Wednesday, August 26, 2020

Procurement Outsourcing Strategies Essay Example | Topics and Well Written Essays - 750 words

Acquirement Outsourcing Strategies - Essay Example Furthermore, the Wonderful Widgets Company gets the chance to go about as an administration center point that executes the settled procedures for the item. This perusing centers around the arrangement of vital activities that clarify the apparent effect of framing key coalitions in acquirement and redistributing. The approaching inquiries in regards to the issues with redistributing this specific case situation is the thing that dangers are included, and whether the re-appropriating procedures ought to rely upon the item qualities, for instance, the clock speed. As the Supply supervisor, the undertakings included involve the ID and advancement of a powerful acquirement methodology that guides in bringing down or diminishing the month to month operational expenses (Rosenfield, 2012). An official conclusion relating to acquirement is likewise subject to the business activities associated with the organization. Smoothing out the business forms is basic in authorizing and executing a proper acquisition administration that works for the business objectives regarding limiting the operational expenses. The determination of a key hotspot for the assembling segments would help the organization in exploiting any grouped obligation rates or regardless of whether the organization is qualified to take an interest in uncommon exchange programs. The elements of the travel costs should be determined to decide the stock conveying costs, the cargo, obligation and financier or protection costs (Rosenfield, 2012). Buying in to premium cargo benefits that require paying higher rates can end up being costly to the company’s operational expenses. This is basic for shipment of premium merchandise which utilizes bearer protection. Uniting the merchandise and segments expected by the organization from numerous providers helps in limiting vehicle costs for the business. The variable travel times for products from various providers brings about higher installments for the organization. Since the organization

Saturday, August 22, 2020

Security Incident Handling Service

Security Incident Handling Service Official SUMMARY 1 INTRODUCTION Expect the unforeseen. When an emergency emits, it ought to be promptly taken care of to lessen its latent capacity sway on basic business activities. Such unfortunate episodes happen unforeseen and when they do occur, harm or mischief is the outcome. In many parts of life, it is smarter to quit something unfortunate occurring than it is to manage it after it has occurred and IT security is no exemption. On the off chance that conceivable, security occurrences ought to be managed in like manner from happening in any case. However, it is unachievable to forestall security occurrences. At the point when an episode happens, its effect should be brought down to satisfactory suggested level. Security occurrence dealing with diagrams the activities to follow in an occasion that an electronic data framework is undermined. An occasion is announced an episode when the privacy, trustworthiness or accessibility (CIA) components of a framework is undermined. Critical items, for example, data and information must be defended no matter what. Correspondences inside an association and its communications to its client base are viewed as the existence blood in this IT concentrated quick paced world. In the event that an association is out of commission for any timeframe, it might cost millions in lost business or loss of notoriety. Size of an association doesn't make a difference. Startling personal time impacts associations of all sizes affecting income, consumer loyalty and by and large creation. It is imperative that they rapidly recuperate from such personal time and reestablish activity and restore their quality to guarantee endurance. Thusly, numerous organizations have understood the significance of setting up episode dealing with techniques. One of the downsides is that numerous associations figure out how to react to security occurrences simply in the wake of experiencing them. Over the span of time, occurrences frequently become considerably more exorbitant. Legitimate episode reaction ought to be a necessary piece of the general security arrangement and hazard moderation methodology. Occurrence dealing with techniques that are set up in an association improves to keep up the business coherence of basic activities. In todays serious economy, an organization cannot bear to stop basic business tasks and stay inert for significant stretch of time in light of absence of occurrence giving systems. Accordingly, an association should be decidedly ready for progression or recuperation of frameworks. This ordinarily requires an extensive venture of time and cash with the point of guaranteeing insignificant misfortunes in case of a problematic occasion. The objective of setting up episode taking care of systems is to know precisely what to do when an occurrence breaks out. This implies envisioning situations before they happen and settling on fitting choices about them ahead of time. Those evaluations ordinarily request counsel and senior administration su pport, subsequently these individuals are required early following an occurrence has been affirmed. For instance, simply concluding who to tell when an occurrence happens can be difficult to decide. The board needs to give contribution to react rapidly and this leaves into issues like nightfall support and blended venture/bolster jobs. Outer help may likewise be looked for, bringing about extra cost, time and exertion to choose accomplices. 1.1 PURPOSE OF THE DOCUMENT This report gives direction to recognize and record the nature and extent of a PC security occurrence taking care of administration. This paper talks about the capacities that help the administration, how those capacities interrelate and the apparatuses, strategies and jobs important to actualize the administration. It likewise focuses on occurrence investigation. For instance, we can make an examination between a fire that severed in a condo and a PC security occurrence that occurred in an association. Essentially as a local group of fire-fighters will explore a fire to know where it started from, a Computer Security Incident Response Team (CSIRT) attempts to make sense of how the security occurrence happened. Both the local group of fire-fighters and CSIRT work in a similar methodology. A local group of fire-fighters needs to coexist with other local groups of fire-fighters on it can rely upon for extra help in top occasions or to handle a genuine fiasco. It must help out other cri sis units to respond immediately and give law implementation. This record will talk about how CSIRTs associate with different associations, for example, the office that revealed the security episode to it, different CSIRTs, law implementation and the media. Both local group of fire-fighters and CSIRT need to appropriately deal with data, some of which is delicate and pertinent to the individual considered liable for the wrongdoing. Data taking care of is viewed as an imperative conversation topic in this paper. CSIRTs propose customer classification in a similar way that numerous crisis units do, protecting columnists and casualties from open exposure. CSIRT endurance relies upon dealing with classified data fittingly, supposing that it cannot be believed, no one will answer to it, consequently making it practically futile. CSIRTs have submitted perpetual staff just as low maintenance, volunteer staff and solid security specialists to deal with a sudden security crisis. Its staff is at the bleeding edge in occasion of an emergency, CSIRT accomplishment relies upon their communication with the outside world and the picture that they anticipate by the method of playing out their obligations and the administration quality that they give. To accomplish such elevated level of progress, selecting appropriately skilled staff is by all accounts a confounded procedure. Individuals accountable for delegating CSIRT staff erroneously search for inadmissible arrangement of ability and capacity in forthcoming workers. Consequently, this paper talks about staffing and recruiting concerns and activities to ensure that CSIRT staff offer solid, lovely and specific assistance. Different administrations other than the occurrence dealing with administration, for example, the gracefully of interruption location help and powerlessness taking care of are additionally given by CSIRT. The data in this paper is reasonable in such a way, that is fundamental to the peruser to place it int o activity to a CSIRT setting, from in-house group for an organization to a global coordination community. This report is planned to introduce a significant establishment to both as of late made groups and existing groups where there is an absence of unmistakably characterized or archived administrations, approaches and methods. This paper is progressively fitting to use during the beginning times when an organization has gained the executives backing and financing to set up a CSIRT, before the group gets operational. Also, this paper can be as yet an important reference archive for effectively operational groups. 1.2 INTENDED AUDIENCE The general CSIRT people group who may require a superior information on the piece and goals of their current groups will profit by this archive. It additionally targets people and associations who are probably going to join the CSIRT people group sooner rather than later. It is accurately focused on chiefs and other work force who partake during the time spent setting up and driving a CSIRT or overseeing occurrence emergency. The rundown may incorporate Boss Information Officers, Chief Security Officers and Information Systems SecurityOfficers Undertaking pioneers and individuals responsible for making the group CSIRT supervisors CSIRT staff IT supervisors [1] Higher administration levels and all CSIRT staff can utilize this paper as a helpful reference. This record can likewise be used by others who cooperate with CSIRTs. This may incorporate individuals from the CSIRT body electorate law implementation network frameworks and system head network CSIRT parent association or different divisions inside the parent association, for example, legitimate, media or advertising, HR, reviews and hazard the board examinations and emergency the board [2] 2 MAIN CONTENT Meaning of Security Incident The Information Security Management Handbook characterizes an occurrence as any unforeseen activity that has a prompt or potential impact on the association [3]. At whatever point the wellbeing and dependability of a data framework is undermined, such occasion can be alluded to as a security occurrence. There are a few unique meanings of security episodes; one is An infringement or approaching danger of infringement of PC security arrangements, worthy use strategies, or standard PC security rehearses [4], another definition depicts the security occurrence as any occasion that may undermine or bargain the security, activity or honesty of figuring assets [5]. As such, a security occurrence is a condition of infringement of security approach in an association and the security of their data framework. Security occurrence alludes to a typical term that includes any sort of security penetrate paying little heed to area, the degree of the danger or its greatness. The normally known variable s of security occurrences are occasions and activities that uncover at least one fundamental components of data security: classification, honesty and accessibility (CIA) of data frameworks. An episode can be brought about by approved or unapproved work force, procedure, equipment or programming. It very well may be a mishap just as an arranged malevolent activity. Taking care of security episodes Over the span of an emergency, time runs short as far as about what to do, who will do it or how it will complete, accordingly it is fundamental to mastermind a reaction ahead of time. The more ready you are for an occurrence, the more probable you are to react effectively. Legitimate set-up of an episode taking care of method can assist with reducing effect of bothersome occurrences. The target of such methodology set up is to give a system to an efficient, facilitated reaction by suitable assets inside the association. It is in a companys own advantage that it builds up a Computer Security Response Capability, a procedure that gives brought together reaction and revealing capacities for security episodes. Accordin

Friday, August 21, 2020

Example Query Letter for Writers

Example Query Letter for Writers Most writers will get to know the query process all too well. And a quick glance through Writers Digests successful query letters will show you that there are a few very simple dos and donts when it comes to writing a query letter that will get an agents or editors attention fast.A few things you should doDo keep it under five paragraphs (one page).Do use the agents/editors name after Dear.Do write it so the reader can hear your works voice.Do follow a typical formal letter format.Do include important details of the book, such as word count and genre.And a few things you shouldnt doDont forget a SASE (self-addressed stamped envelope).Dont use odd font/text color/paper color.Dont oversell yourself.Dont make it generic; show that publisher or editor why its a perfect fit for him/her.Example query letterDear Mr. McCarthy,You remember it, dont you? That rush of excitement in the air when it was almost summer break? The feeling of impending freedom, counting down too slowly on the calenda r, and moving at a snails pace closer to you? Josh Baer, a junior at Valleydale High School, was feeling exactly that when he made a quick decision that would change the course of his summerâ€"and his life!Awaiting the end of another school year that was a complete drag, the Josh accepts a last-minute invitation to an end of the school year bash at Megans place. Since she was the most beautiful girl at school, and his hardcore crush at the moment, he decided to go. And thats when things got weird.First, he found a room he wasnt supposed to find. Then he found out a secret that would lead him and Megan on an adventure with a questionable motorcycle gang through back alleys and empty warehouses, all to find out that Megans family wasnt everything it seemed.Coming of Age is YA fiction that combines the melancholy love story of Twilight with the high-speed adventure Dan Brown is best known for. Coming of Age is my first novel and is just over 60,000 words.I would be delighted to send a sample or full manuscript at your request. Thank you for reading, and I look forward to hearing from you.All the best,Shiloah Garret

Sunday, May 24, 2020

An Analysis Of Chaucer s The Canterbury Tales

An Analysis of Chaucer’s Miller in the Canterbury Tales Many characters in Geoffrey Chaucer’s Canterbury Tales link to the different social classes in England during the Medieval Period. The Miller is a crude character who tells an entertaining, yet inappropriate tale on a pilgrimage to Canterbury Cathedral. In the Prologue to the Canterbury Tales, Chaucer describes the Miller as a bold, garrulous man and shows the morally incorrectness of the Miller. The Miller tells a vulgar but suitable story which classifies him as a man of low social status with an uncouth, shrewd sense of humor. Narrating his tale directly after the Knight’s noble and honorable tale, the Miller tells a tale degrading romanticism and love while exhibiting adulterous relationships. The vulgarity of his tale is one example of the Miller’s low social class. During the Middle Ages, a miller was generally a middle or low class man who owned or operated a wheat mill. The social rank of a mi ller could vary, as explained by Jeffery Singman and Will McLean in Daily Life in Chaucer’s England, â€Å"People’s positions in the hierarchy were considered to be of great importance, but sometimes the precise gradation weren’t entirely clear . . . However, it might be hard to tell whether the local miller was a more important man than the local smith† (9). Singman and Mclean are saying that one can not categorize a miller into a specific social class, but can generalize a miller in the low to middle class inShow MoreRelatedAn Analysis Of Chaucer s The Canterbury Tales 2650 Words   |  11 PagesAn Analysis of Chaucer’s Miller in The Canterbury Tales In the prologue to The Canterbury Tales, Chaucer introduces the Miller as a crude, rude, loud character who cheats his customers. The tale, which the Miller later narrates, is appropriate because the Miller’s tale clearly reflects this individual’s unrefined personality by telling a typical, filthy tavern story. The Canterbury Tales, written by Geoffrey Chaucer, is a story that details thirty pilgrims, including Chaucer, traveling onRead MoreAnalysis Of Chaucer s The Canterbury Tales 1161 Words   |  5 Pagescomposing The Canterbury Tales, there is a broad diversity of tales told by a wide range of narrators. This indicates that Chaucer likely used a wide variety of sources. The alterations made by Chaucer to the source material for the Clerk’s Tale, including Boccaccio’s Decameron X, or â€Å"The Story of Griselda,† indicate Chaucer’s motive to examine issues such as marriage as was found in Renaissance Italy, and to explore the state of mind of the Marquis, as well as Griselda. Chaucer not only layersRead MoreAnalysis Of The Canterbury Tales : Chaucer s Second Nun s Tale 2418 Words   |  10 Pages AN ANALYSIS OF THE CANTERBURY TALES: Chaucer’s â€Å"Second Nun’s Tale†. Leah Holle REL. 700a: Transitional Moments in Western Christianity 1 November 5th, 2014 Geoffrey Chaucer was a prominent figure within English Literature during the Middle Ages, and is regarded as one of the greatest English poets. Among Chaucer’s works, The Canterbury Tales is arguably one of his most famous pieces. In this fictional work, there is a collection of over 20 stories that areRead MoreAnalysis Of Geoffrey Chaucer s Canterbury Tales Essay1670 Words   |  7 Pagesthemselves. This first exploit of trust can be found within Geoffrey Chaucer’s Canterbury Tales. While the whole entire work exposes corruptions within the Catholic Church during Chaucer’s time, the breaking of trust is actually demonstrated within the Pardoner’s Prologue and Tale. At the end of the Pardoner’s tale, he offers the pilgrimage relics, for a fee of course. However, at the prologue of the Pardoner’s tale, the Pardoner himself has explained how the Catholic Church and other fellow pardonersRead MoreAnalysis Of John Chaucer s The Canterbury Tales 1594 Words   |  7 PagesToday’s Society and Canterbury Tales Money? Greed? A lot of people have some money at least. The everyday person doesn’t have all the money they want. Greed, by definition is an excessive or rapacious desire, especially for wealth or possession. At some point in time, there is always something someone is greedy for; it usually is money (let’s be honest, that’s the one thing people want the most.) People in today’s society always want more than what they have. Geoffrey Chaucer shows us this in TheRead MoreAnalysis Of Geoffrey Chaucer s The Canterbury Tales 1697 Words   |  7 Pages Geoffrey Chaucer Thinking of Geoffrey Chaucer one may only consider him as the author of The Canterbury Tales but like most authors they are not only their best works. Unfortunately for most late poets and authors their history isn’t much known, it is usually not documented in general. Yet fortunately for Chaucer he has worked for people who do get their history written about which makes his past a little more well known than other poets of his time. So of course with this there are biographiesRead MoreChaucer s Candide And Shakespeare s Macbeth1317 Words   |  6 Pagessociety in which the author lived such as Voltaire’s’ Candide and Shakespeare’s Macbeth. Geoffrey Chaucer, famous for his The Canterbury Tales, and considered instrumental in the creation of English literature, is not as well known for social commentary in his writing. However, The Canterbury Tales do indeed possess insight and analysis of society, namely the role of the authority figures in the Churc h. Chaucer was critical of the abuses and misuses he saw in the authority within the Church. He demonstratedRead More Contradictions in Chaucers The Canterbury Tales Essay3897 Words   |  16 PagesContradictions in Chaucers The Canterbury Tales There is no question that contradictory values make up a major component of The Canterbury Tales. Fate vs. Fortuna, knowledge vs. experience and love vs. hate all embody Chaucers famous work. These contrasting themes are an integral part of the complexity and sophistication of the book, as they provide for an ironic dichotomy to the creative plot development and undermine the superficial assumptions that might be made. The combination of completelyRead MoreKnights Of The Middle Ages1692 Words   |  7 Pagesorigin. Gradually, the knights blended into the nobility, acquiring the privileges and rights of the old aristocracy. The Knight is one of the pilgrims who is portrayed in a literal interpretation and not satirical. Chaucer depicts the Knight as â€Å"a most distinguished man† (Chaucer 4) who is a true hero. There are four main traits that the narrator articulates about the Knight; chivalry, truth, honor, and generosity. When the Knight was called to serve his kingdom, he performed his duty courageouslyRead More Canterbury Tales Morality Paper1070 Words   |  5 PagesEternal Bliss or Life Amiss?: Analysis of Theme in Chaucer’s The Canterbury Tales The Christian Church has been a driving force in politics and morals for hundreds of years. In the medieval time period in Europe, the Church was particularly strong, a majority of the European peoples and rulers were followers. The set of moral codes and virtues the Church sets forth dictates how each person should live. Provided that one follows these morals, the Church guarantees every follower a place

Thursday, May 14, 2020

New Orleans A Unique City With Its Own Unmistakable Culture

New Orleans is a unique city with its own unmistakable culture. It is unlike any other city in the United States with its vivid colors, mixed architecture, and festivals you can’t celebrate anywhere else. New Orleans was created from the port that made it attractive to other people to settle down in. Geographically, it could be considered a part of the Caribbean, since it is in such close proximity to the islands. In fact, it is closely connected to the Caribbean islands in so many different aspects such as living conditions, cultural norms, traditions, food, dance, music, and many other things. The European powers, specifically Britain, Spain and France, were huge contributors that helped shape these traditions, through settlement, colonialization, importing and exporting, as well as establishing government and structure. It connected Western Europe with the countries around the Gulf of Mexico, the Caribbean and even included culture from Africa. The three great super powers at the time, Britain, Spain and France all vied for colonization among the Americas. As a result, the coastline of the Americas all had British, Spanish and French influences and â€Å"had what amounted to three colonial eras in rapid succession: French, Spanish, Anglo-American† (4). With France being the first and longest influence, one might assume that the French cultures dominate the area. However, France was not as invested in establishing New Orleans as a habitable place that people might want toShow MoreRelatedManagement Course: Mba−10 General Management215330 Words   |  862 Pagespublication by the instructor of this course. The instructor is solely responsible for the editorial content of such materials. 111 MANGGEN ISBN: 0−390−58539−4 Management Contents Feigenbaum−Feigenbaum †¢ The Power of Management Capital 1. New Management for Business Growth in a Demanding Economy 1 1 Text Jones−George †¢ Contemporary Management, Fourth Edition I. Management 17 17 2. The Evolution of Management Thought Hughes−Ginnett−Curphy †¢ Leadership, Fifth Edition I. LeadershipRead MoreMarketing Mistakes and Successes175322 Words   |  702 PagesDESIGN DIRECTOR SENIOR DESIGNER SENIOR MEDIA EDITOR George Hoffman Lise Johnson Carissa Doshi Dorothy Sinclair Matt Winslow Amy Scholz Carly DeCandia Alana Filipovich Jeof Vita Arthur Medina Allison Morris This book was set in 10/12 New Caledonia by Aptara ®, Inc. and printed and bound by Courier/Westford. The cover was printed by Courier/Westford. This book is printed on acid-free paper. Copyright  © 2009, 2006, 2004, 2001, 1998, 1995, 1992, 1989, 1986, 1981, 1976 John Wiley Sons

Wednesday, May 6, 2020

The Leader Of The People By John Steinbeck - 953 Words

Isolated Generation In the short story â€Å"The Leader of the People† John Steinbeck writes about a young boy named Jody, who lives on an isolated ranch with his parents and a hired worker. Jody’s parents are stern with him and give him orders to take care of the ranch, but Jody wants to explore the world and live like a normal child. After Jody finds out his grandfather is visiting, he is happy and wants to hear about the adventurous stories his grandfather tells about the Great Plains. When Grandfather’s tales create a controversy, he tells Jody how the ocean is the end of discovery. In â€Å"The Leader of the People† Steinbeck uses the ranch, ocean, and Grandfather to symbolically develop the conflict between past and present. Steinbeck uses the ranch to symbolize isolation from the outside world. Since the ranch is secluded away from other human activity, the family rarely leaves the ridge top. Steinbeck gives characterization to the animals to demons trate how isolated the ranch is; for example, the cat walks in the direction of the road, but â€Å"gallop[s] back again† (1) and does not try to leave. When Jody’s father comes home, the dog â€Å"look[s] up the hill toward the cleft in the ridge† (2) and stares at the road. Like the animals, Jody feels isolated because his parents teach him only about responsibilities he has to uphold for the benefit of the ranch. Since Jody is taught to work hard, he does not get the chance to be around other children. Although Jody does not have a lot ofShow MoreRelated Character Analysis of The Moon is Down by John Steinbeck Essays974 Words   |  4 PagesAnalysis of The Moon is Down by John Steinbeck â€Å"Apart from Mayor Orden, the characters in â€Å"The Moon Is Down† remain two dimensional† John Steinbeck’s â€Å"The Moon Is Down† is a novel about human relationships, the relationships between a small town and its invaders, the relationships between town officials and the towns-people, and the relationships between the members of the invading army. Although it is a short novel Steinbeck has made a few strong and well-defined characters in theseRead More Character Development in John Steinbecks Cannery Row Essay750 Words   |  3 PagesCharacter Development in John Steinbecks Cannery Row Maybe its more important to be appreciated than to be wealthy. Cannery Row by John Steinbeck (1945) is one of the most unique of all of the Nobel Prize winning novels. Cannery Row is set in a very poor area of California known as Monterey. It is a small port town south of San Francisco. The time era is post Depression and World War II. The novel is about how lower class people with warm hearts have the ability to create their own heavenRead MoreUnmasking Capitalism in Steinbeck ´s The Grapes of Wrath997 Words   |  4 Pagesdollars, depriving the people who actually need the help and money. The greed that Sabaratnam had was partly caused by the profit seeking capitalist system. The desire for wealth in capitalist society leads to corruption and causes a divide between the rich and the poor, so perhaps a system that supports equality and fairness is a better choice. The Eastern-European expression,â€Å"Capitalism is man exploiting man; communism is just the opposite,† summarizes one of the main ideas in John Steinbeck’s The GrapesRead MoreOf Mice and Men Argumentative Essay1115 Words   |  5 PagesEssay Prompt: John Steinbeck’s novel, Of Mice and Men, has a controversial history. It has been repeatedly banned by school boards. Why might this book have been banned? Is such an action justified? In a five-paragraph essay, take a position for or against banning this novel. Use your three body paragraphs to develop each of three reasons for or against banning the novel. The Lost Portion of Human Society Right from the beginning of human civilization, books had become the vital flame that ignitedRead MoreWhat Do You Learn About Steinbeck‚Äà ´s View of Human Nature from Reading His Novel ‚Äà ²of Mice and Men‚Äà ´1242 Words   |  5 PagesThis essay is about how John Steinbeck represents human nature and the nice and unfavourable qualities people had during the American depression in the 1930s where the story ‘Of Mice and Men’ took place. The story shows the way different people will react diversely to various situations. In this case, living with the trouble of having to travel to faraway places to search for jobs. It shows how some people can behave overly difficult while others can be calm, friendly and easy to live with. The manyRead MoreThe Grapes Of Wrath By John Steinbeck1189 Words   |  5 Pagesafter being released John Steinbeck’s book â€Å"The Grapes of Wrath† was banned because many critics viewed the novel as promoting communist propaganda, or socialist ideas. The ideas that many of these critics point to is Steinbeck’s depiction of the Big Banks/ Businesses as monsters, the comparison of Government camps to a utopia in contrast of the makeshift â€Å"Hoovervilles,† and the theme of the community before the individual, In his novel â€Å"The Grapes of Wrath† John Steinbeck uses the struggle of migrantsRead MoreJohn Steinbeck s The Great Depression1405 Words   |  6 PagesThe historical masterpiece written by John Steinbeck portrays a story about a humble family who are forced to find jobs during the time of the Great depression. The characters are hopeful, as they pray for a pray for a brighter future. Steinbeck tries to demonstrate the strength of unity, and that working together will triumph anything that is done individually. Rather than sticking to their own beliefs, the characters are modeled by their environment. They have no choice but to seek help to beRe ad MoreLennie and George in John Steinbecks Of Mice and Men Essay1010 Words   |  5 Pages John Steinbeck wrote the play Of Mice and Men in 1937 (Steinbeck). It is a play about two ranch workers who do not have the best of luck. The two workers were named George and Lennie. George was a more small bodied man. His partner Lennie was a giant among average sized people. They are on the road going place to place working numerous jobs. Lennie has a learning disability. The two work hand and hand. George is there to keep Lennie out of trouble. Lennie in a way helps keep George together. SometimesRead MoreEnglish Essay- Explore the Ways in Which John Steinbeck Presents Power in the Fight Scene.884 Words   |  4 Pagesways in which John Steinbeck presents power in the fight scene. The 1930’s was hard time for most people who lost their money in the Wall Street crash. John Steinbeck tries to portray how tough life was back then in his novel mice and men. Mice and men also portray how power was abused and the way that it was used in the 1930’s. In the fight scene power is portrayed in many different ways physical power, financial power, collective power, emotional blackmail, status power and people who are disempoweredRead MoreThe Grapes Of Wrath By John Steinbeck1563 Words   |  7 Pages John Steinbeck’s novel, The Grapes of Wrath, depicts a migrant farming family in the 1930s. During this time, life revolved around the Great Depression and the Dust Bowl, making circumstances difficult for almost everyone involved, especially those who had little. This time of drought and despair caused people to lose hope in everything they’ve ever known, even themselves, but those who did not, put their hope in the â€Å"promised land† of California. Here, the grass was thought to be truly greener

Tuesday, May 5, 2020

Software Defined Network Organize and Maintain Services

Question: Discuss about theSoftware Defined Network for Organize and Maintain Services. Answer: Introduction Software defined network abbreviated as SDN is computer networking approach which allow administrators of network to monitor, organize and maintain services offered by the network infrastructure [1]. It centralizes the computing components which help control the properties of the network. Convectional network are different from Software defined Network in that the physical routers and switches are not separated as the case with SDN. This is important as allows network administrators to write level control programs to specify the attributes of the whole network. This is done through network abstraction whereby administrators remove additional properties from the network leaving just the essential ones [2]. Literarure Review This paper will review some done by fellow researchers on Software Defined Networking so as to get deep understanding of what has been done, what has not been done and what needs to be done [3]. New approaches and thorough analysis will be done so as to reveal the success and shortcomings of software defined networking An American author named Diego together with his colleagues Fernando and Ramos proposes a software defines environment to assist the software defined networking[4]. They argue that software defined network is the basis of advanced networking that is taking world by storm and will eventually the industry for good. They note a number of ways that SDN differs from the existing or traditional networks. Software defined networks is considered the interface between the control plane and data plane where it receives high speed network traffic from data plane and defines how it will be passed to control plane [2] Software defined network is the link between data plane and control plane where administrator can administer abstractions for network devices where they can hide the details of the network[1] The centralized logic center is centralized by Software defined network to give it a universal view of network resources and specification needed to build and optimize the global policy effectiveness [5]. Figure 1: SDN functionality planes Software defined network has slowly by slowly improved the state of network innovation by increasing network scalability, flexibility of performance[6]. Ease of network management is critical as it helps cut maintenance costs, however most network administrators argue that it is likely to be high at initial stage of set up but in the long run it goes down. Of most notable figure in software defined networking is IBM SDN environment which possess the main characteristics of SDN. These features in IBM SDN environment include reduced maintenance costs, scalability, improved and manageable performance and assured security[7]. However these authors fail to address how SDN use network resources better and efficiently. Moreover they have noticed the gap and explain that in the near future this will be addressed by use of tight tracking control loops that are able to do adaptive and clever network engineering together with cementing of network traffic as well as offer services of higher quality. IBM software define network virtualized environment has the ability for all rapid instantiation of virtualized networks and inter operate the products with Open stack neutron plugin which give API for virtual networking Neuron open stack plugin is made of network applications like middle box and Virtual machine placement which improves consciousness of the network. This is a promising feature of SDN-VE which is seen that after a few years it will be a platform for IBM to solve future problems. Though SDN-VE is a promising platform it comes with a number of challenges. Fernando and his fellow authors questions how will make the abstract network models design and implementation easy to understand and easily express policy. Another challenge they face is to build frameworks that give SDN controllers ability not be extended without conflicts to third party and lastly but not the least if how to offer self-management and self-turning of networks through intelligent use of resources Two other authors Michael and Wolfgang in their publication [8]propose SDN using applications, open flow protocols as well as architectural design choices. SDN southbound is implemented by an Open flow protocol. Open flow distinguish data plane from control plane by offering configurable forwarding plane hence considered pre dominant. Open flow architecture is composed of three main concepts namely open flow switches for Data plane, open flow controllers within data plane and secure control channel to offer links for control plane switches Figure 1: A 3 layered architecture showing open flow switches for control plane and open flow controllers for data plane All Open flow compliant switches are basic forwarding devices whose main function is to send packets to flow table which has a set of entries that match fields, counters and instructions. The fields are referred to as flow rules which in turn have flow entries. Figure 2: open switch flow table Open flow compliant switch is a basic forwarding device that its primarily function is to send packets according to flow table. Flow table has a set of entries that match fields, counters and instructions as shown below. These fields are called flow rules and flow entries. The header fields in figure 2 above comprise of wildcard the match a specified fields of packets Security Issues in SDN Three main features of SDN are inherent control, programmatic properties and predetermined network implementation [9]. To operate, maintain and secure a communication network is considered a challenge as the network administrators have to accept to deal with low level vendor preset configurations so that high policies of the network can be implemented. Despite efforts to make SDN networks easier to manage attacks to SDN layers has remained a threat to solve. The rigid nature of the underlying infrastructure is difficult to change, however it offers a platform for innovation and improvement. The infrastructure is vertically, closed and proprietary integrated [10]. Figure 4: SDN architecture showing the attack targetable layers This is the most common architectures with even the new technologies. It is expected that as technology matures more it will become an interest for attack to channel their efforts [6]. Most common security issues usually occur at the layers outlined above. This infrastructure delivers some weakness which can be easily be exploited by malicious users by launching attacks on each of the open flow protocol. The SDN attacks vectors that can be exploited by malicious peoples have been discussed below. Attack Vectors From figure 4 above we can clearly see three layers which offer platform for possible attacks. The layers include SDN data plane layer which has capable network devices, SDN controllers which the middle layer and applications and services layer which offer configurations to SDN SDN Layer Attacker This is security threat posed to northbound protocol. The north bound API for SDN layer are JSON, REST, XML, python, java, C, C++ and ruby. The northbound interface is the upper part of controller that is responsible for defining operation tasks and network policies as well as enforcing them into controller in an understandable form. Figure 5: northbound interface There has been little effort to determine, explain and implement northbound protocols as opposed to southbound protocols which could have opened flood gates to defining and implementation to reactive policies. As result the northbound is left exposed and is seen a weak point for attackers to use [10]. North bound API allows the network managers to configure parameters of network runtime for instance network admin may add and modify a list of end host using network control system so as to define who can access the network and block the rest from accessing. These APIs are revealed by HTTP server using the REST practices to allow access to network admin parameters using programming. This allows implementation of graphical user interface, command line interfaces and admin scripts which are good targets of attackers. The attackers focus on the NORTH BOUND API and try to compromise it to gain control of the network through the controller. In cases where the controller does not secure north bound API the attackers are able to create their own SDN policy which gives them absolute control of software defined environment. In case it uses default password them the attacker can create packets to the interface of the controller to allow querying and modification of SDN environment [11] Attacks on Data Plane Layer Malicious user of SDN may harness the malicious use to attacking of data plane layer so as to penetrate the network. If successful they gain access to virtual and physical components that allow modification of the host configuration which acts as their platform form attacks. This platform now allows them to maliciously attack the network infrastructure and compromise the good functionality of the entire network. They can launch attacks such as fuzzing attacks as well as denial of service (DOS)[12]. Southbound APIs are used to communicate with computing components of the network but they do not have secure implementation and no thorough research has been done on them as they have just entered the market. SDN systems use protocols with no encryption or authentication which expose the packets to attackers. The protocols are designed such that they are easily compromised by the attackers[10]. An attacker trys to leverage the South bound API protocols to start flows into flow table of the component. Then the attacker now can spoof the new flows and allows various network traffic flows across the network which have been already blocked by the network administrators. This is possible by creating a bypass traffic steering that focus the network to their direction and avoid the network firewalls. This results to man in the middles attacks and network sniffing. Also the attacker may now the flows and allowed traffic through the network as a result of eaves dropping at the south bound communication of controller and network component. Attacks to Control Layer Control layer attacks are central to spoofing of north bound and south bound API messages which allow attacks instantiate new flows in flow tables. This gives the attacker ability to control traffic through the SDN which allow bypassing of the implemented security protocols The attackers sometimes try to make the controller malfunction through denial of service attacks which is as result of consuming network resources and jamming the network to deny the controller access to the network. As a result the controller becomes slow to receive and sent packets. General purpose operating systems have their own problems which acts as a weak point for hackers. Their controllers are usually deployed using default passwords which dont allow configuration of security settings as the system engineers fear interfering with the system. This results to weak configurations [9]. The attackers sometimes try to create their own virtual controller to tap network elements by making them believe that the flows moving from their controllers are genuine. This give them a chance to instantiate flows to flow table in network elements. As a result the engineers are denied visibility to flows hence its hard for them to trace the source of problem. Resolving Security Issues of SDN Adding security to software defined networking is crucial without consideration of the architecture model used or the communication protocol used. The concept of everything which allow all devices that have an IP address connect to network can be a threat to the network however each network element can be secured. SDN has address these options by integrating security services into this systems [13]. The systems may include threat defense, content inspection and many others In this paper we discuss securing of data plane layer as a measure to control attacks to data plane layer Securing Data Plane Layer Most SDN system run on general purpose x32 bit system and use transport layer security to protect the control plane, however long life sessions make data plane vulnerable to attacks. The control plane need to be separated from major data flows via network security controls or using an out of band network [14]. Transport Layer Security (TLS) authenticates controllers and encrypt end points to protect from eavesdropping and spoofing of communications[6]. Some security protocols used by TLS sessions use either shared secret passwords or nonce or both to protect against replay attacks. The tunnel endpoints and tunnel traffic may be authenticated a certain type of data center interconnect or still use passwords or shared secrets. Some business enterprises have faith in some networks and believe they are inherently secure. Biblography [1] N. McKeown, "Software-defined Networking," infocom, california, 2011.[2] J. ONISICK, "Network Abstraction and Virtualization: Where to Start?," Define The Cloud, 19 June 2013. [3] N. B. C. L. R. 1.-R. John Glover, "Write a Literature Review," VCU Libraries, p. 1, 20 september 2016. [4] D. K. V. Fernando M. V. Ramos, Towards Secure and Dependable Software-Defined Networks, University of Lisbon, Portugal: LaSIGE/FCUL, 2012. [5] Kanika, "Difference Between Control Plane Data Plane," SDN tutorials, p. 1, 21 june 2016. [6] S. Hogg, "SDN Security Attack Vectors and SDN Hardening," Network World from IDG, 2014. [7] m. r. t, "OpenStack Neutron (formerly called Quantum)," tech target, london, 2016.[8] M. M. a. Braun Wolfgang, "Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices," future internet, pp. 320-329, 2014. [9] A. R. Voellmy, "Programmable and Scalable Software-Defined Networking Controllers," 2014.[10] H. K. a. N. Feamster, "Softw are Denied Networks," Georgia, 2013.[11] A. R. Voellmy, "Programmable and Scalable Software-Defined Networking Controllers," 2014.[12] Y. Y. Y. YuHunag MinChi, " A Novel Design for Future On-Demand Service and Security.," in In Proceedings of the International Conference on Communication Technology (ICCT), Nanjing, 2011. [13] Open Networking Foundation, "Principles and Practices for Securing Software-Defined Networks," ONF TR-511, january 2015. [14] R. Millman, "How to secure the SDN infrastructure," in TechTarget, 2015. [15] D. O. J. C. D. W. F. J. C. M. B. V. M. J. M. T. R. R. C. Dixon, "software defined networking to support the software defined environment," International Business Machines Corporation, 2014. [16] C. C. P. B. S. N. Todd Aven, "Principles and Practices for securing Network Defined Networking," Open Networking Foundation, 2015. [17] J. W. D. L. J. L. A. V. V. M. I. Zhaogang Shu, "Security in Software-Defined Networking: Threats and Countermeasures," Springer Link, 2016. [10] Gladisch and W. Kellerer, "Software defined networking and network function virtualization", it - Information Technology, vol. 57, no. 5, 2015.[11] Gladisch and W. Kellerer, "Software defined networking and network function virtualization", it - Information Technology, vol. 57, no. 5, 2015. [12] Kirkpatrick, "Software-defined networking", Communications of the ACM, vol. 56, no. 9, p. 16, 2013.