Thursday, October 31, 2019

Court Report Personal Statement Example | Topics and Well Written Essays - 1000 words

Court Report - Personal Statement Example Excessive formality involving security checks etc makes the proceedings look serious, but this is a necessary security precaution. The silence is important too as everybody needs to hear all proceedings clearly. Modern techniques of using multimedia display screens and air conditioning makes the proceedings easier for the judge(s), jury and others. Waites observes that flat-panel monitors are more conducive to the courtroom environment. They allow the judge and attorneys to review information together before displaying it to the jury (Waites, 384). Such systems have the option of delaying display on the large screen through 'delay switches'. This allows the judge to review information before presenting it to the jury. Moreover enhanced video and sound playback devices such as the ELMO, as acknowledged in the Litigant's report, improves the quality of information processing inside the courtroom (Webb). The courtroom looked well secured. All entrants are thoroughly examined through security devices such as metal detectors. The judge's bench is elevated about three steps above the floor, so that his/ her vision covers the whole courtroom, and he/she is equipped with security alarm as well. The hallways and the courtroom comes under surveillance of security cameras, moreover a docket box may be used to control for large number of arrestees, who wait there with the defendants before appearing in front of the judge in the courtroom. On a whole the courtroom looked well secured from any miscreant activity. Court Personnel Barristers: Barristers are specialist legal advisers found in many common law jurisdictions that employ a split profession in legal representation. They are court room advocates trained to advise clients on the strengths and weaknesses of their case. Barristers become involved in a case when advocacy before the court is required by the client. It is the solicitor who is in a direct relation with the client. As put in the UK bar council website a barrister could be compared to a specialist in medicine, who is consulted by a client's personal doctor when the case is complex and beyond the personal doctor's knowledge. Here the personal doctor or a general practitioner is taken to be the solicitor (What Barristers Do). The comparison is not entirely accurate though. There is no difference in the level of complexity in the practice of law by the different branches of the profession, though barristers tend to be instructed in complex litigation and in certain other specialist fields. Stenographer: He or she is an individual who records court proceedings either in shorthand or through the use of a paper-punching device. A court stenographer is an officer of the court whose appointment is largely governed by statute. She is an official under the control of the court and is, therefore, generally subject to its direction. The stenographer has the duty to attend court throughout the trial and record all proceedings. She must take notes of what occurs before the court and these notes must certify that all the evidence, and charges levied against the defendant were fully and accurately taken at the trial and that the transcript represents an accurate translation of the notes. In addition to preparing and protecting the legal record, the Bureau of Labor Statistics website informs that many stenos

Tuesday, October 29, 2019

CAPE Industrial Services - case study Essay Example for Free

CAPE Industrial Services case study Essay 1.0 Introduction In response to the increased importance of services, numerous articles on issues related to the effective management of service operations have appeared in both academic and practitioner based publications (Chase and Hayes, 1991; Karmarker and Pitbladdo, 1995; Kellogg and Nie, 1995; Lovelock, 1992; Roth and Van Der Velde, 1991). Several of these articles present typologies of services and provide directions for improving quality, productivity and operating efficiency, however relatively little has been done to test the proposed ideas. In order to understand more of these various service management typologies, an actual business organisation that focuses on providing services will be observed and analysed. In the discussion, the design and strategies of the selected company in the Oil Industry service sector will be taken into account. Recommendations for improvement will also be provided at the end of the discussion. 2.0 Model of the Service The variety of the service sector makes it complicated to come up with useful generalisations concerning the management of service organisations. Therefore, a considerable amount of research has been focused on developing service classification schemes. For example, Judd (1964) classified services according to three categories: rented goods, owned goods and non-goods services. Similarly, Rathmell (1974) categorised services according to type of buyer, buyer motives, buying practices, type of seller, and degree of regulation. Even though these classifications show how some services are different from the others, they do not provide much useful insight into the design and management of service processes from an operational perspective. More recent classification schemes have explored the complex nature of service delivery systems with the goal of identifying differentiating characteristics, which affect quality and process improvement, as well as service design. For example, Shostack ( 1977) and Sasser, Olsen and Wyckoff (1978) developed the concept of product-service-package based on the tangible versus intangible nature of services. More recent researchers however believe in an integrated approach to service management. For example, Thomas (1978) argues that a large part of manufacturing experience is irrelevant to the management of service operations because the supply services are very different from that of manufacturing. Sullivan (1981) and Bowen and Cummings (1990) also advocate an integrated approach to service management and suggest that operations management researchers must include organisational behaviour and marketing constructs and techniques to address service operations problems adequately. The means of classifying service models are indeed varied. For this particular analysis though, the model proposed by Schmenner (1986), also known as the Service Process Matrix (SPM), will be used. The SPM expands the customer-contact model and categorises services on two dimensions. One is labour intensity, and the other is customer contact and service customisation. Schmenner (1986) proposed a two-by-two service process matrix that classifies services as service factory, service shop, mass service, and professional service. Under these models, CAPE Industrial Services can be classified under the Professional Service category. Professional service is described as the provision of services with high customer contact and or customisation and high labour intensity. Labour intensity on the other hand is defined as the ratio of the labour cost incurred to the value of the plant and equipment. A high labour intensity business involves relatively small plant and equipment investment relative to a considerable amount of worker time, effort, and cost. The second dimension in the classification scheme combines two distinct concepts: customer interaction and customisation. A service with a high level of interaction is one in which the customer can actively intervene in the service process. A service with high customisation will work to satisfy an individuals particular preferences. The joint measure has a high value when a service exhibits both a high level of interaction and a high level of customisation for the customers. In the selected business, CAPES Operations management has a high contact with customers who need to be kept informed of the service range being delivered to them. Thus, high customisation or high selection on the services occurring in this type of Industry. Also, CAPE employ a high labour intensity as the Oil Industry service sector is located globally, in short the service range offered by CAPE is readily accessible, incurring fewer costs for equipment and labour. 3.0 Service Design and Delivery The contracts that are held by CAPE require daily customer contact on a personal level, having designated Business Delivery Managers for these contracts assist the customers with what they need for their services. So as to maintain the efficiency and speed of service, there are also designated project managers. These managers have constant contact with the offshore or onshore facility, this is handled in such a way that both the customer and the CAPE Business Delivery Manager are aware of all the daily operations that are on going. The services rendered by CAPE Industrial Services are a vast range of Multi-Disciplined Fabric Maintenance and Access techniques to Oil and Gas Sector. Charges built into the contract rates cover the costs of the additional project management. At times, services are requested that are not of the norm for CAPE, to service these Third party companies are brought in under the CAPE banner. While the cost of these services may vary much from the standard contract rates, excellent service is a must. Thus, extra costs are incurred for additional time and effort put into the contract by the CAPE managers. So as to make the services offered by CAPE more affordable and viable for their customers; the company tends to work on providing innovative ideas that will improve work ethics. Typical innovative ideas are the Introduction of Industrial Rope Access; this is a benefit to the customer as it cuts out the need for Scaffold or other means of conventional access solutions. Like other service companies, one of the common strategies of CAPE is to offer a volume discount or a reduced rate if the period of the contract can be extended. 4.0 Service Strategy Service companies in the Oil and Gas Industry have numerous strategies on how their rendered services can be better than competitors. Aside from maintaining quality and safety in service, one of the aims of the CAPE Industrial Services is to provide innovative ideas to their customers that will keep them ahead of their competitors whilst at the same time providing cost savings and improvements in quality to the customer. Improvements in the equipments and materials that are available in the Oil Industry also help in achieving the quality of service. Industrial Rope Access for instance, helps in reducing time scales for accessing work sites. Hence, this reduces costs to the customer. Using the appropriate tools in the work-site also helps to improve quality and time-scales. This goal of the company does not only facilitate in serving the customer appropriately, but most importantly it shows that the Oil and Gas Industry service area prioritises its customers. This in turn results to high customer satisfaction and loyalty. 5.0 Service Encounter: People in the Service Personnel working for CAPE Operations include Operations managers, Project Managers, QA/QC and HSE Managers, Technical Clerks and Secretarys. Each of these employees has their own designated duties and responsibilities in the area. This way, efficiency of service is maintained in the Company. Of course problems might occur in any type of businesses, a company is bound to make mistakes if there are no careful observations to their businesses. One of the problems that a company like CAPE might encounter is the companys personnel or human resource mistakes. The reason for this is the lack in the training it provides for its personnel. The training and development of each employee is very significant as this does not only help in providing confidence in work performance, but it also helps in maintaining quality service. So it is advisable for CAPE Industrial Services to train their employees well to provide their customers with better satisfaction. 6.0 Managing Service Expectation and Capacity In times when demands for services increase, CAPE Industrial Services tries to cope by conducting reliable forecasts. The company so as to keep track of its activities regularly keeps records of previous business operations. This aids the managers from predicting sudden increases of service demand. In order to cope with peak months for ad-hoc services, the customers managers are advised to make their project plans ahead of time. Through this system, CAPE is able to plan ahead for availability of equipment, consumables and personnel that will be used for upcoming projects. 7.0 Recommendations One of the problems that the organisation might face is the mistake their site personnel are committing because of their lack of training and development. As previously mentioned, this is a vital factor so as to maintain efficient service in the company and lessen the number of mistakes which can be made on one of the sites. In order to remedy this problem, the managers can plan an effective and appropriate program for each employee based on their respective duties within the company. The managers can also implement a system at the sites wherein the older workers with more site experience can assist newly hired employees. This can be a more appropriate method of training as the exposure of the workers to the actual work area can help them adjust to the nature of their job. Regular evaluation of the workers can help in improving the skills of the workers and keep them up to date of their current work performance. In this way, quality of service is maintained and skills are enhanced. Overall, the performance of CAPE Industrial Services is efficient. Considering its effective strategies and significant goals for quality service, it is enough to say that the services provided by CAPE are good and successful. However, there are other factors that are to be considered in this type of service. The consideration of these factors will not only help the company in serving their customers better, but it will also help them maintain quality and service provided to existing and potential new customers. 8.0 Operational Improvement Through the Use of Technology In reality, the world of a service company in the Oil and Gas Industry is changing. The expectations of people are different than those of past generations, Safety and Quality are becoming more important features of the industry each year, cost pressures continue to mount, and new information technologies have changed operational functions (Cushman and Shanklin, 1996; Bowers, 1987). As a result, the captive market plan concept is declining and the services are being exposed to a greater amount of competition than in the past. Due to these changes, the old strategies of a service company system must also adapt. This adaptation will definitely contribute to sufficient flexibility that will meet customers needs in an ever-changing environment while retaining the beneficial aspects of a Multi-Disciplined service provider. As CAPE is focused on giving their customers a quality service, one of the possible strategies that can be employed by the company is the application of the One Stop Sh op Fabric Maintenance service provider. As information technologies have advanced, the virtual organisation concept has been promoted as an alternative too traditional, vertically integrated organisational structures (Goldman et al, 1995). In virtual organisations, a lead entity creates an alliance with a set of other organisations (Grenier Metes, 1995). The tasks performed by the virtual organisation are divided among the entities that comprise it, based upon their respective competencies. Virtual organisations can produce superior results because they harness market forces to combine competencies in ways that traditional organisations, using internal mechanisms, cannot (Chesbrough Teece, 1996). Once constituted, the lead organisation operates the virtual organisation by co-ordinating parallel tasks through the use of sophisticated information technologies and management systems, thus creating a coherent system. A virtual organisations membership changes over time as market conditions and technologies shift and the strategies and resources of the constituent organisations evolve. While virtual organisations are most often found in high technology industries such as the development of new computer systems, some characteristics of CAPE Industrial Services make it amenable to the successful operation of a company that services the needs of the Oil and gas Industry. 9.0 Conclusion While CAPES Operations may take a lot of resources to maintain the business and the quality of service provided, the benefits that it can provide outweigh the expense incurred. Aside from that, the services offered by CAPE will definitely increase in quality, hence, greatly contributing to the goals of the company. Through careful and effective planning, budgeting and implementation, CAPE Industrial Services can begin on making little changes, improving the company one step at a time. The important thing is that constant adaptation to change is being done and that the Operations management is coming up with ways on how to improve the services that are provided by the company and keeping the customer coming back. 10.0 References Bowen, D.E., and Cummings, T.G. (1990). Suppose we took service seriously. In Service Management Effectiveness, New York: Jossey-Bass Publishers, 1-4 Chase, R.B., and Hayes, R.H. (1991). Beefing-up operations in service firms. Sloan Management Review, 33 (1), 15-26 Chesbrough, H. W., and Teece D. J. (1996, January-February). When is Virtual virtuous?: Organising for innovation. Harvard Business Review, 65-73 Goldman, S. L., Nagel, R. N., and Preiss, K. (1995). Agile Competitors and Virtual Organisations: Strategies for Enriching the Customer. New York: Van Nostrand Reinhold Grenier R., and Metes, G. (1995). Going Virtual: Moving Your Organisation Into the 21st Century. Upper Saddle River, NJ: Prentice Hall PTR www.soc.napier.ac.uk/module.php3?op=getlecturecloaking=nolectureid=1935516 Karmarkar, U.S., and Pitbladdo, R. (1995). Service markets and competition. Journal of Operations Management, 12 (4), 397-411 Kellogg, D.L. and Nie, W. (1995). A framework for strategic service management. Journal of Operations Management, 13, 323-337 Lovelock, C.H. (1992). A basic toolkit for service management. In Managing services: marketing, operations, and human resources 2nd ed. Englewood Cliffs, NJ: Prentice Hall Roth, A.V., and Van Der Velde, M. (1991). Operations as marketing: A competitive service strategy. Journal of Operations Management, 10 (3), 303-328 Judd, R.C. (1964). The case for redefining services. Journal of Marketing, 28, 1 Rathmell, J.M. (1974). Marketing in the service sector, Cambridge, MA: Winthrop Schmenner, R.W. (1986). How can service businesses survive and prosper. Sloan Management Review, 27 (3), 21-32 Shostack. G.L. (1977). Breaking free from product marketing. Journal of Marketing, 41 (4) Sullivan, R.S. (1981). The service sector: Challenges and imperatives for research in operations management. Journal of Operations Management, 2 (4), 211-214 Thomas, D.R.E (1978). Strategy is different in service businesses. Harvard Business Review, 56 (4), 158-165

Sunday, October 27, 2019

Wireless Networking And Malicious Association Computer Science Essay

Wireless Networking And Malicious Association Computer Science Essay Wireless security is to prevent unauthorized user to access the wireless network or damage the computer by using wireless network. When the wireless technology has been first introduced to the world, it already has few danger methods that will harm the users desktop or laptop, but that time cracker and hacker dont have any resources to crack or hack a network by using wireless technology. At that time, the wireless network only use by the big company. But now day, wireless network is very common, every corner of the world like cafà ©, shopping mall, school, or college that has provide wireless access for the people to access it. Not only cafà © and college using wireless network, at other country it use wireless technology to connect whole citys network. With this technology, people that around the wireless router can easily to access the wireless network to do the search of the information, check mail or play online game. Because of the wireless technology, now day, every laptop has wireless adapter card pre-install inside and make the laptop more portable and let them can connect to internet easily. Not only for laptop, wireless technology also make benefit for the desktop. Desktop can connect to network by installing a wireless adapter card or plug in an USB wireless adapter then desktop can connect to a network and without cable messy around the floor. In this case, wireless technology has become widely use and because of this reason, the risk of using wireless technology has increase and let many hacker found the way to hack the wireless network. All of security risk is related to the current wireless protocol and encryption method. Most of the wireless networks use IEEE 802.11b for standard communication and IEEE 802.11b have already became standard wireless networking technology among the small business user and home user. The IEEE 802.11b can support the indoor distance from several meter to several hundred meters, and can support the outdoor from several kilometer to several ten of kilometers by using unlicensed wireless band. Now day, the wireless network devices normally are equipped with Wired Equivalent Privacy (WEP) data encryption. WEP data encryption was based on 64-bit RC4 encryption algorithm. Other that 64-bit RC4 encryption algorithm, 128-bit encryption algorithm is another data encryption on the WEP data encryption. But this kind of device is more expensive compare with 64-bit RC4 encryption and beside that, all the nodes must use the same encryption level. 1.2 Aim of Research Aim of the research is to implement the wireless security into the CSC System to prevent unauthorized user to access the wireless network. To increase the security level of the wireless network. To avoid the data or information inside the server or computer been hacked by unauthorized user. To increase the safety of the data transfer between server and computer. To add extra encryption method to encrypt the packet need to be transfer. To prevent unauthorized user to shut down whole system though the wireless access point. Chapter 2: Main Body 2.1 Wireless Security Concept A research has been carried out about the concept of the Wireless Security and how to enhance the wireless security. Wireless Security is to prevent an unauthorized user to invade the server database and bring harm to entire network. Below are the results of the research. 2.1.1 Unauthorized Access According to the research, have a lot of way to break into the wireless access point without an authorization. The unauthorized access will cause companys daily operation failure and lose profit. Below are the some of the examples unauthorized accesses. 2.1.1.1 MAC Spoofing MAC spoofing is a technique to change an assigned MAC (Media Access Control) address to another different MAC address. When a person using this technique, he/she has his/her reason to changes a network devices MAC address, whether is legitimate or illegitimate. Changes a network devices assigned MAC address allows bypass the access control list on the server or router, either hiding a computer on a network or attacking a network by simulate another network device. MAC spoofing occurs when a cracker or hacker has the ability to listen the network traffic that passed by and through it; the cracker or hacker can identify the MAC address of the computer with network privileges. Most of the wireless system allows MAC filtering to only allow authorized computer that with specific MAC address to access the network. The computer that dont has specific MAC address cant access the network, so the cracker or hacker use a program which has network sniffing capability and combine with other software or program to pretend the computer has any MAC address that the cracker desires. (Wikipedia, 2010) 2.1.1.2 Malicious Association The Malicious Association is hacker that can connect to company network by using their cracked laptop. This type of laptop is known as soft AP (Access Point) and this type of laptop is created by using some software that makes the hacker laptops wireless adapter card look like a legitimate access point. After the hacker has already gained the access to the company network, the hacker can steal the password or plant the computer virus into the network. (Wikipedia, 2010) 2.1.1.3 Ad-hoc Network Ad-hoc network, also known as peer-to-peer network built up between two or more wireless computers and these wireless computers dont have access point in between them. Ad-hoc network usually provide little protection, encryption method to the network. When a company or person using Ad-hoc network and wired infrastructure network together at the same time, and will link up a secured network to an unsecured network. Connect two different network topology need to have a bridge between them. Bridging is in two forms. User can connect the network topology y a direct bridge and indirect bridge. Direct bridge need to configure by the user and indirect bridge is user share resource on the user computer. The indirect bridge is provides two security problems. The first problem is the data can be obtained through the secured network on the user computer and this data exposed to other user discovery via the Ad-hoc network bypassing the user secured network. The second problem is a Trojan, computer virus or worm can be placed on the user computer through the Ad-hoc network. The unauthorized user no needs to crack the password of the network and can place the computer virus through the Ad-hoc network. (Wikipedia, 2010) 2.1.1.4 Denial of Service C:UsersZoukyDesktop424px-Stachledraht_DDos_Attack.jpg DoS (Denial of Service) or DDoS (Distributed Denial of Service) will occurs is when an attacker continues non-stop bombards an attacker targeted access point with bogus request, failure messages, or other commands. Denial of service will cause other users cant get into the network and also will cause a network crash. The DoS attack will expose a little bit of the data to the attacker, when the DoS attack happen, the interrupted network will prevents the data flow and also indirectly prevent the data from being transmitted. After the DoS attack has been performed, the attacker will start to observe recovery of the wireless network. During the initial handshake code is start to re-transmitted to the wireless network, the attacker continue what he remain. The attacker will record down the initial handshake code and use cracking tools to analyze the security weakness and exploit this code to get an unauthorized access to the system. (Wikipedia, 2010) 2.1.1.5 Man-in-the-middle Attack Man-in-the-middle attacker using a computer to sets up a soft AP (Access Point) and enticing other computers to log into the computer that already been sets up to soft AP. After this all are done, the attacker connects to a real access point by using other wireless card and the attacker will offers a steady flow of the network traffic through the done hacking computer to real network. Man-in-the-middle attack forces other computers AP drop the connection to real network and reconnect to attackers soft AP. This allows hacker to receive what other computers want data need to send out to real network. (Wikipedia, 2010) 2.2 Basic Security for Wireless Wireless network exist in this world already has a decade, at that time the security for the wireless network still not strong enough to prevent infiltrate by hacker or cracker. But at that time the hacker doesnt familiar on technology or technique to hack the wireless network. One of the reasons is the hacking device to hack the wireless network still hard to achieve on that time market. After a decade, the technology and technique to hack a wireless network and the step to build up the hacking device can found on internet. So now day the wireless network users need to have a strong and better wireless security to secure the wireless network. Below are the basic securities for wireless network for the first wireless network has been introduced. 2.2.1 Service Set Identifier SSID (Service Set Identifier) is a common network name for a device in a wireless LAN and some of the wireless device has its own default SSID. The default SSID can be replaced by other string and normally this string is generated randomly. SSID is to identify a name for particular wireless access point. All wireless network need to have SSID within the wireless access point just can communicate each other. The client doesnt know the SSID of the access point, then that client cant simply access the network; this is to prevent hacker to invade network by access through access point. The hacker need to know the SSID of a network just can complete the 802.11b protocol to access the network. The access point will broadcasts the SSID by the beacon inside the wireless device. However, even the broadcasting of the access point is turn off, the SSID still can detected by hacker with undetected monitoring of particular network or sniffing. So, all the clients need to know the SSID of the acce ss point before can make connection to the wireless device. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.2 Medium Access Control Address Filter Each wireless access point can be configured only accept the clients MAC address that already registered inside the wireless access point. With this function, the network administrators can limit the access of the client into wireless network by register the clients MAC address into the wireless access point. Most of wireless devices MAC address is unique and MAC address filter only allow the clients MAC address already registered in the wireless access point to access the network. The entire clients MAC address will store into MAC address ACL (Access Control List) and wireless access point will denied other wireless device if the wireless devices MAC address is not register inside wireless access points MAC address ACL. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Prasad, 2007) 2.2.3 Wired Equivalent Privacy WEP (Wired Equivalent Privacy) is intend to give wireless users have a security scheme is equivalent to the wired network security. WEP doesnt provide any superior level or higher than that level of security, although WEP doesnt has superior level of security but it security level is equivalent with wired network. In the practice, the result show that the security level of WEP need to equivalent to wired network security is hardly to achieve. The use of WEP is to prevent the wireless client from sending and receiving data from the wireless access point, the wireless clients need to have the correct WEP key just can connect to the wireless access point. Now mostly of the network devices is equipped with the WEP data encryption and the encryption algorithm for the WEP is 64-bit RC4. Some of the network device capable to uses 128-bit encryption algorithm. After WEP is active, each 802.11 packet will encrypted by 64-bit RC4 key with RC4 cipher stream. This key is composed of 24-bit IV (I nitialization Vector) and other 40-bit is WEP key. IV is chosen by the sender and the IV can be change, this make every packet wont encrypt with the same key. Another additional 4-byte is for ICV (Integrity Check Value); ICV is computed and appended on the original packet. RC4 cipher stream is generated by 64-bit RC4 encryption algorithm. The WEP encryption algorithms work on a key that share between wireless device and wireless access point. The packet is encrypted by using the key before packet is send out and all packets wont have same cipher stream. The packet receiver use integrity check to ensure that the packet is not modified during the transmission. Most of the systems are share a single key among all the wireless device and wireless access point. The Integrity Check Field is to ensure the packets are not been modified during the transmission and Integrity Check Field also encrypted with the RC4 cipher stream. WEP is using CRC-32 (Cyclic Redundancy Code 32) mechanism for i ntegrity check. CRC is defined as a class of checksum to prevent overflow by dividing the message into binary. (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Prasad, 2007) 2.3 Comparison between SSID, MAC Address Control Filter and WEP From the research, SSID (Service Set Identifier), MAC (Medium Access Control) address control filter and WEP (Wired Equivalent Privacy) are the basic security for the wireless network. This three security methods can implement together in one network. Because these are basic security for wireless network, so the security methods are easy to break by unauthorized user. If not implement other security methods and only just implement SSID, MAC address control Filter and WEP into wireless network, that wireless network will not secure under protection of these three security methods. The wireless access point will broadcast the SSID to the wireless client and wireless client just can access to the access point. When the access point broadcast its own SSID, the entire nearby wireless client will know the SSID of that network or access point, even the unauthorized users also will know the SSID of the network. The unauthorized users will attempt to access the wireless access point. And the wireless access point can close the SSID broadcast function; mean that the SSID is hidden. But when the authorized user requires connecting to the access point, the authorized user will broadcast the SSID to the wireless access point, if the SSID broadcast by the authorized user is match with the SSID of the access point. The authorized user just can make connect to the access point. This make hacker a chance to hack the access point because when authorized user is broadcasts the SSID to the access point, hacker can capture the packet that broadcast by the authorized user and make connection to the wireless access point. The wireless devices MAC address will store inside the wireless access point ACL (Access Control List), the wireless devices MAC address need to be match with MAC address inside the wireless access point ACL just can connect with wireless network. If that wireless network has more than 20 computers need to connect to the wireless network, then the network administrator need to enter all the computers MAC address into the wireless access point ACL. This will make the network administrator very troublesome enter the MAC address one by one and MAC address can be forged. WEP has been considered as a failure in wireless security, at the end it still accepted by the IEEE because WEP wasnt aim for provides fully security for wireless. WEP encryption is very easy to crack by the unauthorized user. WEP only authenticates the wireless client. This allows an unauthorized user to capture the packet send by the wireless client. WEP key is easily lost or stolen by unauthorized user and if the stolen WEP key hasnt been report to the network administrator, the network administrator wont able to detect the unauthorized user has already infiltrated the wireless network. If the stolen WEP key has been reported, network administrator require to change the entire devices that have use the same WEP key with stolen devices WEP key. If the company or enterprise has more than thousands of wireless user using that wireless network, this can be a very difficult task for the network administrator to change the entire WEP key for each wireless users. Like just mentioned, the WEP authentication message is easy to forging by the unauthorized user. Unauthorized user can capture the authentication message that send by the wireless client and forge a new authentication message; unauthorized user can use this forged message to associate with wireless access point. The management for WEP key in not specific in WEP standard. Since dont have management for WEP key, then WEP key will be use for a long term and lack of quality. Most of the wireless network uses one WEP key and share between the entire network and the entire wireless clients access point need to program with same WEP key. Because of this reason, network administrators rarely change the WEP key. SSID, MAC address control filter and WEP is basic security for wireless network; these methods still cant apply in wireless network. Just using SSID, MAC address control filter and WEP are not enough to prevent the security break. These methods require associate with other security methods to enhance the wireless security to prevent security break. 2.4 Advanced Security for Wireless From the research that carried out, advanced wireless securities are to replace the basic wireless security and improve what basic wireless security vulnerability. 2.4.1 Wi-Fi Protected Access WPA (Wi-Fi Protected Access) is a certification program that created by Wi-Fi (Wireless Fidelity) Alliance; WPA is a subset of the IEEE 802.11i. This technology is designed to response to the weaknesses that found in WEP. WPA will generate the key based on the master key and the master key never use by WPA. To encrypt the data, WPA is much more secure than WEP. Key management and updating in WEP is poorly provided, the secure key management is a built-in function in WPA. Mean that WPA can update and manage the key easily, not like WEP. If WEP need to manage or update the key, the network administrator needs to change entire wireless client key that has connection with the wireless network. WPA got one key only and that is master key like just mentioned, network administrator only require to change that master key then WPA will generate the key based on the master key. Generated key is hierarchy of the master key. So this make the management and updating become much easier. The IV (Initialization Vector) values can be reuse and the length of the IV is become longer, from 24-bit increase to 48-bit. Another additional part, the IVs are the sequence counters for the TSC (TKIP Sequence Counter), to protect the loop of the data. The WEP message integrity protocol CRC-32 has been proved ineffective. Because of this reason, WPA uses a MIC (Message Integrity Check) mechanism to replace the WEP message integrity protocol. The correct MIC is very difficult to guess. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) WPA has 3 improvements over WEP: Improved Data Encryption WPA improves the data encryption through the TKIP (Temporal Key Integrity Protocol). TKIP generates the key by using hashing algorithm and adding the integrity checking feature, this will ensure the key havent been edited by other person. TKIP is a Temporal Key hash Function and it is another option to WEP to fix all security problems that WEP has and it doesnt require installing other new hardware. TKIP same like WEP, use RC4 stream cipher to encrypt and decrypt data and all involved clients require share the same key. This key must be 128-bit and it calls Temporal Key (TK). The Initialization Vector also include in TKIP. Even if the TK is shared among all the wireless clients, all wireless clients generate different RC4 key stream. Since the communication participants perform a 2-phase generation of a unique Per-Packet Key (PPK), which is used as the key for the RC4 key stream. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) User Authentication User authentication in WPA is through the EAP (Extensible Authentication Protocol). This function is missing in WEP and WEP access to the wireless network is based on computers network cards MAC address and MAC address is very simple to be stolen. The purpose of EAP is to create a more secure public-key encryption system to ensure that only authorized user can access the wireless network. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Integrity WPA has a new mechanism call (MIC) Message Integrity Code for TKIP is computed by a new algorithm, name Michael. MIC is computed to detect errors in the data contents, either is transfer errors or purposely change the data content. The Michael is a 64-bit MIC and need to add to the data and ICV (Integrity Check Value). (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) 2.4.2 Robust Security Network RSN (Robust Security Network), also call as WPA (Wi-Fi Protected Access) 2. At year 2004, concept of RSN has been released, where the wireless devices need to support by additional capabilities. RSN is fully tested by Wi-Fi Alliances. RSN has a whole new standard and architecture to utilize the IEEE 802.1X standard for AES (Advanced Encryption Standard) and access control. RSN is using a pair-wise key exchange (Four Way Handshake) protocol, RSN also utilizing with 802.1X for key management process and mutual authentication. Now, 802.11i allows for the network implementation and also can use TKIP (Temporal Key Integrity Protocol). By default RSN uses CCMP (Counter Mode MAC Protocol) and AES (Advanced Encryption Standard) to provide for a scalable and stronger solution. AES is a replacement for RC4. Data transmission between the wireless access point and wireless device, RSN uses encryption algorithms and dynamic negotiation of authentication on the data transmission. The authentication of RSN is based on 802.1X and EAP (Extensible Authentication Protocol). Encryption algorithms and dynamic negotiation of authentication make RSNs security more secure and save. RSN is stronger and better than WEP and WPA because RSN is using dynamic negotiation, 802.1X, EAP and AES. Unfortunately only the latest devices have the capability let RSN to accelerate the speed of algorithms calculation in wireless client and wireless access point; now day of wireless product cant fully provide the performance of RSN. (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005), (Bhagyavati, Wayne C. Summers and Anthony DeJoie, 2004), (DifferenceBetween, 2010) 2.5 Comparison between WPA and WEP WPA (Wi-Fi Protected Access) is the solution for the WEP vulnerability, has some critics done for the WEP, the WPA has numerous enhancements over WEP. WPAs TKIP encryption algorithm has fully enhances the WEPs RC4 encryption algorithm. TKIP make the data encryption more efficient and replace the RC4 vulnerability. WPA has made the key management became much more easier compare with WEP, because the WEPs key require enter one by one to the wireless client, if the company has more than thousands users then the network administrator need to enter more than thousands keys into the users computer. If the key is hacked by unauthorized user, then network administrator need to change key for entire companys computers. On the other hand, WPA no needs so troublesome, WPA only needs to enter one master key, and then WPA will generate key according with the hierarchy of master key, after that WPA will assign the key to the clients and the key is generated in 48-bit of IV size. Even the company g ot more ten thousands users also no need to trouble the network administrator. If one of the key has been hacked by unauthorized user, TKIP just need to generate a new key then network administrator can info the wireless client to change the key. WPA has EAP to authenticate the wireless user. WEP is using MAC address to authenticate the wireless user and some of the wireless devices MAC address can be forged. If the wireless devices MAC address has been forged by unauthorized user then the unauthorized user can easier to connect the wireless network without known by the network administrator. Network administrator also wont notify the wireless network is infiltrated by the unauthorized user until the wireless user report there is a missing MAC address. WPA is using EAP to authenticate the wireless user and the EAP for each wireless client is hard to forge by unauthorized user. If the EAP of the client is forging, but the unauthorized user still need wireless clients private key just can access the wireless network. WEP dont have error checking for the data content, and this will cause the looping of the data. If cant prevent replay attacks and will cause the wireless network crash. WPA has inserted the MIC into TKIP and IV sequence mechanism; this is to prevent replay attacks in the wireless network. MIC and IV sequence mechanism support for the existing wireless infrastructures not require installing new wireless device. Adding MIC and IV sequence mechanism without install new wireless device, adding these two methods can increase the wireless security and also without increase the installation cost of wireless device. Compare WPA with the WEP, WPA has solved a lot of WEP vulnerabilities. This make WPA is more secure compare with WEP because WEP only is basic security for the wireless network; it doesnt provide any protection for the wireless network. WEPs security methods can let a small enterprise to setup a small wireless network. For the big company, WEPs security methods are hard preventing the unauthorized access from outsider. 2.6 Comparison between WPA and RSN For now, never the less, RSN (Robust Security Network) is the strongest wireless security protocol for the wireless network. RSN provide stronger data encryption algorithm and all advantages of WPA. The RSN data encryption algorithm method is using AES (Advanced Encryption Standard) to encrypt the data. What advantages WPA have all included in RSN, expect the RSN data encryption algorithm is more advance. For WPA require upgrade for the software and firmware of the wireless device for the existing wireless network infrastructure, but the RSN doesnt support existing wireless network infrastructure, require upgrading the wireless device in order to implement AES. Implement RSN into the existing wireless network infrastructure require extra cost for just upgrade the hardware. RSN need large amount of processing resources in order to protect the wireless network. Mean that implement RSN will reduce the wireless network performance by processing the data transfer or verify the wireless client. 2.7 Table of Comparison between WEP, WPA and RSN Below is summary of the comparison between WEP, WPA and RSN: Features of Mechanism WEP WPA RSN Encryption Cipher Mechanism RC4 RC4 / TKIP AES / CCMP CCMP / TKIP Encryption Key Size 40 bits 128 bits 128 bits Encryption Key Management None 802.1x 802.1x Encryption Key Per Packet Concatenated Mixed No need Encryption Key Change None For Each Packet No need IV Size 24 bits 48 bits 48 bits Authentication Weak 802.1x EAP 802.1x EAP Data Integrity CRC 32 ICV MIC (Michael) CCM Header Integrity None MIC (Michael) CCM Replay Attack Prevention None IV Sequence IV Sequence (Halil Ibrahim BulBul, Ihsan Batmaz and Mesut Ozel, 2005) Chapter 3: Conclusion 3.1 Achievement of Objectives 3.1.1 To increase the security level of the wireless network. In chapter 2.2 until 2.4, the different wireless securities provide different service. 3.1.2 To avoid the data or information inside the server or computer been hacked by unauthorized user. In chapter 2.1, the type of the unauthorized user that can infiltrates the wireless network and chapter 2.2 and 2.4 the methods to prevent hacking. 3.1.3 To increase the safety of the data transfer between server and computer. In chapter 2.2 until 2.4, increase the safety of the wireless access point of wireless network. 3.1.4 To add extra encryption method to encrypt the packet need to be transfer. From chapter 2.2 until 2.4, the extra encryption methods that can hide the data detail. 3.1.5 To prevent unauthorized user to shut down whole system though the wireless access point. In chapter 2.2 until 2.4, the methods to prevent the unauthorized user to connect with wireless access point. 3.2 Research Conclusion A research has been carried out to finish this seminar report by studying the type of the unauthorized access, concept of the wireless security and how efficiency is the wireless network security by determine the wireless security method. Now wireless has already became widely use by company or enterprise, even at home also can using wireless to connect to internet for home purpose like surfing the internet. The reason why so many people like to use wireless network compare with wired network, is because the structure of wireless network is more neat and easy to manage. At the time wireless just came out to the market, the security for the wireless still breakable by hacker or cracker but need a lot of resources to break the security of wireless network. Because last time, wireless network just introduced, the hacker or cracker lack of technology and technique to break the wireless network. Still after few years, the technology and technique to break the wireless security can found in internet. At that time the wireless network has sound the alert and organizations are finding the solution for solve the wireless security problem. But now, the new technology of wireless security has out to market and the security methods are easy to install. So, now wireless security is not a problem. In the report got mentioned is RSN can be the most dependable wireless security for the wireless network. But it still has certain problem like higher cost. Installation for the RSN needs to change whole wireless network infrastructure. WPA got a lot of security methods that cant compare with RSN but WPA still dependable just like RSN. Doesnt mean the expensive item is the good item. As long as the item is reliable then that item is a good item.

Friday, October 25, 2019

Tragedy and the Common Man - Miller Redefines the Tragic Hero :: Tragedy and the Common Man Essays

Tragedy and the Common Man - Arthur Miller redefines the Tragic Hero Arthur Miller states in his essay, "Tragedy and the Common Man," " . . . we are often held to be below tragedy--or tragedy below us . . . (tragedy is) fit only for the highly placed . . . and where this admission is not made in so many words it is most often implied." However, Miller believes " . . . the common man is as apt a subject for tragedy in its highest sense as kings were" (1021). It is this belief that causes Miller to use a common man, Willie Loman, as the subject of his tragedy, Death of a Salesman. Miller redefines the tragic hero to fit a more modern age, and the product of this redefinition is Willie. Miller states, " . . . the tragic feeling is evoked in us when we are in the presence of a character who is ready to lay down his life . . . to secure one thing, his sense of personal dignity" (1021). Willie is no exception. Willie's sense of personal dignity is primarily found in his family, most notably his son Biff. Willie transfers his dreams of being great onto Biff and, when Biff is a failure in the world, these dreams affect Willie's self-image and sense of personal dignity. To regain this personal dignity, Willie must make Biff great. In the end, it is the love for his son and the belief that his insurance money will make Biff "magnificent" that give him the needed excuse and cause him to end his life. "Tragedy, then, is the consequence of a man's total compulsion to evaluate himself justly" (1021). It is the nature of man to make evaluations of himself based upon his peers. Willie's peer with whom he evaluates himself is Charley. Willie and Charley are about the same age, their children grew up together, and have been friends for many years. Charley has achieved what Willie has dreamed of for so long. Charley's son is a successful lawyer, whereas Biff is a loafer. Charley is successful in business, whereas Willie has "washed out." As mentioned before, for Willie to be great, Biff must be great. Willie has failed his job in making Biff better than Charley's son, therefore he fails his evaluations of himself. "The flaw Tragedy and the Common Man - Miller Redefines the Tragic Hero :: Tragedy and the Common Man Essays Tragedy and the Common Man - Arthur Miller redefines the Tragic Hero Arthur Miller states in his essay, "Tragedy and the Common Man," " . . . we are often held to be below tragedy--or tragedy below us . . . (tragedy is) fit only for the highly placed . . . and where this admission is not made in so many words it is most often implied." However, Miller believes " . . . the common man is as apt a subject for tragedy in its highest sense as kings were" (1021). It is this belief that causes Miller to use a common man, Willie Loman, as the subject of his tragedy, Death of a Salesman. Miller redefines the tragic hero to fit a more modern age, and the product of this redefinition is Willie. Miller states, " . . . the tragic feeling is evoked in us when we are in the presence of a character who is ready to lay down his life . . . to secure one thing, his sense of personal dignity" (1021). Willie is no exception. Willie's sense of personal dignity is primarily found in his family, most notably his son Biff. Willie transfers his dreams of being great onto Biff and, when Biff is a failure in the world, these dreams affect Willie's self-image and sense of personal dignity. To regain this personal dignity, Willie must make Biff great. In the end, it is the love for his son and the belief that his insurance money will make Biff "magnificent" that give him the needed excuse and cause him to end his life. "Tragedy, then, is the consequence of a man's total compulsion to evaluate himself justly" (1021). It is the nature of man to make evaluations of himself based upon his peers. Willie's peer with whom he evaluates himself is Charley. Willie and Charley are about the same age, their children grew up together, and have been friends for many years. Charley has achieved what Willie has dreamed of for so long. Charley's son is a successful lawyer, whereas Biff is a loafer. Charley is successful in business, whereas Willie has "washed out." As mentioned before, for Willie to be great, Biff must be great. Willie has failed his job in making Biff better than Charley's son, therefore he fails his evaluations of himself. "The flaw

Thursday, October 24, 2019

Healthcare: Health Insurance and Fraud E. Ethical

Fraud, Waste and Abuse in the Medicare System: A Proactive Approach Course Project Outline Team A: The Prairie State Bulls Julie GIldemeister Elena Hallars Teresa O’Brien Latia Phelps Laura Wimberley HSM 546 Health Insurance and Managed Care Vernice Johnson-Warren Keller Graduate School of Business Management March 17, 2013 Synopsis We propose to discuss the problem of fraud, waste and abuse in Medicare and Medicaid from the viewpoint of a board of directors of a community healthcare system.We agree that a proactive course of action, while initially more expensive, will result in a far better outcome for the system, its providers, and its patients. It will lead to better relations not only with the government but also with our commercial MCO plans. This issue will be addressed on several fronts: legislative loopholes, weaknesses in electronic technology, ethical lapses on the part of providers, and enforcement failures. I. Executive Summary A. Environment B. Rules and regulati ons of Medicare and Medicaid C.Healthcare Reform Legislation D. Problems with Fraud E. Ethical Considerations of Fraud II. Problem Statement A. Fraud, waste and abuse in the Medicare and Medicaid system B. Legislative loopholes C. Weaknesses in electronic medical records D. Ethical lapses in providers E. Common errors in billing and coding F. Enforcement failures III. Literature Review A. Course text B. Fraud, waste and abuse of Medicare/Medicaid funds C. IT and EMR issues D. Ethical training of providers E. Enforcement failures IV. Problem Analysis A.Identification of opportunities for fraud in a healthcare system B. Enforcement of Medicare/Medicaid claims reporting regulations C. Counteracting or preventing a climate of fraud waste and abuse V. Solutions and Implementation A. Streamlining enforcement efforts B. Tightening IT loopholes C. Creating provider incentives for responsible behavior in coding and billing D. Pattern review and claims review to catch trends indicative of fra ud, waste or abuse VI. Justification A. Cost of fraud, waste and abuse, especially in Medicare claims reclamation processesB. Cost of failure to comply with rules and regulations C. Improvement in facility/provider/payer relations D. Improvement in cash flow and claims payment E. Improvement in patient and community relations VII. Conclusion VIII. References Aldhizer III, G. R. (2009). Medicare and Medicaid Fraud and Errors: A Ticking Time Bomb That Must be Defused. Journal Of Government Financial Management, 58(4), 12-20. Boerner, C. M. (2010). 60 Minutes Story on Medicare Fraud. Journal Of Health Care Compliance, 12(1), 29-65. Dietz, D. K. , & Snyder, H. 2007). Internal control differences between community health centers that did or did not experience fraud. Research In Healthcare Financial Management, 11(1), 91-102. Evans, R. D. , & Porche, D. A. (2005). The nature and frequency of medicare/medicaid fraud and neutralization techniques among speech, occupational, and physical the rapists. Deviant Behavior, 26(3), 253-270. doi:10. 1080/01639620590915167. Hambleton, M. (2011). Los Angeles Health Care Fraud Prevention Summit: Moving from a Sickness to Wellness Model of Compliance.Journal Of Health Care Compliance,13(1), 19-24. Hoppel, A. M. (2012). Career Code Red. (Cover story). Clinician Reviews, 22(10), 1-8. Kongstvedt, P. R. (2007). Essentials of Managed Health Care (5th ed). Sudbury, MA: Jones & Bartlett. Moses, R. E. , & Jones, D. (2011). Physician Assistants in Health Care Fraud: Vicarious Liability. Journal Of Health Care Compliance, 13(2), 51-75. Robin, D. W. , & Gershwin, R. J. (2010). RAC Attack—Medicare Recovery Audit Contractors: What Geriatricians Need to Know. Journal Of The American Geriatrics Society, 58(8), 1576-1578. oi:10. 1111/j. 1532-5415. 2010. 02974. x Sparrow, M. K. (2008). Fraud in the U. S. Health-Care System: Exposing the Vulnerabilities of Automated Payments Systems. Social Research, 75(4), 1151-1180. Steinhoff, J. C. (2008). FORENSIC AUDITING: A Window to Identifying and Combating Fraud, Waste and Abuse. Journal Of Government Financial Management, 57(2), 10-15. Thorpe, N. , Deslich, S. , Sikula, S. , & Coustasse, A. (2012). Combating Medicare Fraud: A Struggling Work In Progress. Franklin Business & Law Journal, 2012(4), 95-107.

Tuesday, October 22, 2019

Learn the Spanish-language Version of O Christmas Tree

Learn the Spanish-language Version of O Christmas Tree Below is a Spanish-language version of O Tannenbaum, a famous  German Christmas carol more formally known in English as O Christmas Tree. After exploring the translated lyrics, learn how the word order changes for poetry in Spanish, along with additional vocabulary and grammar notes for the translation. These notes will better explain how phrases and terms change in translation from German to Spanish, plus how the definition of the word can transform itself into the Spanish language. Review the lyrics of  Quà © Verdes Son below and then learn about the difference between hoja, brillar,  airosas, and other words and phrases within the song. Qu verdes son Quà © verdes son, quà © verdes sonlas hojas del abeto.Quà © verdes son, quà © verdes sonlas hojas del abeto.En Navidad quà © hermoso estcon su brillar de luces mil.Quà © verdes son, quà © verdes sonlas hojas del abeto. Quà © verdes son, quà © verdes sonlas hojas del abeto.Quà © verdes son, quà © verdes sonlas hojas del abeto.Sus ramas siempre airosas son,su aroma es encantador.Quà © verdes son, quà © verdes sonlas hojas del abeto. Translation of the Spanish Lyrics How green are, how green arethe needles of the fir tree.How green are, how green arethe needles of the fir tree.At Christmas how beautiful you arewith your glittering of a thousand lights.How green are, how green arethe needles of the fir tree. How green are, how green arethe needles of the fir tree.How green are, how green arethe needles of the fir tree.Your branches always elegant are,your aroma is enchanting.How green are, how green arethe needles of the fir tree. Vocabulary, Grammar and Translation Notes An unusual word order is used throughout the lyrics in the  Quà © verdes son  song for poetic purposes, and so the lyrics tend to go well with the music.The phrase typically used to refer to a Christmas tree is rbol de Navidad. Although these lyrics do not specifically refer to a Christmas tree, neither do those of the original German carol.Hoja is normally translated as leaf, but needles is used in this song because that is what the leaves of a fir tree are typically called. Hoja can also be used to refer to a sheet of paper or a sheet of metal.Brillar is a verb usually meaning to shine, to glitter, or to be conspicuous. The infinitive form here, like other infinitives, can be used as a noun. In nonpoetic use of the language, the noun brillantez would be more likely here.Airosas could have been translated more literally as airy.Note that the word  aroma, like many other words of Greek origin ending in -a, is masculine.