Sunday, May 24, 2020

Biography of Rupert Brooke Poet-Soldier

Rupert Brooke was a poet, academic, campaigner, and aesthete who died serving in World War One, but not before his verse and literary friends established him as one of the leading poet-soldiers in British history. His poems are staples of military services, but the work has been accused of glorifying war. In all fairness, although Brooke did see the carnage first hand, he didnt get the chance to see how World War I developed. Childhood Born in 1887, Rupert Brooke experienced a comfortable childhood in a rarified atmosphere, living near--and then attending--the school Rugby, a famed British institution where his father worked as a housemaster. The boy soon grew into a man whose handsome figure transfixed admirers regardless of gender: almost six foot tall, he was academically clever, good at sports--he represented the school in cricket and, of course, rugby--and had a disarming character. He was also highly creative: Rupert wrote verse throughout his childhood, having allegedly gained a love of poetry from reading Browning. Education A move to Kings College, Cambridge, in 1906 did nothing to dim his popularity--friends included E.M. Forster, Maynard Keynes and Virginia Stephens (later Woolf)--while he broadened into acting and socialism, becoming president of the Universitys branch of the Fabian Society. His studies in the classics may have suffered as a result, but Brooke moved in elite circles, including that of the famous Bloomsbury set. Moving outside Cambridge, Rupert Brooke lodged in Grantchester, where he worked on a thesis and created poems devoted to his ideal of English country life, many of which formed part of his first collection, simply entitled Poems 1911. In addition, he visited Germany, where he learned the language. Depression and Travel Brookes life now began to darken, as an engagement to one girl--Noel Olivier--was complicated by his affection for Ka (or Katherine) Cox, one of his fellows from the Fabian society. Friendships were soured by the troubled relationship and Brooke suffered something which has been described as a mental breakdown, causing him to travel restlessly through England, Germany and, on the advice of his Doctor who prescribed rest, Cannes. However, by September 1912 Brooke seemed to have recovered, finding companionship and patronage with an old Kings student called Edward Marsh, a civil servant with literary tastes and connections. Brooke completed his thesis and gained election to a fellowship at Cambridge whilst captivating a new social circle, whose members included Henry James, W.B. Yeats, Bernard Shaw, Cathleen Nesbitt--with whom he was particularly close--and Violet Asquith, daughter of the Prime Minister. He also campaigned in support of Poor Law reform, prompting admirers to propose a life in parliament. In 1913 Rupert Brooke traveled again, first to the United States - where he wrote a series of dazzling letters and more formal articles - and then through islands down to New Zealand, finally pausing in Tahiti, where he wrote some of his more fondly acclaimed poetry. He also found more love, this time with a native Tahitian called Taatamata; however, a shortage of funds caused Brook to return to England in July 1914.  War broke out a few weeks later. Rupert Brooke Enters the Navy / Action in North Europe Applying for a commission in the Royal Naval Division--which he gained easily as Marsh was the secretary to the First Lord of the Admiralty--Brooke saw action in the defense of Antwerp during early October 1914. The British forces were soon overrun, and Brooke experienced a marching retreat through the devastated landscape before arriving safely in Bruges. This was Brookes only experience of combat. He returned to Britain awaiting redeployment and, during the next few weeks of training and preparation, Rupert caught flu, the first in a series of wartime illnesses. More importantly for his historical reputation, Brooke also wrote five poems which were to establish him among the canon of First World War writers, the War Sonnets: Peace, Safety, The Dead, a second The Dead, and The Soldier. Brooke Sails to the Mediterranean On February 27th, 1915 Brooke sailed for the Dardanelles, although problems with enemy mines led to a change of destination and a delay in deployment. Consequently, by March 28th Brooke was in Egypt, where he visited the pyramids, partook in the usual training, suffered sunstroke and contracted dysentery. His war sonnets were now becoming famous throughout Britain, and Brooke refused an offer from high command to leave his unit, recover,  and serve away from the front lines. Death of Rupert Brooke By April 10th Brooks ship was on the move again, anchoring off the island of Skyros on April 17th. Still suffering from his earlier ill-health, Rupert now developed blood poisoning from an insect bite, placing his body under fatal strain. He died in the afternoon of April 23rd, 1915, aboard a hospital ship in Tris Boukes Bay. His friends buried him under a stone cairn on Skyros later that day, although his mother arranged for a grander tomb after the war. A collection of Brookes later work, 1914 and Other Poems, was published in swiftly after, in June 1915; it sold well. A Legend Forms An established and rising poet with a strong academic reputation, important literary friends and potentially career-changing political links, Brookes death was reported in The Times newspaper; his obituary contained a piece purportedly by Winston Churchill, although it read as little more than a recruiting advert. Literary friends and admirers wrote powerful--often poetic--eulogies, establishing Brooke, not as a lovelorn wandering poet and deceased soldier, but as a  mythologized golden warrior, a creation which remained in post-war culture. Few biographies, no matter how small, can resist quoting the comments of W.B. Yeats, that Brooke was the most handsome man in Britain, or an opening line from Cornford, A young Apollo, golden haired. Even though some had harsh words for him--Virginia Woolf later commented on occasions when Brookes puritan upbringing appeared beneath his normally carefree exterior--a legend was formed. Rupert Brooke: An Idealistic Poet Rupert Brooke wasnt a war poet like Wilfred Owen or Siegfried Sassoon, soldiers who confronted the horrors of war and affected their nations conscience. Instead, Brookes work, written in the early months of the war when success was still in sight, was full of cheerful friendship and idealism, even when faced with potential death. The war sonnets swiftly became focal points for patriotism, thanks largely to their promotion by church and government--The Soldier formed part of the 1915 Easter Day service in St. Pauls Cathedral, the focal point of British religion--while the image and ideals of a brave youth dying young for his country were projected onto Brookes tall, handsome stature and charismatic nature. Poet Or Glorifier of War While Brookes work is often said to have either reflected or affected the mood of the British public between late 1914 and late 1915, he was also--and often still is--criticized. For some, the idealism of the war sonnets is actually a jingoistic glorification of war, a carefree approach to death which ignored the carnage and brutality. Was he out of touch with reality, having lived such a life? Such comments usually date from later in the war, when the high death tolls and unpleasant nature of trench warfare became apparent, events which Brooke wasnt able to observe and adapt to. However, studies of Brookes letters reveal that he certainly was aware of the desperate nature of conflict, and many have speculated on the impact further time would have had as both the war and his skill as a  poet, developed. Would he have reflected the reality of the war? We cannot know. Lasting Reputation Although few of his other poems are considered great, when modern literature looks away from World War One there is a definite place for Brooke and his works from Grantchester and Tahiti. He is classed as one of the Georgian poets, whose verse style had noticeably progressed from previous generations, and as a man whose true masterpieces were still to come. Indeed, Brooke contributed to two volumes entitled Georgian Poetry in 1912. Nevertheless, his most famous lines will always be those opening The Soldier, words still occupying a key place in military tributes and ceremonies today. Born: 3rd August 1887 in Rugby, BritainDied: 23rd April 1915 on Skyros, GreeceFather: William BrookeMother:  Ruth Cotterill, nà ©e Brooke

Wednesday, May 13, 2020

Critique Of The Doctrine Of Inalienable, Natural Rights Essay

In â€Å"Critique of the Doctrine of Inalienable, Natural Rights†, Jeremy Bentham aims to show the reader why the Declaration of Rights is a troubling and terrible document, or as he describes it, a â€Å"dangerous nonsense†. In his critique, Bentham describes natural rights as â€Å"nonsense upon stilts† and says they do not exist, but they are actually made up. He then goes on to attack the Declaration’s vagueness and contradictions, saying it will lead to constant unrest. The Declaration, Bentham says, is condoning revolution and giving grounds for permanent revolution and by doing this, they diminish the roles of government and other future authority. Despite a few confusions, Bentham’s argument is successful because he proves the Declaration is full of confusions and contradictions that can lead to dangerous acts. Natural rights are something we should have, but they are not â€Å"natural† and instead made-up, as Bentham suggests. In Bentham’s preliminary observations, he calls out the overall problems of the Declaration. A huge problem with the Declaration is that since it is vague, it is essentially never-ending dangerous nonsense (p.2). Words can have many different meanings so if you aren’t specific, you can confuse people. In this case, confusion can lead to destruction. Its lack of specific guidelines is troubling. The people who speak of natural rights do not know what they’re talking about, but they still go on about how their rights cannot be taken away from them and theyShow MoreRelatedJohn Locke And John Rousseau1430 Words   |  6 Pagesfreedom to a sovereign, which he refers to throughout the text as the Leviathan. Men forge a social contract among themselves in which he gives up the rights afforded to him in the state of nature in exchange for protection. The Leviathan is a figure with absolute control. They have the sole authority within the political scene, curbing man’s natural egoism and saving them from themselves. The Leviathan would protect man from his innately violent, egoist nature. He would set forth a consistent authorityRead MoreJohn Locke And The Locke Of The United States5485 Words   |  22 Pageshe wanted to make this new country based on the basic fundamentals. He wanted to base the country on what was considered the natural laws. Jefferson had many philosophical minds to ponder when writing the document, such as Aristotle and most importantly John Locke. The writings of John Locke were basic in the idea that they focused on the natural rights of people, the rights given by God. Locke had theories when it came to religious tolerance. Locke believed that earthly judges, the state in particularRead More Copyright in Cyberspace Essay4853 Words   |  20 Pagescyberspace. We have the technology and insight to do so. Now we must begin the process of breaking the code of lawlessness and replacing it with the code of order. The Social Value of Copyright A copyright is a federal property right granted for original works of authorship that are fixed in a tangible medium. To qualify as original, the work must exhibit only a modicum of originality; that is, it must only be slightly original. As long as the work was not copied in its entiretyRead More Nationalism and United States Policy in Latin America Essay6054 Words   |  25 Pagesnational product Magnates petroleros Oil magnates que alli se hicieron ricos, Who became rich in this place pelaron todos gallo Took off right away con la ley de la expropiacià ³n With the expropriation law - El corrido del petrà ³leo -Folk Song About Oil The Folk Song About Oil is a cultural expressionRead MoreSources of Ethics20199 Words   |  81 Pagesgenes influence behaviour and ethics: 52 2.3- PHILOSOPHICAL: 55 2.31- Contribution Of In Ethics By The Source Of Philosophical Systems: 55 2.32- Contribution of Aristotle: 57 2.33- Contributions By Other Important Philosophers: 58 2.34- Rights Theory: 64 2.35- Contribution By KANT: 65 2.36- Contribution By ROSS: 66 2.4- CULTURAL: 68 2.5- LEGAL SYSTEM: 71 2.6- CODES OF ETHICS: 74 2.61- Company Codes: 74 Code of ethics (corporate or business ethics) 74 code of ethics(businessRead MoreGp Essay Mainpoints24643 Words   |  99 PagesResponsibility of Media j. Media ethics k. New Media and Democracy 2. Science/Tech a. Science and Ethics b. Government and scientist role in science c. Rely too much on technology? d. Nuclear technology e. Genetic modification f. Right tech for wrong reasons 3. Arts/Culture a. Arts have a future in Singapore? b. Why pursue Arts? c. Arts and technology d. Uniquely Singapore: Culture 4. Environment a. Developed vs. Developing b. Should environment be saved at allRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesMichael Adas for the American Historical Association TEMPLE UNIVERSITY PRESS PHILADELPHIA Temple University Press 1601 North Broad Street Philadelphia, Pennsylvania 19122 www.temple.edu/tempress Copyright  © 2010 by Temple University All rights reserved Published 2010 Library of Congress Cataloging-in-Publication Data Essays on twentieth century history / edited by Michael Peter Adas for the American Historical Association. p. cm.—(Critical perspectives on the past) Includes bibliographical

Wednesday, May 6, 2020

Importance of the Curriculum to the Society Free Essays

PURPOSE OF THE CURRICULUM TO THE SOCIETY Introduction In 1995 Hornby described education as a process of training and instruction of children and young people in educational institutions which is designed to give knowledge and develop skills useful to the society. This process is centred by a number of planned activities which hold the potentials of imparting the skills significant to the society just as the definition points out. An outline or structure of these activities is what makes up an educational curriculum. We will write a custom essay sample on Importance of the Curriculum to the Society or any similar topic only for you Order Now Pillai (1984; p5) defines the curriculum as a comprehensive plan for an educational training programme or course to offer new or improved manpower to fulfil the rising needs of a dynamic society . Below is a discussion of some of the purposes of the curriculum to the society. * The curriculum serves the function of a tool for societal development. The curriculum include important and knowledge to be imparted on the learners, this is to say that there is a supplement of ideas on the students despite their innate intelligence. These new ideas help in discoveries that may assist in the society’s growth for example, new ways of increasing agricultural productivity. A student at school may encounter an idea that may help in the increase of agricultural outputs and if he implements this new idea, the society to which he belongs, would develop economically. A point which Jacobs (1997, p23) agrees with by saying that â€Å"education is the realization of each person’s unique potentialities thus, education focuses on the social conditions that block the fullest realisation of individual potentialities as it emphasizes on the changes in the present system required to bring about a more humanistic society†. This is just to say that education allows learners to make important contributions to the societies to which they belong, on the other hand enhancing the development of their particular societies. The curriculum also works as a source of societal cohesion. Webster (2011, p365) described a society as an enduring and cooperating social group whose members have developed organized patterns of relationships through interaction with one another. This togetherness is partially achieved through the curriculum in that the curriculum holds distinctive aims and objectives and these are shared amongst all kinds of members of education al institutions across the nation. This is to say that there are similar goals set across the communities of the nation despite the societal differences. To achieve these goals and objectives the society members must share ideas and cooperate and this fosters cohesion as members of different communities are inclined to come together and formulate ways by which they can attain their shared goals. The curriculum serving the purpose of cohesion fostering element amongst members of the society. * The curriculum holds the purpose of effective societal problem solving. Basing on one of the ideologies on which education is found, it can be easily said that education can be used for effective societal problem solving, whereby the curriculum happens to be an integral part of the education system. Adopting such an ideology thus education for problem solving, it means that the curriculum in this case must pertain to such an ideology. Whereby it has to include activities and experiences that will allow students attain effective methods of problem solving. In this case the curriculum being used as a tool for effective problem solving. If student undergo experiences of such a curriculum it means they will positively contribute to their particular societies in terms of problem solving. Hence the curriculum depicting the purpose of effective problem solving in the society. Brosnan (1999, p64) agrees by saying that â€Å"the individual is a unique personality who finds his greatest satisfaction in self-expression in response to the changing world†. Thus humans find it less of a burden when they speak out their suggestions and solutions to particular problems affecting the society and this is exactly what the curriculum offers through the educational system. The curriculum works as tool for awareness in the society. In the experiences included in the educational curriculum, there are relevant topics that each and every person is to be aware of, for example in Social studies are concerning human rights, child and women’s welfare. These are some of the important things that are rendered to the students unde r the guidance of the curriculum, when these learners accommodate such ideas and dissipate them on those that happen to be of a shared society as these learners, the curriculum may work as an agent of awareness. This would be so as the learners would function as messengers in their societies as they will let the others know their rights and entitlements. Hence the curriculum serving the purpose of an awareness agent in the society. * The curriculum serves the purpose of societal problem identification. This idea comes about during the development of the curriculum, where a number of steps are covered on of which is that of identifying the background of a nation before coming up with the curriculum. As the professionals struggle to come up with basis of a country they also realise the problem that a nation goes through both in the social economic and cultural context. These problems are implicitly addressed in the activities that are included in the curriculum, thus for example commerce studies which equips students with commercial skills, may help eradicate financial problems that members of the society encounter. Hence the curriculum serving the function of problem identification and solution implementation in the society. * The curriculum as an element for cultural preservation and continuity in the society. Knowing that different societies hold different beliefs and values, the curriculum put into account these differences. This is done when the professionals are formulating the curriculum they tend to include some of the major beliefs and values that the children must be equipped with in older to achieve cultural preservation and continuity. Inclusion of experiences that hold cultural values does not only ensure cultural continuity but also enable the students to recognise their national and cultural identities, how they are developed, and how they can be maintained in their respective societies (O’Neill, 1990; p78). Thus the curriculum being in the position of enhancing cultural preservation and continuity in the society. * Ethical function of the curriculum The curriculum being at the centre of the education system, it holds all sorts of functions along with it, one of which includes social control. In this case the curriculum helps in maintenance of law and older in the society, whereby the curriculum gives learners the access to instruction for proper behaviour and personal conduct, for example, at schools children are taught not to steak from others rather to ask for whatever they want in a polite manner. This is the expected mode of conduct which helps reduce cases of increased rates of thieves as these youngsters are nurtured to behave in the required way in their early stages of life. In this case inclusion of such elements in the curriculum enables members of the society to be morally sound. Hence the curriculum serving the function of ensuring ethical conduct. * The curriculum helping in shaping the society The International Educational Agency (I. E. R) report (2006, p3), pin pointed that the curriculum as the core of the education system helps equip students with better skills of reflection which is a vital element for students to grow as learners and as useful citizens of the society. Coupled with the skills of gathering and organising information students have constant opportunities to practice responsible self-direction in the society. In addition, much of the curriculum is concerned with allowing students to learn about how people live in other places, times and how they are expected to influence the society. These understandings help students to develop high levels of self-awareness. This all can be achieved through the curriculum hence the curriculum helping in shaping the society by producing students that will be able to effectively self-guide themselves in the society. Conclusion Despite the strengths that govern the curriculum, there are a lot of shortfalls that can be corrected, for example inclusion of the rights of those in minority, thus the disabled, elderly just to mention a few. These also happen to be part and parcel of the society, whereby the topics of awareness included in the curriculum seem to dwell much on the abled. Consideration of teacher’s expertise when it comes to their familiarity with the materials and methods prescribed to be used in the teaching and learning process, this is to say that the curriculum indicates that it assumes that teachers are conversant with the materials they are expected to use in the teaching and learning process. Even though the curriculum assigns teachers to particular topic to teach, it does not opt for a follow up on whether there is observation of the prescribed topics and see if the required values are really being imparted on to the learners for the society’s benefit. REFERENCES Brosnan, M. J. (1999). Modelling Technophobia: a case for word processing Computers in Human Behaviour, New York; Guilford Hornby, A. S. (1995). Oxford dictionary: advanced learners edition 5, London; Oxford press International Education Agency, (2006). Report: Society and environment curriculum, revised edition: I. E. A Jacobs, D. (1996). LISREL8 user’s reference guide, Illinois, USA: Scientific Software International. O’Neill, W. F. (1990). Educational Ideologies Contemporary Expressions of Educational Philosophy, Iowa: Kendall / Hunt Publishing Company Pillai B. M. (1984). Smart schools: Better thinking and learning for every child, New York, USA: The Free Press. Webster, M. (2011). Higher Education in the 21st Century: Futures, New Jersey: USA Lawrence Erlbaum Associates. CATHOLIC UNIVERSITY OF MALAWI FACULTY OF EDUCATION DEPARTMENT OF FOUNDATION STUDIES COURSE TITLE: CURRICULUM THEORY AND PRACTICE COOURSE CODE: EDU 3102 TO: Mrs O Nampanda FROM: Phunziro B. M Mphwina ASSIGNMENT: THE PURPOSE OF THE CURRICULUM TO THE SOCIETY DUE DATE 22/03/13 How to cite Importance of the Curriculum to the Society, Essay examples

Monday, May 4, 2020

System Security and User Privacy-Free-Samples-Myassignmenthelp

Questions: Define the Concepts of symmetric key encryption, public key encryption, and hashing and explain which of these techniques are used for confidentiality and authentication 2.You are a security administrator responsible for your organization's security. Using the content of the book, describe in detail at least two ways to defend your company from denial of service attacks 3.You are a security administrator responsible for your organization's security, list rules for working in secure areas. Please include how should trash bins be protected? and What can be done to reduce the dangers of desktop PC theft and unauthorized use?4.The two types of filtering IDSs use are deep Packet inspection and packet stream analysis, explain why they are important and why they are processing intensive. Answers: 1.Encryption Encryption is a process of data protection by converting the data into a code that can be only accessed by the authorized user. Encryption prevents the unauthorized use or access of data or information. Encryption is one of the most effective methods of achieving data security (Goshwe, 2013). In order to access an encrypted file, one must obtain the security key or passwords that will be enable them to decrypt the file. The unencrypted text before the process of encryption is termed as plain text while the encrypted data in termed as cipher text. The process of encryption mainly uses an algorithm to encrypt or transfer the information into a cipher text. This method is used to protect sensitive data such as credit or debit card number by encoding and transferring it into cipher text (Shinge Patil, 2014). Encryption ensures trusted delivery of sensitive information. There are mainly two main types of encryption namely symmetric encryption and asymmetric or public key encryption. Symmetric Encryption Symmetric key encryption is a more secure method of encryption as it uses a common secret key for both encryption and decryption. The data of each key is self-encrypted for additional protection. The algorithm related to the encryption is Data Encryption Standard or DES, which uses 56- bit encryption. However, the Advanced Encryption Standard or AES that uses 128-bit or a 256-bit key encryption is considered as more reliable (Agrawal Mishra, 2012). Symmetric key encryption is simpler and faster as it uses only one key. The major drawback of this method of encryption is that only a private key is needed in both encryption and decryption and if this key is lost, the receiver can never decrypt the information. Another obligation of this system is that the sender and receiver must exchange the key in a secure manner. Asymmetric or public key Encryption Asymmetric or public key encryption needs two different keys (public and private) in order to encrypt and decrypt data. The key that can be shared with everyone and generally used for encryption. The key that is kept secret and used for decryption is called private key (Thambiraja, Ramesh Umarani, 2012). Both the keys can be employed for encryption or decryption. This type of encryption is generally seen in web browsers to ensure a secure connection and also in digital signature (Hoffman, 2012). Hashing Hashing is the transference of a string value into a smaller or shorter value of fixed length that represents the original string. This technique is majorly used in database in indexing and to retrieve the items or values present in that particular database. This is mainly done as it is faster to search and find items using a shorter hashed key instead of using the original value. It is one of the major encryption techniques as well, that hides the real value of an arbitrary sized data or string and transforms it into a fixed sized value. Symmetric and asymmetric key encryption is generally used for authentication and maintaining the confidentiality of data. The asymmetric key encryption is mainly used in digital signatures attached with electronic documents that verify the authentication of the sender. In symmetric key encryption, the sender share a unique key with the receiver, which the receiver uses to decrypt the data send. Therefore, the receiver or the user who have access to the private key can read or access the data. Thus, it maintains the confidentiality of the data as only the sender and receiver is able to access the data. 2.Secure Networks Denial of service attack or DoS attack is a cyber attack where the attacker aims to make a network or system resources unavailable for the legitimate users by disrupting the services of the host connected with internet indefinitely (Gunasekhar et al., 2014). This is done by flooding the network with excessive unwanted messages asking the network or the server to authenticate the requests that generally have invalid return addresses. Thus, it becomes difficult for the legitimate users to access the network. Dos attacks may crash a server thus leading to the wastage of time and money. Denial of Service attack is dangerous in sense it can paralyze even a well-structured network for days, freezing all the online services of the company (Liu, Liu Saddik, 2013). The recommended ways to prevent the denial of service attack are as follows- 1) Installation of routers and firewalls along with DoS mitigation appliances- Routers can be well configured to prevent the ping attacks by filtering the invalid IP addresses and non essential protocols. Routers can however prove to be ineffective against a sophisticated spoofed attack. Firewalls are capable of shutting down a targeted flow related to an attack. DoS mitigation appliances can be used for load balancing. Proper server configuration is essential to minimize the effect of Dos attack. An administrator can limit the resources, an application can use and how it will respond to the requests. This will prevent the allowance of the invalid requests into the server thus preventing the Dos attack (Gupta, Joshi Misra, 2012). 2) Over provisioning- this is another recommended way to handle DoS attack. Over provisioning refers to allocating excess bandwidth or redundant network devices in order to handle DoS attacks in the system. The advantage of buying an outsourced provider of service is that the extra bandwidth can be bought when the company needs it rather than making an expensive capital investment of buying the redundant networks interface and devices. A company however, has no idea that a DoS attack is coming and hence the company needs to acts as quickly as possible in this approach. The primary aim of any DoS attack is o consume the internet bandwidth and hence a well structured and equipped managed hosting provider is to be selected for preventing the attack. These equipments are fixed in front of the normal servers and are programmed to detect and filter out the malicious traffic (Hashmi, Saxena Saini, 2012). These systems are needed to be updated constantly by the operations team in order to r emain up to date with the latest threats. The only disadvantage of this system is that, it cannot handle the volumetric attacks and becomes incapable when the attack exceeds the network capacity. Cloud Mitigation provider is an effective over provisioning method. The cloud mitigation providers are expert in delivering DoS mitigation in cloud. Cloud mitigation providers have developed massive amounts of network bandwidth and capacity of mitigation over multiple sites round the internet. It can take up any sort of network traffic and filter the traffic to send only the validated traffic into the destination. The network security engineers who monitor the latest DDoS tactics for better protection manage this (Deshmukh Devadkar, 2015). 3) Server hardening is another recommended but less used method of controlling the DoS attack. It deals with hardening of IP Tables to permit only those traffic that is expected by the company. It also configures server in such a way that it is capable of auto recover on occasion of system failure. It makes the server more resilient of the requests thus preventing the DoS attacks (Sharma, Singh Singh, 2013). 3.Access Control Working in secure areas is ensured to prevent unauthorized access or damage to the confidential information of the organization. This is done by protecting and defining the security perimeters with appropriate security barriers and entry control. The rules listed for protection includes commensuration of the identified risk (Peltier, 2016). The rules for working in secure areas are listed below- 1) Unsupervised work in secure areas should be avoided to the best and when no one is working in the security area, the area should be locked and checked periodically. 2) Electronic devices capable of recording or copying mass amounts of information should be forbidden in the secure areas for example, Smartphone, camera, USB, laptops and similar devices. 3) The security perimeters should be clearly defined and the strength of each perimeter depends on the security requirement of the assets within the perimeter. The security perimeter or barrier includes card controlled entry doors, walls or manned reception desks to protect the secure areas from unauthorized access. The access to those areas of the organization will be restricted to authorized personnel only. Moreover, the areas should be equipped with suitable intruder detection system. This system should be regularly checked and tested to ensure that they are in perfect working condition. 4) Inspections of personnel entering or leaving the secure areas should follow strict notification and compliance. The entry and departure of the employee and the visitors are recorded on the visitor access log and they are to be granted access to the protected areas or organizations information only for specific and authorized purposes. Furthermore, authorization controls are to be used to authorize and validate their access. 5) Discretionary access control can be used for working in secure areas. In this method, the owner of the resource gives access rights to the other users according to his discretion. 6) The server room should be locked and should allow only authorized person to enter to ensure that the security of the protected areas are not tampered with. Setting up a proper surveillance is necessary for working in secure areas. A video surveillance camera should be installed to supplement other rules of working in secure areas (Chen et al., 2012). 7) The backup of the sensitive data should be properly stored to prevent unauthorized access. The backup files should be password protected to prevent unauthorized access. Or else, the backup file may be kept offsite to prevent intruders access. Trash bins can act as an important source information and thus it is needed to be protected in order to prevent data loss. Trash bins are protected by ensuring that no confidential information is discarded into the trash bin. The wastes in the trash bin are properly disposed to prevent data theft. Moreover before disposing the contents of the trash bin, it is to be ensured that it does not contain any sensitive information or information that can be misused. In order to reduce the danger s of desktop PC theft, the individual desktop Pcs present in the office premises can be locked onto their desks with a cable. In order to reduce the danger of unauthorized use, it has to be ensured that every PC has a login screen with a complex password so that no intruder can use it easily. The password should be strong and un-common so that the intruder has little room for guessing the password and accessing the PC. The laptops however can make use of the fingerprint authentication or face scanning security options to keep secured and prevent it from unauthorized access (Jain Nandakumar, 2012). 4.Firewalls Deep Packet Inspection Deep packet inspection is an effective way of packet filtering, which functions in the application layer of the OSI reference model. Deep packet inspection renders it possible to identify, classify and block certain packets with specific data that the convectional packet filtering cannot detect. DPI is generally used to allocate resources and streamline the flow of traffic. A high priority packet is routed to its destination ahead of less priority packets. DPI improves the network performance by preventing the peer-to-peer abuse. The security implication of DPI is widespread as it helps in identifying the originator of a specific packet (Bremler-Barr et al., 2014). It is process intensive as it uses data parallel approach to process large volumes of data. Deep packet works by inspecting the data part of the packet as it passes the point of inspection. It generally un-hides the presence of non compliance, viruses, spam and intrusion. Deep packet inspection helps in advanced network ma nagement and operation of security functions such as data mining. DPI is widely used by the telecommunication provides. It is important particularly because it mixes the objectives of intrusion detection system as well as intrusion prevention system with the help of a state-full firewall. This combination makes it possible to detect a number of attacks. DPI is used to overcome the buffer overflow attacks, denial of service attacks and illegal intrusion into the system. DPI is often capable of monitoring the layers 2 to 7 of OSI model. DPI can also be used against net neutrality (Thinh, Hieu Kittitornkun, 2012). This is significant because it inspects all the fields in packet including the IP header, TCP or UDP header and the message of the application. Certain attacks cannot be prevented if the firewall only looks at the application content. Deep packet inspection is processing intensive as it looks at all the fields of the packet and takes more time as well as processing power. Packet Stream Analysis Packet stream analysis intercepts and logs the traffic passing over a digital network. As the data in passed through the system or a network, a sniffer captures the contents of every packet and decodes the raw data present in the packet. It supervises and analyzes the content of the packets according to the set objectives or specifications. Packet stream analysis requires different IDS to maintain and compare a number of packets, which are examined to determine whether an attack is taking place into the system or not (Rueppel, 2012). This results in placing a heavy load of processing on the IDS. This effective filtering technique scans a series of packets at a time to determine the probability of an attack. Ids are important because they identify suspicious rackets that may be a cause of harm or a part of a probable attack. Packet stream analysis identifies a probable attack with the help of IDs and alerts network administrators of potential threats so that the suspicious packets can be dropped. IDs cannot drop the suspicious packets on its own (Sanders, 2017). Packet stream analysis is important because, only a single packet is not capable of determining certain types of attack and therefore the need of checking of multiple packets comes into play. It generally takes more than one packet to determine whether a network is symmetrically scanned or not, whether the TCP is half open or even a probability of denial of service attack (Asrodia Patel, 2012). The packet stream analysis is processing intensive because every fields of a series of packets are inspected. This is necessary for defining the probability of attack and thus has more processing power (Singh, Lozano Ott, 2013). References Agrawal, M., Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering, 4(5), 877. Asrodia, P., Patel, H. (2012). Network traffic analysis using packet sniffer. International journal of engineering research and applications, 2(3), 854-856. Bremler-Barr, A., Harchol, Y., Hay, D., Koral, Y. (2014, December). Deep packet inspection as a service. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 271-282). ACM. Chen, C., Sun, L., Shao, Y., Hu, Z., Shi, Q. (2012, January). Iems: An intelligent environment monitoring system of server room. In Intelligent Computation Technology and Automation (ICICTA), 2012 Fifth International Conference on (pp. 189-192). IEEE. Deshmukh, R. V., Devadkar, K. K. (2015). Understanding DDoS attack its effect in cloud environment. Procedia Computer Science, 49, 202-210. Goshwe, N. Y. (2013). Data encryption and decryption using RSA Algorithm in a Network Environment. International Journal of Computer Science and Network Security (IJCSNS), 13(7), 9. Gunasekhar, T., Rao, K. T., Saikiran, P., Lakshmi, P. S. (2014). A survey on denial of service attacks. Gupta, B. B., Joshi, R. C., Misra, M. (2012). Distributed denial of service prevention techniques. arXiv preprint arXiv:1208.3557. Hashmi, M. J., Saxena, M., Saini, R. (2012). Classification of DDoS attacks and their defense techniques using intrusion prevention system. International Journal of Computer Science and Communication Networks, 2(5), 607-14. Hoffman, P. (2012). Elliptic curve digital signature algorithm (dsa) for dnssec. Jain, A. K., Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. IEEE Computer, 45(11), 87-92. Liu, S., Liu, X. P., El Saddik, A. (2013, February). Denial-of-Service (DoS) attacks on load frequency control in smart grids. In Innovative Smart Grid Technologies (ISGT), 2013 IEEE PES (pp. 1-6). IEEE. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rueppel, R. A. (2012). Analysis and design of stream ciphers. Springer Science Business Media. Sanders, C. (2017). Practical packet analysis: Using Wireshark to solve real-world network problems. No Starch Press. Sharma, S., Singh, G., Singh, P. (2013). Security Enhancing of a LAN Network Using Hardening Technique. International Journal of Innovative Technology and Exploring Engineering, 2(3), 174-181. Shinge, S. R., Patil, R. (2014). An encryption algorithm based on ASCII value of data. International Journal of Computer Science and Information Technologies, 5(6), 7232-4. Singh, V., Lozano, A. A., Ott, J. (2013, December). Performance analysis of receive-side real-time congestion control for WebRTC. In Packet Video Workshop (PV), 2013 20th International (pp. 1-8). IEEE. Thambiraja, E., Ramesh, G., Umarani, D. R. (2012). A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7). Thinh, T. N., Hieu, T. T., Kittitornkun, S. (2012, May). A FPGA-based deep packet inspection engine for Network Intrusion Detection System. In Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2012 9th International Conference on (pp. 1-4). IEEE.