Monday, May 25, 2020
AP Themes and Symbols - 1419 Words
Updikes A P is rich in symbolism and begins in the very first paragraph. Sammy is eyeing the three bikini-clad girls who walk into his supermarket where he is a checker. His reverie is interrupted, however, by a witch whose feathers Sammy has to smooth. The older generation are typically symbolized in negative terms throughout the story, those women who cannot and will not understand youth. Queenie, on the other hand, is symbolic of all that is alluring about women and life that might be possible for Sammy on the outside, a life that seems palatable yet unattainable to Sammy. Stokesie, Sammys older co-worker, is symbolic of the life Sammy may well be headed for: married, tied down with children, and few options for anotherâ⬠¦show more contentâ⬠¦To Lengels credit, in spite of his stuffiness and self-importance, he shows Sammy patience. He does not yell or order him immediately out of the store, but warns him of the very real consequences of his act. Yet, it is Lengels adherence to the social codeââ¬âwhich says that this behavior must go into Sammys personnel file and dog him for the rest of his lifeââ¬âthat cause those consequences. It is, in a small way, like Greek tragedy. The players in this drama are helpless to act other than the way they do, but it is not the gods who set the parameters of their behavior, but society, with its written and unwritten list of expected behaviors and consequences for deviating from that list. Individualism Sammy asserts his individuality when he quits. He knows that Lengel has every right, according to the standards of his time, to speak to the girls as he does. But by standing up for the girls, Sammy questions those standards and asserts that there is a higher standard of decency that says one should not embarrass others. In deciding which rules of conduct are more important, he asserts his individuality, unlike the girls who slink away because they know they have violated the rules of conduct. Sammy is the only character in this story who asserts his individuality. Two of the girls are simply following their leader, and Queenie is easily embarrassed and capitulates to Lengel. The other shoppersShow MoreRelatedA P By John Updike1160 Words à |à 5 Pagesthe girlsââ¬â¢ eyes. Reality sinks into Sammy when he misses the girlsââ¬â¢ exit and regret fills him. What he thinks is noble and just becomes a changed, regretful soul. In ââ¬Å"APâ⬠by John Updike, the symbolism portrays the theme of the desire for change. The girlsââ¬â¢ immodesty is a symbol of rebellion, revealing the theme of the desire for change. As Sammy acknowledges in the short story, the story takes place ââ¬Å"north of Bostonâ⬠(Updike 360). The estimated time period is the 1960s. At thisRead MorePersuasive Essay804 Words à |à 4 Pagesthrough illustrations of a cathedral, drawn by the narrator with his eyes closed. ââ¬Å"Cathedralââ¬â¢sâ⬠narrator exposes readers to anti-heroic views influenced by his thoughts and actions through the analysis of the storyââ¬â¢s theme, symbols, and conflicts. As readers will obtain, the theme, looking verses seeing, of ââ¬Å"Cathedralâ⬠becomes a major element towards the narratorââ¬â¢s insulting comments. The narrator clearly shows his capability of looking, through his remembrance of, ââ¬Å"having read somewhere that theRead MoreMoney for Moneys Sake in The Great Gatsby by F. Scott Fitzgerald804 Words à |à 3 Pagesperfectly captures the essence of the theme that I have come to for The Great Gatsby. The theme I see most strongly reflected in the book is this: Although greed and lust are human nature, they are often used as a substitute for happiness, but almost always lead to decay. I will provide examples of this theme by looking into events and the behavior of characters throughout the plot of the book. One main event in the book that I believe strongly represents the theme is when Gatsby is shot while floatingRead MoreGerman Propaganda and its Effects on the Holocaust and World War Two1127 Words à |à 5 Pagesthrough the use of mass media of communications, the manner in which a mass audience perceives and ascribes meaning to the material world.â⬠1 Propaganda was a major part of Germanyââ¬â¢s way to brain wash people into following Hitler and his army. The theme of Hitler and Goebbels, (Paul Joseph Goebbels, was appointed Hitlerââ¬â¢s Reichspropagandaleiter, the Nazis national director of propaganda), using propaganda, ââ¬Å"was to merge the traditional German patriotism with Nazi ideological motifsâ⬠2, this was basicallyRead MoreAnalysis Of A P 940 Words à |à 4 Pages6- What is the theme of ââ¬Å"APâ⬠? What literary devices are employed in the story? Love, disillusion, religionâ⬠¦ every story has its own theme and its author leads the readers all the way to its understanding. The short story ââ¬Å"APâ⬠is not an exception of this. Written by John Updike and published in the New Yorker in 1961, it tells the story of Sammy, a 19 years old cashier in an AP grocery store who is amazed by the journey of three girls that enter the store dressed only in bikinis. The story isRead MoreAnalysis Of The Movie Caramelo By Sandra Cisneros1508 Words à |à 7 Pagesmoves through Texas, Chicago, and Mexico, Cisneros exhibits the theme of identity through the familyââ¬â¢s history, relationships, and other interactions the characters have with one another. Everybodyââ¬â¢s role and identity within a latino family are explored throughout the text. Sandra Cisneros uses smaller main ideas and symbols of home, love, roots, and womanhood in order to further elucidate the greater theme of identity. One of the symbols and smaller main ideas that the characters explore is the meaningRead MoreSymbolism In The Lottery By Shirley Jackson879 Words à |à 4 Pagestradition. Shirley Jackson uses many symbols in the story to relate to the theme. By doing this it helps the reader understand the story and the message she is trying to get across. Jackson uses tone, setting, and symbolism to conduct a theme for her readers. By doing this she creates connections to the theme by using the black box and old man Warner as a symbol. Old man Warner plays a significant role in ââ¬Å"The Lotteryâ⬠considering he is one of the main symbols. Old man Warner is the oldest man inRead MoreFlowers for Algernon Symbols and Motifs1629 Words à |à 7 PagesSymbols and Motifs By Amber Wang In Flowers for Algernon by Daniel Keyes, there are many motifs and symbols. According to Dictionary.com (2013), a motif is: ââ¬Å"a recurring subject, theme, idea, etc., especially in a literary, artistic, or musical work.â⬠On the other hand, a symbol is, according to the same website: ââ¬Å"something used for or regarded as representing something else; a material object representing something, often something immaterial; emblem, token, or sign.â⬠However, unlike motifs,Read MoreA P By John Updike1532 Words à |à 7 PagesPaper 1: AP by John Updike In this essay I will be reviewing the six elements of fiction: point of view, plot, setting, characterization, symbolism, and theme in the story, AP by John Updike, to see how it constitutes to the work as a whole. Sammy, a 19-year-old cashier at the AP, narrates AP. In this first-person narrative, the narrator tells us everything as he sees it, but since it is a limited point of view the narrator is unreliable. But this allows the reader to notice growth in the characterRead MoreWit Flim Mid Term734 Words à |à 3 Pagesmake the story more interesting and creates the story to be more detailed. Two stories in which characterization makes the story better and are similar in the way that the themes go is ââ¬Å"Aamp;Pâ⬠written by John Updlike and ââ¬Å"Arabyâ⬠written by James Joyce. Both story is about a worker who is admiring a woman from a far. In ââ¬Å"Aamp;Pâ⬠Updlike characterize the three girls who walk in the store that he is working. He describes in details of how the girls looked and even the color of their bathing suite and
Thursday, May 14, 2020
Essay about The Cultural Art of Body Art - 1084 Words
For a long time now body art and decoration has been a custom in many cultural groups. Through research we have learned about the different types of body art and ornamentation such as permanent and nonpermanent tattooing, scarification, and piercings. These forms of body art and ornamentation are done for a variety of reasons, ranging from identification purposes to religious rituals. ââ¬Å"Skin, as a visible way of defining individual identity and cultural difference, is not only a highly elaborated preoccupation in many cultures; it is also the subject of wide-ranging and evolving scholarly discourse in the humanities and social sciencesâ⬠(Schildkrout, 2004). The process of ornamentation and body art is usually a painful experience, but it isâ⬠¦show more contentâ⬠¦Secondarily, they are seen as a symbol of beauty or a derogatory symbol to keep troublesome kids alive. In his article Orie states that ââ¬Å"Every Yoruba is born into a patrilineal clanâ⬠(Orie, 2011 ). When the children are born their parents decide when the scarification will take place, this usually happens between the age of three weeks to three months. The procedure is done by an oloola or akomola which is a professionally trained specialist. The procedure is said to be performed at dawn to help minimize the loss of blood, dawn being the coldest part of the day. The patrilineal stripes declare the clan membership of the children, and ensure that they are not denied the entitlements and rights of the clan members. There are many differences in the length, depth, spacing, and the placement of the stripes on the face. It may seem difficult to be able to be able to tell so much information about someone simply from the stripes on their face, but as Orie explains, for those that can read the traditional stripes, a brief look at someoneââ¬â¢s face is enough to identify the town, regional affiliation, or family of that person (Orie, 2011). In the Maori culture of New Zealand, tattoos are distinct and unique, not only in their design, but also their significance. Palmer and Tano explain in their article that there are two methods that are involved when creating a moko tattoo. There is the method of carvingShow MoreRelatedThe Artist Is Present : Challenging Performance And Cultural Politics1506 Words à |à 7 PagesPresentâ⬠challenging Performance and Cultural Politics Marina AmbramoviÃâ¡Ã¢â¬â¢s concept of performance art interrogates the traditional forms and practices of what most people would consider to be the ââ¬Å"normâ⬠, that derive from personal preferences generated from different aspects of society. AbramoviÃâ¡ is known for her durational performance work that tests the endurance and limitations of her own body and mind. Performance art may be understood as a practice where the body of the artist is central or theRead MoreBody Art and Ornamentation Essays1569 Words à |à 7 PagesRunning head: BODY ART AND ORNAMENTATION Body Art and Ornamentation in Different Cultures Introduction to Cultural Anthropology ANT101 July 28, 2013 There is no culture in which people do not, or did not paint, pierce, tattoo, reshape, or simply adorn their bodies (Schildkrout, 2001). Throughout history, body art and ornamentation has become a worldwide phenomenon and has played a key role in our lives, yet there is a social stigma which we cannot seem to rid ourselves of. It is mostRead MoreCultural Policy in Taiwan Essay955 Words à |à 4 PagesCultural Policy in Taiwan Taiwan has its own very special government system. On the central government level (relevant to the federal government), there are both president and premier in the system. The National Assembly is the representation of all citizens to the president, and the Legislative Assembly is to the premier who is in charge of the Executive Yuan, the top administrative body of Taiwan. The current National Assembly is in charge of the change of constitution laws, while the LegislativeRead MoreA Student Of Art History Survey1506 Words à |à 7 PagesAs a student of Art History Survey I, I need to complete a museum paper. I wondered if this paper is really a necessary assignment. I did not think of this paper as an assignment, but it as an opportunity to discover and experience great works of art which are certainly more dynamic and realistic than what I learned in the textbook. For my trip, I decided to visit the Dallas Museum of Art, one of the largest art museums in Texas. This museum is a valuable place where I can be immersed in the vastRead MoreDeborah Whaley s Black Women1423 Words à |à 6 Pagesdistorted body parts; and the angry sapphire. Within the male dominated comic art world, Deborah Whaleyââ¬â¢s Black Women in Sequence: Re-inking Comics, Graphics Novels, and Anime offers a countervision on the Black body. Women, especially Black women may welcome the book as a confirmation that their story is recognized and represented. For this audience, Whaley will explore the historical, racial, and sexual representation of Black women in sequential art pointing out the imagined Black body through interracialRead MoreThe Big Black Smiling Mammy, The Sexual Deviant, And The Angry Sapphire Essay1487 Words à |à 6 Pagescomic art world, Deborah Whaleyââ¬â¢s Black Women in Sequence: Re-inking Comics, Graphics Novels, and Anime offer a countervision on the Black body. Women, especially Black women may welcome this book as a confirmation about recognizing, represen ting, and reframing their story. For this audience, Whaley will explore the historical, racial, and sexual representation of Black women in sequential art pointing out the imagined Black body through interracial relationships, African fetishism, cultural politicsRead More The History of Modern Women and Body Art Essay1402 Words à |à 6 PagesThe History of Modern Women and Body Art I chose to do this field report on body art because I, personally, find the topic very complex and interesting. It is for this reason that I decided to narrow the scope of my field research. I am focusing this report on the trends and evolution in body art as relating to modern women. When I say modern women I am referring to the women from about the 18th century to the current day. I chose to focus on women imparticular because of the strong societalRead MoreThe Los Angeles County Museum Of Art1301 Words à |à 6 Pageschoosing only one museum for my cultural visit. Since, there are so many prodigious and amazing museums to choose from to visit in the county. But, I have heard many great feedbacks about the Los Angeles County Museum of Art from fellow classes mates, friends and family. So, I finally, had my destination set to and planned a visit to the Los Angeles County Museum of Art. Upon my visit my attention was already fixated on the unique building layout and the many arts ex hibited located all around theRead MoreRelationship Between The Live Event And The Document Within Performance Practice1692 Words à |à 7 Pagesevent and the document within performance practice, specifically focus on in relation to body, time and space. Performance art is commonly known as a performance presented to a viewer within a fine art context. Through performance artists emphasize the bodyââ¬â¢s role in artistic production. Performance archive has been characterized as a false representation of the art performance in the past. Yet, in contemporary art the relationship between live performance practices and documentation has overcome toRead MoreRelationship Between The Live Event And The Document Within Performance Practice1588 Words à |à 7 Pagesthe document within performance practice, specifically focus on in relation to body, time and space. Performance art is commonly known as a performance presented to a viewer within a fine art context. Through performance art ists emphasize the bodyââ¬â¢s role in artistic production. Historically, performance archive has been characterized as an unfaithful representation of the momentary art experience. Yet, in contemporary art the relationship between live performance practices and documentation has progressed
Wednesday, May 6, 2020
Lord Of The Flies Character Analysis - 1288 Words
In Lord of the Flies there is a lot of leadership,order, and civilization. William Golding was born on September 19, 1911 and died June 19, 1993. Lord of the Flies was a novel that was published on September 17, 1954. This novel is about a group of boys stranded on an island. The boys worked together to find things so they can get help. The boys all were scared at first but Ralph being the leader got all the boys to calm down and relax so he could find ideas to help me get off the island. It will be best to take what you seen in this novel and use it in real life because things in life are like this. The novel shows how the boys worked together so they can survive. In Lord of the Flies, William Golding uses detail to suggest characters.â⬠¦show more contentâ⬠¦This is significant because all the boys listen and look up to Ralph. This shows that Ralph only has to blow the conch shell to get the boys in order. ââ¬Å"Two of the boys, Ralph and Piggy, discover a conch shell on the beach, and Piggy realizes it could be used as a horn to summon the other boysâ⬠(Sparknotes). This is significant because they worked together and look around for things to help make noises and they found the conch shell. This shows Ralph and Piggyââ¬â¢s leadership and order. This is a good way of showing leadership, order, and how good of friends they are together. The author utilizes Piggy as the scientific and intellectual aspect of civilization. For instance ââ¬Å"I no longer identify with Ralph and his helpless attempts at order and civilityâ⬠(Golding). Piggy felt like Ralph did not like him anymore and was giving up but he just got weak and could not lead the group of boys. This means Piggy is not getting along with Ralph anymore. This implies that Ralph was being helpless and Piggy does not like it so he is not getting along with Ralph anymore. ââ¬Å"I felt as vulnerable as Piggy and disliked Jack because he revealed too much about my own selfâ⬠(Golding). This shows that Piggy and one of the boys does not like Jack because he knows too much about them. This is significant because Jack should not know that much about Piggy and the other boy and that makes Jack very suspicious to them. ââ¬Å"Ralphââ¬â¢s weeping for the end ofShow MoreRelatedLord Of The Flies Character Analysis1584 Words à |à 7 Pages Lord of the Flies, by William Golding, is a story about a troop of boys who are on a plane out of war-torn England. However, their plane crashes and strands them on an island without any adults. The boys, who are anywhere from age six to age twelve, must learn to survive not only the elements, but each other as well. By the end of the story, at least three of the boys have died, two of which were killed knowingly by other boys on the island. When the boys first arrive, they appoint Ralph as chiefRead MoreLord Of The Flies Character Analysis807 Words à |à 4 Pagesstranded the more they think they will never find civilization, making them turn inhuman and careless. As their behavior gets worse they end up killing their only source of survival but eventually get rescued. In the novel ,â⬠Lord Of The Fliesâ⬠, written by William Golding, the character Piggy represents human intelligence, Ralph illustrates leadership, while Jack symbolizes social chaos. Being the civilized one in the group, Piggy tries to calm everyone down, but also being the most vulnerable one becauseRead MoreLord Of The Flies Character Analysis940 Words à |à 4 PagesAll people have evil inside them, sometimes deep enough for it to not come out. William Goldingââ¬â¢s novel Lord of The Flies theme is that all people have evil inside them, and only rules and order can keep them from acting upon it. Ralphââ¬â¢s character disputes this theory because of his knowledge and wisdom, him seeking civilization and his leadership skills. Ralph seeking for civilization helps prove that he is not leaning towards the evil inside him. For example, the signal fire which is used toRead MoreLord Of The Flies Character Analysis947 Words à |à 4 PagesAustin Curtis Ms. Tantlinger Honors English 10 2 January 2018 Title In William Goldingââ¬â¢s novel, Lord of the Flies, a group of children are deserted on an uncharted island due to the conflict of a world war. As the boys live on the island, they begin to have conflicts among themselves, and Jack, an older boy on the island, begins to become power-hungry. Jack falls far from the rules of society as he is overcome by the power of the mask, Jack also conceals his humanity by using his war mask; GoldingRead MoreLord Of The Flies Character Analysis1161 Words à |à 5 Pages The novel ââ¬Å"Lord of the Fliesâ⬠, written by William Golding, follows a group of british schoolboys on their fight for survival. After their plane crashed on an island, the boys must work quickly and alert someone of their whereabouts. The main character, Ralph, opens the story as ââ¬Å"a fair boyâ⬠meaning the favourite or the most promising of a group. Leading the boys was a job Ralph took on proudly and all was sain in the world. The boys arenââ¬â¢t on the is land long before the idea of order starts to fadeRead MoreLord Of The Flies Character Analysis1322 Words à |à 6 PagesIn the novel ââ¬ËLord of the Fliesââ¬â¢ by William Golding, a group of schoolboys are marooned on a tropical island after their plane crash-lands on it. At first, the boys see it as a fun adventure but it doesn t take long for them to descend from boys to savages. The novel ends with the boys being rescued, but not before the death of several of them. In the novel, the character of Jack personifies the the evil that lies within man. This is shown through Jackââ¬â¢s tendency towards violence, him becoming aRead MoreLord Of The Flies Character Analysis1009 Words à |à 5 PagesFor centuries people have accepted living side by side with good and evil, as they will for years to come. This philosophy is demonstrated in the allegorical novel, Lord of the Flies written by William Golding. Set in an unknown time period, during an atomic war, in which, the attemp t to take a group of schoolboys to safety fails and they crash into a deserted island in the Pacific Ocean instead. As the boys realize there is no adult survivors, they celebrate their newfound freedom and try to establishRead MoreLord Of The Flies Character Analysis778 Words à |à 4 PagesTo what extent do people feel dependent on those who provide good to society? William Golding, the author of Lord of the Flies, brings out the realities of society. Through multiple characters and relationships, the boys on the island learn of these harsh truths. The death of Simon leads to the deterioration of the boys on the island, proving that once good is removed a society will collapse. Ralph expresses prominent changes at the loss of Simon. Chief of the island, Ralph must keep law and orderRead MoreLord Of The Flies Character Analysis1368 Words à |à 6 PagesPicture life today without a structured government: no morals, no laws, and no persecution. People would be able to act however they wanted, without thinking about the consequences. In his novel Lord of the Flies, William Golding uses characters and symbols to provide a complex perspective on the lack of society and its effect on peopleââ¬â¢s behavior. Golding himself served in the military for five years, and he fuels the plot with his own experiences with corruption. In the text, a pack of BritishRead MoreLord Of The Flies Character Analysis932 Words à |à 4 Pagesdesires, power and committed some immoral acts in their life but at what point do these assets effect the amount of corruption present in a person. Lord of The Flies is a 1954 novel written by Nobel Prize winner William Golding. With the stand out themes of savagery and corruption it can be clearly seen why this book has such a large audience. Lord of The Flies is an allegory based around the events of war and destruction going on in the world at this time. The Following is a 2013-2015 crime drama Tv show
Tuesday, May 5, 2020
News Report Analysis Yahoo Hack
Question: Describe the Report of News Analysis on Yahoo hack. Answer: Introduction Data breaches are the major threats to the security of an information system and many of the security concerns can be associated with breaches such as hacktivism which involves stealing of data, malware incorporated by these breaches and criminal attacks by exploiting stolen data. Over the years, there have been many data breaches that have caused losses to organizations and threats to people who fall victim to cybercrime and thus, it is a very important area of study in the field of information security(STEWART, 2014). Choice The news article was about the latest security breach in which hackers stole personal information of over 500 million yahoo users. It is the largest data breach after the 500 million user data of Court Ventures including social security numbers, credit card data and bank account information was sold to an identity theft organization in Vietnam. Although, the state-sponsored attacker was not able to gain sensitive data including bank account or credit card information yet it was a data theft that was huge in numbers and has been going on since past 2 years without getting noticed. This data breach raises a concern over the capabilities of security engineers in securing networks against cyber criminals(Wood, Nahorney, Chandrasekar, Wallace, Haley, 2014). As the case presents a unique story of security breaches involving a state-sponsored agent attacking an already troubled organization that was in the process of being acquired by another organization and stealing personal data but not the sensitive accounts or financial data, and has affected the largest number of users in the history of data breaches, it made an interesting case for consideration in this report. Moreover, the incident was latest and was caused to a renowned organization; the news article on the subject was taken up for exploration in this report. Reasons One of the major causes of the security breach as identified by Yahoo was use of invalidated and unencrypted security questions and answers by Yahoo users. Challenge questions are the weakest form of authentication. Another observation by Yahoo was that the passwords that were hacked were hashed with majority of them using bcrypt. Hackers used Brute force to crack these passwords. The bcrypt or Blowfish File Encryption is an algorithm that is designed for storing passwords. The method is actually considered as a very secure way to store passwords making the authentication system of yahoo secure with low probability of cracking. However, Yahoo itself stated that all passwords were not stored using bcrypt which could have been a probable reason for this huge number of hack(OECD, 2008). A research experiment done on the use of word associations for security revealed that when family and friends were asked to guess answers to security questions of users and close to 50% of them could make a successful attempt. When attempting the experiment with complete strangers, it was found that that question and answers challenge was still not an efficient method for protection unless they are hashed(John Stringer, 2011). A major non-technical cause was the use of commonly memorable or easy passwords for authentication by users and unwillingness to change passwords too often to avoid forgetting passwords. It was found that close to 5% of Yahoo users very frequently forget passwords. When passwords are created for the first time, Yahoo puts restrictions and compels users to create strong authentication passwords using letters, numbers and characters in combination. However, when the system goes through the forget password loop, even easy passwords can get accepted putting users to more risks. Further, users do not change passwords or update security questions often which make it easy for hackers to gain access to accounts. In the case of Yahoo data breach, the data stolen included several questions and answers information also.. Impacts In order to understand the severity of the damage caused by the security breach, breach level index methodology can be used. As per this methodology, this breach can be considered to have a breach level index of 7-8.9 as it gave a significant exposure to business, had regulatory impact as a result of hacking attempt by state official entity representative and a large amount of sensitive information was leaked. It also affected the public image of Yahoo causing tensions between Verizon and Yahoo over the deal in which Verizon was to take over Yahoo(Stiennon, 2013). Further, the breach is expected to bring lawsuits that would be in addition to the costs that would be incurred for remediation of the breach. An average cost of such a remediation is $220 per stolen record and with over $500 million records stolen, the cost of remediation would be even larger than its Verizon deal amount. Yahoo is already losing its users, its traffic and revenues and is unable to stand against the competing rivals like Google and Facebook which is why it was decided to be sold for $4.8 billion. Moreover, this mega breach can worsen the problems for Yahoo as its users are likely to lose trust on the brand. Further, with credentials of so many people stolen, there could be an obvious risk for the users as their credentials could be misused by the hackers in various ways. The passwords and personal details obtained from accessing user accounts can be sold to third parties and this can include use names, passwords, birth dates, zip codes and email Ids. Some of the information could have already been used even before people decide to take a protective step as the breach had been going on for 2 years before it was disclosed by Yahoo in public(TrustSphere, 2012). More potential impacts that the organization is likely to face in response to the data breach can include damage to brand, loss of its customers, loss of the competitive advantage in market, loss of the market share, legal actions and erosion of the shareholder value(EY, 2011). Remedies To prevent brute force attacks, an organization should go beyond only password protection policies and use specific detection methods like login attempts rate limitations, logins from automated browsers, logins from unexpected locations, popular password data, and stolen credential information and so on. If challenge questions are used as an authentication measure, a creation of hash in responses may be used. Even better would be to have multiple questions and answers such that a single hash tag is created by combing responses to multiple questions(Just Aspinall, 2009). The data protection principle suggests that security must be designed in organized in a way that it fits the nature of personal data that is being managed. It further commands establishing of right security measures and robust security policies. After data breach has already occurred, the only measure remains is remediation. However, a better way would be prevention of the problem as after data breaches, much less can be done(Engine Yard, Inc., 2014). A data breach can be avoided in several ways such as by using strong authentication passwords, use of an appropriate granular data classification scheme, improved access control measures, assessment of traffic for identifying and understanding data loss vectors, compliance audit and so on. Risks can be reduced if the data usage is monitored and appropriate prevention measures are taken on the discovery of a potential threat to data(Xero, 2016). A holistic way could be establishing of a layered technological approach to data protection using various security control measure like encryption, threat protection, data loss prevention and security compliance. Encryption: A policy based encryption may be used for securing personal data. The file sharing feature can have its own encryption process to prevent data from getting lost or stolen in transit. Threat Protection: Threat protection involves protection of user end points, web vectors and email accounts. For this, a service provider can build a capacity to detect malwares like viruses, Trojans, worms, spywares and any other suspicious files proactively. Antivirus, firewalls and application controls can be used for protecting user accounts. Data Loss Prevention: Whenever sensitive information is transferred through an email, certain automatic rules may be established in advanced that are provoked at these times for preventing data loss. This can be done by using file matching that involves understanding of the file formats and content rule that contains some data definitions that can invoke certain specific actions. Security Compliance: Methods for controlling activities happening over web space may be established by an email service provider or any organization providing services such that the policies have to be adhered to while using the account for ensuring protection(John Stringer, 2011). Conclusion Human factors are also important for consideration when user behaviour can actually have a great impact on the security of systems which was also the case with Yahoo(Ponemon Institute, 2012). A way would be to sufficiently educate users about the security threats, risky behaviour and protection measures. Certain precautions can be taken from the user end as well such as use of strong authentication passwords, using variations in passwords for different accounts, changing passwords often and so on. References Anderson, R. J. (1994). Liability and Computer Security: Nine Principles. CL. EY. (2011). Data loss prevention : Keeping your sensitive data out of the public domain. Ernst Young. Engine Yard, Inc. (2014). Security, Risk, and Compliance. Engine Yard. John Stringer. (2011). Protecting personally identifiable information:What data is at risk and what you can do about it. Sophos. Just, M., Aspinall, D. (2009). Challenging Challenge Questions. University of Edinburgh. MYOB. (2016, September 13). Protecting your confidential information. Retrieved from MYOB: https://myob.com.au/myob/australia/myob-security-recommendations-1257829253909 OECD. (2008). Malicious Software (Malware): A security Threat to Internet Economy. OECD. Ponemon Institute. (2012). The Human Factor in Data Protection. Trend Micro. STEWART, J. N. (2014). Advanced Technologies/Tactics Techniques, Procedures: Closing the Attack Window, and Thresholds for Reporting and Containment. IOS Press. Stiennon, R. (2013). Categorizing Data Breach Severity with a Breach Level Index. IT-Harvest LLC; SafeNet, Inc. . TrustSphere. (2012). Advanced Security Methods for eFraud and Messaging. TrustSphere. Wood, P., Nahorney, B., Chandrasekar, K., Wallace, S., Haley, K. (2014). Internet Security Threat Report.Symantec Corporation. Xero. (2016, September 13). Your data is safe with multiple layers of security. Retrieved from Xero: https://www.xero.com/accounting-software/security/
Subscribe to:
Posts (Atom)