Cloud Computing Security Issues In Enterprise Organizations Thesis College Application Essay Help

Introduction Cloud computing has started to move beyond hype and into the fabric of businesses today. Small and Medium Businesses have discovered by utilizing cloud services, they can gain significant benefits including access to novel business application and state of the art infrastructure resources.

Although Enterprise Organizations are gaining valuable insight into the potential benefits of cloud, IT directors still have concerns about the security of their corporate data in the cloud. There are three major security issues inherent in cloud computing that make implementation in Enterprise Organizations a challenge. These issues are:

Loss of control over data and

Dependence on the Cloud Service Provider (CSP)

Spying

These three issues can lead to a number of legal and security concerns related to infrastructure, identity management, access control, risk management, regulatory and legislative compliance, auditing and logging, integrity control as well as Cloud Computing provider dependent risks (CEPIS, 2011).

This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats and ensure that the enterprise is able to benefit from the numerous advantages of the cloud without exposing itself to unnecessary risks.

Defining Cloud Computing The concepts behind cloud computing have been applied for over two decades (CEPIS, 2011). However, the widespread implementation of cloud computing services has only become prevalent over the last 7 years.

The National Institute of Standards and Technology defines cloud computing as “a model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and delivered with minimal management effort or service provider interaction” (Chirag et al., 2013, p.562).

Cloud computing offers a number of significant benefits, therefore making it attractive to many enterprises. To begin with, cloud computing utilizes a pay-per-use model, meaning that the organization only gets to pay for the services that it uses. Chirag et al. (2012) document that cloud computing present businesses with the ability to increase their IT capabilities on demand and without having to invest much in new infrastructure or training of personnel.

Get your 100% original paper on any topic done in as little as 3 hours Learn More The enterprise is therefore allowed to focus on its core business concerns instead of dealing with technical IT issues. According to Chirag et al. (2013), many of the organizations in the US and Europe that have migrated to the Cloud environment have done so in order to exploit the advantages or cost reduction. Skendrovic (2013) reaffirms this observation by noting that most enterprises acknowledge that using a cloud solution is integral to maintaining future organizational growth and productivity.

Concerns In spite of the widespread enthusiasm for cloud computing, there still exists significant apprehension about migrating to the cloud. Cloud computing brings about risks that an organization would not be forced to face if its applications were run in-house. A number of significant and valid security concerns have caused this apprehension.

Loss of Control over Data

When an enterprise makes use of cloud services it, in essence, relegates the control of data and applications to third parties. An enterprise that migrates from the traditional in-house environment to a cloud environment immediately relinquishes its control over the networking infrastructure.

The cloud service provider (CSP) is in control of infrastructure including servers, log files, and incident reports. The first issue that arises is that the enterprise does not have control over the physical infrastructure where its data is stored.

Chirag et al. (2013) assert that a reality for organizations that choose to make use of cloud computing is that their data will be stored off-site. Since the servers, storage space, and application programs are provided by external service providers, the organization will have a loss of control over the infrastructure.

Enterprises expose themselves to a higher risk of facing unauthorized access when they use a cloud system as opposed to the traditional network system. Cloud service providers store data for various organizations at the same location. This stored data (data at rest) needs to be protected from physical and electronic compromise.

A non-authorized user who is able to access the shared environment has access to the private data of the organizations that use the particular cloud computing service provider. The distributed nature of cloud system resources makes it hard to ensure data security and privacy (Qaisar

[supanova_question]

Analysis: “Professionalism at Work: The Kids Are Not Alright” by Silverman Report essay help free: essay help free

Silverman (2013) is critical of entry level workers describing them as “entitled, unprofessional bunch.” The author notes that entry level workers lack professionalism and commitment to their employers which makes them incompetent at work. They do not take their work responsibilities seriously which makes them incompetent and unprofessional. This harsh assertion reveals organizations need to readjust their expectations when hiring college graduates to fill up vacant positions.

The article shows that business organizations need to adopt stringent measures to ensure new and inexperienced employees perform their duties well. It is notable that this decline in performance has been going on for the last five years. It is disappointing to see that many entry level employees have a poor work ethic due to their negative attitudes to work (Silverman, 2013). The article confirms that the current crop of entry level employees in many firms do not have desired qualities to perform assigned duties effectively.

Employees need to have respect for authority for them to perform their duties well. Therefore, managers of different firms need to use discipline and respect for authority as some of the criteria used to assess employee performance. Silverman (2013) notes that some new candidates even show their arrogance while still being interviewed.

This portrays poor social etiquette on the part of the interviewee which shows that he or she does not value being associated with the interviewing firm. Managers should not tolerate any negative behavior by new employees as this sends a wrong signal to other employees in the firm. Cases of poor performance and insubordination by employees must be dealt with firmly. This will make workers more diligent to achieve organizational objectives.

This article confirms that performance based appraisals are effective in evaluating the contribution of each individual employee to the organization. Entry level workers must be taken through a firm’s organizational culture and practices to make them understand their roles and responsibilities. This will make them understand that any form of incompetence and insubordination at the work place will not be tolerated.

Performance appraisals can be used as benchmarks to reward employees who perform well in their duties. Likewise, appraisals can also be used to encourage employees who do not perform well to improve their performance in the future. Organizations need to put in place strict measures to ensure each individual worker produces quality output (Schrage, 2011). Employees who are not able to achieve positive productivity levels due to their incompetence should be replaced.

Effective time management is a good way to assess if an employee is committed to an organization. All employees must be made aware of the need to keep time to enable the organization achieve positive output. Employees should not be allowed to report to work late as this slows down internal operations and other crucial work processes. Organizations should put in place disciplinary measures to reduce lateness by employees.

Get your 100% original paper on any topic done in as little as 3 hours Learn More This will ensure all employees take their duties at work more seriously. Technology is a useful tool at the work place though it has some disadvantages. Some workers waste a lot of time chatting on various social media platforms. This behavior affects their productivity because their attention is diverted from crucial work duties to other unnecessary activities (Schrage, 2011).

It is necessary to supervise employees more to ensure that they perform their duties as expected. Time should be treated as a valuable resource which needs to be managed properly to ensure organizational objectives are achieved.

Entry level employees should be given mentors to make them adapt quickly to the transition between college and work. Effective mentors help young employees to understand the culture and practices observed by all stakeholders in a firm. Employees should be given mentors who are more experienced and knowledgeable in different work procedures.

Young employees need to be encouraged to enable them improve their attitudes and commitment at work (Baldoni, 2011). A good mentor helps a young and inexperienced novice learn the importance of setting goals and the way they are to be achieved. Mentors make it possible for an organization to get the best results out of talented employees who do not have a strong motivation to work. This helps a firm to nurture inexperienced employees who are talented.

Business organizations must have clear communication protocols which all employees must follow whenever they communicate with each other. This should be made part of the organization’s culture to make all employees appreciate its importance. Verbal communication, e-mails, letters and telephone calls should be the main forms of communication used by employees to send and receive messages.

Entry-level employees need to be discouraged from using smart phones and computers inappropriately. This will ensure they follow laid down communication policies and other rules (Baldoni, 2011). Therefore, they will be able to focus more on their duties at work. It is important for Business organizations to change the manner in which they treat their entry level employees. This will enable them achieve positive results in their operations.

References Baldoni, J. (2011, Feb. 17). Help employees listen when they don’t want to hear. Harvard Business Review. Web.

We will write a custom Report on Analysis: “Professionalism at Work: The Kids Are Not Alright” by Silverman specifically for you! Get your first paper with 15% OFF Learn More Schrage, M. (2011, May 26). The new trust vs. due diligence dilemma. Harvard Business Review. Web.

Silverman, R.E. (2013, March 12). Professionalism at work: The kids are not alright. Wall Street Journal. Web.

[supanova_question]

Was the American Use of the Atomic Bomb against Japan in 1945 the Final Act scholarship essay help

Introduction Known as one of the world’s greatest bloodbath, the World War II is also notorious for the first use of an atomic bomb as a weapon of mass destruction. As a matter of fact, restricting the amount of choices concerning the reasons that made the United States government attack Japan would be an insult to the history of the world in general and the history of the relationships between Japan and the United States in particular.

Therefore, to evaluate the reasons that guided the American government in their successful attempt at mass genocide of the residents of Hiroshima and Nagasaki, one must consider not only the political implications behind the actions of the U.S. government, but also the specifics of the relationships between the two states, the influence of the U.S. and Japan in the WWII, the peculiarities of the American and especially the Japanese culture, as well as the numerous details concerning the outbreak of the Cold War.1

Despite the ace that every single piece of the existing evidence points at the fact that the United States were either intending to stress their participation I the WWII or to display their military power to the USSR, it can be assumed that the reasons behind the notorious Hiroshima and Nagasaki attack was an attempt to eliminate the slightest possibility of having the WWII going any longer, which would have necessarily appeared in Japan due to the peculiarities of the Japanese culture unless a sudden attack would have distracted them.

The Use of the Atomic Bomb as the Sign of the Cold War Considering the arguments “pro”: the plausibility

There is no secret that there always was an element of competition in the relationships between the USSR and the USA2. According to what Crockatt says, the fact that the U.S. dropped the bomb on Hiroshima and Nagasaki to prove their economic and political world dominance is clear-cut. As Crockatt explains, the means that the U.S. chose to prove their point were predetermined by the differences in which the two states fought for their dominance.

According to Crockatt, the differences in the way that the two states envisioned their concept of power defined the specifics of the approaches that the two states undertook in order to seize the power over the economic space. While the USSR preferred to adopt a more localized approach, the USA tended to encompass the opportunities provided by the entire world, and the situation with Japan was one of these opportunities.

Because of the differences in the attitudes towards Japan, the bellicose one of the United States and the peaceful one of the Soviet Union, the attack of Hiroshima and Nagasaki triggered the start of the Cold War between the USA and the USSR, as Crockatt explains: “The Soviet Union remained neutral towards Japan and declared war only after the dropping of the first atomic bomb on Hiroshima on 6 August 1945.”3

Indeed, there are a number of facts that indicate the willingness of the USA to demonstrate its power to the USSR. There could not be a better moment for showing the military strength of the United States, since the Soviet union was clearly in the process of healing its wounds after taking part in one of the greatest bloodsheds in the world history; America, meanwhile, was not harmed in the twists and turns of war, since, first, the USA only entered the war in 1945, as the war ended, and, second, was separated from Europe by the Atlantic Ocean and, therefore, could not become another battlefield.

Get your 100% original paper on any topic done in as little as 3 hours Learn More With that being said, the USA clearly had an opportunity to defeat the Soviet Union in their chase for the world economic dominance. The fact that the USA possessed the weapon of such power of destruction meant that the U.S. became the superior state whom the USSR would not be able to compete with: “The Soviets did not have the atom bomb, but the Americans did, and that caused insecurity.”4

According to the given point of view, the mere fact that the USA showed its martial potential was enough to start the Cold War5.

The above-mentioned viewpoint has all rights to exist; moreover, seeing how the tension in the relationships between the United States and the Soviet Union escalated after the given incident,6 the version of the bombing of Hiroshima and Nagasaki as the pretext for starting the Cold war becomes especially plausible.7

It can be assumed that the USA failed to show their entire military strength in the course of the WWII, as they managed to enter the process only as the WWII was getting to an end – in contrast to the Soviet Union, which displayed its military potential to the full, and, needless to say, made a great impression on the rest of the world.

Therefore, by dropping the atomic bombs on the Japanese cities, the United States technically showed that their military power was just as huge and threatening as the one of the USSR: “Sherwin demonstrates how the US decision to drop the atomic bomb on Japan frew out of the Anglo-American thinking about its use as a diplomatic tool in peacetime as well as a winning weapon in wartime.”8

Concerning the arguments “counter”: the doubt

To address the hypothesis concerning the assassination of the Hiroshima and Nagasaki dwellers as an attempt to introduce the dominance of the USA into the USA–USSR relationships., it is necessary to consider the latter in detail. According to Boyle, the fight for the title of the superior nation has been lasting since both empires became powerful enough9.

With all due respect to Boyle’s research, however, it must be admitted that his account of the specifics of the USSR policies leaves much to be desired in terms of accuracy. It seem that Boyle makes a typical mistake by considering each action of the U.S. government as the response towards the ones of the USSR.

We will write a custom Essay on Was the American Use of the Atomic Bomb against Japan in 1945 the Final Act of WW2 or the Signal That the Cold War Was about to Begin specifically for you! Get your first paper with 15% OFF Learn More Therefore, Boyle’s interpretation can be easily questioned, which picks the question whether the Little Boy and the Fat Man were a response to the USSR policies. Nogee’s work, on the contrary, offers much more introspective into the way in which the Soviet Union operated. Even though Nogee’s focus is on the USSR instead of its relationships with the USA, and, moreover, on the USSR of the post-WWII period, Nogee manages to capture the specifics of the state’s policy quite well.

According to Nogee, the USSR leader of the WWII era, Stalin never actually considered the United States’ demonstration of what an atomic explosion was capable of as an actual threat to the safety of Russia and the allied states.10 Moreover. Nogee makes it clear that starting a direct confrontation was more than undesirable for both states, since both the UA and the USSR were devastated after the WWII.

When considering the numerous signals that showed the start of the Cold War, one has to mention that the attack of the Japanese cities as another attempt to re-state the obvious would have been rather useless.11 According to what the existing sources say, by the end of the WWII, it was clear that the Cold War was brewing and that the U.S. and the USSR were going to divide the world into their spheres of influence.12

The Use of the Atomic Bomb as the Signal of the End of the WWII

The idea that the USA used atomic bomb as the means to bring the WWII to an end is another common interpretation of the incident.

What speaks in favor of the hypothesis: Truman’s policy

Despite the fact that at present, the interpretations of the USA assassination of the residents of Hiroshima and Nagasaki gears towards the idea that the given action can be interpreted as the attempt of the United States to declare the end of the World War II.

When talking about the reasons for the United States to attack Japan, one must specify that on the given time slot, the reins of power were quickly passed over from Franklin Delano Roosevelt to Harry S. Truman, who had no other choice but to follow the track blazed by his predecessor. Meanwhile, in accordance with to the score of the Yalta Conference, the U.S. was waiting for the USSR to enter the Pacific War.

In addition, a number of German cities were incinerated prior to the attacks of Hiroshima and Nagasaki in a vengeful attempt to make Germany feel the power of the Allies.

To make the matters worse, the testing of the A-bombs in the USA has just ended by that point, which must have brought Truman to the conclusion that threatening Japan by wiping Hiroshima and Nagasaki off the face of the earth would be a logical ending to the WWII. Dukes states in a very straightforward manner that the bombing of Hiroshima and Nagasaki helped bring the victory day closer:

Not sure if you can write a paper on Was the American Use of the Atomic Bomb against Japan in 1945 the Final Act of WW2 or the Signal That the Cold War Was about to Begin by yourself? We can help you for only $16.05 $11/page Learn More The dropping of A-bombs on Hiroshima and Nagasaki on 6 and 9 August brought VJ Day more quickly than had been previously hoped and feared. There was just time for the Soviet Union to fulfil its promise of declaring war against Japan three months after VE Day.13

What speaks against it: the end of the War

However, there is also enough evidence that shows the opposite to the aforementioned ideas. Indeed, the link between the fact of genocide in Hiroshima and Nagasaki and the end of the WWII can seem somewhat farfetched.

Another interpretation of the hypothesis The traditional idea of seeing the USA assassination of the Hiroshima and Nagasaki dwellers as an attempt to draw the line in the WWII can also be viewed in a different light. While it can be considered that the act of dropping atomic bombs on the cities can be interpreted as the way of showing the power and influence of the USA as the state that ended the World War II, there is also a different way of interpreting the given step.

The latter, however, requires an introspective into the peculiarities of the Japanese culture. According to the existing sources, even as the outcome of a battle becomes clearly unfavorable for the Japanese, the bushido code of conduct does not allow the Japanese warriors to cease the fire and give up; on the contrary, according to the bushido principles, fighting until the last soldier falls dead is the most appropriate tactics.

Therefore, it is logical to suppose that even after Hitler’s suicide, the war would have been going on as the code of bushido dictates. While the rest of the states that the Tripartite Alliance consisted of surrendered with the leader of the Alliance having been killed, the Japanese soldiers would have been fighting until the very last of them would have fallen breathless. Therefore, the World War would have been even longer and bloodier than it was, which the rest of the world, including the USSR and the Allies, would have hardly take14n.

As history shows, culture plays great role in developing and solving international conflicts. For instance, as Kegley and Wittkopf show, cultural specifics predetermine largely the economic relationships between such states as, say, USA and China.15 The same can be applied to the conflicts between the states.

In the given case, the fact that the Japanese government would have not ceased their attempts at fighting the enemy so easily is brought to people’s attention. Indeed, according to bushido, the Japanese code of a warrior’s conduct, a soldier is supposed to fight till the end even when the opponent seems to be superior.

Therefore, it can be assumed that, unless the USA had demoralized the Japanese, the WWII would have been continuing for quite long after the surrender of Germany. As a result, the consequences of the WWII would have been even more deplorable for the Allies, as well as for Germany, Japan and Italy. While Japan would have suffered most, the rest of the states would have also driven their economical and financial resources to an absolute zero.

The U.S. and the Soviet Union: Sworn Friends or Sworn Enemies? While the two states have been maintaining moderately friendly relationship, there has always been some kind of tension between them, as if the two were constantly trying to win over the other one. Indeed, if considering the way in which the specifics of one culture is portrayed in the other state, it becomes obvious that each of the two countries have always been trying to take over the opponent. For instance, according to English, even in mass media of each of the states, the portrayal of the other one was rather negative.16

For instance, in Russian media, the portrayal of the Capitalist USA world was far from being positive.17 The given attitude, however, had not grown into anything spectacular until the Cold War; it seemed that the two states realized that, once they clash, they might get harmed greatly; in the process.

Therefore, it can hardly be considered that the bombing of Hiroshima and Nagasaki was a deliberate attempt at starting the Cold War; the U.S. should have known that, even after the WWII, the USSR would have still be able to rebuff the attack efficiently enough18.

In fact, at certain point, the development of the notorious atomic bomb was planned as a joint attempt of the USA and the USSR to enhance their influence in the world, as McCauley explains.19 The given supposition can be supported by the fact that, according to some sources, the Soviet Union was the first to come up with an idea of a hydrogen bomb.20

Conclusion: In Search for the Truth Truly, it would be wrong to believe that nowadays, more than sixty years after the WWII was ended, it is possible to reconstruct the implications behind the actions of each of the states that took part in the WWII.

However, by analyzing the factors that influenced these actions, as well as learning about the position that the U.S. took in the World War, one can possibly figure out if the action of dropping atomic bombs on Japan was the sign of the triumph of the Allies or the beginning of the Cold War. While some of the sources contradict each other, it is possible to learn the truth about the notorious Hiroshima and Nagasaki attack.

Even though the connection between Hiroshima, Nagasaki and the Cold War might seem rather loose, it is necessary to admit that by dropping the bomb on these Japanese cities, the United States have shown their military strength, which was very timely in the light of the beginning of the Cold War.

Even though there is little to no evidence showing the effect that the given action had on the U.S. reputation in the Eastern Europe, one has to admit that the Hiroshima and Nagasaki incident was rather well-timed. Indeed, considering the consequences, one has to acknowledge the fact that the U.S. has shown its military potential, therefore, making it clear to the Soviet Union that the United States were able to fend for themselves.

Meanwhile, the act of brushing millions of the Japanese off the face of the Earth could be viewed as the attempt of the American government to draw the line in the WWII and make it clear that the Allies won.21 Indeed, the given action can be translated as a manifestation of the end of the WWII and the fact that fascism was finally defeated.

The reasons for the American government to undertake the given measure, on the other hand, are rather obscure; since it was not Japan, but Germany who was at the helm of the Tripartite Alliance, it would have been much more logical to use Germany as the venue of their vengeful act.

The role of Japan in the WWII could not be described as the definitive one; Italy had practically similar share of influence in the Axis Pact. The choice of the location for the Little Boy and the Fat Man was sporadic, which meant that the United States was going to draw the final line in the WWII.

With that being said, it is reasonable to suggest that, even though the attack of Hiroshima and Nagasaki with an atomic bomb triggered an increase in the U.S. authority, the given effect was sporadic rather than planned; by attacking Japan, the U.S. clearly intended to show that it also had its share of the triumph that the victory triggered.

Considering the policy of the American government at the time, one must admit that the idea of bombing Japan as the means to threaten the government of the Soviet Union seems much like a last-minute choice, which would have been rather untypical of the U.S. government.

As the existing evidence says, making Japan surrender was crucial to the outcome of the WWII mostly because of the specifics of the Japanese culture; with its specific code of honor, the residents of the latter would have not seized their actions until they had lost each of their soldier. Demoralization seemed a viable strategy to adopt, which the USA did by using an atomic bomb.

Bibliography Bell, PMH, The world since 1945, London, Hodder Arnold, 2001.

Boyle, PG, American-Soviet relations, London, Routledge, 1993.

Carlton, D and HM Levine, The Cold War debated, New York, McGraw Hill, 1988.

Crockatt, R The fifty years war: the United States and the Soviet Union in world politics, 1941-1991, London, Routledge, 2002.

Dobson, AP and S Marsh, US foreign policy since 1945, 2nd edn, London, Routledge, 2006.

Dockrill, S Advances in Cold War history (ed.), London, Palgrave, 2006.

Dockrill, S and G Hughes, Advances in Cold War history, Basingstoke, Palgrave Macmillan, 2006.

Dukes, P, The superpowers. A short history, London, Routledge, 2000.

English R D, Russia and the idea of the West, New York, Columbia University Press, 2000.

Gaddis, JL, The Cold War, Harmondsworth, Penguin, 2007.

Kegley, C and ER Wittkopf, World politics: trend and transformation, 9th edn, Belmont, CA, Wadsworth, 2003.

Kennedy-Pipe, C, Russia and the world, 1917-1991, London: Arnold, 1998.

Leffler, MP and DS Painter, The origins of the Cold War (ed.), London, Routledge, 2002.

Light, M, The Soviet theory of international relations, Brighton, Wheatsheaf Books, 1988.

Lightbody, B, The Cold War, London, Routledge, 1999.

McCauley, M, The origins of the Cold War, London, Longman, 1995.

McCauley, M, Russia, America

[supanova_question]

Cause of crime Exploratory Essay essay help: essay help

Man and crime have coexisted throughout history. Nonetheless, traditional patterns guiding the transition from childhood to adulthood have changed. Moreover, there are limited opportunities for young people to explore. For instance, unemployment rates have skyrocketed.

As a result, many youths are unable to cater for their basic needs. Poverty is, thus, one of the major causes of violent crimes. The proliferation of criminal gangs in my area of jurisdiction, as director of the county juvenile court, represents a nationwide problem. Therefore, all parties involved must redouble their efforts in dealing with juvenile deliquesces and other gang-related problems. This paper provides background information on the gang problem.

In the 1990s, the rate of crime rose in most parts of the world (World Youth Report, 2003). Most of these crimes were related to youths. In Western Europe alone, the rate of juvenile delinquency increased by 50%. According to the Federal Bureau of Investigations (FBI) (n.d.), about 33,000 gangs operate across the US today.

In addition, 48% of violent crimes are committed by gangs (FBI, n.d.). In some areas, the percentage is as high as 90%. It is also estimated that these gangs have 1.4 million members. Most of the groupings are well organized and use sophisticated strategies to run their illegal activities and control neighborhoods. Some of their ways of generating money include gun and drug trafficking, kidnapping and robbery.

Before preventive programs are designed, reasons behind involvement of juveniles in crime must be understood (World Youth Report, 2003). One cannot effectively deal with a problem without knowing its root causes. According to the World Youth Report (2003), sociologists believe that juvenile delinquents commit minor to serious offences. Therefore, criminal gangs differ in their modes of operation.

Consequently, gang problems must be solved by more than one strategy. For instance, some gangs commit status crimes. A status crime is a criminal offenses related to the age of a person (World Youth Report, 2003). Peer pressure is the main driver of status crime. Sociologists use such issues to connect youth behaviors with their surroundings in an attempt to explain their actions.

African American neighborhoods have the highest number of criminal gangs. This trend is associated with institutional discrimination. For instance, about one third of African Americans are born in poor neighborhoods. Furthermore, these neighborhoods are faced with innumerable social-economic hardships.

Get your 100% original paper on any topic done in as little as 3 hours Learn More The number of African Americans who can be categorized as middle class by either income levels or education is low compared to other ethnic groups. Although their social-economic status is improving, African Americans sit at the bottom of the ethnic hierarchy (pear, 2013). Structural discrimination and lack of opportunities lead to disruptive internal behavioral patterns among African Americans. Some of these behaviors include prostitution and crime. On top, these behaviors have negative impacts on their socio-economic mobility.

Proliferation of criminal gangs is brought about by socio-economic problems. According to pear (2013), in the last two years, ethnic groups with low incomes experienced a steeper drop in their incomes than those with high incomes. Undoubtedly, African Americans were the most affected.

Accordingly, most gang members are African Americans. Nonetheless, criminal gangs traverse across ethnic barriers and their activities are diverse and complicated. Dismantling these gangs requires joint efforts from the community, law enforcers, courts and other stakeholders. In fact, everybody has a role to play if this problem is to be eradicated.

References Federal Bureau of Investigations (n.d.). Gangs: They poison our streets with drugs, violence, and all manner of crime. Web.

Pear, R. (2013, August 21). Median income rises, but is still 6% below level at start of recession in ’07. The New York Times. Web.

World Youth Report (2003). Juvenile delinquency. Web.

[supanova_question]

Examining Acceptable Use Policies Report (Assessment) essay help online free

It does not matter whether a company has the access to the new technologies and services or not, if the stuff does not follow the proper procedures, this access can be ineffective. In order to have steady development the companies should take into consideration the security of information (Easttom, p.281).

Thought, examining and developing the security policies should be the major step in companies success. Four different acceptable use policies have been examined: Level3 acceptable use policy, Earthlink acceptable use policy, Sans Institute policies, and Information Security World Policy.

Level 3 use policy is applied to all users of the mentioned service. After accepting the rules of the policy, the user is acknowledged about the responsibility for compliance with them. The main aim of the policy is to protect the User, the Level 3 Network, and the Service from illegal manipulations over the Internet.

Among the Level 3 rights are: the right to terminate or suspend the service, the right to cooperate with investigators, the right to modify the policy, the right to filter the information. Level 3 policy prohibits illegal activities, unauthorized access, spamming and mobile bombing, fraud and spoofing.

In order to control the rules enforcement, Level 3 use policy anticipates the possibility to complaint. Thus, every User, or some other party can complaint about the above mentioned amusements (Level 3, 2012). Another important thing is that “Level 3 has no obligation to forward the complaint to the User or to identify the complaining parties.”(Level 3, 2012, line 126-127).

In addition, Level 3 use policy forbids transmitting the files which include corrupted data or viruses; altering or circumventing the procedures or processes to bandwidth utilization, measure time and other similar methods; using those activities, which (Level 3, 2012).

EarthLink acceptable use policy is quite similar to Level 3 acceptable use policy. As well as Level 3 policy, EarthLink policy is oriented on stopping the violations. This policy forbids any kind of illegal use: uploading, transmitting, receiving, storing, posting, data or material. It includes the information about illegal terrorism, drugs or weapon, services, goods or substances, and many others. EarthLink acceptable use policy includes fraudulent activities connected to finances: different suspicious financial schemes and pyramids.

Get your 100% original paper on any topic done in as little as 3 hours Learn More In addition, EarthLink acceptable use policy does not allow gambling, spamming, and phishing. Much attention is devoted to the copyright and trademark infringement. According to it, uploading, transmitting, receiving, and posting any material that infringes any copyright is forbidden.

One of differences to Level 3 policy is the rule about network probing, which was not mentioned in the first policy. According to EarthLink acceptable use policy, any kind of detective network activity is prohibited. EarthLink policy requests everyone who considers some actions to be violation can inform about it. EarthLink in its turn can give the verbal or written warning, suspend the person or service for some period of time, block the internet access to the service, terminate the service, or bring some legal actions (EarthLink, 2012).

Sans Institutes Policy is divided into several sub policies. Thus, Sans Institutes Policy includes such security policies as Computer, Desktop, Email. HIPAA, Internet, Mobile, Audit, Network, Physical, Server, Wireless, and Whitepapers Policy. There is no similar to Audit Security Policy in Level 3 and EarthLink acceptable policies.

This policy defines different requirements, provides the authority information to the team which conducts the audits and deals with the information security and risk assessments in order to ensure the resources and information integrity and investigate incidents. Another unique security policy is HIPPA policy. This policy was creates especially to protect confidential information, which is connected to the health issues.

The policy includes 18 standards, which are summarized in the three major themes: Physical, Technical, and Administrative Safeguards. Furthermore, different to other use acceptable policies is Visitor or Physic policy, which demands penalties for information disclosure and the camera usage. The mentioned policy requires check-in system. Thus, each visitor should go through the special check-in entrance, present his or her photo identification card, and only after will have the opportunity to visit their employee sponsor (SANS, 2012).

Another researched policy is Information Security Policy. This policy addresses such issues as integrity, disclosure, availability concerns and others which concerns the information security.

The policy is intended to influence the actions or decisions and create general way of behavior, as it sets the rules, the laws, and to prevent their violations. This policy is very similar to the previous policies. However, in this one the major focus is made on the technical aspect. The main point of the policy is connected to the risk analysis (The Information Security Policies, 2012).

We will write a custom Assessment on Examining Acceptable Use Policies specifically for you! Get your first paper with 15% OFF Learn More The Eastons book is devoted to the examining of the acceptable policies. The main focus of the examined chapter is devoted to researching the most effective user, access, system administration, and developmental policies. As well as the previous policies, those that are described in the book are focused on the technologies.

However, according to the author, the good technologies should be supported with people factor, to be precise, with professionals, who can use the technologies in order to provide the best service. The author gives many tips how to be sure in the security of the information in the internet. First of all, Easttom advices never have a copy of the password in the accessible places. Secondly, the author advices never share the password.

Finally, in any case of suspension the violation, the person should inform about it the IT department. The book gives the overview of those activities that are appropriate in the network of the company, and those that are not. Among not appropriate are: the search for the job, the photographic use, the violations of the laws.

This list may include online shopping, reading news, or watching funny videos. In addition, the author gives the recommendations how to use the e-mail service. One of those recommendations is not to open the emails from unknown author or, which is even worth, not to answer that suspicious emails (Easttom, 2006).

Many different types of policies have been examined. However, each of them claims that nevertheless the powerful software and technological equipment, the person should be very careful him or herself. To my mind, the best recommendation how to be safe was written in the Easttoms book: “Passwords must never be shared with any person for any reasons”(Easttom, 2006, p.283).

The reason is that the person near you can be your worst enemy. When we are talking about the security of the important things, you are yourself the only person you can trust. The scheme is very simple: the responsibility equals the security.

References EarthLink Policies

[supanova_question]