Wednesday, November 27, 2019

USF Corporate Essay Example

USF Corporate Essay USF Corporate Travel, like any other modern business today, needs to have an online presence. Networks have become a global tool that is used as platforms for any organization to remain competitive. Installing a Wireless Local Area Network (WLAN) is one of the recommended methods of implementing a network through which all computers within an organization can be connected to achieve a smooth flow of information and execution of business processes. USF would like to increase their corporate image by allowing potential and existing customers to use their laptops while they are in their premises. Even though different models of the WLAN exist, they have a common vulnerability which is security.   These vulnerabilities or threats to security can be curbed or reduced to an acceptable level that will cause minimal loss for USF Corporate Travel.To thoroughly understand the security implications of the implementation of WLAN, it is important to take a look at the concept, technology and ar chitecture of Wireless LAN Technology. This insight is necessary so that USF Corporate Travel can make an informed decision as to the most appropriate way of deploying the Wireless Local Area Network.The Concept of WLANA Wireless Local Area Network is a type of network that does not rely on wired connections to be functional. It may be implemented as an extension of or as an alternative to a wired LAN. Data is received and transmitted over the air (Proxim, 1998).The speed of a WLAN ranges from 1 to 54Mbps though some manufacturers offer up to 108Mbps solutions. A WLAN signal can cover areas ranging from small offices to large campus and areas. Several standards of WLAN hardware can be found, for example, 802.11a, b and g standards are the most common for home access points and large businesses. There are different types of technology utilized in implementing wireless technology and one of them is the Narrowbandechnology, which involves spreading and receiving information on a specif ic radio frequency. The second is the Spread Spectrum Technology which is implemented via Frequency-hopping spread-spectrum and the direct sequence spread-spectrum. Also, there’s the Infrared Technology which is also very popular (Proxim, 1998).Wireless LANs use electromagnetic waves to communicate information without the need of any physical connections. Access points are used to transmit and receive information and are thus called transceivers; one single access point can support many users. LAN configurations can employ peer-to-peer topologies and complex networks offering data connectivity and roaming facilities. IEEE 802.11b/WiFi standard encryption for wireless networking has been replaced by the more secure IEEE 802.1x standard, which comprises three different sections: Extensible Authentication Protocol (EAP), Point-to-Point Protocol (PPP), and 802.1x (Proxim, 1998).Benefits of WLANIt is more flexible than wired Ethernet connections. Users and Staff of the company can move around the office space and still remain connected to the network. The installation procedure of a WLAN is easier and more cost-effective because it eliminates the need to run cables around the building; it also eliminates the cost of labour required in installing cables all over the building. Even though the cost of setting it up may outweigh that of a wired connection, over time, it proves to be more cost-effective due to the innovative technologies that are continually introduced into the market (Proxim, 1998). Another major benefit of a WLAN is that the configurations to the wireless networks can be easily changed and modified to fit the organization’s mobility requirements. Other major benefits include the ease of deployment, flexible installation options and scalability. WLAN security may be compromised by the effects of Denial-of-Service attacks, spoofing and eavesdropping (Proxim, 1998).Vulnerabilities of Wireless NetworksThere are inherent security flaws in Wir eless Local Area Networks. IEEE 802.11 is a standard model of WLAN and this is used as reference in the discussions contained in this document. There are numerous reasons while wireless systems are seen as insecure and not secure suitable enough even though it provides excellent network connections. Most of the data sent via wireless networks are protected by encryption at the low level but there are still some vulnerabilities at higher levels (Komu Nordstrom, 1999).One of the major vulnerabilities of Wireless LAN is that an intruder can easily block an entire radio channel used for communication by transmitting junk over that channel. This is a form of Denial of Service (DOS) attack that can prevent legitimate users from gaining access to network systems. WLANs can also be exploited by stealing the laptop of a legitimate user and gaining unauthorized access to the network (Komu Nordstrom, 1999).The authentication procedures used for logging onto the network are quite unreliable and this may subsequently lead to the compromise of security settings, information and possibly, loss of millions of dollars. With Wireless networks, only the data that is transmitted is encrypted.   Data headers are not encrypted and as such, it becomes possible for anyone to decipher the source and destination of the data being transmitted.With WLANs, data is sent through air and this leaves it open for intruders to intercept whatever information is being sent. Data is vulnerable to being sniffed by anyone who already has access to the network Another major problem with wireless networks is that the management of the keys that facilitate access to networks is done by an operator (Komu Nordstrom, 1999).Accessibility is another major feature of WLANs that make them easy to attack. Wireless LANs are very easy to access because they need to announce their existence so that existing and potential clients can connect directly to them. This is possible through a special feature known as b eacons. These beacons have no privacy functions. The only security methods that can be implemented at this level are encryption and strong accesses control (Johnson, 2002).Rogue access points can be created by any malicious attacker. Access points can be purchased from a store, and used to connect to corporate networks without a hitch. These pose security threats to the entire network (Johnson, 2002).How can we improve the Security of Wireless LANs?Adopting a layered approach is one of the most recommended methods for securing the Wireless Network. This includes locking down communication between devices, and monitoring neighbouring air spaces to ensure a safe implementation of the WLAN. Sensitive traffic may also be monitored through the use of Virtual Private Networks and Intrusion Detection Systems (IDS). An effective IDS should be stationed at all access points to monitor 802.11a/b/g protocols and analyze them for signals of attack or irregularities (Khatod, 2004).There are othe r ways of improving the security of Wireless LAN systems. By following the approaches outlined below, information assets of organizations can be kept reasonably safe. Unauthorized access points, user stations, laptops and printers constitute significant threats to network security. The default configuration of these systems offer little security to the entire network and can easily be misconfigured. Intruders may also use any of these insecure stations as an entry point to attack the network (Khatod, 2004).Neighbouring Wireless LANS located within the same area also present certain security risks because they may attempt to access an organization’s network and thereby interfere with the existing wireless channels. There are however, certain software that can help to identity unauthorized access points and network vulnerabilities. For example, NetStumbler and Kismet. These are however limited and involve the system administrator walking across the area and scanning for threats in the air. The recommended way to detect rogue stations and connections is by continuous monitoring. A continuous network monitoring strategy should be adopted through the use of wireless intrusion-detection sensors (Khatod, 2004).All access points should have security and management features. MAC (Media Access Control) address filtering is another method of securing the wireless network and preventing it from abuse. MAC address filtering is used to determine and filter which computers can connect to the network. Larger enterprises that have a huge number of computer systems may however, not be able to use MAC address filtering effectively and may employ the use of Remote authentication dial-in service (RADIUS) servers.Also, to prevent pople from connecting to the Wireless LAN without the organization’s knowledge, access points should be configured not to allow slow connections which are typical from stations close to the area where the WLAN is deployed. Encryption and auth entication are the main methods of security used by Wireless LANS these days. Unfortunately, they are not fool-proof.   In 2001, Hackers where able to show how the Wired Equivalent Privacy (WEP), a standard method used for the encryption of 802.11 WLANs could be cracked. Many organizations after seeing this illustration became wary of deploying WEP and this made their networks more exposed (Khatod, 2004). To combat intrusion, it is important to set and enforce WLAN policies. This will help to prevent security breaches and attacks. Examples of policies that may be implemented limiting WLAN traffic to selected channels, speeds, and durations (Khatod, 2004).Major Access points running default configurations need to activate this WEP facility so that unauthorized access can be prevented. Unauthorized access can cause bandwidth charges and legal and security problems. 802.1x is a modified version of wireless connectivity that is more secure and allows the selection of an authentication mode based on Transport Layer Security (TLS) to ensure users attach only to authorized access points (Johnson, 2002).ReferencesJohnson, B. C. (2002). Wireless 802.11 LAN Security: Understanding the Key Issues. SystemExperts Corporation.Khatod, A. (2004, November 4). FIve Steps to WLAN Security. Retrieved December 11, 2008, from Computer World: http://www.computerworld.com/mobiletopics/mobile/story/0,10801,97178,00.htmlNordstrom, M. K. (1999). Known Vulnerabilities in Wireless LAN Security. Retrieved December 10, 2008, from http://www.niksula.hut.fi/~mkomu/docs/wirelesslansec.htmlProxim. (1998). What is a Wireless LAN? Proxim.

Sunday, November 24, 2019

Aesthetic Domain Essays

Aesthetic Domain Essays Aesthetic Domain Paper Aesthetic Domain Paper The domain that interests me the most is the aesthetic domain. The aesthetic domain is the appreciation of the arts and enjoyment of sensory experiences. I believe art is an important part to learning and expands the imagination and creation of a child. Art allows children to express feelings, thoughts and creativity. Although every domain is imperative to a child’s education, I believe the aesthetic domain ranks as one of the most important domains. When the aesthetic domain is compared to the other five domains, it is not considered â€Å"essential† to education, but â€Å"beneficial†. Fine arts are often phased out of curriculum because of the lack of time, no money and little learning potential. I believe it is very important to incorporate all areas of fine arts in the classroom, such as, theatre, visual, dance and music. Children who have developed the appreciation of arts will notice beauty in cultural artifacts and communications and in the natural environment, look at and respond to works of visual art, look at and respond to works of visual art, and listen and respond to different kinds of music. There are several activities that can be incorporated in the classroom to teach the appreciation of the arts, for example, class demonstrations, picture books and story time, class discussions, show and tell, field trips and videos. The aesthetic domain consists of different stages which each child will experience at each age. The first stage is the stage of creative representation. Children between the ages of 2 and 4 use scribbling as their creative representation, which is a disordered and controlled. From the ages 4 and 7, representational preschematics by symbols are used. Children between the ages of 7 and 9, use a schematic approach, which is highly, individualized, visual symbols. The main focus when incorporating aesthetics into curriculum is to promote creativity. A few strategies teachers may use to promote creativity are to direct hands-on time with materials, demonstrate new techniques, show and discuss pictures of real objects, encourage imagining, use nonverbal reinforcement, connect creative experiences to a concept, promote motivational dialogue, give visual examples of quality art and beautiful craftsmanship and come up with a  role-play idea. Another important aspect of teaching the aesthetic domain in curriculum is for teachers to have quality strategies. If a teacher is not using appropriate strategies, when incorporating aesthetics in the classroom, it may portray a lot of misconstrued information and confusion to the children. A teacher must model aesthetic awareness and enthusiasm and prepare an aesthetics-friendly classroom environment. A teacher must also select appropriate music supporting materials and organize an art center or â€Å"creation station† with appropriate materials for arts and crafts that have already been explored by the teacher before asking the children to use them. Providing a variety of creative movement props and props for dramatics is also an important strategy. More strategies include teaching children to respect and care for materials, motivating creativity through a variety of strategies and valuing all aspects of the creative expression process. A teacher should avoid making a product when demonstrating a technique to the class and begin each movement experience with a similar routine warm-up and end with a similar cool down. Most importantly, a teacher should accept children’s own ideas for creative movement, use questions to describe, analyze and evaluate art, avoid reinforcing only a realistic approach and to involve all of the children in the arts. There are several projects and activities a teacher can incorporate in the curriculum to encourage the children to express the aesthetic domain. Teachers can use songs to teach literacy or having the children create songs about a topic. Children may also be encouraged to use musical instruments. Teac hers may also use poems, puppets and fingerplays, as well as listening to taped stories or guest speakers. Children can have their own book making experience or create paintings or other arts and crafts as well. The aesthetic domain is detrimental to the education of our young people and can bring out many different educational skills of a child once they are allowed to freely express and explore themselves. Resources songsforteaching.com/teachertips.htm

Thursday, November 21, 2019

Workflow Essay Example | Topics and Well Written Essays - 500 words

Workflow - Essay Example When an object absorbs visible red light wavelengths (within wavelength of about 700nm) it is observed be hue. This is explained by the fact that not when red light wavelength strikes the object, not all the light rays are absorbed, but some are reflected by the surface. This reduces the brain perception of the red light as refection is accompanied by wavelength transformation. Light is described by its wavelength (a physiological property) which is the distance between two consecutive crests. However, not all the wavelengths are visible to our eyes. Human eyes are sensitive to a limited electromagnetic spectrum range with falls between 400 to 700 nm (nanometers) which accounts for only a mere slice within the massive electromagnetic spectrum range. Although the range of light spectrum visible to human eye are limited within 400-700nm, we use the invisible waves which are beyond our vision in a number of ways ranging from x-rays (of short-wavelength) to radio and television broad-wavelengths. Human eyes are made of light sensors which are very sensitive to visible electromagnetic spectrums. When the visible light wave strikes the light sensors in the eyes, the sensor communicate the signal to the brain, which perceives the received signals as being instinct color. The type of the color perceived by the brain depends on the constituents and composition of t he wavelengths of the visible light spectrum (Billmeyer and Max Saltzman 12). For instance, when all the visible wavelengths are detected once by the sensor, white light are perceived by the brain or a black color would be perceived when the brain detects no wavelengths. The normal ability of an individual to visualize color or light wavelengths is defined as trichromacy. Tungsten is an example of Illuminant-A falling in the class of incandescent lighting with a temperature of 2856Â ° K.