Sunday, May 31, 2020

Essay Topics for Your First Essay on Japanese Culture

Paper Topics for Your First Essay on Japanese CultureSo you have chosen to compose an article on Japanese culture, and you are thinking about how to start? Is it enough to just expound on how the Japanese individuals or culture has influenced your life? Or then again is there something more to this than that? In the event that this is your first article on Japanese culture, here are probably the most normally gotten some information about expounding on Japanese culture? Would it be advisable for you to just discuss Japanese food, or would it be advisable for you to likewise discuss Japanese history? There are numerous Japanese culture articles that don't discuss Japanese history, yet this can likewise work furthering your potential benefit. You can discuss things that you have never contemplated. You can discuss the various celebrations and occasions that happen each year in Japan.Should you incorporate your own encounters with Japanese culture? Do you believe that all Japanese cultu re is extraordinary? All things considered, when you talk about Japan you are discussing society, not nationality, so it might appear to be somewhat odd to incorporate what you by and by think about the Japanese culture, however it very well may be fascinating to discuss how you feel about your own nation, just as how others feel about their own country.What are a portion of different things that you can discuss in Japanese culture? You could discuss the distinctive ethnic gatherings in Japan. When you talk about Japanese culture you are discussing what the Japanese accept, so it may be useful to incorporate some conversation about things that are special to the Japanese culture, for example, the way that Japanese culture varies from the Japanese language, the way that the Japan Imperial family dresses, or even about a portion of the things that make the Japanese think about Japan in general.How should the subject be composed? The best spot to begin would be with a short synopsis of the historical backdrop of Japan. Ordinarily it is the start of the sentence, however it ought to likewise remember a portion of the significant occasions for the Japanese culture that you have remembered for your exposition. For instance, for your article on Hokkaido you ought to incorporate a reference to the well known image of the Japanese samurai. Toward the finish of your article you ought to give a synopsis of your contention, or if nothing else a rundown of the focuses that you have discussed.What are a portion of the all the more intriguing points for your exposition? One of the most intriguing subjects to talk about is the impact of Buddhism on the Japanese. There are bunches of Buddhist sculptures and works of art all over Japan, and these are utilized to show the various parts of Buddhism. By examining the different ways that Buddhism has affected Japanese culture, you can discuss the impacts that Buddhism has had in transit that individuals live their lives, and it can likewise give a decent prologue to the idea of karma in Japanese culture. There are numerous books and different materials that can be utilized to acquaint the subject of Buddhism with your readers.So there are a lot of various themes to examine when composing a paper on Japanese culture. Whenever you are looking into subjects for a paper, set aside some effort to expound on the various themes you are considering.

Friday, May 29, 2020

Determinants of Hedging FX risk Survey of EU - Free Essay Example

Hedging as defined by Judge (2006) is all tools and techniques used to Minimise Risk, these tools and techniques include use of Derivatives like Swaps, Forwards Contracts, Asset Liability Match and etc. Further Hedging can be considered to be similar to Medicine i.e. shall be used with the purpose to minimise risk however it was found that there can be different possible use of Hedging Currency risk as found in Graham and Rogers (2002) that one of the different use of Hedging can be to escape Tax, the working behind that was explained that Hedging Risk via raising debt will reduce the Tax and will improve the Debt capacity along with the Firm Value. Also to note that Smith (1995) found that some part of Corporate Hedging include Hedging with a motive to earn profit and not to minimise risk. 1.2 Background : Recent currency Appreciations and then the Depreciation resultant of The Greece scare of the government being insolvent did cause a lot of instability to the currency market as far as the Euro is concerned. The automobile industry in the world has most EU country producers, Germany being one of the biggest producers as it had producers like Daimler, Mercedes, BMW and Porsche and Italy has Ferrari, Jaguar from England and many more. This companies sell all over the world, hence this exposes them to a foreign currency risk which in turn might want the companies to minimise these risks as well. (Yahoo! Finance Graph) Taking into consideration the US Dollar which is the worlds most traded currency against Euro. The above graph suggest that the Euro was stronger against the USD as the result of huge amount of cars being imported in USA, further the current contagion effect of the Greece government the Euro has fallen and has affect some of these companies. As reported by Reed, J. (2007) that the weakening of USD has hurt the giant car manufacturer which meant that Appreciation as seen in the graph initially did hurt the BMW and so will to many more similar companies. This means that a appreciating currency company when sales its product in a country where the currency is depreciating the company will suffer lose of lower profits. Hence comparison found in the report to a similar producer i.e. Daimler that reported return on sales was 9.5 % compare to BMW 5.4 % CONTINUE. Now there are a number of ways a firm can save the losses caused by currency movements, some of them are use of Forwards, Swaps an d etc Derivatives another option is that to create a natural hedge i.e. to create an Asset Liability match as explained by Judge (2006). Some firms which have huge demand and can afford a production unit like BMW can make a production unit in Free trade Zone with in the allowed parts of Mexico near USA and then reduce the cost and hence eliminate risk. Further as suggested by Judge (2006) that while findings determinants of Hedging the past literature explains quite a bit however the answer still remains a Mystery , similarly it was found in Rogers and Graham (2002) they said in reference to the research that Hedging depends on the industry and market drivers however for Auto mobile car industry there has been no ideal method to deal with foreign exchange exposure. 1.3 Research Question : To see if there is any significant effect of currency appreciation or depreciation on the Auto Mobile car Industry in EU. In the case of Significant effect how does the company Hedge i.e. does the company outsource its production in-order to reduce or eliminate the effect of currency meaning a natural hedge or a company uses derivatives. The most important objective is to see that if there is any ideal solution that is being used in within the industry. 1.4 Hypothesis : All the hypothesis will be tested step by step, this means that H1 will be tested first and then H2 and so on. The alternative hypothesis is simply the other possible thing for instance for H1 the alternative Hypothesis i.e. HA will be Currency change has no effect on the companies in the Auto Mobile Car Industry. H1 : Currency changes has an effect on the companies in Auto Mobile Car Industry H2 : The companies do Hedge H3 : The companies do a nature Hedge i.e. an Asset Liability match H4 : The companies Hedges with the help of Derivatives 1.5 Research Aims and Objectives : Aims : One of the main aim of the research is to learn what is the general idea if any within the Automobile car Industry, however if in case of a common practice what shall be the rationale of the common practice is an important question. Further if there are no similar practices the rationale of different practices is at core importance of the study. Objectives : The first and the most important task is to review the list of similar researches done in the past, then comes the plan of an ideal analysis technique to be used taking into consideration the data availability / requirement. After the technique has been decided the required data will be collected and analysed, here there can be problems like Unbalanced Data problem as found in Judge (2002a). The problem with unbalanced data is that data for some type is missing hence shall be removed or be balanced in order to finish the analysis. And to end with after overcoming the problem of unbalanced data the analysed data will be interrelated and interpret in the authors own view and ideas. 1.6 Literature Review : Starting from Bua et al. (2009) explained currency hedging in relation to cost concept, the main aim of the research was to explain the cost concept that is conflicting with the returns on hedging however the main aim or rationale of hedging is to minimise risk but the research revolves around two other reasons of hedging i.e. Value creation and other reasons like being risk averse, or using hedging as the last resort of reducing the risk. Further the paper then goes on to explain the evidence on Hedging from Auto mobile car Industry in US and Europe. It was found out of 273 companies examined that had foreign exchange exposure, those were specifically Auto mobile car companies i.e. car makers or the engine makers or luxury interior designing firms for luxury cars, the data used was to know if the companies did hedge and if they did what was the method. The way of analysis i.e. the methodology used was a multiple factor regression the factors included Capital structure, nominal value s of the derivatives, sales (foreign and domestic), and etc. The findings of the result were further supported with a significance test to confirm if the results were meaningful. Finally the conclusion of the report was into two parts the first part of the conclusion was found that cost of hedging has a significant effect on value creation i.e. as per the theory as the cost of hedging increases the profits from the same will reduce however this will give rise to value creation if the hedge is a nature hedge i.e. an assets liability match. Hence it was concluded that an asset liability match is a better way to hedge if the company has a significant amount of sales in foreign and does report to historical price standard for the annual reports, further the other half i.e. the important half explained that for Auto mobile car Industry it was found that companies with significant car sales for instance Jaguar, BMW, Mercedes and etc were found to be using swaps for smaller hedges and for bigger hedges the most profitable i.e. the most viable option was an Asset liability match followed by forward contracts to report in the home currency. An interesting bit noted in the research was that there was no clear explanation of a rule of thumb to hedge for Auto mobile car companies and was concluded that the research still leaves A lot of work to be done yet. Further in a similar research by Judge (2006) was about what determines the hedging of foreign currency hedging by non financial firms in within the UK. The author argues that there is a relationship between Financial distress costs like interest on shares and debentures over the hedging decision i.e. totally related to Asset Liability match. It was also found that the findings were also significant with the US data that was analysed and concluded in different studies but the author argues that this might be a biased result as the data collection explained internet only and derivatives hedgers and nothing else i.e. a n arrow or result tied to a specific hedgers. Further the author explained that determining the factors leading to Hedging can include factors like Hedging for Tax Incentives, Cost of Financial Distress as found in Bua et al. (2009) alongside Graham and Rogers (2002). Further the determinants or the factors determining Hedging included Under investment costs i.e. in case of a companys globally recognised will have a better effect on a investor then a domestic company, another and one of the most logical and important factor to be considered was the amount of foreign exposure i.e. the amount of sales or the amount of cash flow generated from foreign country. Talking about the sample that was of 500 and 441 were non financial companies as on December 1995 but only 412 firms were selected to analysed i.e. for the analysis. The author used Multivariate Regression Analysis to test the data as it can include a number of variables that can be considered. Further the conclusion found was tha t there is a strong significant relationship between foreign currency hedging and financial distress costs like debenture interests and etc. Further another factors to be considered is a foreign debt, as found in Judge (2002) that about most of studies that were taken into consideration particularly in relation to the use of foreign debt found that use of foreign debt is now getting on to be a very good option for counties that have cash flow from the same foreign country, the hedge works in a way that the cash flow is settled against the distress cost arise in the country by raising the debt. This will create a hedge with number of advances i.e. increase the firm value as explained in Judge (2002) and Bua et al. (2009) reduce the distress cost hence by offsetting it against the cash flow and the most important one will be there will be no foreign exchange risk to the cash flow as it will then be settled in within. Further banks considered to be an institution that does hedging for different companies i.e. that is what banks are meant to be for, a research by Sinkey and Carter (1994) tried to explain the use of derivatives and hedging activities by Banks in within the United States the rationale was explained that banks do both deal and use it for hedging as well. The preposition of dealing with derivatives and using the same for hedging are not always the same with every bank some banks can do it and some cannot hence it was found that out of 11000 banks only 600 did both together. For banks out of the sample of 600 , the analysis were done using multiple regression similar to the above researches i.e. Judge (2002) , Bua et al. (2009) and Graham and Rogers (2002) as well. The conclusion of the research however was that there is a correlation between banks having weaker capital structure and hedging, low margin of profits and deteriorating asset management further it was found that with banks the determinants for hedging were not only for risk management howev er profit motive was considered to be an extra measure of hedging. To so sum up almost every research reviewed it was found that hedging is meant for risk management however it shall be noted that not many hedge funds manage to earn profit or super normal profit and the reason to that can be that they are not meant for profit. The ideal hedging mainly found are an asset liability match and raising foreign debt is considered to be a good example of hedging for companies with health amount of foreign operations. The determinants found were significant amount of sales in foreign country or currency, a widely operating company i.e. operations in different country, and etc. 1.7 Rationale of Research : Personal Reason : I am very much interested in Foreign currency Exchange literature, recent fluctuations in the currency market has made me keen about many factors that affect the movement of currency and one of them is import and export. Being a student I can explore a area of FX markets and determine the factors of hedging. Further the Automobile industry in EU is the biggest and best in the world which made me passionate about the research. Academic Reason : Being a student I am very keen to learn about FX market and to explore new areas of Hedging as well and for that this research will be perfect for me. 1.8 Reflection : The reflection of the research is that all the empirical research will be carried out with a greater care that is does not provide biased results. The ethical implication however that is there is no use of primary data hence it can be assumed that there is no problem. Further all the data that can be analysed are from different data source i.e. companies own annual report. 1.9 Scope : The scope of the study is for Hedging the Foreign risk that is limited to Auto mobile car industry in The European union. Further taking other factors into consideration it was found that if in case of a narrow model being formed it can be criticised in number of ways i.e. selection of model and selection of the different processes. 1.10 Action Plan : The main rationale of the research is to clear he fume that has been around the research literature reviewed and it was found that all the research has concluded that the research stays a bit handicap hence to conclude on the part of what can be a better way of hedging for auto mobile car industry in Europe. There are a number of things to be considered is the data availability i.e. in some cases companies report throughout a number of years and some times the reporting standard keeps on changing hence it is to be considered that an unbalanced data will be taken into consideration but care will be taken that it does not create any biases. Date Target 18th February, 2011 Introduction 25th February, 2011 Literature review 15th March, 2011 Data collection 23th March, 2011 Data Analysis 28th March, 2011 Data interpretation 15th March, 2011 Conclusion The tasks will be kept on till the research is finished, the first task will be to review the literature i.e. similar in terms of topic or similar in terms of Method this shall be done by 25th February, 2011., the second step will be data collection which shall be finished by the 15th of March, 2011., then taking into consideration full data support the analysis will be carried out and the interpretation will be done by 28th of March, 2011., and to end with the conclusion and finishing up activities will be done by 15th of April, 2011. 1.11 Ethical consideration : All the work presented will be original hence the code of ethics will be taken into strict consideration, all the work that has been used from other articles or resources have been marked and referenced properly. 1.12 Methodology : Taking into consideration number of surveys i.e. Literature review into consideration it was found that under most cases it was found that Multiple regression was considered to be the finest method to conclude, the justification found was that authors thought that a multiple regression model can include a different variety of factors also it is possible to include a dummy which is quiet possible in the current analysis to differentiate the different types of companies i.e. to narrow down the selection. Further all the regression analysis will be backed by a significance test as found in Judge (2002) and Graham and Rogers (2002). 1.13 Research Design : The data to be used in the analysis is purely secondary data. The data will be collected from the official site of a company or the annual reports, with annual reports it is clear that the report is published under high audit programmes. Under collection of the secondary data the only possible problem is that the data turns out to be an unbalanced data and balancing data may create biasedness however care will be taken so that the data is not wasted. 1.14 Analysis and Discussion : The collection of data will start with collection of annual reports i.e. Secondary audited data will be used, the data will then be extracted out of the annual reports like if the companies hedge, type of capital structure, derivatives used by them and etc. The analysis of this data will be done after refining the data i.e. converting the data t a value that will be similar for all the companies hence to do the analysis is easy. However care will be taken that in this process the data do not turn biased or are not manipulated in order to get a desired result. The analysis will be done using a statistical software called Stata 11 .0 v. The software will give out a result that can be used and understood by researchers under most cases hence the data so analysis via Stata 11 .0 v will be presented in a simple table format and interpreted in a manner that it is easy even for the layman to understand the interpretation and the analysis. Finally the methodology so used is a multi regression analysis; the regression will include those variables that have been significant in the past research hence to get a better result. There can be two critical part in the analysis the first part can be explained as a technical part as it is a Panel data analysis there are a number of statistical problem with the data that cannot be ignored however if this problems are then taken into account the problem with them is the analysis will be too long to conclude also then the analysis will be more technical then it will be less related to the main topic of Hedging in the automobile industry. The second part is related to the topic as it is a topic related to Hedging the topic has been narrowed to Auto mobile with the rationale that the research produces a fair and industry specific analysis. However this narrow bit can be considered to be critical, as the analysis will be down to only on industry or sector. 1.15 Implementation of Research project : The research method involves some procedures to be followed as seen in the past research however care will be taken that the research follows as missing a part of the procedure can be a critical problem. With hypothesis testing and research question the above method will be followed i.e. taken from researches taken into literature review however to specify the applicability or the validity and reliability will be tested by a statistical method called Test Statistics which will be found by a formula and will be compared to table value of the frequency that follows a T distribution. 1.16 Research Evaluation : The success of the research on the basis of the data gathered and rest on the availability, the thing with the data is that because all the companies have different reporting techniques it is hard to find the required data, also to note some companies will be French, Italian, German and etc, this companies will mostly report in their national language hence sometimes this companies make the English version of the annual report available however if the annual report is unavailable in English the company then has to be ignored in the research and if the problem is similar with more number of companies the analysis may suffer as the sample then get reduced and might produced a biased or narrow result assuming that the companies ignored will not make much difference. Reliability of the research is depend on the supervisors signature i.e. the research will be supervised by a expert in the field hence this will enable the research to be signed by an authenticated person who knows more about the field then the researcher. However the supervisor will have to keep an eye that the research is not manipulated. The advantage of the research will be to 3 types of people, firstly the advantage will be to these companies examined as the result will then suggest them and evaluate the their own strategies. The second advantage will be to the government, this will suggest to the government that how auto mobile companies hedge, because hedging itself contains risk the government has to keep an eye as a watch dog that the companies are not misusing the method of hedging hence the government after looking at the research can know if the market is safe i.e. the share holders are safe or not and this will give rise to any change that has to be done or not. Further the third advantage of the research will be to foreign exchange traders to derive the current market flow of hedging, hence if there are news about the auto mobile industry the foreign exchange traders then know how the markets shall react and hence this research and its findings will help them decide how to trade. 1.17 Conclusion : Finally it can be concluded that taking into consideration the clarity of thoughts, ideas and data collection technique the research can be completed with in the given period of time or the time frame designed, however certain barriers may obstruct the way but then depending upton the barrier the problems will be solved and taken further.

Tuesday, May 26, 2020

Rumors, Deception and Admission Essay

<h1> Rumors, Deception and Admission Essay</h1> <h2> Things You Should Know About Admission Essay</h2> <p>An affirmation article requests a great deal of time as you should place everything about its correct spot. The creator is, as a general rule, determinedly contending against uncommon treatment. The creator begins with a fairly complete story of an occasion or depiction of an individual or spot. </p> <h2> The True Meaning of Admission Essay</h2> <p>Discuss what you could offer. Other than having an extraordinary SAT score, you would need to think about the absolute best school exposition. In spite of extraordinary evaluations, an inadequately composed exposition gives you a poor name. </p> <p>You're a secondary school senior, and you should seem like one. Because you've just composed a school paper for a solitary college doesn't imply that it might likewise apply on your next applications. In case you will incorpor ate subtleties that may straightforwardly hit the necessities of the school, at that point you can promptly get the approvalA that you ought to be acknowledged for enlistment. Wow understudies get in their fantasy schools year in, year out.</p> <h2>The Nuiances of Admission Essay </h2> <p>Writing an article isn't a simple activity to do. Your school article ought to contain data that identify with the guidance offered to you. Composing the school application paper can be among the most overwhelming bits of applying to school. Composing an astonishing school confirmation exposition requires a ton of imagination. </p> <h2>A Secret Weapon for Admission Essay </h2> <p>After you get an unfinished version of your affirmations article, remember that it's a work in progress. The whole system for college affirmation paper composing might be a difficult one. On the off chance that you wish to make a school exposition which works, you should give significance on the substance you will offer the affirmations official of your planned college with. School affirmations expositions require a colossal amount of work. </p> <p>Although you should be innovative when composing your paper, oppose the compulsion to obtain inventive with the realities. The confirmation article probably won't be all. Before you start composing your school exposition, you should see the article examplesA that we've recorded for you, so you can have more thought on what things to place in the school paper which you will make. Your confirmations exposition is similar to some other article you've composed. </p> <p>It isn't so direct to distribute article. The article you get from College-paper. You, in this way, need to give your article the absolute best. On the off chance that you are needing an all around created article, at that point you can rely on us to convey. </p> <p>Don't overlook, a confirmation exposition test might be acceptable approach to discover increasingly about the composing methodology and comprehend the errand better. Recorded here are the ensures we offer to anyone arranged for proficient guide. In this manner, the article can really be viewed as the most pivotal factor of the application approach. An application paper is among the most significant segments in the college application practice. </p> <h2> The Admission Essay Pitfall </h2> <p>Building a top notch article won't ever be the perfect decision to take. Layouts may likewise assist you with getting a thought of the best approach to make a decent school confirmation arti cle position. Altering can assist you with rectifying the errors. On the off chance that you will require altering of an article we've composed, simply don't stop for a second to address us. </p> <h2> But What About Admission Essay? </h2> <p>If you don't, it's conceivable to really hurt your chances of confirmation. Make a concise rundown of focuses you need to underline in your affirmation article. Confirmation article is only one of the most fundamental scholarly papers throughout your life as it decides if you will be in a situation to go into the school you need or not. </p> <p>You likely realize it's conceivable to buy affirmation article on the web. Affirmation expositions must be specific relying upon your favored zone of study. An affirmation paper is an opportunity to communicate and illuminate the choice board which you're the ideal understudy for that particular profession. Composing a school affirmation article can be extremely intense. </p> <h2> The Fundamentals of Admission Essay Revealed </h2> <p>When it has to do with college confirmation paper composing, we might want to be certain everything is done spot on so you have the absolute best possibility you can get at delivering your fantasies work out as expected. Valid, the exposition is an extra work, yet it's your chance to publicize yourself to your fantasy college. As a result, going through cash to manage your articles could be testing. The key to persuading the affirmations officials is in understanding what they need to get. </p> <h2>Here's What I Know About Admission Essay </h2> <p>If you understand that you are left with your exposition, don't stop for a second to discover help from our online mentors. Let EssayEdge assist you with creating an application paper which gets took note. Our affirmation article models can demonstrate that we're here so as to give just the perfect help to guarantee you which you present an application exposition you can be certain about. An incredible application article should be succinct however instructive and interesting.</p> <h2>Admission Essay: No Longer a Mystery </h2> <p>Apart from the circumstances that you ought to consistently recall, what's more, there are a few things which you shouldn't do while making the substance of your school paper. In the event that you might want a tweaked paper or whether you need help improving your present article, you should come to us since we have the best individuals available to furnish you with decisively what y ou're searching for. On the off chance that you decide to buy affirmation article from us, you're certain to get a great deal of advantages, experienced essayist and able help. Building up a breathtaking school article may lose its motivation in the occasion the substance of what you've composed isn't what the college is requesting. </p> <h2>Introducing Admission Essay </h2> <p>Most understudies are beneath the impression a paper should be significant and composed with grand words to have any impact. Since you comprehend what it should state, it's easy to fool yourself into accepting the article says something it doesn't. Your exposition is an exceptional impression of who you are as a person. Confirmation exposition composing needs a mess of devotion to create a paper without any mix-ups. </p> <h2>The Key to Successful Admission Essay </h2> <p>Be sure that your exposition mirrors your tendency and reveals your inclinations. At the poi nt when you own a subject, it's ideal to make a blueprint of thoughts. To achieve this, conceptualize on points which you are energetic about. </p>

Monday, May 25, 2020

Choosing Steps to Writing an Essay First to Last

Picking Steps to Writing an Essay First to Last Life, Death, and Steps to Writing an Essay First to Last Lastly, you will require an extraordinary end. The last passage of the paper specifies the end. The early on section of a story paper may affect your. On the off chance that composing an article appears to be a staggering encounter, at that point figuring out how to separate the procedure into heaps of simple advances will concede you the certainty you should make an intriguing, top quality bit of work. Think how you are going to get your peruser's advantage. The best advance you will be approached to take with respect to quick article composing is to verify that you have an awesome great audit and altering system set up. In the first place, when you are just beginning article composing, you're best served by building up a basic diagram. You've quite recently composed a recognized paper. At the point when you're advised to go over an announcement, your article should by the by hav e a position. When you get your proposition then you may wish to cause a blueprint of how you'll to compose your paper. A proposal ought to be significantly progressively explicit. Steps to Writing an Essay First to Last - Is it a Scam? Your key thought is the best angle in organizing how your entire article will be spread out. In the first place, it's essential to find a unique article. Consider what perusers should know to know the focal point of your paper. Do Your Research Another convenient paper composing tip is to verify you invest adequate energy investigating all the components of your favored point. Second, concerning article composing, the introduction of your article should offer a central rundown of the chief focuses you will address in the review. With any article, the presentation can either give you a pleasant beginning or decimate any chance you will compose an extraordinary paper. Composing a postulation proclamation can be among the most significant, yet most inconvenient parts of your entire paper. The article is your absolute best opportunity to deliver the case for why you should get. Finally, audit what you've composed. Steps to Writing an Essay First to Last Can Be Fun for Everyone To start with, you ought to pick a point. You may be composing a paper to contend for a particular perspective or to disclose the means required to complete an occupation. Regardless, your paper will have the indistinguishable standard configuration. There are a few exposition composing administrations that believe they're the absolute best, and in this manner don't be cheated and check the certified rundown of the absolute best. The Most Popular Steps to Writing an Essay First to Last To help you in getting moving on your lord proposition, here's a specialized agenda of these things you should have and to do. On the off chance that you wish to get high excellent research and proposition papers dependably and at a reasonable cost, you ought to most likely evaluate utilizing EssaySupply.com. On the off chance that your article is depicting a procedure, similar to how to make a gigantic chocolate cake, ensure your sections fall in the correct buy. On the off chance that you need significantly better, longer article, investigate our easy deceives to support the size of your paper! There are some basic advances you do need to proceed at the top of the priority list when it has to do with attempting to sort out an article as a bit of your article composing endeavors. Postulation work includes a lot of perusing. Invest some energy and cash to get the paper you proved una ble. On the off chance that you haven't been allocated a subject, you have more work to do. Luckily, you can figure out how to create a dynamite exposition on the off chance that you can adhere to the regular example and write in an exceptionally clear and composed strategy. In any case, in the event that you incline toward your paper to hit the bulls-eye and change the way that your peruser thinks, you need a couple of strategies. Perusers are probably going to move toward your paper in precisely the same way. Probably the best approaches to manage it lies backward. The Steps to Writing an Essay First to Last Game Writing an extraordinary acquaintance and end is fundamental with the general accomplishment of your expositions. Composing an exposition is in all likelihood one of the most troublesome papers to compose, there are a great deal of things you should consider before you initiate composing your article. At the point when speedy article composing administrations guarantee to convey papers in a concise timeframe, it's normal to be wary and wonder in the event that they're associated with written falsification. A perfectly clear technique is fundamental to composing a flourishing powerful exposition. The Nuiances of Steps to Writing an Essay First to Last A presentation Your presentation is a huge part of your article. On the off chance that you would prefer to cause a diagram, to compose your theme at the pinnacle of the site page. The key to a prevalent article, beside great examination, is an astounding presentation. While an exposition is a sizable venture, there are various stages an understudy can bring which will help separate the errand into sensible pieces. The New Angle On Steps to Writing an Essay First to Last Just Released To verify you experience a crowd of people for your book, and individuals that will buy it, make certain your book fills a need. A few understudies become frightened to begin composing. In case you're composing a book abou t b-ball it is conceivable to compose it for mentors to upgrade their groups or players to better their capacities. For example, a book named Coaching Basketball is sufficiently fine yet not all that convincing. What is Really Happening with Steps to Writing an Essay First to Last After you have decided the reason, you'll have to do a little research on points which you find interesting. It's conceivable to compose regarding a matter which you discover fascinating or you're ready to compose regarding a matter which you have a mastery in. At the point when you amend your article, you must ensure its association is totally suitable to your target group, the paper setting, and the objective. Clearly, papers have a major impact in the school application technique, moreover.

Sunday, May 24, 2020

Research Topics For Term Paper - Finds Some Research Topics

Research Topics For Term Paper - Finds Some Research TopicsThere are lots of ways to find research topics for term papers. But there are also a lot of resources available online to help you get started. This article will discuss some of the best places online to find these types of topics.You may be curious about research topics for term papers, but it can be difficult to find them because there are so many out there. Plus, you also have the same problem with the research questions. That is, there are not enough of them to really make any progress with your research.To start with, you need to decide what research topics you want to tackle. It can be something you already know about, or something you want to learn more about. This helps narrow down your search and make it easier to narrow down the kind of research you want to do. Start by looking at popular websites, such as Google, that will show you links to research on certain topics.Another option for finding good research topics for term papers is to look in your favorite research book. Many books will have research topics included in them, especially if they were written by experts. This way, you can narrow down your research until you find something that is really fun to research. And once you have a topic, the easiest thing to do is to write about it.Finding an interesting research topic may take some research. Many people will give up trying to find good research topics for term papers after a couple of weeks. The first problem is that they do not know what their topic is.So, why do people give up? They either look at research topics that are already done, and these are too boring, or they spend all their time researching something that does not work. So the best solution is to spend a little time looking at things that are already done and see what happens. You could always go back and redo the research later.Once you have a good idea of what topic you want to tackle, you can begin to look for research topics for term papers. By doing this, you are sure to find one that is a little different from the others that you have looked at. This is the most fun part, but it is the only part that is guaranteed to work.So, you can learn to research topics for term papers. And this can help you complete your term paper. But remember, do not spend all your time trying to find the research topics for term papers, just as long as you are able to find a fun one.

Friday, May 22, 2020

The Types of Fun Home Essay Topics

<h1>The Types of Fun Home Essay Topics</h1><p>When I was a secondary school understudy, I truly needed to realize what fun home paper themes were. The initial barely any expositions I composed were the regular exhausting ones that every other person composed, however when I began expounding on my interests and interests, I found that it made me look quite a lot more fascinating and well rounded.</p><p></p><p>If you are attempting to choose what to expound on, the principal thing that you have to do is to make a very rundown of things that you have an enthusiasm for. Regardless of whether it be learning another dialect, playing the guitar, considering something, working with creatures, or whatever it is that you love, put that down on a pleasant, thick, rich rundown. From that point forward, it's an ideal opportunity to consider the extraordinary things that you share for all intents and purpose with your subject.</p><p></p>& lt;p>Themes are simple, truly. Simply stay with what you love. My preferred subjects are things like: vehicles, creatures, music, television programs, and so forth. When you have that rundown of things you love, it's an ideal opportunity to take every one of them and put them in one sentence.</p><p></p><p>You can generally go through some funniness to break the dreariness of your school exposition subjects. This will likewise assist you with getting over your enthusiasm for one snappy sentence. Here's a straightforward thought for a school exposition theme thought for school. I'm discussing pictures of irregular articles around your house.</p><p></p><p>All you need to do is to make up a story, similar to a horrible wrongdoing being submitted at home, or something to that effect. Ensure that you fuse an intriguing turn, such as being gotten, and clarify that you captured the person who did it. In the event that you have enough data t o back it up, that is consistently a decent idea.</p><p></p><p>Finally, we go to the best sort of energizing home paper points, and this is the ones that really rouse you to improve. We would prefer not to have some regular exhausting expression that everybody utilizes that has nothing to do with you, right?</p><p></p><p>So there you have it, the sorts of school exposition subjects that you can concoct, however just in case you're willing to consider new ideas. A little innovativeness goes far, so attempt to consider how you can split away from the norm.</p>

Thursday, May 21, 2020

Using an IB Extended Essay Writer For Hire

<h1>Using an IB Extended Essay Writer For Hire</h1><p>One of the most troublesome things for understudies to do in school is to compose an exposition, even an IB Extended Essay author for employ. This is because of the way that composing an exposition is an untouched test for undergrads, who will in general disregard composing for packing for tests. Besides, most understudies have constrained time to do look into and appropriately get ready for exams.</p><p></p><p>Because of these issues, it would be an enormous test for an IB understudy to compose an all-encompassing exposition all alone. In any case, numerous schools have discovered the correct devices to enable their understudies to accomplish a similar accomplishment as the individuals who work for authors. Rather than chipping away at his own, an understudy can go to an establishment for help. The assets an IB understudy will utilize are similarly as significant as the assets utilized by the understudy's professor.</p><p></p><p>First, the IB Extended Essay author for enlist must have the option to offer a successful layout. Understudies ought to never hold back on this progression. It is significant that the layout is composed well, in light of the fact that the framework must be adaptable enough to suit any amendment after the task is delivered. This is a pivotal advance in the process.</p><p></p><p>The IB Extended Essay author for recruit likewise should be a decent audience. Understudies who have concentrated great audience members and interpretive researchers will think that its straightforward what their understudies are attempting to state. Moreover, it is additionally significant that the IB Extended Essay author for employ realizes how to give a solid oral introduction and keeps his/her talks interesting.</p><p></p><p>Finally, the IB Extended Essay essayist for recruit must realize how to compose the last draft. Since the assignments are turned in right off the bat in the semester, understudies should be comfortable with the arrangement before hand. This progression is significant, since it includes accomplishing more altering on the last draft.</p><p></p><p>Not each IB understudy has the correct instruments to succeed. Along these lines, an understudy's encounters with the assets accessible will assume a major job in their prosperity. An understudy who has perused and been presented to a ton of assets will in all likelihood have a vastly improved possibility of succeeding. Likewise, understudies who are confronted with poor perusing abilities may not get the full advantages of the assets, however they may even now succeed.</p><p></p><p>Finally, on the off chance that you wind up experiencing difficulty finding an IB Extended Essay author for enlist, at that point guarantee that you completely inquire about which sch ool you are thinking about joining in. This will assist you with settling on the correct choice. Moreover, this examination will likewise assist you with choosing whether you need to work with a nearby organization or a bigger national organization. This is imperative to guarantee that you approach the best resources.</p>

Sunday, May 17, 2020

Analyzing Mr. Keating’s Teaching Concept in Dead Poets...

â…   Introduction 1.1 Brief Introduction of Dead Poets Society In 1959, Welton Academy is respected by the people for its dignified style at that time. The education mode there is fixed, not only monotonous but ideology shackled. However it all changed in the hands of a new teacher. John Keating’s educational method against tradition brought vitality to this school: in his classroom, he encouraged the students to stand upon the desk, to observe the world around with a different perspective; he introduced thoughtful poetry to students; the free divergent thinking philosophy he advocated caused great repercussions among students. Gradually, some people accepted him, began to bravely face every day and grasp their own life. Charlie is eager†¦show more content†¦(3) Learning from Doing. The knowledge children gain from listening and reading is not real. The primal and impressive knowledge was gain from doing something like experiment. When we engaged in activities that are meaningful to us, our study effect will be magically revealed. So the study from doing will never be replaced by textbooks. (4) ‘Children Centered’ Theory Proponents of this theory take a child’s development as a natural process that teachers can not dominate, but being a ‘natural servant’. Take children’s interest as the center, emphasize children’s personal development and growth and put students in central point of teaching. Promote new forms, content, methods of education. 2.3 Influences to American Education Due to the establishment of guiding ideology based on people (children, learners), it would inevitably lead to the overall changes which are related to this aspect in education system. That is this whole education reform, at the end of 19th century, early 20th century American society really needs. In this sense, the first contribution of Progressive Education to American education is that, it powerfully promotes American education from agricultural age to industrial age, from modern to contemporary. The Progressive Education constitutes an important beginning of modern American education. Another critical contribution of Progressive Education to the development of American education in 20th

New Article Reveals the Low Down on Pharmacy School Personal Statement and Why You Must Take Action Today

<h1> New Article Reveals the Low Down on Pharmacy School Personal Statement and Why You Must Take Action Today </h1> <p>Nobody can tell you what to compose. Regardless of what it is you are composing, make sure to sound extremely positive and eager. </p> <p>What's more, it feels like school program has been delivered for some super-individuals, since you can't stand the stream. In the event that you have worldwide experience, it probably won't set you apart in a completely unique manner, however it's advantageous to show your diverse experience and affectability. For example, you may have various significant encounters which are completely identified with worldwide wellbeing or working with the underserved. Inasmuch as you expound on your encounters with respect to how they helped you to develop and the manner in which they impacted your decisions, you won't be seen in a poor light. </p> <h2> The Start of Pharmacy School Personal Statement</h2> <p>The article ought to have as its essential topic why you might want to visit the drug store school you're composing the paper for. Your article should be historical, in this manner it should spill out of your own understanding. In particular, guarantee that it shows that you are an unmistakable applicant. Composing articles can be trying for certain understudies. </p> <p>Discover which is arranged in secondary school. You're putting forth a valiant effort, however the results are now and again not fulfilling. Clinical school counseling organizations show up in a collection of structures. Drug store isn't simply developing but at the same time it's calling that is flexible, appropriate and. </p> <h2> The 30-Second Trick for Pharmacy School Personal Statement </h2> <p>One other significant component is our care group, which is set up to help you nonstop, any date. You may consistently leave a complimentary callback solicitation and one of our private articulation scholars with insight and involvement with the pharmaceutical business will get in contact with you inside one day! Make sense of how to empower a will, either all alone or with the help of an individual. </p> <p>The layout is a fundamental area of the drug store school exposition, as it works as a guide in transit the thoughts are probably going to be sorted out inside the paper from the earliest starting point to the completion. While requesting that an amigo make your proposal letter probably won't be the absolute best thought, you can rely on your companions to edit your drug store school application. Kindly don't be hesitant to get in touch with me at a specific time at whatever point you have any additional inquiries. Given that the correct inquiries are posed by you, you're well on the way to get the most fitting data to pick a structure which has an approach that satisfies your endorsement. </p> <h2> The Hidden Truth About Pharmacy School Personal Statement</h2> <p>Analysis can be done either at the beginning of the timeframe, or toward the finish of the timeframe, as expressed previously. Once more, necessities for various projects will be extraordina ry. You could comprehend that you aren't picked that you'd like except if you can make your program stick out from different candidates at that point. </p> <h2> All About Pharmacy School Personal Statement </h2> <p>If there's a sentence in your very own explanation that may have been composed by another person (particularly Miss America), it does not merit the space on the page. Our absolute first top 10 of what things to place in your private articulation article. That implies you should ensure your announcement varies. A long and exhausting explanation won't can pull in the perusers. </p> <p>You can be sure your private explanation will be high caliber! The individual explanation is among the primary parts of the application. Your very own announcement ought to mirror your tendency and your. Much like an introductory letter for a request for employment it ought to sell you as an incredible candidate! </p> <p>A basic approach to start is to make a diagram. On the off chance that you don't possess an energy for composing your announcement or you're befuddled about the substance, we're here to help you. Start early composing your very own announcement will call for much idea and reflection. Look for help when composing your very own announcement. </p> <h2>Finding Pharmacy School Personal Statement Online </h2> <p>Essays and individual articulations manage the cost of you an opportunity to introduce your. An elegantly composed Personal Statement is a significant guide for you to get in the Pharmacy School you wish to join in. You may need to reword a few sentences or even dispose of a few. In this way, it runs with astonishing exactness without any personal times. </p>

Choosing The Right Topic For Your Church History Paper

<h1>Choosing The Right Topic For Your Church History Paper</h1><p>Researching and composing a congregation history point paper is a remunerating experience. It resembles having the option to collaborate with individuals from varying backgrounds. This sort of paper presents intriguing, auspicious, and exact data to students.</p><p></p><p>An successful research paper is a significant part of any school understanding. You need your understudies to gain from the material you present.</p><p></p><p>Students must be tested to see past the material they are learning in the homeroom. They should likewise figure out how to have a great time while they are learning and creating. This is an incredible route for them to manage the weights of school.</p><p></p><p>A great research paper will give an understudy an alternate method to learn. You would prefer not to exhaust them or bore yourself. Great research s hould start intrigue and help the understudy get more out of the material than what was offered in class.</p><p></p><p>Experience is additionally a significant factor in arranging an examination venture. On the off chance that you have information in your general vicinity of chapel history, it would be an astute choice to talk with a specialist in that field. The individual can give significant understanding and assist you with composing an incredible and enlightening exploration paper.</p><p></p><p>Experience is likewise critical on the off chance that you need to introduce intriguing and exact data to understudies. The more ready you are for the undertaking, the more the understudies will profit by it.</p><p></p><p>When examining various sorts of chapels, you will likewise need to think about nearby issues. Church history points can incorporate neighborhood, territorial, or national strategies. You may likewis e need to consider nearby history that will identify with your own locale. These themes are regularly the most hard to inquire about in light of the fact that you need to depend on the locals.</p><p></p><p>You will in the long run become weary of investing a similar energy and exertion to look into and compose your subjects over once more. Get help presently by inquiring about a venture that will enable your understudies to turn out to be increasingly taught. Exploit online research instruments to guarantee you are set up to introduce intriguing and enlightening material that will help your students.</p>

Saturday, May 16, 2020

Linux operating system - Free Essay Example

Sample details Pages: 29 Words: 8608 Downloads: 6 Date added: 2017/06/26 Category IT Essay Type Essay any type Did you like this example? TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Enumerate the various costs associated with the performance, security, support, and maintenance of the Ubuntu within the bank. Answers What is Windows? Microsoft Windows is a series of computer operating systems and GUIs (Graphical User Interfaces) produced by Microsoft Corporation. Windows was the first operating environment introduced by Microsoft in 1985 as an add-on to MS-DOS. Windows was introduced because of the growing interest in Graphical User Interfaces (GUIs). Then Windows dominated the worlds personal computer market, overtaking the Mac OS, which had been introduced previously. Microsoft has introduced two parallel routes in their operating systems. One route is for Home users and the other route is for Professional IT users. The home versions have greater multimedia support and less ability for network and security. But Professional versions have low multimedia capabilities and better networking and security. Windows operating systems are commercial products and we should purchase license in order to use the products. And also the source code of windows products are closed and owned by Microsoft. Linux is a f ree and open source Operating System referring to Unix-type operating systems originally created by Linus Torvalds with the support of developers all over the world. Linux source code is freely available to everyone and anyone can freely modify and redistribute both commercially and non-commercially. Linux kernel can be defined as one of the best kernels that uses today. And further, many organizations have begun to use Linux based operating systems because of its high security and low cost. Linux is well known for its use in servers. And also Linux can be installed on vast variety of hardware, such as mobile phones, watches, mainframes, supercomputers and etc. Fedora, Suse, Mandriva, Ubuntu, Kubuntu and Red Hat are some popular distributions of Linux. Don’t waste time! Our writers will create an original "Linux operating system" essay for you Create order Comparative Features of Windows and Linux Malware Threats Security is a vital feature that every Operating System (OS) should provide. Because operating system is a key requirement of every computer system. Therefore everything depends on it. Malware or Malicious Software is a computer program that is designed by computer criminals in order to damage the systems and theft important information from computer systems. Therefore a network OS should have a thorough security. Without security, the network is vulnerable to larger number of threats. Windows Microsoft Windows OS is the most popular operating system in the world. It runs nearly 90% of desktop computers in the consumer market, and is the main operating system of the vast majority of commercial and institutional users. Therefore this makes windows equipped machines larger target of malware (or malicious software) which is written by computer criminals who want to cause much damage to the system. According to the surveys that conducted by Kaspersky Lab have revealed that more than 11,000 malware programs for windows were discovered just in the second half of 2005. And also nearly one million Windows based computers have been infected with Botnets (Botnet is a small computer program used to control other computers remotely). In windows based computer systems some malware are very hard to remove without using an Anti-Malware program. Linux In year 2006 approximately 800 Linux malware were discovered. Most of the malware are propagated through the Internet. Usually Linux based malware are extremely rare. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. Because of the rarity of malware threats, there is no initial requirement for Anti-Malware programs in Linux based systems. But anti-malware software such as ClamAV and Panda Security are rarely used for Linux servers for more security. Resource Sharing Computer Network is a set of interconnected computers that is used to share resources such as printers, scanners, information, storage and etc. Therefore operating systems should support for reliable resource sharing. Reliable resource sharing increases the networks performance. Linux and Windows belong to two different platforms. Though they provide different facilities, they provide they initial requirements of a network. Usually Linux performs well for file sharing and Windows performs well for Printer, Scanner and other hardware resources sharing. Cost For desktop or home use, Linux is very cheap or free, and Windows is so expensive. For sever use, Linux is very cheap when comparing with Windows. Microsoft allows a single copy of Windows to be used on only one computer. In contrast, once we have purchased Linux, we can run it on any number of computers for no additional change. For instance in year 2005, Windows XP Professional Edition was sold for $200 and Windows Server 2003 Standard Edition with 10 Client licenses was sold for $1,100. But we can download Linux distributions freely from their web sites. Otherwise we can purchase a assorted distributions of Linux in a box with CD and manuals and technical support for around $40 to $80. Bugs All software has and will have bugs (programming mistakes). Linux has a reputation for fewer bugs than Windows. Windows is developed by faceless programmers whose programming mistakes in Windows are hidden from the outside world because Microsoft does not publish the particular source code for Windows. Microsoft believe that their source code as a trade secret. In contrast, Linux is developed by hundreds of programmers all over the world. They publish the source code of the operating system to the world. Therefore it is stronger and less vulnerable for threats. That is why most of the organizations use Linux for their networks. Linux is getting update from many talented programmers all over the world. Network Configuration When comparing with Linux network configuration, Windows configuration is easier. Because of generally Windows is based on GUI (Graphical User Interface). Therefore anyone can understand Windows based network configuration without having much knowledge. But Linux is generally based on Command Line or Terminal and there should have a good knowledge about Linux in order to implement a network by using Linux. File System In Windows based systems the support NTFS, FAT, ISO 9660, UDF and others. But in Linux based systems they use ext2, ext3, ext4, ReiserFS, FAT, ISO 9660, UDF, NFS, JFS, XFS, and others. When comparing with Windows, Linux supports for many file systems. But now Windows has 3rd party drivers for ex2, ex3, ReiserFS, HFS and others. System Stability Windows operating systems based on the NT kernel and it much more stable than the other older versions of Windows. But if we are using unsigned or beta drivers, it can lead to decreased system stability. Linux window manager is a key component of X-Windows based GUI system and can be highly stable. Mechanisms used to terminate badly behaving applications exist at multiple levels, such as Ksysguard and the kill command. If the GUI fails Linux can use a text based system. This feature is a powerful feature in Linux for network stability. Interoperability features of Fedora 12 with Windows Within this task I used Fedora 12 instead of Ubuntu. Windows and Fedora belong to two different platforms. Therefore their mechanisms are different. That is why the feature interoperability is needed. Interoperability can be defined as the ability to work with each other. In order to exchange messages between each different platform reliably without any errors or misunderstandings, there should have a common background between each platform. Likewise Windows and Linux (or Fedora 12) also has that kind of common grounds that support for exchange messages between each platform. Samba Samba can be defined as a re-implementation of SMB/CIFS networking protocols. It was developed by Australian Andrew Tridgell. It provides various facilities for file and printer sharing between Windows, UNIX and UNIX like systems such as Linux, Solaris, AIX, and Apples Mac OS X server systems. Samba runs on most systems and now it has become a standard of most of the distributions of Linux (such as Fedora, Redhat, Mandriva, Suse and etc). When we need to share files and printers between different platforms such as Windows and Fedora, we should have to configure Samba. That is how we make interoperability between each platform. DHCP DHCP is short for Dynamic Host Configuration Protocol, a protocol used for assigning dynamic IP addresses to devices on a network. With a dynamic addressing, a device can have a different IP addresses every time it connects to the network. Though some systems and devices are allow to change the IP addresses while it is still connected, DHCP also supports a mix of static and dynamic IP addresses. DHCP simplifies the network administration because the DHCP server keeps the track of IP addresses rather than requiring an administrator to manage the task. I consider that the DHCP is also an interoperability feature because it can assign IP addresses to any platform such as Windows and Fedora. When a LAN network has a mixture of a Windows and Linux based computers, DHCP can assign IP addresses to all computers without a barrier of the platform. X Windows System The X Windows system is a windowing graphical user interface that almost, but completely, entirely unlike Microsoft Windows and the Macintosh. This X Windows System is an open, client/server system that for managing a windowed graphical user interfaces in distributed network. Earlier UNIX based systems used Shell as an interface. Shell is an inbuilt special program that allows users to enter commands in a CLI or Command Line Interface. But the new versions of UNIX-like systems heavily use X Windows as a Windows like graphical user interface. Earlier it was very difficult to work with Windows and Linux through CLIs. Because of Window was completely GUI (Graphical User Interface) and Linux was completely CLI. But now the new distributions of Linux come with the X-Windows capability. Therefore now the both systems can work more reliably and easily as a whole. X Windows is also an interoperability feature that is provided by Fedora 12 in order to work with windows systems much ea sily. TCP/IP TCP/IP shorts for Transmission Control Protocol and Internet Protocol. Generally it is a protocol suit that is used for the internet. It provides easy communication across different platforms and provide basis for the global internet. And also it can be defined as a basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or extranet). When we set up with direct access to internet, our computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. In an intranet there may have computers with different platforms such as Windows and Linux. But using TCP/IP protocol we can connect these computers. Both Windows and Linux distributions support for TCP/IP. Therefore it can also be considered as an interoperability feature of Windows and Linux. DNS DNS is Short for Domain Name System. DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, theyre easier to remember. The internet is based on IP addresses. Every time when we use a domain name, DNS server must translate the name into the particular IP address. In intranets also some organizations use DNS servers to name their network computers. Though it is a Windows based computer or a Linux system, it carries out its task perfectly. Because DNS also has a interoperability feature to work with different platforms. Enumerate the cost associated with the Performance, Security,Support and Maintenance of Fedora 12 within the Bank. For this Task I used Fedora 12 instead of using Ubuntu. Because Ubuntu do not have an inbuilt a Samba server facilities and it should be downloaded as a third party tool. But Fedora 12 has those facilities for printer and file sharing. Performance Performance is a vital part of a network. The efficiency of a network depends on the hardware and software performance. To the banks network I used one of the distributions of Linux called Fedora 12 as the NOS (Network Operating System). Generally Linux based operating systems are lightweight and need low performances. As the other distributions of Linux, Fedora 12 is also a lightweight operating system that requires low performance hardware. Bank is a place where many transactions are taken place every second across their branches and other networks. Therefore the banks network should be stable and reliable. Due to these reasons a bank should use trusted and reliable hardware and software in order to increase their network performances. Usually the costs of network devices are relatively high in the modern market. And also the network operating systems like Windows are extremely expensive. Therefore by using a free and open source OS like Fedora 12 we can reduce the money wasta ge. Further it does not need high performance computers for installation and does not consume lots of hard disk space like Windows does. Fedora 12 provides online updations and does not have a limit on installation. One copy of Windows can be installed to a one computer only. Otherwise we have to buy license. But Fedora 12 can be installed to any number of computers without any limitations. According to those above reasons I think that Fedora 12 provides good performances and also it is more cost effective when comparing with Windows. Security Security is a key requirement of a network. Otherwise anyone and any malware can attack and theft the important information from the network. Therefore OS (Network Operating System) developers try to increase OSs security features. If theres no security within an OS, then it is totally fails. Fedora 12 is a distribution of Linux and it is categorized as Free and Open Source Software. Linux based systems and their source codes are freely available to anyone and can be modified as required. Fedora 12 has also been developed by many programmers all over the world and it is a strong operating system. But windows based systems are commercial OSs and they do not publish their source code to the public. Therefore it is developed by limited programmers and there security is also limited. That is why we need third party security tools to protect windows based systems. The third party trusted and reliable Anti-Virus guards or third party security systems are more expensive and it is an ad ditional cost to the windows based systems. But Fedora 12 has a strong in-built security mechanism (but Windows dont have) such as DPI (Data Packet Inspection) and ISD (Intrusion Detection System). Because it is developed by many programmers all over the world. Therefore it doesnt need any third party virus guards. The cost for additional security efforts has reduced in Fedora 12. Therefore Fedora 12 is a cost effective operating system when comparing with Windows. And also it is the best choice for a cost effective banks network system. Support Computer operating systems and other software are not 100% perfect. That is why the manufactures provide support for their products. When a problem is taken place in a system, we can get the manufacturers support to solve the problem. And also manufactures provide patches and other updations to reduce the vulnerabilities of their products. Microsoft Windows also provide free updations and online support for their products after they are purchased. Though Windows provides free online support services for their products without any payments, Fedora and other Linux based operating systems do not provide free support services. If we need to get a support from Linux based system, we should pay some amount of money for their service. But they provide 24 hours update service for their products. In Fedora should have to pay for their services. Though the support service is not cost effective for the bank, the OS is totally free for download. Maintenance After installation and Configuration every computer system need to be well maintained. Windows systems are much easy to maintain because it doesnt need well trained persons (compared with Linux). But Linux systems are more complex and cannot install, configure and maintain if theres no knowledge of it. In order to maintain the Fedora system in the bank, the bank needs a well trained personnel or network administrator. Anyone cannot maintain a Linux system; therefore the cost of a Linux based network system administrator is higher when comparing with a Windows Network System Administrator. Manufactures support is always need for system maintenance. But we need to buy the service advices in Fedora form its manufacture. TASK 02 Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: A brief overview of current VPN technologies (both hardware and software). Design a suitable VPN using appropriate Internet Service Providers (IPS) for the requirements of the bank. Identify and list the hardware and software required to implement the banks VPN. Produce a schedule for the implementation of the VPN, detailing the installation of any necessary hardware, network operating system upgrades and associated applications software required. Write a section of the report on the responsibilities and level of service required from an ISP in order to implement a successful VPN within the company. Answers Although the topic VPN or a Virtual Private Network is a much complex subject in networking field, the basic idea of a VPN is quite simple. A corporation may have a number of officers (or group of officers) in different locations, and each of these locations can have its own local network. In many corporations there are many employees working remotely by connecting to the corporations local network at home or on the road. And also business partners can join together in extranets to share business information. Interconnecting these separate networks and locations over a public network is called a VPN or a Virtual Private Network. The apparent simplicity of VPN makes us think that it is a simple concept. But there is an ever-increasing number of VPN types, and a huge range of technologies for implementing VPNs are available today. This makes us easy to decide the most appropriate VPN solution for our need. The most common way to interconnect sites has been to use ATM or Frame R elay (FR) leased lines supplied by a service provider. The following parts of this task describe the VPN technologies, cost effective hardware and software solutions and responsibilities and level of services required from the ISP (Internet Service Provider). VPN Technologies As I mentioned above, VPN is a complex subject in networking. Therefore different sort of VPN technologies are introduced for different purposes. These technologies provide secure and cost effective solutions for telecommuters, home based workers, road warriors, remote sales people, mobile executives and also for global business. Within this task I expect to provide a short description about the current VPN technologies that are widely used today. I divide these technologies into two major parts such as Hardware Technologies and Software Technologies. According to my perception, I believe that the VPN protocols that are used to establish a VPN connection should also be a part of the software technologies. Because these protocols are created by using specialized algorithms and programming languages. Therefore I consider those protocols as Software Technologies within this task. Software Technologies PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) protocol technologies are heavily based on this PPP (Point-to-Point protocol) technology. PPP was designed to send data across dial-up or dedicated connections. PPP technology is used to encapsulate IP packets within PPP frames and then transmits the encapsulated packets across a point-to-point link. PPP was specially designed to use between dial-up clients and NASs (Network Attached Storage). PPTP (Point-to-Point Tunneling Protocol) PPTP is one of VPNs first protocols built on PPP (Point-to-Point Protocol) to provide remote access for VPN solutions. PPTP technology encapsulates PPP frames in IP datagrams using GRE or Generic Routing Protocol. PPTP uses authentication techniques within PPP. PPTP can be used for remote access and router-to-router VPN connections. The Point-to-Point Tunneling Protocol (PPTP) uses TCP (Transmission Control Protocol) connection for tunnel management and GRE for encapsulation. L2F (Layer Two Forwarding Protocol) L2F was designed to transmit data from corporate sites to their users by using tunnels. This protocol or VPN technology was first implemented in CISCO products. L2F doesnt depend on IP and its the only way that it differs from PPTP. This protocol accepts other authentication mechanisms and allows tunnels to support more than one connection. L2F uses PPP for authenticate the remote user and its done twice at the ISP and then the second at the gateway to the connecting LAN. This is a Layer-2 protocol and handles IPX and NetBEUI as well. L2TP (Layer Two Tunneling Protocol) L2TP is a combination of L2F and PPTP and it exists in the second layer of the OSI reference model. That is why it named as Layer 2 Tunneling Protocol. L2TP is defied for packet media, Frame relay, ATM and X.25. It has its own tunneling protocol and uses PPPs PAP and other advanced mechanisms for authentication. Its encryption method is based on IPSec (Internet Protocol Security). IPSec (Internet Protocol Security) IPSec is a solution for VPN security and it exists in the third layer of the OSI reference model. IPSec uses number of encryption technologies to provide confidentiality and integrity of data. IPSec allows senders to authenticate and encrypt each packet. There are two modes of IPSec such as Transport mode and Tunnel mode. These two modes depend on the situation of security and traffic. Transport mode authenticates and encrypts the transport segment of an IP packet, and tunnel mode authenticates and encrypts the whole IP packet. VPN Client Software VPN Client software provides protected access to corporate resources via wireless, broadband, and dial-up connections with robust encryption and broad support across multiple connection types. Most of the modern VPN software simplifies the configurations of security policies and management of certificates through its graphical user interface. Microsoft, Netgear, Stone Gate and CISCO are some popular manufactures for VPN client software (But each of these manufactures use different sort of technologies to implement these VPN client software). Hardware Technologies VPN Router In network communication, data are transferred in the form of packets. Usually a router is a hardware device or a computer that looks at the IP packets and decides how to forward it. Routers operate at the network layer of the OSI reference model and that is used to connect networks or connect the networks to the internet. When a packet is received from the NIC (Network Interface Card) card, the router reads the IP address on the packet and forwards it to the appropriate network interface. The packet forwarding depends on the IP address and routing information that contains in the packet header. Even if the network architecture differs, the router has the capability to connect them. Though it can connect different network architectures, I cannot transform data from one data format to another (TCP/IP to IPX/SPX). Software for VPN router functions or normal router functions can be added to a server or a specialized computer that is optimized for communication. VPN Concentrator VPN Concentrator is a device that is used to combine several communications channels into one. And also it is further used to tie multiple terminals together into one line. Although a device called Multiplexor carries out the same function as VPN concentrator, the total bandwidth of the concentrators inputs is not equals to its outputs. The concentrator has the ability to store data temporary but the multiplexor does not have this ability. An Ethernet hub, which is a multiport repeater, is sometimes called as a concentrator. VPN Gateway Although a VPN Gateway can be implemented as both Hardware and Software, I consider this as a hardware technology because for the ease of categorization. VPN Gateway is a device (can be a Hardware/Software) that is used to convert packets from one network protocol to another. Gateway acts as an entry and exit point of data where some kind of processing is done on the information that passes through it. Sometimes the VPN Gateway also called as a router or Layer 3 Switch. Gateway is a device that is used to join two networks together. It can be implemented completely in hardware, completely in software or as a combination of both. VPN Firewalls Firewall can be implemented as both hardware and software or as a combination of both. But I included VPN Firewalls in the VPN Hardware category because for the ease of categorization. Network security is a major need of an organization. Firewall is one such solution that allows the computer to prevent unauthorized access of any application on the computer. Firewalls monitor traffic in the computer or the network. This monitoring can be done by the software in the computer or router. When using a VPN in an organization, the organization has a great requirement of using a firewall solution. Because of there may have a possibility of unauthorized access to the organizations confidential information. By using VPN firewall technology we can reduce the outside threats. Even though the above technologies directly look like just software and hardware, they all have a complex technology encapsulated within them. The above VPN technologies are widely used within the modern VPNs. Description of Banks VPN Due to the requirements of the bank I designed a VPN that provides cost effective networking solutions. The bank needs their agents and branches to connect to the banks network secure through VPN. Therefore I designed a network that provides the above facilities. When designing the banks network I assumed that the particular bank is the head office and the agent is another organization. Although the bank may have many agents and branches, Ive mentioned only one agent and a one branch within this network overview. Banks head office is the place where many of the confidential information about the transactions are stored. Therefore its network should be more secure than any other else. According to my VPN design I connected the banks network to the internet through an ISP (Internet Service Provider) in order to get the VPN access. The bank connects with the ISP directly using a VPN Router (this router is highly configured and cannot be accessed by the unauthorized VPN clients). Th en I added a DMZ (Demilitarized Zone) in order to secure the LAN network from the unauthorized access. If the File server was implemented within the DMZ, it may vulnerable to the threats and there may have a possibility of information thefts. Therefore I implemented the File Server far away from the DMZ and its secured with two highly configured firewalls. Though someone can get into the DMZ in order to access the Web Server, he/she cannot penetrate the other firewall without proper authenticate information. All the computers within the Banks network can access the WEB server and File server according to their assigned privileges. Other agents and branches have rights to access the banks network (using Router to Router connection). Even though the VPN Routers and Firewalls (Hardware) are much expensive, they provide a great security to the Bank network. In order to reduce the software cost I recommend free and open source software for both servers and clients such as Linux, Open Office and etc. Hardware and Software required to implement the banks VPN According to my VPN design I need several kinds of software and hardware to implement the network. Therefore Ive chosen some products to which supports for VPN. Some products are little bit expensive but provide high security and reliable service to the banks network. When choosing the software to the network implementation, Ive chosen some widely needed software. Hardware VPN Router SMC Barricade VPN BR21VPN Router SMCBR21VPN The Barricade router which has built-in VPN support is an ideal networking solution for VPN. This router consists of load balancing WAN ports, DMZ (Demilitarized Zone) port and a 10/100 LAN port. It has a built in firewall to protect the network from the edge. This router supports protocols such as TCP/IP, VPN connections with PPTP and IPSec. The in-built firewall provides a great protection against DOS attacks (Denial of Service attacks) and also it provides flexible Access Control. This router has the ability to access remote corporate network securely through an authenticated and encrypted tunnel over the internet. Switch NetGear Pro-Safe switch is suitable for high-speed network on a small scale. This switch consists of five auto-speed-sensing 10/100/1000 Mbps UTP ports. And also this it has the capability to handle huge workloads (this feature is more useful because of the Web Server is connected to this switch within my VPN design). This switch can move large files across the network instantly and let devices to connect to the network painlessly. The metal chassis protects the interior working parts from physical damages. Hub Cisco FastHub 424 Ethernet Hub (WS-C424M) The CISCO FastHub 424 10/100 of high-performance Fast Ethernet repeaters deliver unmatched flexibility and low-cost managed connectivity to the desktop. The FastHub 424 10/100 provides ultra low-cost 10/100 autosensing desktop connectivity where dedicated bandwidth is not required. The FastHub 424 will be deployed as a high-performance solution for providing 10/100 Fast Ethernet connectivity to the desktop. This hub provides dedicated connections over extended distance (up to 2Kms) to upstream switches or routers. Firewall NetGear ProSafe FVS338 Firewall supports for 50 VPN Tunnels for Encrypted Remote Access. This VPN firewall with 8 Port 10/100 switch and Dial Back-up is an SNMP-Manageable, High Performance network solution that furnishes multidimensional security. Broadband capable VPN firewall comes with connection insurance: a built-in serial port for dial-up access. This hardware firewall provides greater protection to the network from outside threats. Server Machine Hewlett Packard ML115 G5 (470065-098) Server The HP ProLiant ML 115 G5 is a perfect server for the growing businesses. Designed with SMB (Server Message Block) needs in mind, this product offers expandability through multiple PCI-Express slots, and four hard disk drive capacities. This server has the ability to automatically backup vital information. UDP Cable (Unshielded Twisted Pair Cable) These ultra high performance gigabit Ethernet patch cables are perfect for connecting PCs in areas where space is tight. With all the reliability and performance of a standard Cat 5e patch cable, this 1.2mm thick cable is able to fit into even the tightest space and give a neater, less cluttered appearance to desktop or wall jacks. Software Fedora is a Linux-based operating system that showcases the latest free and open source software. Fedora is always free for anyone to use, modify, and distribute. It is built by people across the globe. Therefore this operating system is less vulnerable for threats and supports for many platforms. This is a good alternative for cost effective networking systems. This OS has many networking features that supports for reliable network communication. NetGear VPN Client Full Version for PC The NetGear ProSafe VPN client software provides secure network access for remote users and mobile workforce requiring connectivity to corporate network resources. This VPN client software is ideal for customers using NetGear wireless and wired VPN/Firewall routers. NetGear VPN Client supports for all windows platforms and it is easy to configure and deploy. And also this software is cost effective and provides broad security support with the interoperable with IPSec VPN solutions with other major manufacturers. I recommend this product for client computers which have Windows platform. The AVG Anti-Virus SBS Edition gives advanced antivirus software to guard Microsoft Windows server network with maximum spyware protection. It has the ability to protect the system from viruses, Trojans, worms, spyware, adware, and simultaneously scans files, email and internet traffic. The Web Shield and LinkScanner technologies keep network safe from malicious websites and hackers. I recommen d this software product for the client computers which mainly have Windows Platform. Schedule for Implementing the VPN As in software development, the network implementation mechanism also has a procedure of implementation. Network Design, Implementation, Testing and Maintenance are the abstract level steps that should be followed in order to implement a complete and well functional network. Before implementing a network, we should design a proper schedule with all the facts. The following schedule is the one that I consider when Im going to implement a network as a networking advisor. Responsibilities and Services Required from an ISP ISP who plans to offer VPN services has many responsibilities. As the customer has a responsibility upon the enterprise network, ISP has a responsibility upon giving connection and services. ISP should provide installation and support services for their all customers. Following are some services and responsibilities of an ISP. Responsibilities Decide how VPN services will be provided relative to their other services, such as leased line, frame relay. Decide the most appropriate services and data rates in order to fulfill the customers requirements. Determine the security services that should be provided. Decide the services which should be delivered at the customer premises versus those delivered within the SPs infrastructure. Integrate VPN services into their order administration, provisioning and operating systems. Provide the necessary services on time. Choosing most appropriate hardware and software products that provide reliable services to the particular customers. Determining the billing procedures for VPN. Establish processes and resources for VPN design, installation and support. Services Provide complete security for all VPN. Provide IP services necessary to the other network infrastructures by making arrangements with other SPs. Providing technical services such as repairing immediate damages and system failures of the SPs side. Provide 24 our customer service especially for VPN owners. Provide training sessions to the sales and staff. TASK 03 Prepare a short report on Network Security covering: Trojan horses, Worms, Viruses and the major network security issues. Why there should be a Network security policy in place in all the networked companies? Introduction to Network Security A computer network is an interconnected group of computing nodes that is used to share information and other resources (such as printers, scanners and etc) according to a well defined set of rules and conventions known as Protocols. The interconnectivity of the computers reduces the network security and increases the vulnerability. Because, when a computer is uncovered to the public network (or internet), unauthorized access and other malicious software attacks can be occurred from the outsiders. That is why the need of network security is occurred. Network security means understanding the risks, deciding how much risk is acceptable, and gets necessary measures to avoid the risk. Different levels of security are appropriate for different organizations. It varies from one another according to their purposes and rules. No network is 100 percent secure and we cant even aim for that level of protection. We all know the advantages of computer networks and the internet. Connecting our network to the internet provides access to a vast amount of information and allows us to share them with each. Although this nature of the internet creates so many benefits, it also provides unauthorized users and malicious software easy access to numerous targets. This is the most vital and critical situation of internet. Therefore we all have a responsibility to ensure the safety of our networks. The following parts of this task describe some of the network security threats and the measures that can be taken to protect our networks. Network Security Threats When we talk about network security threats, there are mainly two general categories of threats: intentional and unintentional. Unintentional threats can be defined as the threats that are carried out by accidents or ignorance. For instance, accidently spills water on a server and short the circuitry makes the server inoperable is not an intentional action. But purposely poured water on a server in order to make the server inoperable is an intentional action. According to these examples we can get a vivid idea of intentional and unintentional threats. Intentional threats or attacks can be further divided in to two sub categories such as active and passive threats. An active threat attacks to a system directly. Breaking in to a system and change the sensitive data is the best example for an active attack. In contrast, a passive threat doesnt attack to a system directly. But it observes the actions and the other behaviors carefully and then attacks to the system silently. Looki ng key presses when typing a password, collect private and confidential information secretly and social engineering techniques are some examples for passive threats. Trojan horses, Worms, Viruses, Hackers, Spyware, Phishing, Zombies, Spam, Macros, IP Spoofing, SYN Flood, Teardrop, DOS(Denial-of-Service), FIN Attacks, Fraggle Attacks, Man in the middle and Session Hijacking are some examples for common network security threats. Trojan Horses According to the legend, the Greek won the Trojan War by hiding in a huge, hollow wooden horse to sneak in to the city of troy. Then they conquered it and won the battle. In todays computer world, Trojan horse is defined as a malicious security breaking computer program that pretends or masquerades as a beneficial program. Trojan horse virus is a common security threat that yet difficult to remove. Trojan horse viruses are hidden within seemingly useful software programs. When we execute or install the infected software in to a computer, this type of virus will start infecting to the other files in the computer unknowingly. Trojan horse viruses are mainly used for stealing important information from users computers. Then they send this information to Internet servers designated by the virus developers. After this process, the developers can gain a level of control over the computer through these Trojan horse viruses. While these things happen, the users will notice that the infe cted computers become slow and then it can lead to a computer crash. Trojan horse viruses are mainly spread through email attachments and chat software such as Yahoo Messenger and Skype. Once the users open the attachment, the viruses immediately infect the system and carries out the tasks mentioned above. Best ways to prevent Trojan horse viruses: Do not download form people or sites which you arent 100% sure about. Beware of hidden file extensions. Always be aware on the files come from the outsiders. Do not type command that others ask you to type. Do not go to web addresses mentioned by strangers. Always use up to date anti-virus software. Do not open unknown emails. Worms A computer worm is a self replicating computer program, similar to a computer virus. But it differs from a computer virus because of its ability to run itself. Although a virus needs a host program or a medium to run (because virus code runs as part of another program), a computer worm doesnt need a host program to spread. But modern computer worms use files to hide inside. Worms have the ability to spread copies of itself or its segments to other computer systems via network connections. Mainly there are two types of worms such as host computer worms and network worms. Host computer worms exist in the computer they run on and use network connections only to copy themselves to other computers. Host computer worms terminates themselves after they send a copy to another host (so that, only one copy of the worm running somewhere on the network at any given moment). These kinds of worms are called rabbits. Network worms have several parts or segments. Each segment of the worm exe cutes on different machines and carries out different tasks. And they use the network for several communication purposes. Propagating their segments form one machine to another is their main purpose. The main part of the network worms is called as octopus that coordinates the work of the other segments. In addition to replication, deleting files on a host computer system and send documents via emails are some of the other actions carried out by worms. Best ways to prevent computer worms: Do not uncover an unpatched, nonupdated computer or other devices to the internet. If possible, always use software or hardware firewalls. Patch and update the operating systems and other software frequently. If you have an organization, always train the users. Because the carless mistakes can leads to security threats. Always use up to date anti-virus software. Do not open unknown emails. Always check your system for vulnerabilities. Use spam filters. Delete temporary internet files. Turn off your pc when you are not using it. Turn off auto run on Microsoft Windows system. Viruses A biological virus is a bacterial that makes us sick. It persists within our body and requires something powerful to get rid of it. A computer virus is also very similar to a biological virus in the way they need a host to survive (or a virus needs a medium for its existence). But in the computer world, a virus is a small computer program spreads from one computer to another and interferes to the computer operations. As a biological virus spreads by injecting its DNA into host cell, a computer virus also needs to attach itself to a document or program to infect other computers and programs. Self propagation is the main feature of a computer virus. Just as a biological virus, the way a computer virus infects to a PC depends on its type. Because all computer viruses have their own features and factors that make them unique and dangerous to the health of a computer. Resident Viruses, Direct Action Viruses, Overwrite Viruses, Boot Viruses, Macro Viruses, Directory Viruses, Polymorph ic Viruses, File Infectors, Companion Viruses, FAT Viruses, Worms, Trojan Horses and Logic Bombs are some popular examples for different types of viruses. Computer viruses are easily spread through email attachments and instant messages. Therefore we should never open unknown email attachments. And further, viruses are spread through floppy disks, CDs, DVDs, Flash Drives (Pen Drives) and other storage devices. Having a reliable and updated anti-virus software program is the best solution for this virus threat. How do computer viruses find us? By sharing files with other users. By visiting untrusted web sites. By opening spam emails or email attachments. By downloading free stuffs. By installing untrusted software application without fully reading the license agreement. Symptoms of computer viruses: Slow PC performance. Unexplained data lost. Frequent computer crashes. Unusual computer behaviors Incorrect program installation. Best ways to prevent computer viruses: Use anti-virus protection and firewalls. Get anti-spyware software protection. Update the operating system regularly. Increase browser security settings. Download only from trusted sites. Do not open messages from unknown senders. Frequently visit advisory sites. Hackers Peoples are the only threats for computer network security. Because computers dont have the ability to create malicious programs or launch attacks. Only the people can create malicious programs in order to break into other systems with the help of the computers. Like wise, Hackers are unauthorized users who break in to computer systems in order to steal, change or destroy information. They make the path to break into a system by installing malware without our knowledge. Computer hackers have clever tactics, tools and detailed knowledge of computing. Therefore they break into systems and steal our private and confidential information by using their tools and tactics. The subculture that has made around hackers is often referred as computer underground. Some of the people do hacking for learning purposes. Any computer connected to the internet is susceptible for the threats of hackers. These online criminals typically use phishing scams, spam, email or instant messages and fake web sites to deliver dangerous malware to our computers in order compromise our computer security. Hackers can access our information easily if our computers are not protected with a firewall. What can hackers do to us? Hijack our usernames and passwords. Steal our money and open credit card and bank accounts in our names. Ruin our credit. Sell our important information to the other parties. Make purchases. Use and abuse our Social Security number. Best ways to prevent hackers: Use firewalls. Update our operating system regularly. Use anti-virus protection. J:Networking assignmentPictures?511-0906-2321-1306_Guy_Hacking_a_Computer_clipart_image.jpgGet anti-spyware software protection. Dont open messages from unknown senders. Increase browser security settings. Avoid questionable Web Sites. DOS (Denial of Service) attacks In a denial of service attack, an attacker tries to prevent users from accessing information or other services from a particular network by flooding it with unbearable traffic. In other words, by using DOS attacks, attacker attempts to make computer resources unavailable to its users. Therefore the legitimate users cannot access the email, websites, online accounts and other services that are provided by the victimized computer. Usually DOS attacks are launched by computer hackers. When we type a URL of a particular website on the web browser, we are sending a request to the server that the particular web page is stored. Usually a server can process a limited number of requests at once. So that the attackers overload the server with vast number of requests that the server cannot handle. Therefore the server buffer or backlog will overflow and the services it provides will be unavailable to their legitimate users. This is called a Denial of Service. Like viruses, different kinds of DOS attacks are introduced unceasingly by DOS attackers. Types of Denial of Service Attacks: Flood attack Ping of Death attack SYN attack FIN attack Teardrop attack Smurf attack Symptoms of a DOS attack: Unusually slow network performance Unavailability of a particular web site Inability to access any web site Increasing the amount of spam receive Best ways to prevent DOS attacks: J:Networking assignmentPicturesDOS_attack.jpgInstall and maintain anti-virus software Install a firewall Applying email filters. Spyware Spyware is a type of malware that installed on computers and collect information about users without their knowledge. This installation process is carried out secretly by the spyware program. Sometimes network administrators purposely install spyware programs in order to monitor the other users on the network. As the term spyware suggests that it secretly monitors the users computing, its functions go well beyond simple monitoring. Spyware programs are mainly used to collect users personal information, such as Internet surfing habits and sites that have been visited frequently. Spyware programs change computer settings, resulting in slow connection speed, different home pages, and loss of internet or functionality of other programs. Unlike viruses and worms, spyware do not have the ability to self replicate. Usually spyware programs are mainly designed for commercial purposes. As I mentioned above, delivery of automatic pop-up advertisements, theft of personal information and monitoring web activities are some functions carried out by spyware for marketing purposes. Symptoms of Spyware: Slow connection speed. Changing the home pages. Malfunction of other applications. Failure to boot. System crashes. Application freezing. Best ways to prevent Spyware: Read licensing agreements before installing the applications. Beware of clickable advertisements. Scan computers often. Keep the Internet browser up to date. J:Networking assignmentPicturesspyware.jpgUse anti-spyware programs. Brief Introduction to Security Policy Once a company has determined which parts of the company should be protected, then they document a set of rules in order to protect the company assets. These documented set of rules are defined as a security policy. Although a security policy may seem to be an unnecessary set of rules, the benefits far outweigh the work. Because of it protects the Confidentiality, Integrity and Availability of company data. Mainly a security policy has the following three important benefits: Communicates a common vision for security throughout a company. Represents a single easy-to-use source of security requirements. Exists as a flexible document that should be updated annually to prevent the latest security threats. Acceptable use policy, password policy, backup policy, Remote Access policy, encryption policy, Network Security policy, guest Access policy, confidential Data policy and Mobile Device policy are some examples for policies. Why there should be a Network Security Policy, in place in all the networked companies? When organizations connect their networks to the internet, their private and confidential information also expose to the public. Therefore the possibility of outside threats, such as hackers and malicious software has increased. Thats why the Network Security Policies have been implemented by organizations in order to protect their network resources from the outsiders. Network Security Policy is a documented set of rules for computer network access. Usually this is a complex document that consists of rules for data access, web browsing habits, use of password and encryption, email attachment and more. Network security policies protect the company from outside threats an d limit the internal network access from risky employees. Therefore this document is not only a set of rules, but also a guide for the company network protection. Elements of Network Security Policy On the left are the network design factors which the security policy is based. On the right are some basic Internet threats that need to be prevent by using network security policies. Why do we need Network Security Policies? To set the framework for network security implementation. To define the allowed and not allowed actions of the network background. To create a baseline of our current network security posture. To determine the necessary tools and procedures for the network. To define how to handle network security incidents. To communicate agreements and define roles. Bibliography https://www.ciscopress.com/articles/article.asp?p=24833 https://compnetworking.about.com/od/vpn/a/vpn_tutorial.htm https://www.vpnc.org/vpn-technologies.html https://www.vpn-technology.com/ https://en.wikipedia.org/wiki/Vpn https://www.cisco.com/en/US/products/sw/secursw/ps2138/products_maintenance_guide_chapter09186a008007da0d.html https://httpguru.com/ https://www.skullbox.net/vpn.php https://www.alliancedatacom.com/how-vpn-works.asp https://www.computerworld.com/s/article/9002090/What_you_need_to_know_about_VPN_technologies?taxonomyId=16pageNumber=1 https://www.devhardware.com/c/a/Opinions/Radio-IP-Softwares-Mobile-VPN-Technology/ https://www.vpntools.com/vpntools_articles/vpn-software.htm https://technet.microsoft.com/en-us/library/bb742571.aspx https://www.laptop-security-pro.com/current-vpn-technologies.html https://www.vpntools.com/vpntools_articles/vpn-software.htm https://www.ml-ip.com/html/documentation/vpn-ug-key-concepts-4.html https://www.interhack.net/pubs/network-security/ https://www.selfseo.com/story-19229.php https://www.interhack.net/pubs/network-security/network-security.html#SECTION00021000000000000000 https://www.linux.com/archive/feature/122681 https://www.hq.nasa.gov/office/ospp/securityguide/V1comput/Threats.htm https://www.comptechdoc.org/independent/security/recommendations/ https://www.webroot.com/En_US/csc/computer-security-threats.html https://online.localtel.net/spyware/glossery_computer_threat_terms.htm https://www.londonancestor.com/security/computer-security.htm https://ezinearticles.com/?The-Top-Twelve-Threats-No-Computer-User-Should-Ignoreid=56950 https://www.topbits.com/trojan-horse-virus.html https://www.irchelp.org/irchelp/security/trojan.html https://www.ehow.com/how_4735907_prevent-computer-worm-attack.html https://www.antivirusworld.com/articles/computer-worm.php https://www.2privacy.com/www/viruses/computer-worms.html https://www.builderau.com.au/tag/features/linux-networking.htm?page=2 https://www.linuxplanet.com/linuxplanet/reviews/1821/1/ https://www.us-cert.gov/cas/tips/ST04-015.html https://www.answers.com/topic/denial-of-service-attack https://www.windowsecurity.com/whitepapers/How_to_develop_a_Network_Security_Policy_.html https://www.webopedia.com/TERM/s/security_policy.html https://www.cisco.com/en/US/tech/tk869/tk769/technologies_white_paper09186a008014f945.shtml#intro https://www.instantsecuritypolicy.com/?gclid=CMHG9uCS0J4CFcwtpAodHHPujg https://technet.microsoft.com/en-us/library/cc781417%28WS.10%29.aspx https://www.foogazi.com/2006/12/19/5-advantages-of-using-linux-over-windows/ https://forum.notebookreview.com/showthread.php?t=21493 https://ubuntuforums.org/showthread.php?t=189192 https://www.vpntools.com/vpntools_articles/VPN-Protocols.htm https://www.vpntools.com/vpntools_articles/vpn-security-issues.htm https://compnetworking.about.com/od/vpn/tp/vpnsoftwarefree.html