Sunday, February 23, 2020

The Social Impact of Economic Crises Research Proposal

The Social Impact of Economic Crises - Research Proposal Example Most of the economic problems were attributed to World War I. In the aftermath, economies were trying to recover from the losses while nations in Europe strived to repay the debts acquired in the war. The United States was affected by the depression to a large extent and it ended just before the beginning of Second World War which again led to enormous spending to finance the war. Its impact affected the social lives of people even long after it ended. In a bid to conquer the impact of the great depression, President Roosevelt of the United States established a peace time strategy which had wide transformation within the free trade structure thereby encouraging the formation of the welfare states. The government would intervene in to socio-economic activities with the aim of assisting the citizens at a wider perspective. After the great depression, the government and the citizens learned to appreciate the role of the government in ensuring the welfare of the people as well in economi c development. The programs created by President Roosevelt culminated in political alliances. These alliances were important in the eventual formation of the Democratic Party. The depression played a significant role in shaping the lives of many Americans. None of them would like a repeat of the suffering that they underwent within that period. They could now see the need to save money for future use. This ended up improving their asset ownership in order to secure property that could assist them in such difficult times.

Friday, February 7, 2020

Cybersecurity Incident Research Paper Example | Topics and Well Written Essays - 1500 words

Cybersecurity Incident - Research Paper Example Therefore, ensuring that all the stored data is secure and not accessible to everyone has become a prerequisite to almost everyone using the cyber systems to protect their data. The kinds of security incidents range from being minor invasion of a small virus into the computer networks to the major threat on the secrecy of the data available on the networks because of a much powerful and destructive virus attacking the softwares. In all these cases, strict check and reporting of the cyber incidents are mandatory (Shaw, 2006, p 461). One of such cyber security threats that have come up in the recent years includes the Stuxnet Virus. The Stuxnet Virus (Natarajan et al, 2011) was detected in the mid of 2010, this was a Windows computer worm that attacked industrial softwares and equipments. Computer worm is a computer program that produces various copies of itself, and through the help of the targeted computer network, it attacks other computers too in the same network (Natarajan et al, 2011). Computer worms can attack a number of computer softwares in the same network without any sort of user intermediation due to poor security systems of the targeted computers (Gingrich, 2011, pp 333). ... Moreover, Stuxnet was also the first computer breach to have a programmable logic controller (PLC) software root kit (Shaw, 2006) functioning with itself. The Stuxnet worm at first randomly attacks any software but then its specially designed pestware payload aids in aiming at only Siemens and Supervisory Control and Data Acquisition (SCADA) softwares (Shaw, 2006). ‘Supervisory Control and Data Acquisition (SCADA)’ (Shaw, 2006) makes reference to industrial control systems that are computer systems, which look after plus regulate crucial industrial, infrastructural, or facility-based actions. Stuxnet corrupts programmable logic controller softwares by destroying the Step-7 software application (Shaw, 2006) operated to make schemes of the devices in operation. This hinders the softwares from working properly and affects the aimed softwares greatly. In contrast to most of the malware softwares, Stuxnet (Shaw, 2006) does not do much damage to the computers and networks that do not need the downright requirements of the targeted softwares that are set. Instead, it is technically designed software only attacks the networks and computers that stand up to the requirements configured into them. Although the Stuxnet worm attacks and destroys computers and networks without fail, it automatically makes itself inactive if the Siemens softwares are not detected on the invaded computers, this makes the attacking of the softwares very precise and only the sought after networks and computers and affected. Stuxnet worms (Shaw, 2006) can be apocalyptical for the infected computers; Stuxnet embodies self-protection shields within itself that curbs the attacked computers from transmitting the virus to more than three computers, moreover, it also weakens the security systems in