Sunday, February 16, 2020

AUCA Essay Example | Topics and Well Written Essays - 1000 words

AUCA - Essay Example As the author puts it, Florence was a no gone city. Death almost became inevitable to all those who contracted the plague. Dead bodies spread all over the city until churches ran out of space for burying the dead bodies. The solution was to adopt mass graves. Neighbours avoided each other for the fear of contracting the diseases. In fact, some citizens decided to leave the city. It was simply devastating. However, Boccaccio’s choice to introduce his work by this vivid eyewitness account leaves a lot to question especially that the rest of the characters are fictional. In my view, Boccaccio’s decision to introduce Decameron with an eyewitness account was to give the narrative its setting, both time and place. It was certainly written in medieval period and in Florence. This eyewitness account was also to justify the reasons for his characters to leave their city and base their stories in another place. In addition, this eyewitness account serves to add credibility to the author’s stories. For example, it would have been very difficult for him to set grounds as to why the seven women and the three men had to leave their Florence into another city. Furthermore, since this society was traditionally patriarchal, it would have been so hard for Boccaccio to convince his readers the reason as to why the men decided to give up their powers so that they could be ruled by the women. Therefore, the eyewitness account served to exemplify how the plague affected the social set-up of the society such that there was even a reversal of gender roles. The story revolves around Saladin, an Islam sultan and Melchizedek who was a wealthy Jew. Saladin was both generous and easy to lead his people into war. This attributes caused his treasury to run short of money. Saladin only option was to approach Melchizedek in the hope that he would bail him from bankruptcy. Unfortunately, Melchizedek was miser and he would hardly lend Saladin

Sunday, February 2, 2020

Improving Web Security Essay Example | Topics and Well Written Essays - 750 words

Improving Web Security - Essay Example The security of passwords was not of as much worth decades ago as it is today and this is not the sole responsibility of the institutions/bodies that offer email or banking services etc. One must consider taking multiple measures in order to increase the strength of passwords and tighten the security. It is necessary to have the understanding of how the passwords are compromised despite high security algorithms deployed by respective institutions. The easiest way of tracing the passwords of people is to introduce agent software i.e. a spyware into their computer systems to monitor, record and transmit the details of each and every activity people perform including password entries at different sites. This happens through emails, chats and downloading form unauthentic websites like pornographic sites etc. A good internet security firewall installation can handle this situation quite effectively but the possibilities of breaches remain. One of the indications is that the computer syste m takes unusual time in processing usual transactions because of the added work that spywares perform. The other reasons of password compromise include the careless selection of passwords and their redundant usage at different forums to save the hassle of memorization. Sometimes it happens that the communication between the user and the respective body like bank is intercepted by introduction of a lookalike page instead. The users most of the times remain unable to figure out the differences in haste and deliver the actual information to the false page. Redundant passwords cause more damage as the leakage of just one, opens multiple personal horizons of a person’s life before the hackers and cyber criminals. IMPROVING CONTRIBUTIONS OF PASSWORD PROTECTION FOR INFORMAITON SECURITY The baseline of information security lies in the basic structure of the information system itself. The following steps, if taken for the better management of the system would be massive contributions to the improvement of password protection for information security. Information security is an iterative process. It is essential that this process must first be controlled; it should then be planned, implemented, evaluated and maintained. CONDUCTION OF RISK ANALYSIS The use of risk analysis identifies the security requirements of the IT Customers. IMPROVING MINIMUM SECIRUTY BASELINE The feasibility of the requirements assessed in the risk analysis should be compared with the current security assessment and implementation structure of the organization. CONSTRUCTION OF SLA. SLA or Service level agreement between the customers dealing with an organization and the IT management of the company is required to be made. This agreement defines the measurable terms of the information security requirements. It also contains details of the specification of this achievement. OLAs Operational Level Agreements provide the detailed instructions of the implementation of the information security Req uirements. These instructions are negotiated and defined. SLA AND OLA IMPLEMENTATION The successful implementation of the SLA and OLA are done. The regular outcomes of the implementation at every transaction done are monitored. Repots about their outcomes are shared with the customer. The feedback from the customers leads to modification of the implemented information secur