure that a domain account has been set up for the SQL services. The admin backup and standard jobs from SourceSafe InstallationSQL Server 2000 Customise the jobs to ensure that server names and paths are correct Team member: Information Technology Security officer Responsible for the security of the internal sites and well as blocking unsafe sites Team member: Network Engineer Responsible for network connectivity and test our network devices from within our network Run test network script using DOS command Test access to the web services -Use government secure intranet network PC or dial-up PC belonging to web team in OCPD to check connection to all websites -Use nslookup to connect to wb-dns1 internal to the organisation and check that website names can be resolved Test email -An email should be sent to [emailprotected] and echo. These should respond by sending an email back 5.6 Disaster Recovery Plan Is the process of restoring access to the important system data, hardware and software that is required to start the system operational, Disaster Recovery Plan provides information on how to handle information that may be lost or corrupted during the disaster as well as proving team leaders with procedures of restoring information and data. 5.7 The main Objectives of the Information Technology Recovery Team The Recovery Teams main duties/ task are to: Prevent damages to Information Communication Installations Decide the requirements of senior management for other Departmental Recovery Teams and work accordingly to meet the requirements. Carry out tasks that lead to the provision of restoring all Information Communication service to normality as started by the Recovery Team within the disaster constraints or limits. 5.8 Disaster Recovery Team Team leader: Head of Estates and Security Responsible for the safe of the building as well as staff and members of the public Deputy team leader: Site Contractor Responsible for building and central service Team member: Head of security Responsible for staff and public safety 5.9Recovery Site The recovery site will be informed by the Information Technology Departmental recovery team leader and the assistant by Disaster recovery Team in case the team leader is absent. The site is located about 3 miles a way from the organisation, In case of serious incidents, the site can be contacted by information recovery mobile phone. 6. Assumptions With regard to the following case scenarios below, the disaster recovery team can take actions base on case scenario that is relative to the real disaster. Its the organisations policy that when incidents occur, staffs are evacuated from the building and entry to the site is not permitted unless staff members are informed by head of Estates and Security. 6.1 Case Scenarios Building Non-disruptive These case scenarios may include: Disaster in the staff car park not affecting the building Gas licking the building basement Suspicious package found in the public lockers Building is partly destroyed Scenarios in this case may include: Flood affecting the whole building Apart of the sever room that supports site B of the building is partly destroyed A part of fame room in site A where frame cabinets E8a and E8b are located is partly destroyed. IT store room is also partly affected. Building is completely destroyed Scenario in this case is: Server Room on site A of the building including cabinets room E1 and E2 are completely destroyed. 6.2 Building Non-disruptive 6.3 Actions In these case scenarios, all the information technology equipment are not destroyed. The disruption did call for evacuation of staff for healthy and safe issues and as soon as the build is cleared safe, staff members will be allowed in and operations will resume. 6.4 Building is partly destroyed In these case scenarios, some IT equipment are affected partly, it may escalate to a major for example the part destruction of server room in site A and the cabinet room where E8a and E8a may cause staff on this site to loss access to network resources. Here nothing can be done till staff members are not allowed to enter the building. Ones members are allowed in the building, all the equipment in the area affected can the