Wednesday, July 31, 2019

Black Panthers

Black Panther Ten Point Plan Response During the 1960s, the black civil rights movement was at its peak and the call for social and racial equality was spreading throughout America. To promote these ideas, different groups rose up and protested against the current white dominant order in the United States. Among these groups, the Black Panthers were founded to demand an end to â€Å"racism and social oppression in order to create a global socialist community† (Ten Point Plan). Their tactics were very controversial because of the amount of violence their members caused. They were known for fighting and even killing police when provoked. But although their style of protest was severely looked down upon in today’s society, the principles of their cause were just. The Black Panther’s overarching goal of their community is for freedom and the power to determine the destiny of their oppressed communities. The Black Panthers were based upon ten founding goals that would pushed for more rights and freedoms of the black community. The first point was mentioned above and calls for Blacks to basically have the same rights as white people do. After this point, they specified exactly what they wanted to change. These included full employment of their people, fairness in payment for their labor, decent housing, and an education that is not racist and tells the black history as it actually happened and not as a censored version. It also includes free and extensive health care to all, the end of police and governmental brutality, stopping the expansionism of America, fairness in justice and freedom, and finally an overarching demand of property, liberty, peace, education, and modern technology for all peoples (Ten Points Plan). The goals were printed with captions underneath that explained where the current government has faltered and some have steps to correct the situation. The Ten Points Plan calls upon the government to provide full rights to the black population by either aiding them in their goals or backing off and giving them more freedom in their lives. The Black Panthers generally want the government take on more roles in the education and basic needs of their people. In their Ten Points, the Black Panthers demand the government to employ or guarantee money to every person of employment, help the black people create cooperatives for living in, payment for past wrongs, and payment for completely free health care for all African Americans. In addition, general statements such as an â€Å"end to all wars of aggression† and â€Å"an end to police brutality† are included (Ten Points Plan). They don’t necessarily say how the government will get this money or be able to continue payment on the items, but rather just demanding the help. This isn’t very conducive for government intervention or for actual results because it isn’t a realistic goal being presented. If the points included a way to get the money or labor, then the points would be more complete and taken more seriously. The reasons these goals were presented to the United States was because of the oppression the black community had been under for centuries. Specifically the points were pointed toward the end of slavery and the unfairness in treatment by government programs. The black community was lumped into poor areas for living, creating the modern day ghettos and a place where overall racial success and equality could not be accomplished. The Black community was also seen as subservient to the white community in the pre-1960s and so the general population did not help the struggling community. To further demoralize the community, the government treated them as a lesser people and didn’t respect them, which caused tension between the groups. The Ten Points Plan came out of a tumultuous time in America’s history where civil liberties were under investigation and the tides of change were slowly coming into the popular American culture. The goals expressed in the plan have led to positive changes for Black Americans today and the furthering of their community. Although the Panthers have not continue on, their goals of freedom for the average black American are seen in the equality of black Americans today. Works Cited â€Å"Ten Point Plan† . Acts of Inquiry. Ed. University of Washington. Boston, MA: Bedford/St. Martin’s, 2011. 389-392. Print.

Tuesday, July 30, 2019

Book Review on the Godfather by Mario Puzo

Submitted by Md. Jane Alam Sufian Assistant Director 29th BCS (Ansar) Ansar & VDP Academy Shafipur, Gazipur Book Review On The Godfather By Mario Puzo Submitted To: Hira Miah Course OIC Director (Training) Ansar & VDP Academy Shafipur, Gazipur Submitted by Md. Jane Alam Sufian Assistant Director 29th BCS (Ansar) Ansar & VDP Academy Shafipur, Gazipur Acknowledgement Book review is an important assignment for an officer. For the successful accomplishment all credits and praises are due to Almighty, the most merciful the most gracious Allah.To complete this very work I had to seek guidance and help from lot of persons who helped me without any hesitation, I am really grateful to them for their patience.. I had to take notes from the internet in this case I have used wikipedia as reference and As I had submitted the book name by Mario Puzo and it wasn’t available in our library so I had to collect this book from Nilkhet, Dhaka. I would like to express my sincerest and deepest resp ect to my course OIC Hira Miah, Director (Training) Bangladesh Ansar & VDP Academy and CC Deputy Director Kamrun Nahar Bangladesh Ansar & VDP Academy.Finally I would like to express my deepest sense of gratitude and heartfelt thanks to my course mates. Introduction The Godfather is a crime novel written by Italian American author Mario Puzo, originally published in 1969 by G. P. Putnam's Sons. It details the story of a fictitious Sicilian Mafia family based in New York City (and Long Beach, New York) and headed by Don Vito Corleone, who became synonymous with the Italian Mafia. The novel covers the years 1945 to 1955, and also provides the back story of Vito Corleone from early childhood to adulthood.The book introduced Italian criminal terms like consiglieri, caporegime, Cosa Nostra, and omerta to an English-speaking audience. It formed the basis for a 1972 film of the same name. Two film sequels, including new contributions by Puzo himself, were made in 1974 and 1990. The first an d second films are widely considered to be two of the greatest films of all time. The cover was created by S. Neil Fujita whose design featured a large Gothic-style letter â€Å"G† with a long curl at the top emphasizing the first three letters of the title, accompanied by the hands of a puppeteer holding a set of strings over the â€Å"father† portion of the word.Title Some controversy surrounds the title of the book and its underworld implications. Although it is widely reported that Puzo was inspired to use â€Å"Godfather† as a designator for a Mafia leader from his experience as a reporter, the term The Godfather was first used in connection with the Mafia during Joe Valachi's testimony during a 1963 United States congressional hearing on organized crime. Main characters The Corleone family patriarch is Vito Corleone (The Don), whose surname (Italian for â€Å"Lionheart†) recalls the town of Corleone, Sicily.Vito has four children: Santino â€Å"Son ny† Corleone, Frederico â€Å"Fredo† Corleone, Michael â€Å"Mikey† Corleone, and Constanzia â€Å"Connie† Corleone. He also has an informally adopted son, Tom Hagen, who became the Corleones' consiglieri. Vito Corleone is also the godfather of singer and movie star Johnny Fontane. The godfather referred to in the title is generally taken to be Vito. However, the story's central character is actually Michael. Its central theme follows that it is Michael's destiny to replace his father as the head of the family, despite his determination to lead a more Americanized life with his girlfriend (and eventual wife) Kay Adams.The Corleone family is in fact a criminal organization with national influence, notably protection, extortion, gambling and union racketeering. Serving under the Don is his oldest son Santino, who serves as underboss. The operational side of the organization is headed by two caporegimes, Peter Clemenza and Salvatore Tessio. Film adaptation Ma in article: The Godfather In 1972, a film adaptation of the novel was released, starring Marlon Brando as Don Vito Corleone, Al Pacino as Michael Corleone, and directed by Francis Ford Coppola.Mario Puzo assisted with writing the screenplay and with other production tasks. The film grossed approximately $269 million worldwide and won various awards, including three Academy Awards, five Golden Globes and one Grammy and is considered to be one of the greatest films of all time. The sequel, The Godfather Part II won six Oscars, and became the first sequel to win the Academy Award for Best Picture. The film is similar to the novel in most places, but leaves out some details, such as extended back stories for some characters. Some of these details ere actually filmed, and were included in later versions such as The Godfather Saga. A subplot involving Johnny Fontane in Hollywood was not filmed. The biggest difference was that the novel included a more upbeat ending than the film, in which Kay Corleone accepts Michael's decision to take over his father's business. The film, in contrast, ends with Kay's realization of Michael's ruthlessness, a theme that would develop in the second and third films, which were largely not based on the original novel. Vito Corleone's backstory appeared in the second film.Other adaptations Main article: The Godfather: The Game The video game company Electronic Arts released a video game adaptation of The Godfather on March 21, 2006. The player assumes the role of a â€Å"soldier† in the Corleone family. Prior to his death, Marlon Brando provided some voice work for Vito, which was eventually deemed unusable and was dubbed over by a Brando impersonator. Francis Ford Coppola said in April 2005 that he was not informed of Paramount's decision to allow the game to be made and he did not approve of it. 4] Al Pacino also did not participate, and his likeness was replaced with a different depiction of Michael Corleone. Sequels In 1983 Pu zo's literary sequel to The Godfather was published. Entitled The Sicilian it chronicles the life of â€Å"Guiliano† (Salvatore Giuliano) but the Corleone family is featured heavily throughout, Michael Corleone in particular. Chronologically this story sits between Michael's exile to Sicily in 1950 to his return to the USA. Due to copyright reasons the Corleone family involvement was cut from the Michael Cimino movie adaption.In 2004, Random House published a sequel to Puzo's The Godfather, The Godfather Returns, by Mark Winegardner. A further sequel by Winegardner, The Godfather's Revenge, was released in 2006. The sequel novels continue the story from Puzo's novel. The Godfather Returns picks up the story immediately after the end of Puzo's The Godfather. It covers the years 1955 to 1962, as well as providing significant backstory for Michael Corleone's character prior to the events of the first novel. The events of the film The Godfather Part II all take place within the t ime frame of this novel, but are only mentioned in the background.The novel contains an appendix that attempts to correlate the events of the novels with the events of the films. The Godfather's Revenge covers the years 1963 to 1964. Continuing Puzo's habit, as seen in The Godfather, of featuring characters who are close analogues of real life events and public figures (as Johnny Fontane is an analogue of Frank Sinatra), Winegardner features in his two Godfather novels analogues of Joseph, John, and Robert Kennedy, as well as an analogue for alleged organized crime figure Carlos Marcello (Carlo Tramonti).In The Godfather Returns, Winegardner also dramatizes the sweep of organized crime arrests that took place in Apalachin, New York, in 1957. Winegardner uses all of the characters from the Puzo novels, and created a few of his own, most notably Nick Geraci, a Corleone soldier who plays a pivotal role in the sequel novels. Winegardner further develops characters from the original nove l, such as Fredo Corleone, Tom Hagen, and Johnny Fontane. Real-life influencesLarge parts of the novel are based upon reality, notably the history of the so-called ‘Five Families', the Mafia-organization in New York and the surrounding area. The novel also includes many allusions to real-life mobsters and their associates, and Johnny Fontane is based on Frank Sinatra, Moe Greene on Bugsy Siegel, for example. Summary Ageless Books are boldly ignorant of the passage of time. The past and the future merge in the permanence of a timeless story. Years and decades pass us by, we grow up and grow old, and yet these books only become more enduring with time.The Godfather story is insurmountable, it is beyond a classic, it is unashamedly ignorant of cultural, geographical or age boundaries – it resonates with all of us and has so ever since it first appeared in print in Mario Puzo‘s epic novel in 1969. Nino Rota‘s world famous main theme song is etched in the depth o f my memory from my childhood days when the music filled my house in London. the Godfather has held a special place in my heart all my life. I knew the music many years before I watched the movie first, and that came many years before I read the novel.Now, and only now, after reading the novel do I understand why everyone loved this story so much and why they repeatedly watched and listened to the music. Now I feel closer to one of my friend Razib and marvel at his taste in what I find to be a remarkable story. How I wish he could be here today to tell me his thoughts on the Godfather, now that I can appreciate it. We may express the gratitude we feel toward our families while we have the chance, but why is it that the true understanding of that gratitude often greets us bitterly late in life?The ingenuous story and remarkable characters aside, the writing of Mario Puzo is of highest quality. Puzo’s novel speaks to every reader from every walk of life, and evidently through d ifferent generations. It runs through themes understood by all humans: family and brotherhood, sacrifice and justice, trust and betrayal, revenge and retribution, business and friendship – friendship that the Godfather held so tenderly and seriously, friendship that he offered openly and generously, friendship in the name of which he offered favors and collected them in due time.In the core of this magnificent story is Mario Puzo’s writing. On the surface, it mostly appears to be a crime novel with grotesque scenes and unhappy outcomes but it is only the surface. The writing is solid, authentic, lustful and obsessive through and through – it takes your imagination into the scene, it places you inside the situation with the character and it demands that you fully partake in the intensity of every moment. The story endures and the writing of this remarkable author is the solid foundation of support which upholds t. â€Å"Amerigo Bonasera sat in New York Court Num ber 3 and waited for justice†¦. † And so we enter the under world of Italian immigrants in New York city. We encounter characters we can never forget. The depiction of these unforgettable characters – Luca Brasi, Tom Hagen, Sonny Corleone, Kay Adams, Johnny Fontaine – while secondary to our main characters, paints a permanent picture before our eyes in the hands of Mario Puzo’s masterful prose.Through these characters, we get to know our heroes, Don Vito Corleone as the head of the Corleone family and business, and the mastermind of the ingenious mafia world, and Michael Corleone, the Don’s favorite son, who refuses to follow in his father’s footsteps, joins the army and keeps a distance from the family, until one day in the deep countryside of Sicily, he meets his ultimate fate. Perhaps, in its essence, in its very core, the Godfather is a story about father and son and their undeniable bond, which can be weakened but not broken, in the company of family loyalty and devotion reciprocating that of the Corleone family. I will reason with him. † – Don Corleone’s famous motto, a phrase that, when used, immediately translated to Tom Hagen, his consigliere, that the Godfather will not be persuaded otherwise, and that it would be in the best interest of the opposing party to acquiesce to Godfather’s terms because no matter what terms presented to them at this time, if they should fail to agree, it would most certainly be subject to harsher circumstances. Don Corleone is not a criminal man in his own world. He is a gracious, reasonable and honorable man.He has earned the respect of his family, his community, his workforce, the entire immigrant population from Italy, and all who know him through his distinguished reputation. When he first came to America, for the young Vito, this was the dream land of opportunity at a time when jobs were scarce in Sicily and the government was to be feared and no t trusted. He wore out his welcome quickly in America. He soon realized that the government and the authorities do not exist to protect him, to grant him justice in the face of adversity and to act in his best interest.They exist to protect the law, which often is lacking in reason and circumstantial exceptions. The young Vito’s turning point in life comes to him in the early days in America, when recently armed with this bitter knowledge, he had to protect himself against the corrupt and feared Fanucci in New York’s Hell’s Kitchen. Vito Corleone makes the simple, logical, ingenious decision on the fate of Fanucci, and subsequently the fate of all those families and businesses from whom Fanucci extorted money for nothing in return. That marks the day when he realizes his own fate in life.He begins to believe that every man has one fate, something Michael always remembers about his father but does not fully comprehend until his hideout in Sicily later. The obsess ion and the reverence of the Godfather is stunning and undeniable. He is worshiped on a massive scale, and yet by society’s measures, he is a first rate criminal. Even as he commits the most heinous crime in all of the story, that of beheading of Khartoum, the magnificent horse belonging to Hollywood hotshot Woltz and the symbol of all beauty and innocence, the Godfather stands tall and respected.It is all understood and forgiven him as part of the business, necessary to reach certain goals and to protect certain interests. It is the legendary Marlon Brando performance engraved into a rock in our memory – standing erect and powerful, commanding his world and bringing justice where none can be achieved by society’s standard measures. The ethics of Don Corleone come to surface as he is first approached by Sollozzo, the â€Å"Turk† about the drug business. It makes perfect sense to get engaged in trafficking drugs as a guaranteed measure to long-term power a nd money.Tom Hagen lays it down clearly: If we do not get into it, someone else will. If it is not a main stream of income in the families now, it will be in 5 years, 10 years down the road. We must act quick, Tom tells the Godfather. Sonny, with his short and quick temper, makes a fatal mistake during the course of these negotiations by disagreeing with his father during the meeting with Sollozzo – words that have no doubt made a proud mark on the American pop culture when the Godfather tells him never to let anyone outside the family know what you think.Yet despite the advice of his consigliere and his most likely successor, Sonny, the Godfather stands strong if alone in refusing to engage in drug business on ethics and brilliant business vision. This decision along with Sonny’s foolishness to speak up at the Sollozzo meeting costs the Godfather 6 bullets. Even so, these bullets do not even come close to matching the merciless gunning down of Sonny that later follows . These harsh blows to the most powerful man in all of NYC at the time raise intensity among the mafia world, and yet the Don refuses to act on this with justified vengeance.It is with unwavering belief and rock-solid ethics that the Godfather then delivers a most unforgettable speech to the five Italian families in hopes of truce on the drug business. The judges and senators that hold his friendship dear would no longer wish to be associated with him if the business graduated from the small petty crimes around importing and exporting of olive oil and other goods, gambling, prostitution – a favorite of Tattalias – to a seriously debilitating substance.In all of this, he stands alone as visionaries often do. When all hell broke loose after Godfather’s shooting and his hospitalization, it took a mastermind planning session between Clemenza, Tom Hagen and Sonny and Michael to arrive at the perfect solution. It was risky but the only way to handle the situation and it was for Michael to kill the slimy NY cop, McClusky, and the head of drug business, Sollozzo, in a public restaurant. Michael flees overnight to a hideout in Sicily, and waits for the smoke to clear to come home.It takes almost three years before he is able to safely return home – during which time the Godfather tells Hagen every day â€Å"Remember to use all your wits for a plan to bring Michael home. † But it takes the genius of the Godfather’s sharp mind, even in his weakened condition, to find the only legitimate way to realize this – and that brings us to the story of Felix Bocchichio. This was omitted from the first movie but brilliantly told in the book. The Bocchichio family are the primitive borderline hostile generation who would take revenge – an eye for an eye – if anything were to happen to their clan.For that reason, having a Bocchichio hostage or having one arrange a meeting is absolute insurance on the impartial validity of the matter. And it is through a misfortune of the Bocchichio family that Michael is able to return home. When Felix Bocchichio has his wake-up call after the ruthless way in which his colleagues betray him, he has to pay for a crime he did not commit. After he served his term and was released, he shoots his enemies dead in broad daylight, and waits to be arrested. It is impossible to find a way out of this mess for Felix Bocchichio.The genius of Godfather arranges for Felix to confess to the murder of McCLusky and Sollozzo, for an exchange of large pension to his family for life. Felix confesses and Michael comes home at long last. The recurring theme of taking care of one’s family in exchange for a ‘favor’ to the Godfather is renewed at the turn of every page in this book. Some of the sub-plots running through the Godfather, non-central to the overall theme and missing from the movie, still make up my most cherished parts of this genius story.The indelible, lus tful, raw passion which Lucy Mancini and Sonny enjoy for a short while is on top of that list. Even the sweet brief romance of Michael Corleone and his first wife, the Italian bella Apollonia, deliciously described as it was, pales in comparison to the passages imparting the details of Sonny’s wild affair with Lucy. Mario Puzo proves no less a gifted author in his creation of the erotic love scenes between the impassioned lovers. The love making is predatory as Lucy and Sonny devour one another with voracious appetite.When Sonny dies, Lucy’s whole physical being aches for him, a loss and a wound that Sonny’s wife is far from experiencing. With the move to Vegas, thanks to Hagan’s arrangements to take care of â€Å"extended† relations of Sonny, Lucy embarks on a new life and adventures, including the nature of her relationship with Jules. Large or small, Puzo takes the time to first develop his characters fully – even if in isolation of other s – and then to carefully weave each into the central plot. There is a reason and time for each character to play their part, pay their dues, return a favor, or bestow an act of friendship to the Godfather.The Don, the mastermind of Mario Puzo’s creation, is the only one who knows well in advance of others – and that includes the reader – how and when each chosen one will be called to action. From the wide spectrum of the compelling personalities at his finger tips, Mario Puzo affords way too much time to developing that of the wasteful, whiny, incapable Johnny Fontaine, the Godfather’s Godson. If there is a more insufferable type in all of the Godfather, I must have missed the chapter – because Johnny Fontaine is it for me. To my disappointment, we delve into Johnny and peel layer after layer into his life, his career, and his psyche.The irony surrounding the deep love the Godfather feels for Johnny is blatant. He makes heaps of mistakes, b ut he also destroys the one singular value held of highest regards in the eyes of Don Corleone, that of family: He divorces and abandons his Italian wife and family in his drunken and desperate stupor of dealing with fame. Still the Don continues to love and support his Godson unconditionally. It is for the undeserving Johnny Fontaine that Jack Woltz pays dearly in the beheading of Khartoum, the finest, priciest, and rarest racehorse in the world.All of this sacrifice for the sacred bond of the Godfather to Godson relationship – one held very high in the eye of a Sicilian man – a bond for which the Godfather murders and destroys anything and anyone in order to protect. A sacred bond ever so wasted on a man such as Johnny Fontaine. Conclusion As a novelist and a masterful story-teller, Mario Puzo is gripping in every passage, every chapter and every book (total of 9 books in The Godfather). Movies 1 and 2 are no doubt classics of our time, and tightly capture the essenc e of the novel.Timeless movies as they be, with unforgettable theme music to pull us in even deeper into the elusive ways of the Italian mafia underworld, it is the writing that I prefer. It is in the riveting passages of Mario Puzo’s original book that his characters come alive in more riveting shapes and colors, although I admit that it is impossible not to associate them with the actors that have burned those names into our memories since the original Godfather movie. The Godfather is a masterpiece and a classic, and a story that once read and consumed, leaves its readers and viewers changed permanently.About the author Mario Puzo Mario Gianluigi Puzo (October 15, 1920 – July 2, 1999) was an American author and screenwriter, known for his novels about the Mafia, including The Godfather (1969), which he later co-adapted into a film by Francis Ford Coppola. He won the Academy Award for Best Adapted Screenplay in both 1972, and 1974. Puzo was born into a poor family fr om Pietradefusi, Province of Avellino, Campania, Italy living in the Hell's Kitchen neighborhood of New York. [1] Many of his books draw heavily on this heritage.After graduating from the City College of New York, he joined the United States Army Air Forces in World War II. Due to his poor eyesight, the military did not let him undertake combat duties but made him a public relations officer stationed in Germany. In 1950, his first short story, The Last Christmas, was published in American Vanguard. After the war, he wrote his first book, The Dark Arena, which was published in 1955. At periods in the 1950s and early 1960s, Puzo worked as a writer/editor for publisher Martin Goodman's Magazine Management Company.Puzo, along with other writers like Bruce Jay Friedman, worked for the company line of men's magazines, pulp titles like Male, True Action, and Swank. Under the pseudonym Mario Cleri, Puzo wrote World War II adventure features for True Action. Puzo's most famous work, The Godf ather, was first published in 1969 after he had heard anecdotes about Mafia organizations during his time in pulp journalism. He later said in an interview with Larry King that his principal motivation was to make money. He had already, after all, written two books that had received great reviews, yet had not amounted to much.As a government clerk with five children, he was looking to write something that would appeal to the masses. With a number one bestseller for months on the New York Times Best Seller List, Mario Puzo had found his target audience. The book was later developed into the film The Godfather, directed by Francis Ford Coppola. The movie received 11 Academy Award nominations, winning three, including an Oscar for Puzo for Best Adapted Screenplay. Coppola and Puzo collaborated then to work on sequels to the original film, The Godfather Part II and The Godfather Part III.Puzo wrote the first draft of the script for the 1974 disaster film Earthquake, which he was unable to continue working on due to his commitment to The Godfather Part II. Puzo also co-wrote Richard Donner's Superman and the original draft for Superman II. He also collaborated on the stories for the 1982 film A Time to Die and the 1984 Francis Ford Coppola film The Cotton Club. Puzo never saw the publication of his penultimate book, Omerta, but the manuscript was finished before his death as was the manuscript for The Family.However, in a review originally published in the San Francisco Chronicle, Jules Siegel, who had worked closely with Puzo at Magazine Management Company, speculated that Omerta may have been completed by â€Å"some talentless hack. † Siegel also acknowledges the temptation to â€Å"rationalize avoiding what is probably the correct analysis – that [Puzo] wrote it and it is terrible. † Puzo died of heart failure on Friday, July 2, 1999 at his home in Bay Shore, Long Island, New York. His family now lives in East Islip, New York. Works of PuzoN ovels †¢The Dark Arena (1955) †¢The Fortunate Pilgrim (1965) †¢The Runaway Summer of Davie Shaw (1966) †¢Six Graves to Munich (1967), as Mario Cleri †¢The Godfather (1969) †¢Fools Die (1978) †¢The Sicilian (1984) †¢The Fourth K (1991) †¢The Last Don (1996) †¢Omerta (2000) †¢The Family (2001) (completed by Puzo's girlfriend Carol Gino) Non-fiction †¢Ã¢â‚¬ Test Yourself: Are You Heading for a Nervous Breakdown? † as by Mario Cleri (1965) †¢The Godfather Papers and Other Confessions (1972) †¢Inside Las Vegas (1977) Short stories †¢Ã¢â‚¬ The Last Christmas† (1950) â€Å"John ‘Red' Marston's Island of Delight† as by Mario Cleri (1964) †¢Ã¢â‚¬ Big Mike's Wild Young Sister-in-law† as by Mario Cleri (1964) †¢Ã¢â‚¬ The Six Million Killer Sharks That Terrorize Our Shores† as by Mario Cleri (1966) †¢Ã¢â‚¬ The Unkillable Six† as by Mario Cleri (1967) †¢Ã ¢â‚¬ Girls of Pleasure Penthouse† as by Mario Cleri (1968) †¢Ã¢â‚¬ Order Lucy For Tonight† as by Mario Cleri (1968) †¢Ã¢â‚¬ 12 Barracks of Wild Blondes† as Mario Cleri (1968) Screenplays †¢The Godfather (1972) †¢The Godfather Part II (1974) †¢Earthquake (1974) †¢Superman (1978) †¢Superman II (1980) †¢The Godfather Part III (1990) †¢Christopher Columbus: The Discovery (1992)Summary:The book opens with the wedding of Connie Corleone, daughter of Don Vito ‘The Godfather' Corleone, head of the most powerful of the five great Mafia clans or ‘families' of New York. Don Corleone is shot at by a new contender for power in the city, Virgil ‘the Turk' Solozzo, who plans to obtain power by the lure of vast profits in the drug trafficking trade. After the Don is incapacitated by his assassination attempt, the book follows the Corleone family's progress as they must now adapt to the changing times and power dynam ics and maintain the Corleone empire.Santino ‘Sonny' Corleone is too blunt and brash a man to ever become Don while Freddie is weak and ineffective. The book follows the journey and transformation of the youngest, and hitherto the Don's most distant, son Michael as he realizes that though he may have tried to live by society's norms, rejecting what his father represented, inside lives a true Sicilian who will stop at nothing to get what he wants and protect those he loves. Michael has a tough task ahead of him, he has to locate his father's would-be assassin, crush the rival gangs and regain once more the respect that the name Corleone inspired in New York†¦

Difference Between Wordpad and Notepad Essay

What is the difference between Notepad and WordPad? Answer: Both programs are text editors that are included with the Windows operating system. Notepad is the most basic text editor, which allows you to open and create text files. While you can create several paragraphs of text with Notepad, using line breaks (by pressing the Enter key), the program does not give you text formatting options. For example, you cannot change the font size or make the text bold. WordPad is similar to Notepad, but gives you more formatting options. You can use bold and italics formatting, and change the font, size, and color of the text. You can also create bulleted lists and center and justify paragraphs. WordPad allows you to save documents as either basic text (. TXT) files or rich text format (. RTF) files. Saving a document in the rich text format will keep all the formatting you have done to the text, while saving it as a basic text file will remove all text formatting from the document. Notepad is a good choice for creating webpages It is also useful for removing formatting from text that you have copied and want to paste somewhere else as plain text. Just paste the text into Notepad, copy it again from Notepad, and you have completely unformatted text. WordPad is a good choice for writing papers or creating documents that you want to print. It is also great for making lists, since it supports bullets. You can use WordPad to open an unformatted text document and add whatever formatting you want. If you want even more formatting options and a more user-friendly interface, you can use a program such as Microsoft Word.

Monday, July 29, 2019

Response Assignment Example | Topics and Well Written Essays - 250 words - 21

Response - Assignment Example Through such kind of networks, the fellows can thrive in most if not all of their endeavors. For instance, "20 Under 20 Thiel Fellowship" played a significant role in Ritesh Agarwal success (Velayanikal, 2015). It gives the fellows the opportunity to escape boredom of being in classrooms. That is, it serves as an alternative to college as a way for better life (Constine, 2014). I believe that Thiel Fellowship makes one to face the reality of life instead of the theoretical practice in classes. It gives one an opportunity to face life challenges such as starting a business and become innovative enough to address them. It does not only provide employment ideas, but develops one as a person to be able to make their decisions (Imam, 2014). Another reason that would make me join the fellowship is because there is a proof of success among those who joined first. Eden Full, who left Princeton to start SunSlauter, is a good example (Kim, 2015). Her business now has branches in 15 countries and a factory in India. Even though, some have failed in the program, the success shows that there is hope in it (Hindman, 2012). In conclusion, I would accept Thiel Fellowship opportunity if given a chance since it has more pros than cons. I do believe that failure among some of the individuals is the same way even in education others do fail. The financial support and mentorship is enough for a young person’s success. Constine, J. (2014). Correction: 20 Under 20 Thiel Fellowship Did Not Up Age Limit To 23, But Maybe It Should. Retrieved from http://techcrunch.com/2014/10/10/thiel-fellowship- twenty-under-twenty-three/ Kim, E. (2015). Billionaire Investor Peter Thiel’s Plan to Pay College Students To Drop Out is Showing Mixed Result. Retrieved from

Sunday, July 28, 2019

Importance of Human Skin Pigmentations Essay Example | Topics and Well Written Essays - 500 words

Importance of Human Skin Pigmentations - Essay Example UVB is the short wave ultraviolet rays from the sun that are less dangerous than the short wavelength Ultraviolet rays known as the UVA. A UVB ray is absorbed at the surface of the skin and their intensity depends on the geographical area, time, and season. Vitamin D is responsible for absorption of calcium in our bodies for strong bones and teeth. Insufficient vitamin D causes brittle bones and rickets and people who have less exposure to the UVB rays from the sun must take vitamin D supplement. The skin is the largest organ and very important for the survival of human beings. Its protective nature to the other body organs and its pigmentation matters a lot in our health. Melanin is therefore very crucial for healthy individuals and where it lacks such as the people with albinism, medical attention is mandatory to prevent skin disorders and cancers. Skin pigmentation is very important in human bodies especially those living in hot regions such as the African continent. The main functions of melanin are the absorption of the ultraviolet rays from the sun that has a damaging effect by causing diseases such as the skin cancer. Light-skinned people have a problem in coping with the intense radiations from the sun as it causes a lot of damage to their skins. Inadequate melanin cannot absorb all the UVR rays from the sun especially when it is very hot leading to adverse effects such as premature aging, cancers, and vitamin D deficiency.

Saturday, July 27, 2019

Same as the last time Research Paper Example | Topics and Well Written Essays - 750 words

Same as the last time - Research Paper Example The city of Seoul in southern Korea is therefore no exception and experiences one of the most radical extents of polarization evident in its pattern of habitation and the people’s way of life in the city. The disparity between the two regions: Gangnam and Gangbuk dates back as early as the 17 BC when the region around Pungnap became the administrative capital of the Joseon dynasty. Pungnap is located in a region believed to be in the Gangnam side of the city. It is not clear the exact location of the region but the royal dynasty that ruled the early Korea resides in this region owing to its favorable climatic condition and the forested neighborhood it therefore provided. This implies that the region has for a long time had the ambient of wealth, which thereby influenced its distinctive architecture and settlement pattern. The subsequent occupants of the city followed the settlement pattern, which secluded the Pungnap region alienating it for the royalties while the rest of the subjects settled in other parts of the city notable on the eastern side of the river Han currently the Gangbuk region. The special city of Seoul is the capital city of South Korea and arguably the largest modern day metropolis in the entire Korea. It is home to approximately fifty million people most of whom are South Korean nationals but also provides residence to more than ten million international business people (O'Loughlin 33). The city has an elaborate design, one that considers and showcases the economic growth of the country and its interesting history. The architecture of most skyscrapers in the city embodies the modernism in design and comfort but also imbed the rich cultural history of the South Korean people. The wide clean highways, the artistically tall building structures, and the every glaring subway stations among other interesting features such as Seoul’s nightlife all act as a unifying feature to the diverse people of the city. However, behind the glamor a nd the beauty, the truth of the city lies in a more analytical scrutiny of the residences’ way of life. It is conspicuous that the city has two extreme ends that find their way in virtually every aspect of life of the people in the city including the city design and its initial planning. River Han divides the city into two and the kind of life on each side of the river is distinct of Seoul economic stratification. Liberal markets have effective yet relatively concealed mechanisms of discrimination. While everywhere is accessible and every product available in the market, the price tag on the commodities and services in the market always ensure that the rich rarely interacted with the poor. Additionally, it provides for an effective mechanism of keeping the rich to their own society and possibly denying the poor access to such societies. Seoul is one such city. Being an industrial country, the South Korean economy grows very fast with international businesses giving rise to ex tremely wealthy businesspersons and business empires. The wealth disparity and economic imbalance influence the design since the city has to include all its residences despite their financial positioning. This has resulted in the birth of two residential regions namely the Gangnam and the Gangbuk. Gangnam resides the rich who therefore live more flamboyant lifestyles, a feature that influences the landscape of the Gangnam region on one side of River Hang.

Friday, July 26, 2019

Comparative Justice Essay Example | Topics and Well Written Essays - 500 words - 2

Comparative Justice - Essay Example tries to delve into the basis of the US legal system, it becomes lucidly clear that the US legal system as per the Judi-Christian tradition, traces its origins in relation to some divine power. The US notions of justice, fairness and honesty have their moorings in the Biblical texts. Similarly, the Islamic law traces its origins to the Holy Quran and the Islamic legal system believes law to be an expression of the will of God (Terrill, 2009). The other pivotal fact is that the US legal system tends to employ the tool of law to shape a specific type of society that is in consonance with the essential American values and ethics. In other words, In America, the law is also considered to be a means of shaping and constructing a desirable society. In that context, the purpose of Islamic law is also the same. The Islamic law also intends to shape a society that is in consonance with the quintessential Islamic values, ethics and aspirations. However, there exist also marked differences between the Islamic legal system and the US legal system. The US legal system tends to guide and restrain the actions of its denizens within a defined social domain. In contrast, the Islamic legal system not only pertains to the legal rights and obligations of its citizens but also tends to define their ethical aspirations. In other words an Islamic legal system not only governs as to what its citizens could do, but also defines as to what they cannot do (Terrill, 2009, p. 612). The second thing is that the US legal system is subservient to the requirements of the time and social circumstances that is the US law is open to relative interpretations. However, the Islamic legal system considers Sharia to be an expression of the will of God that is sacrosanct and unchangeable in all times and societies (Terrill, 2009, p. 598). As per the Islamic legal system, it is not the law that is subservient to the requirements of the society, but rather it is the society that is to mould itself as per

Thursday, July 25, 2019

Exclusionary rule and the fruit of the poisonus tree Essay

Exclusionary rule and the fruit of the poisonus tree - Essay Example Such illegally obtained evidence was henceforth banned form use in Federal courts. Justice William Day wrote the unanimous opinion, saying that the Fourth Amendment essentially embodies the old English common law principle that ‘a man’s home is his castle’, and that it was intended to â€Å"forever secure the people, their persons, houses papers, and effects, against all unreasonable searches and seizures under the guise of law.†2 Justice Day continued with what may be one of the most damning indictments of illegal police conduct as he argued that â€Å"the tendency of those who execute the criminal laws of the country to obtain convictions by means of unlawful searches or enforced confessions . . . should find no sanction in the judgment of the courts which are charged at all times with the support of the Constitution and to which people of all conditions have a right to appeal for the maintenance of such fundamental rights.†3 The vital element of this argument is that just because the police and prosecutors had routinely performed illegal searches and â€Å"pressured† (some would say tortured) suspects into giving confessions, the mere fact that the illegality was widespread and of long duration provided no defense. Interestingly, Day’s argument was essentially the opposite of William Rehnquist’s argument for keeping the Miranda rights. Renquist argued that while the constitution may not guarantee or require such rights, the fact hat they had become part of the overall fabric of the legal system in particular and of American society in general they had become an essential fabric of the legal landscape.4 While the actual reasoning behind the exclusionary rule may be somewhat hazy at times, especially in these early cases when it was being initially being developed, and before its progeny had fleshed out the whole, its institution seems to have been catalysed by a view of

Wednesday, July 24, 2019

Qualitative Interface Evaluation of Website Essay

Qualitative Interface Evaluation of Website - Essay Example User interface of a given product is evaluated using various techniques. The main aim of assessing the interactivity of an interface is to see the design of that interface ensures that the user is able to accomplish their tasks. The main objective of interface evaluation is to help the designers and developers of the product to minimize the malfunctions in the system, Gould and Lewis (1985) also asserts that feedback to the developers is very critical to ensure that there is an interactive process of product development. An interface is said to be good one if the users of all levels from novice to experts are able to accomplish their tasks. User interface experts have for over years been designing the best way to evaluate the interface. The evaluation therefore defines two groups; the experts and novice evaluators where each one has their level of evaluating the product within the development cycle of the program. Interactive user interface is a part of the software or the hardware t hat enables the user to interact with that product or the computer. For instance, computer users interact with the computer via software interfaces. According to Melody & Marti (2002), a web site that was poorly designed reduces the revenue and the performance of an organization. The main question is which is the best design principles for a quality website. Many evaluation techniques looks at the human daily activities and habits where the website should imitate these behavior. For a website the following are some of the criteria to be used in evaluating a website. Text elements of a website are important features that evaluators check, text should be visible with high quality but very simple to understand by the users. There should be minimal text with the web page. This is called clarity and concise. The number of links are very important too they tell us how easy is it to navigate from one page to another. There should be many ways in which the user can accomplish their tasks. T oo much external links make a bad website however. The colors which indicate that the link has been visited or not yet should be distinct and outstanding. The images in the site is also important the size and color adjustments should make it attractive. There should be interactive graphics which make users participate actively in the sites operations. Software guidelines and heuristic evaluation techniques will be used in the analysis of the site. Techniques of evaluating interface According to Afonso et al., (2011), evaluation of user interface entails measuring of how easy the interface is to learn by a new user and adopt to the environment. Learning outcomes are measured y how someone can be able to navigate from one level to another, the use of shortcuts and minimal errors. The user satisfaction is another factor in a good interface, if users yarn to use the interface once ore then it is a good one. Interface evaluation is a process that aims at establishing problems of the inte rface which is a process that requires several activities done. The techniques below are used by stakeholders of the hardware or software product at different levels such as experts and end users. Experts in UI evaluate the interface during formative evaluation while end users test the system by cognitive and pluralistic walkthrough (www.cs.umd.edu).There are several techniques used in interface evaluation such as; Heuristic evaluation

Family Owned Real Estate Properties in London Dissertation

Family Owned Real Estate Properties in London - Dissertation Example This particular paper focused on family owned real estate businesses that are located within the City of London. Among the most prominent real estate companies that are family owned, include the Grosvenor Estate, the Cadogan Estate, the Howard de Walden Estate, and the Portman Estate. According to Darlow (2013), these companies have a big shareholding in the London property market mostly because their founders acquired land in the earlier centuries when land the price of land was low (Darlow, 2013). These families have held the ownership of the parcels of land till the present times when the lands are being developed to property and real estate (Wheaton & Torto, 1990). However, it is important to note that besides these prominent families, there are other small family owned real estate companies that also own a small number of real estate within the London. Whilst focusing on family owned real estate companies in London, the research study focused on the aspect of management in these companies and in particular how the collaborations of property agents work with these family owned businesses. A property agent or a real estate agent is described as an individual that has been approved and issued with a license that enables him to represent either a landowner or a land buyer in a real estate transaction. Such an individual earns a brokerage commission out of such a deal (Mccrea, 2005). Besides the brokerage services, property agents also act as agents for the owners of residential and commercial properties.

Tuesday, July 23, 2019

Trafficking and Prostitution Essay Example | Topics and Well Written Essays - 4250 words

Trafficking and Prostitution - Essay Example As the report stresses feminist philosophy is a subject which has acquired much attention in the past decades regarding speculative arguments and practical politics. It is us who create and visualize differences, differences based upon characters and differences that emerge as if woman is entitled to a separate class. Despite these differences, feminist philosophers are able to gather and unite woman in a single perspective which in the vision of a philosophical mind is free of the misogyny and male bias that have characterized so much of Western philosophical tradition. Feminist philosophy’s challenge to this tradition has been the challenge of repairing the distortions, centring the marginalization, and valorizing what were once considered the trivial, if not invisible, facets of woman’s nature, woman’s knowledge, and woman’s happiness According to the report findings contemporary feminists believe that unless and until the feminist philosophers are free to attend towards women’s diversity, women will remain stereotyped by the same kinds of restrictive and historical paradigms as those advanced by traditional philosophy. Therefore, many feminist philosophers have not only researched women’s experience but have also advocated the exploration of the complexity and variety of women’s experience. It is through such exploration that women found themselves open to accept learning attitudes in context with their inner voices and morality differentiated by such features as race, class, and sexual preference. Critics say that by possessing such bold opinions, feminist lit hope to avoid the essentialism of claiming some single, immutable, and universal nature of 'Woman'. A 'Prostitute' Class Many feminists perceive prostitution to be among one of the classes in society. Pro-sex work feminist advocates believe that a 'free-sex' choice must be legally provided to the women for 'prostitution' is a profession after all and a woman possesses a right to choice. Feminists say that prostitutes are not only similar to other women in their society; they also possess a right to acquire the same rights as that of a

Monday, July 22, 2019

Jesus and Caravaggio Essay Example for Free

Jesus and Caravaggio Essay Caravaggio (1573-1610) Originally named Michelangelo Merisi, Caravaggio was born on September 28, 1573 in the Lombardy hill town of Caravaggio near Milan, which he is named after. He was born to relatively privileged parents who were victims of an epidemic and he became an orphan at the age of eleven. When Caravaggio was only 13 years old his family decided he would devote his life to painting. Caravaggio began as an apprenticed in 1584 to Simon Peterzano, a Milanese painter in oils and fresco. His earliest years in Rome, from-1588 were very difficult for Caravaggio. He was employed for a while in the workshop of Mannerist painter Giuseppe Cesari, also known as the Cavaliere dArpino as a fruit and flowers specialist, the only Caravaggios still life work known without figures is a Basket of Fruit (1597 Pinacoteca Ambrosiana, Milan) the facts about this piece are not really clear although it is possible the painting was made as a trial piece, since the background was added later (the piece is now lost). Basket of Fruit (1597)- In 1592, Caravaggio arrived in Rome at the age of 21. His first five years in Rome were the hardest period for Caravaggio. He had no money and lived a very modest life style because he couldn’t find a suitable work place, therefore he moved from one workshop to another frustrated from working as an assistant to painters who had much smaller talent than his own. He earned his living mostly from uncreative routine work and never stayed more than a few months at each studio. Finally in 1595, he decided to set out on his own and began to sell his pictures through a dealer, Maestro Valentino, who brought Caravaggios work to the attention of Cardinal Francesco Del Monte, a bishop of great influence in the Vatican. Caravaggio soon came under the protection of Del Monte and was invited to receive a place to live, and a pension in the house of the cardinal. Despite spiritual and material deficiency, Caravaggio had painted approximately 40 paintings for Francesco Del Monte. The subjects of this period are mostly adolescent boys, such as the above paintings: Boy with a Fruit Basket (1593; Borghese Gallery, Rome). The boy with a fruit basket has similarities with another painting the- Fruit seller by the Lombard painter Vincenzo Campi, painted about 1580, nevertheless, Caravaggio is not following his footsteps and using innovative drawing techniques. Differently from Vincenzo Campis drawing posing a young woman in the center of the piece, Caravaggio preferred a teenage boy which was his most common theme of drawing at the time. Also his subject is brought almost to the front of the picture, so that the boy seems to offer himself as well as the fruit to the observers. There is a sign of uncertainty in the way that the boys long neck raises out of his shoulders edge. Caravaggios incredible techniques of light and shadow are already seen in his early work. Against a near-blank ground, attention is focused on the right side of the boys upper body, his right arm and the fruit basket, displaying very rich variety of fruits. The Young Bacchus (1593; Uffizi Gallery, Florence). Caravaggios Bacchus no longer seems like an ancient god, or the Olympian vision of the High Renaissance. Instead, Caravaggio paints a rather vulgar and soft yang boy, who turns his chubby face towards the viewer and offers wine from a large glass held by his small thin fingers. This is not Bacchus himself, but some perfectly ordinary individual dressed up as Bacchus, who looks at the viewers rather exhaustedly. It appears that Caravaggio used real people for his paintings even in his early work. The Music Party (Metropolitan Museum of Art, New York). The two figures seen in the front of the piece are the main characters of the composition. They are shown in an oppositional structure, and only one of them is fully shown. The figure of the instrument player and the corresponding figure that we see from behind. The face between these two is Caravaggios; the figure on the left is taken from an earlier composition (Young Peeling a Pear). Caravaggios usage of a narrow range of earth colors which was his signature method of painting is shown from his earliest work as well as in his most famous ones. Also his amazing use of details, he describes every part of the figures anatomy and he always creates movement in his paintings. These early pictures show an innovative, direct, and empirical approach; they were painted directly from life and show almost no usage of the academic method of painting which was used in Rome at the time.

Sunday, July 21, 2019

Personal Reflection on Learning Outcomes of Professional Practice

Personal Reflection on Learning Outcomes of Professional Practice In order to reflect upon my learning throughout this module, I will identify and critically discuss three Module Learning outcomes that reflect the range of possible issues of the Nursing and Midwifery Council (NMC) Proficiencies (2004). I will then identify appropriate literature and reflect on my learning and experience. This will enable me to identify personal strengths and areas for further development. The first learning outcome is: Recognise the importance of reflective practice and understand the process of reflection. The second outcome chosen is: Discuss the difference between data and information?. The third outcome is: Demonstrate appropriate non-verbal and verbal skills, including the use of silence, open and closed questions and summarising, to gather information. *Please note that the names of the patients mentioned in this essay have been changed in order to protect their identity for confidentiality reasons. 1 Recognise the importance of reflective practice and understand the process of reflection This outcome relates to the NMC Proficiency of Demonstrate the responsibility for ones own learning through the development of a Record of Achievement of practice and recognise when further learning is required. Reflection is a new method of learning for me. With regard to nursing, the term reflection and reflective practice has been defined by many academics, resulting in various models and theories being developed. The Oxford Mini-dictionary for Nurses (2008) describes reflection as the careful consideration of personal actions, including the ability to review, analyse and evaluate situations during or after events. It is an essential part of the learning process that will result in new methods of approaching and understanding nursing practice. Johns (2000) defines reflection as a window through which the practitioner can view and focus self within the context of his/her own lived experience in ways that enable him/her to confront, understand and work towards resolving the contradictions within his/her practice between what is desirable and actual practice. Schon (1983) proposed that reflection occurs on action or in action. The first occurs after the incident whereas the latter occurs during the incident and is said to be the hallmark of the experienced professional (Somerville Keeling, 2004). The more traditional theories and models base reflection on critical incidents. Love (1996) states that a critical incident does not have to be negative or dramatic but should provide deep thought and raise a professional issue. Gibbs (1988) developed The Reflective Cycle. The model divides the reflective process into sections; Description, Feelings, Evaluation, Analysis, Conclusion and Action Plan (see Appendix 1). Johns (2000) developed a Model of Structured Reflection (MSR) (see Appendix 2) As with Gibbs (1988) Reflective Cycle, the MSR uses a series of questions to guide an individual through the reflective process. Johns model is based on five cue questions; Description, Reflection, Influencing Factors, Could I have dealt with it better? and Learning. The volume of studies and models on reflection demonstrates the value that is placed on this tool. Newell (1992) described the process of reflection to be a cornerstone of nursing professionalism. Gustafsson and Fagerberg (2004) support the notion that reflection is a vital tool and advantageous in terms of the improvement of a nurses professional development and patient care. Many consider journal writing to be an effective reflection strategy (Johns 2000; Paterson, 1995; Cameron Mitchell, 1993; Lauterbach Becker, 1996). Journal writing is considered to offer writers the opportunity to become participants/observers of their own learning, to describe a significant experience and to reflect on that experience to see what they can learn from having had it (Weisberg and Duffin, 1995). While in clinical practice, I have written a journal of my experiences. I recognise its value to aid reflection as I feel that the act of writing things down is important. This is supported by Somerville and Keeling (2004). To demonstrate my understanding of reflective practice, I will now reflect on an incident that occurred while on placement when I was feeding a patient, named Tom*. I will utilise Gibbs (1988) model as this is my first experience of using reflection and feel that it is concise and appropriate at this stage. Tom had dementia and had recently suffered a stroke, which had left him confined to bed. As Tom had difficulty feeding himself, I offered to assist him; he smiled, agreed and appeared to recognise me. Halfway through the meal, Tom became agitated and asked if the food was mackerel. I told him that it was turkey. He shouted aggressively that he wanted mackerel and then became verbally abusive towards me. I was unable to calm him so I left the room with an assurance that I would be back soon. I then asked a senior nurse for help. This was the first time that I had fed a patient but felt comfortable. I knew Tom well and felt that I had built up a rapport with him. I was pleased that he seemed happy and relaxed. When he shouted I felt shocked, worried and conscious of other peoples reactions; they may think that I had done something wrong. Even though Tom was disabled he did have some use of one arm so I was afraid that he might become violent. I was upset that I had to stop feeding him and leave the room. When I left I felt relieved but also anxious that I may have contributed to the way Tom was feeling. When evaluating and analysing the incident, I was pleased initially with the way the task started as on admission he had a poor appetite. The negative side of the situation was that Tom became angry and didnt finish his meal. I realise that dementia is a complex progressive illness and there may be times when a patient experiences sudden mood changes. I believe that I would now do things differently if a similar situation arose. With hindsight, I questioned whether I should have just agreed with Tom that the turkey was mackerel then this incident may not have occurred. However, this raises ethical issues such as whether it can be acceptable to not tell the truth. A report published by the Nuffield Council on Bioethics (2009) discusses the ethics of dementia care and states that ethical dilemmas arise on a daily basis for all those providing care for people with dementia. Research suggests that challenging someone with dementia could be detrimental and cause unnecessary distress (Shellenberger, 2004). Naomi Feil developed validation therapy between 1963 and 1980 as a technique to communicate with patients with dementia by recognising and accepting their view of reality of people with dementia in order to provide them with empathy and respect (The Validation Training Institute, Inc). In the future I could use this technique; for exa mple, when Tom asked if it was mackerel he was eating I could have replied by asking him if he liked mackerel which would have avoided giving a direct answer. With regard to strengths and areas of development, I feel that I have reflected successfully on this incident. However I would like to strive to reflect in action as opposed to on action as this is the most effective. In terms of development, I believe that it would be beneficial to patients and myself to learn more about caring for patients with dementia. The Dementia UK Report (2007) published by The Alzheimers Society states that there are currently 700,000 people with dementia in the UK. The report also predicts that by 2025 there will be over 1 million people with dementia so it is inevitable that I will be caring for many dementia patients in my career. In summary, although the models of reflection span over 20 years and vary slightly, the principle of reflection is very similar, which implies that reflection is a robust tool and still applies to modern nursing. I have learnt that reflective practice is a vital tool, particularly when associated with journal writing. Continuous reflection will allow me to develop skills and knowledge to enable me to provide the best care possible for patients and their families. 2 Discuss the difference between data and information This learning outcome links to the NMC proficiency of Demonstrate literacy, numeracy and computer skills needed to record, enter, store, retrieve and organise data essential for care delivery. As a student Im not involved in using my computer skills on the ward but eventually will be involved in audit and data entry. My literacy and computer skills are demonstrated throughout my portfolio and assignment. I demonstrate my literacy and numeracy skills when writing patient evaluations, calculating fluid balance and assisting with drug calculations. There are many examples of data and information used within nursing care. Due to the broad nature of this area I have focused on a particular type of data and information to demonstrate my understanding of these terms. My focus is data collected from patients vital signs and the information that relates to this. I will demonstrate how the process of giving information to patients rather than just data is an essential part of nursing. Gathering, giving and recording both data and information accurately is vital. Data can be described as facts and statistics used for reference or analysis. The term information can be defined as the meaning applied to the data (Concise Oxford English Dictionary, 2008). Observation data collected from patients includes pulse rate and rhythm, blood pressure, respiration rate, temperature and oxygen saturate percentage. These measurements are taken on admission as it is important to gain base-line readings to which future readings can be compared. It is necessary to apply meaning to this data to form information to be able to judge a patients condition. Throughout the module I have learnt what data means in terms of acceptable values. As I now have the information about the data I can make judgments about data. For example, I now know that the information I can get from the blood pressure data of 160/110 mmHg is high (Blood Pressure Association). However, this information needs to be put into context to allow use of the information to make a judgement. For example, if a patient has just completed cardiovascular exercise, this may account for a high blood pressure reading. With this information, the plan would be to wait for 30 minutes before repeating to gain more accurate data. Readings can vary temporarily due to a number of reasons; for example, medication, an existing health condition, fluid intake, exercise and alcohol consumption. However, a change in blood pressure can indicate deterioration in condition, which alerts health care professionals to investigate. In order to show my understanding of the difference between data and information I will now give an example of an incident that occurred while on placement. During observations of a 70 year-old lady named Eileen*, I noticed that her systolic blood pressure had dropped from 127 to 90 mmHg. Her other observations remained consistent. I informed a senior nurse who asked a doctor to review the patient. I discussed her fluid intake with her as this could have had an adverse effect on her blood pressure. As she had only drank a small amount I encouraged her to drink more and continued monitoring. Eileens blood pressure eventually returned to her baseline. This example shows how data, such as blood pressure readings, prompts gathering information which, in turn, enables problem solving. As demonstrated, I need to have an understanding of the information gathered from the data but additionally I feel that it is important that patients understand what the data means. Bastable (2006) defined patient education as the process of assisting people to learn health related behaviours so that they can incorporate those behaviours into everyday life and achieve a goal of optimal health and independence in self care. I will now provide an example of my experience of patient education: During a blood pressure check on Paul*, who was hypertensive and took multiple medications, I asked him whether he would like to learn about blood pressures. He gladly agreed so I explained what the reading was and what can affect blood pressure. I explained that exercise, healthy eating, low salt intake and weight control would have a beneficial effect on his blood pressure. He was unaware of how his current lifestyle could have a detrimental effect on blood pressure and said that he now intended to make some lifestyle changes. Research supports my thoughts about the benefits of giving patients information about aspects of their health rather than just the data. Florence Nightingale, who has been described as the founder of modern nursing, recognised the importance of educating about adequate nutrition, personal hygiene and exercise in order to improve well-being (Bastable, 2006). The Department of Health (2009) states that giving people relevant, reliable information enables them to understand their health requirements and make the right choice for themselves and their families. (Bastable, 2008). Partridge and Hill (2000) found that patients who are well informed are better able to manage their health, have improved psychological outcomes, have fewer exacerbations of their condition and less hospital admissions. Glanville (2000) states that if clients cannot maintain or improve their health status when on their own, we have failed to help them reach their potential. Abbott (1998) reported that by involving patients in their state of health by keeping them informed has been proved to improve patient satisfaction and concordance. However, there is research to suggest that providing information may not result in a change in health outcomes (Kole, 1995; Sherer et al. 1998). They found these reasons to be that patients dont understand the information, are unable to absorb it due to pain, anxiety, or that they choose not to act upon it. Additionally, absorption of information is decreased when there is too much information; therefore health outcomes remain unchanged. The question is how much is too much information? This is difficult to determine. In terms of personal strengths, I felt very satisfied that I had initiated this conversation which resulted in Paul considering lifestyle changes. On reflection, this incident highlighted the importance of patient understanding and has encouraged me to take time to educate patients where possible. It has emphasised the need for continuous learning so that I am able to answer questions and educate patients. Additionally, I am aware of my limitations and when to seek advice or refer patients to others. I also need to develop confidence in speaking to patients about sensitive issues such as weight management by researching this area. 3 Demonstrate appropriate non-verbal and verbal skills, including the use of silence, open and closed questions and summarising, to gather information This outcome relates to the NMC Proficiency of Engage in, develop and disengage from therapeutic relationships through the use of appropriate communication and interpersonal skills. Communication is a reciprocal process that involves the exchange of both verbal and non verbal messages to convey feelings, information, ideas and knowledge (Wilkinson 1999; Wallace 2001). In nursing, communication and information gathering is essential to provide quality care. Sheldon, Barrett Ellington (2006) report that Communication is a cornerstone of the nurse-patient relationship. Information gathering commences from when the nurse greets the patient. In order to communicate non-verbal and verbal cues are used. Non-verbal skills are portrayed with body language and impact on communication (Hargie Dickson 2004). These include posture, facial expressions, head movement, eye contact and hand gestures showing active listening. Verbal skills include the use of silence, open and closed questions and summarising. The tone of voice and rate of response are significant. The emphasis is on effective communication; the way we communicate can hinder or enhance the information we gather. Sheldon et al. (2006) state that the power of effective nursing care is strengthened and enriched by good communication. Maguire and Pitceathly (2002) suggest that clinicians with good communication skills identify patients problems more accurately, patients are more satisfied with their care and are less anxious. It has been reported that that ineffective communication can lead to patients not engaging with the healthcare system, refusing to follow recommended advice and failing to cope with the psychological consequences of their illness (Berry, 2007). The scenario below demonstrates my understanding of appropriate verbal and non-verbal cues. It is part of a conversation with a patient on admission regarding current medical history. When meeting Arthur*, a 78 year old, I smiled, introduced myself and explained the purpose of our conversation. I asked Arthur Do you have any chest problems? he answered Yes. I then asked What chest problems do you have and how do they affect you? he answered I have emphysema causing wheezing and a cough. I also get breathless when walking and have oxygen at night I left a brief silence at this point. Arthur then disclosed I cough up a lot of horrible phlegm in the morning which is embarrassing. He then asked will I get a chest x-ray. I asked Have you any particular worries about your chest? to which he replied well I am quite worried about lung cancer. I told him that I would pass on his concern to the doctor and then summarised our conversation. With regard to verbal responses, I initially asked a closed question as I wanted a specific answer. Silverman et al. (2005) supports the theory that closed questions are appropriate when wanting to narrow the potential answer. Due to Arthurs response I asked an open question to encourage him to go into more detail. An open question often results in a lengthy answer, so I used fillers such as mmm throughout, to show active listening and to encourage him to continue. The brief pause was successful as it enabled Arthur to disclose his embarrassment. I summarised his response in order to clarify what Arthur had said for my own benefit but also to give the patient confidence that I had understood and opportunity to correct me if not. With regard to my non-verbal communication, I kept an open posture with eye contact and leant forward slightly to show that I was listening. I also ensured that my facial expressions were appropriate. For example, when greeting Arthur I smiled, but during descriptions of distressing symptoms my facial expression was one of concern. Egan (2002) supports the notion that conveying these non-verbal cues in this way will facilitate emotional disclosure and encourage the patient to talk more freely. Egan derived the acronym SOLER to portray awareness of the non-verbal responses; facing squarely, maintaining an open posture, leaning slightly forward, having appropriate eye contact and being relaxed. There are approximately 700,000 different non-verbal cues that may or may not have meaning (Birdwhistell, 1970; Pei, 1997). As nurses, we must be aware of our use of non-verbal cues as they can convey unintentional meaning. In addition to awareness of our responses it is imperative to be aware of patient cues, as this is part of the information gathering process. Arthurs hesitancy indicated to me to remain silent to encourage further disclosure. Being aware of patients verbal responses is more straightforward than what their non-verbal responses convey and it may be that patients body language contradict the spoken word (Miller, 1995). Barriers to communication include anxiety, language, hearing, sight or speech impairment. During communication, I would like to think that I am non judgemental. According to Underman Boggs (1999) most of us have personal biases regarding others that are based on previous experiences. In relation to my scenario, Fuller (1995) suggests that health care professionals may underestimate the verbal capacity or abilities of older people, which results in their conversations being undervalued. In terms of personal strengths, I feel fairly confident with the use of verbal and non-verbal cues and how these can deter or catalyse communication. I feel that I used silence successfully as Arthur disclosed embarrassment and mentioned about an x-ray, which he may not have done otherwise. I was able to reassure him that we would provide a disposable sputum pot and acknowledged his fear of cancer. I realise that it can be difficult communicating about sensitive information and this is an area of development for me, which I feel will improve with experience. Although at this stage of training I would not be expected to lead consultations for diagnostic purposes, it was informative to research consultation models. I intend to become more familiar with these models in order to utilise some of the communication skills (Newell, 1994). To form an overall conclusion, I feel that through theoretical learning and clinical experience I have demonstrated my achievement of the NMC Proficiencies (2004). I have critically discussed and concluded each learning outcome in turn throughout the essay but to summarise; patient focus and effective communication are paramount. I feel that in terms of reflection, self-awareness is key (Rowe, 1999). This will enable me to look at my skills to recognise strengths and areas of development to ultimately provide best practice in patient care. I realise that I will gain experience and confidence as my training progresses. Word Count: 3289 References Abbott, S. A.(1998) The benefits of patient education Gastroenterol Nursing. 1998 Sep-Oct;21(5):207-9. Bastable, S. (2006) Essentials of Patient Education. London. Jones and Bartlett Publishers. Bastable, S. (2008) Nurse as Educator: Principles of Teaching and Learning for Nursing Practice. Third Edition. London: Jones and Bartlett Publishers. Berry, D. (2007) as cited in Health Communication: Theory and Practice (Health Psychology). Berkshire: Open University Press. Birdwhistell, R. (1970) as cited in Nursing knowledge and Practice; foundations for decision making. London: Bailliere Tindall. Blood Pressure Association www.bpassoc.org.uk. [11th November 2009] Cameron, B. Mitchell, A. (1993) Reflective peer journals: developing authentic nurses. Journal of Advanced Nursing. 18, 290 297. Concise Oxford English Dictionary (2008) Eleventh Edition Revised. Oxford: Oxford University Press. Dementia: Ethical Issues Report (October 2009) published by Nuffield Council on Bioethics (http://www.nuffieldbioethics.org) [13th December 2009] Dementia UK Report (Feb 2007) published on The Alzheimers Society (http://www.alzheimers.org.uk/site/scripts/documents_info.php?categoryID=200120documentID=341) [7th December 2009] Department of Health (2009) Better information, better choices, better health. London. Department of Health. Egan, G. (2002) as cited in The Royal Marsden Hospital Manual of Clinical Nursing Procedures. Student Edition, Seventh Edition. London: Wiley-Blackwell. Fuller, D. (1995) Challenging ageism through our speech. Nursing Times. 91, 21, 29-31. As cited by Miller, L. (2002) Effective communication with older people. Nursing Standard. 17, 9, 45-50. Gibbs, G. (1988) Learning by Doing: A guide to teaching and learning methods. Oxford Polytechnic. Oxford. Gibbs, G. (1988) Reflective Cycle. Queen Mary University http://www.qmu.ac.uk/els/docs/reflection1.pdf. [20th October 2009] Glanville, I. (2000) Moving Towards Health Oriented Patient Education (HOPE). Holistic Nursing Practice. 14(2) 57-66. Gustafsson, C. Fagerberg, I. (2004) Reflection, the way to professional development?. Journal of Clinical Nursing, 13, 271-280. Hargie, O. Dickson, D .(2004) as cited in The Royal Marsden Hospital Manual of Clinical Nursing Procedures. Student Edition, Seventh Edition. London: Wiley-Blackwell. Johns, C. (2000) Becoming a reflective practitioner. Oxford: Blackwell Science. Kole, L. (1995) A lot of knowledge is not enough: compliance and a positive outcome with asthma require more than knowledge. Journal of the American Academy of Physician Assistants. 8, 3, 8 11. As cited by Caress, A. L. (2003) Giving information to patients. Nursing Standard. 17, 43, 47-54. Lauterbach, S. Becker, P. (1996) Caring for self: becoming a self-reflective nurse. Holistic Nurse Practitioner 10(2) 57-68. Love, C. (1996) Critical Incidents and Post Registration Education and Practice. Professional Nurse. 11(9) 576. Maguire, P. Pitceathly, C. (2002) Key communication skills and how to acquire them. British Medical Journal. September 28; 325(7366): 697-700. Miller, L. (1995) The human face of elderly care? Complementary Therapies in Nursing and Midwifery.1, 4, 103-105. Ac cited by Miller, L. (2002) Effective communication with older people. Nursing Standard. 17, 9, 45-50. Naomi Feil http://www.vfvalidation.org/web.php?request=Naomi_Feil_Bio [7th December 2009]. Newell, R. (1992) Anxiety, accuracy and reflection: the limits of professional development. Journal of Advanced Nursing. 17, 1326-1333. Newell, R. (1994) Interviewing skills for nurses and other health care professionals. London: Routledge, Oxford Mini-dictionary for Nurses (2008). Royal College of Nursing. Sixth Edition. Oxford: Oxford University Press. Partridge, M. Hill, S. (2000) Enhancing care for people with asthma: the role of communication, education, training and self-management. European Respiratory Journal. 16, 2, 333-348. As cited by Caress, A. L. (2003) Giving information to patients. Nursing Standard. 17, 43, 47-54. Paterson, B. (1995) Developing and maintaining reflection in clinical journals. Nurse Education Today. 15, 211-220. Pei, M. (1997) as cited in Nursing knowledge and Practice; foundations for decision making. London: Bailliere Tindall. Rowe, J. (1999) Self-awareness: improving nurse-client interactions. Nursing Standard. 14, 8, 37-40. Scherer, Y.K., Schmieder, L.E., and Shimmel, S. (1998)The effects of education alone and in combination with pulmonary rehabilitation on self-efficacy in patients with COPD. Rehabilitation Nursing 23: 2, 71-76. As cited by Caress, A. L. (2003) Giving information to patients. Nursing Standard. 17, 43, 47-54. Schà ¶n, D. (1987) Educating the Reflective Practitioner. San Francisco: Jossey-Bass. Sheldon, L. K., Barrett, R. Ellington, L (2006) as cited in Nursing knowledge and Practice; foundations for decision making. London: Bailliere Tindall. Shellenberger, S. (2004) Therapeutic Lying and Other Ways To Handle Patients With Dementia. Wall Street Journal, November 11. Silverman, J., Kurtz, S. Draper, J. (2005) as cited in The Royal Marsden Hospital Manual of Clinical Nursing Procedures. Student Edition, Seventh Edition. London: Wiley-Blackwell. Somerville, D Keeling, J. (2004) as cited in Nursing Times http://www.nursingtimes.net/nursing-practice-clinical-research/a-practical-approach-to-promote-reflective-practice-within-nursing/204502.article [30th October 2009] Underman Boggs, K. (1999) Communication styles. Interpersonal Relationships: Professional Communication Skills for Nursing. Third edition. Philadelphia PA, WB Saunders. Validation Training Institute Inc. http://www.vfvalidation.org/web.php?request=index [10th December 2009] Wallace, P. R. (2001) as cited in The Royal Marsden Hospital Manual of Clinical Nursing Procedures. Student Edition, Seventh Edition. London: Wiley-Blackwell. Weisberg, M. Duffin, J. (1995) Evoking the moral imagination: using stories to teach ethics and professionalism to nursing, medical and law students. Change, 22. Wilkinson, S. (1999) as cited in The Royal Marsden Hospital Manual of Clinical Nursing Procedures. Student Edition, Seventh Edition. London: Wiley-Blackwell. APPENDIX 1 Gibbs (1988) model of reflection

Saturday, July 20, 2019

Development of Intrusion Detection System Software

Development of Intrusion Detection System Software INTRODUCTION Heavy reliance on the Internet and worldwide connectivity has greatly increased that can be imposed by attacks plunged over the Internet against systems. It is very difficult to prevent such attacks by the only use of security policies, firewall or other mechanism because system and application software always contains unknown weaknesses or many bugs. In addition, complex, often unforeseen, interactions between software components and or network protocols are continually exploited by attackers. Successful attacks inevitably occur despite the best security precautions. There for intrusion detection system has become an essential part of the system because they can detect the attacks before they inflict widespread damage. Some approaches detect attacks in real time and can stop an attack in progress. Others provide after-the-fact information about attacks and can help repair damage, understand the attack mechanism, and reduce the possibility of future attacks of the same type. More adv anced intrusion detection systems detect never-before-seen, new, attacks, while the more typical systems detect previously seen, known attacks [1]. MOTIVATION The speed of growth of Internet is very fast without any end. With this growth the threat of attacks is also increasing. Because as we all know that theft can be occurred over the Internet from all over the world. So we require a system which can detect the attack or theft before there is some loss of information and reputation of organization or any individual. There are many solutions has been provided by the researchers and from many companies like firewall, intrusion detection system and IPS to stop the attacks. But still it is very hard to detect the attacks like DoS and worm propagation before they widespread, because regularly thousands of attacks are being developed and for a signature based intrusion detection system it is very hard to detect these kinds of new attacks with perfect accuracy. Mostly intrusion detection system generates many false alarms. These false alarms can affect the other processing of the network. If somehow any attacker gets to know that there is an intrusion detection system in the network then, the attacker will want to disable the intrusion detection system. His/her first target will be the intrusion detection system before attacking the network. So there should be proper security policies for deploying the IDS to take proper advantages of it. PROJECT OBJECTIVES Security is the main concern for any network. Every day thousands of attacks are created so that alarms and logs should be generated properly for reducing their effect. intrusion detection system and IPS are mostly used devices for providing these kinds of solutions. But there are many issues like performance and accuracy. So the main objective of the project is to develop a signature based intrusion detection system for DoS attacks with better scalability and performance i.e. intrusion detection system with minimum false alarms and with better throughput. In this study the example of TCP SYN flood attack will be taken for implementing and evaluating the performance and scalability of the developed intrusion detection system. Second Objective of this study is to discuss the policies for implementing the intrusion detection system securely. And these policies shall also be evaluated. Intrusion detection system intrusion detection systems (IDS) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations [2, 48]. There are many different types of intrusion detection system and they can be characterized by different monitoring and analysis approaches. Each approach has different advantages and disadvantages. All approaches can be described in terms of generic process model for intrusion detection systems. Many intrusion detection systems can be described in terms of three fundamental functional components information source, analysis, and response [2]. OVERVIEW Chapter 1 In this chapter we will give a brief introduction of whole project, what is the motivation for selecting this project. What are the main objectives of this project? And what is the main problem which will be considered in this project. Chapter 2 is all about the literature review. In this chapter many different aspects of the intrusion detection system will be discussed like why we require intrusion detection system, different type of intrusion detection system, need for intrusion detection system, about attacks different types of attacks and many other different facts about intrusion detection system which can help to improve the knowledge about intrusion detection system. Chapter 3 will focus on the analysis and designing part of the intrusion detection system. How a computer system can be designed. What s the system engineering and different type’s models will be discussed. CHAPTER 2 NEED FOR INTRUSION DETECTION SYSTEM Internet is carrying more traffic than ever before and still growing in the size without any end. Along with the explosive growth comes an increased threat from Internet related attacks. The Internet allows theft to occur from anywhere of the world [14]. Many threats impact on the operation of your computer network. Natural threats such as flood fire and tornadoes, causes unexpected disruptions. Most companies have well-defined procedure to handle these natural attacks. Security procedures designed to combat hacker attacks, an unsecured network will definitely be attacked. The only question is when the attack will occur [14]. COMPUTER ATTACKS AND VULRANABILITIES intrusion detection systems have been adopted by many organizations because the organizations know that intrusion detection systems are necessary component of the security architectures. But still intrusion detection system is not too much popular, most organizations lack experienced intrusion detection system operators. intrusion detection system can be most effective if the human operates it. But before developing a signature based intrusion detection system the knowledge of the attacks is must. Signatures is a set of rules that sensor uses to detect typical intrusive activities. These rules are based on various criteria i.e. IP protocol parameters, transport protocol parameter and packet data [12]. THE PHASES OF THE ATTACKS Attack can be divided into three different phases. The first phase is defining the goal for attack. The second phase is the reconnaissance attack, also known as the information gathering. After collecting the information the attacker proceed to the third phase, the attacking phase [12]. FIRST PHASE: GOALS OF ATTACK Before attacking a network or system, an attacker sets her goals or objectives. When attacking network the attacker can have various goals: Data manipulation System access Elevated privileges Denying availability of the network resources MOTIVATION Revenge Political activism Financial gain Attackers attempt to disrupt network to discredit the particular organization’s image [12]. RECONNAISSANCE BEFORE THE ATTACK Collecting the information is the attacker’s second step in launching an attack against the network. Successful reconnaissance is also important for successful attack. Attackers use two main mechanisms to collect the information about the network. Public data source Scanning and probing An attacker sometime starts his knowledge search by examining public information available about company. By using these kind of information the attacker can determine that where the business is located, the business partners, the value of the company assets and much more. And through scanning, the attackers use remote reconnaissance to find specific resource on the network. The goal of the information gathering is to pinpoint weak points on the network where an attack is likely to succeed. By pinpointing specific weakness on the network, the attacker can launch an attack in the future that generates minimal traffic or noise on the network. This greatly reduces the likelihood of detection during the actual attack [12]. For example: ping sweep, vertical scan, horizontal attack, DNS query, block scan and many more. THE ACTUAL ATTACK After an attacker maps the network, he researches known vulnerabilities for the system that he detected. The attacker’s goal at this stage is to gain access to resources of the network i.e. Unauthorized data manipulation, system access, or privilege escalation. ATTACK METHODOLOGY Regardless of the motivation or personal preferences, an attacker has several attack methodologies from which to choose [12]: Ad hoc (random) Methodological Surgical strike (lightning quickly) Patient (slow) AD HOC (Random) An ad hoc attack methodology is unstructured. An attacker using this methodology is usually disorganized and those types of attacks frequently fail. It is difficult to comprehensively locate targets on the network. METHODOLOGICAL It provides a well-defined sequence of steps to attack a network. First, the attackers use the reconnaissance to locate the targets. Next the attacker locates the exploits for known vulnerability on the target. Finally when he satisfies with his toolkit he starts attacking system on the target network. SURGICAL STRIKE (Lightning Quick) Many times the attacker uses an automated script against a network. The entire attack is completed in a few seconds. Before the system administrator or security analysts have time to react and make any decision. PATIENT (Slow) It refers to how quickly the attacker executes his attacks. Usually the one uses a patient (slow) methodology to avoid detection. Many intrusion detection systems have difficulty detecting attacks that occurs over long period of time. BACK DOORS Viruses and worms provide a vehicle for an attacker to wreak havoc on your network and potentially the Internet. However, the spread of viruses and worms is much harder to determine in advance. Viruses and worms are much harder to determine in advance. Trojan horse program enables an attacker to establish back door on systems. However Trojan horse requires some type of transport vehicle [12]. DENIAL OF SERVICE TECHNIQUES The purpose of DoS attacks is to deny legitimate access to the network resources. These attacks include everything from simple one-line commands to sophisticated programs written by knowledgeable hackers. There are different types of DoS attacks some of them are- Network resource overload Host resource starvation Out-of-band attacks Distributed attacks NETWORK RESOURCE OVERLOAD One common way to deny the network access is by overloading a common resource necessary for network components to operate. The main common resource that can be attacked in the network bandwidth in several ways generating lots of traffic, distributing the attack across numerous hosts, and using a protocol flaws that amplifies the attack by soliciting help from many different hosts on the target [12]. Example- Smurf and Fraggle attack. HOST RESOURCE STARVATION The resources available at the hosts are also known as the attack point as well. One such resource is the buffer that a host uses to track TCP connections. OUT-OF-BOUNDS ATTACKS The first out-of-bounds attack category uses over-sized packet, it overflows the allocated buffer and causes the system crash. An over-sized packet attack is ping of death. DISTRIBUTED ATTACKS The latest trend in DoS attacks is for an attacker to compromise numerous hosts and then use all these compromised hosts to provide a massive against a specific target. These types of attacks are known as the distributed denial of service attack (DDoS). DISTRIBUTION EFFECT To disrupt the victims communication very badly, the attacker must compromise an agent machine that has more network resources than the victim. Locating and breaking into such a machine may prove difficult, if the target of the attack is well-provisioned site [16]. Distribution brings number of benefits to the attackers: By using distribution techniques, the attacker can multiply the resources on the attacking end, allowing him to deny service to more powerful machines at the target end [16]. To stop a simple DoS attack from a single agent, a defender needs to identify that agent and take some action that prevents it from sending such a large volume of traffic. In many cases, the attack from a machine can be stopped only if the machine’s human administrator, or network operator, takes action. If there are thousands agents participating in the attack, however, stopping any single one of them may provide little benefit to the victim. Only by stopping most or all of them can the DoS effect be palliated [16]. If the attacker choose agents that are spread widely throughout the Internet, attempts to stop the attack are more difficult, since the only point at which all of the attack traffic merges is close to the victim. This point is called aggregation point. Other nodes in the network might experience no telltale signs of the attack and might have difficulty distinguishing the attack traffic from legitimate traffic [16]. In DoS attack executed from a single agent, the victim might be able to recover by obtaining more resources. For example, an overwhelmed Web server might be able to recruit other local servers to help handle the extra load. Regardless of how powerful a single agent might be, the defender can add more capacity until he outstrips the attacker’s ability to generate load. This approach is less effective in defending against DDoS attacks. If the defender doubles his resources to handle twice as many requests, the attacker merely needs to double the number of agents- often an easy task [16]. TCP-SYN ATTACK The SYN-flooding attack is a Distributed denial-of-service method disturbing hosts that run TCP server processes. The attack take benefit of the state retention TCP performs for some time after receiving a SYN segment to a port that has been put into the listen state. The basic idea is to utilize this behavior by causing a host to retain enough state for bogus half-connections that there are no resources to establish new genuine connections [51, 52]. A TCP implementation may allocate to LISTEN state to be entered with either all, some, or none of the pair of IP addresses and port numbers specified by the application. In many common applications like web servers, none of the remote host’s information is pre known or preconfigured, so that a connection can be established with any client whose details are unidentified to the server ahead of time. This type of â€Å"unbound† LISTEN is the goal of SYN flooding attacks due to the way it is typically implemented by operating systems [51, 52]. For success, [51, 52] the SYN flooding attack relies on the victim host TCP implementation’s behavior. In particular, it assumes that the victim allocates state for every TCP SYN segment when it is received and that there is perimeter on the amount of such state than can be kept at any time. The [51, 52] SYN flooding attack does not attempt to overload the networks recourses or the end host memory, but merely attempts to exhaust the backlog of half-open connections associated with the port number. The goal is to send a quick barrage of SYN segments from IP addresses (often spoofed) that will not generate replies to the SYN-ACKs that are produced. By keeping the backlog full of bogus half-opened connections, legitimate requests will be rejected. Three important attack parameters for success are the size of the barrage, the frequency with which barrages2 are generated, and the means of the selecting IP addresses to spoof. Usually, [51, 52] systems implements a parameter to the typical listen () system calls that allows the application to suggest a value for this limit, called the backlog. 1 To be effective, the size of the barrage must be made large enough to reach the backlog. Ideally, the barrage size is no larger than the backlog, minimizing the volume of the traffic the attacker must source. Typical default backlog values vary from half-dozen to several dozen, so the attack might be tailored to the particular value determined by the victim host and application. On machines intended to be servers, especially for a high volume of the traffic, the backlogs are often administratively configured to higher. Another aspect makes both DoS and DDoS attacks hard to handle: Defenses that work well against many other kinds of attacks are not necessarily effective against denial of service. For years, system administrators have been advised to install a firewall and keep its configuration up to date, to close unnecessary ports on all machines, to stay current with patches of operating systems and other important software, and to run intrusion detection system to discover any attacks that have managed to penetrate the outer bastions of defense [16]. Unfortunately, these security measures often will not help against denial of service. The attack can consist of traffic that the firewall finds acceptable. intrusion detection systems are of limited value in dealing with DoS, since, unlike break-ins and thefts, DoS attacks rarely hide themselves [16]. WHAT IS INTRUSION DETECTION SYSTEM? intrusion detection systems gather information from a computer or network of computers and attempt to detect intruders or system abuse. Generally, an intrusion detection system will notify a human analyst of a possible intrusion and take no further action, but some newer systems take active steps to stop an intruder at the time of detection [4]. The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all—they only identify evidence of intrusions, either while they’re in progress or after the fact. Such evidence is sometimes referred to as an attacks â€Å"manifestation.† If there is no manifestation, if the manifestation lacks sufficient information, or if the information it contains is untrustworthy, then the system cannot detect the intrusion [5]. intrusion detection systems are classified into two general types known as signature based and heuristic based. Pfleeger and Pfleeger describe signature-based systems as â€Å"pattern-matching† systems that detect threats based on the signature of the attack matching a known pattern. Heuristic based systems, which are synonymous with anomaly-based systems, detect attacks through deviations from a model of normal behavior [6]. intrusion detection systems that operate on a single workstation are known as host intrusion detection system (HIDS), while those that operate as stand-alone devices on a network are known as NIDS. HIDS monitor traffic on its host machine by utilizing the resources of its host to detect attacks. NIDS operate as a stand-alone device that monitors traffic on the network to detect attacks. NIDS come in two general forms; signature based NIDS and heuristic based NIDS [7]. PROCESS MODEL FOR INTRUSION DETECTION SYSTEM intrusion detection systems can be described in terms of three fundamental functional components [2, 48]: Information Sources the different sources of event information used to determine whether an intrusion has taken place. These sources can be drawn from different levels of the system, with network, host, and application monitoring most common. Analysis the part of intrusion detection systems that actually organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place. The most common analysis approaches are misuse detection based (signature based) and anomaly detection. Response the set of actions that system takes once it detects intrusions. These are typically grouped into active and passive measures, with active measures involving some automated intervention on the part of the system, and passive measures involving reporting intrusion detection system findings to humans, who are then expected to take action based on those reports. INFORMATION SOURCE The most common way to classify intrusion detection system is to group them by information source. Some intrusion detection systems analyze network packets, captured from network backbones or LAN segments, to find attackers [2]. It can be describe by dividing three different parts. NETWORK BASED INTRUSION DETECTION SYSTEM NIDS are intrusion detection systems that capture data packets traveling on the network media (cables, wireless) and match them to a database of signatures. Depending upon whether a packet is matched with an intruder signature, an alert is generated or the packet is logged to a file or database [8, 48]. Network-based intrusion detection systems often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console. As the sensors are limited to running the intrusion detection system, they can be more easily secured against attack. Many of these sensors are designed to run in â€Å"stealth† mode, in order to make it more difficult for an attacker to determine their presence and location [2, 48]. HOST INTRUSION DETECTION SYSTEM  or HIDS Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity. Some of these systems are reactive, meaning that they inform you only when something has happened. Some HIDS are proactive; they can sniff the network traffic coming to a particular host on which the HIDS is installed and alert you in real time [8, 48]. These types of intrusion detection systems run on host to reveal inappropriate activities on these hosts. The HIDSs are used for detecting the attacks from the inside and outside network. They provide snap shot about the existing system files and connect them to the previous. If the important system files were modified or deleted, the warning is sent to the administrator for inspection. The HIDS example is notice able on the machines with significant task; these machines do not expect the change of their configuration [9, 48]. APPLICATION-BASED INTRUSION DETECTION SYSTEM Application-based intrusion detection systems are a special subset of host-based intrusion detection systems that analyze the events transpiring within a software application. The most common information sources used by application-based intrusion detection systems are the application’s transaction log files. The ability to interface with the application directly, with significant domain or application-specific knowledge included in the analysis engine, allows application-based intrusion detection systems to detect suspicious behavior due to authorized users exceeding their authorization. This is because such problems are more likely to appear in the interaction between the user, the data, and the application [2, 48]. INTRUSION DETECTION SYSTEM ANALYSIS There are two primary approaches to analyzing events to detect attacks: misuse detection and anomaly detection. Misuse detection in which the analysis targets something known to be â€Å"bad†, is the technique used by most commercial systems. Anomaly detection, in which the analysis looks for abnormal patterns of activity, has been, and continues to be, the subject of a great deal of research. Anomaly detection is used in limited form by a number of intrusion detection systems. There are strengths and weaknesses associated with each approach, and it appears that the most effective intrusion detection systems use mostly misuse detection methods with a smattering of anomaly detection components [2, 48]. ANOMALY BASED DETECTION Anomaly detection uses models of the intended behavior of users and applications, interpreting deviations from this â€Å"normal† behavior as a problem. A basic assumption of anomaly detection is that attacks differ from normal behavior. For example, we can model certain users’ daily activity (type and amount) quite precisely. Suppose a particular user typically logs in around 10 Am., reads mail, performs database transactions, takes a break between noon and 1 Pm., has very few file access errors, and so on. If the system notices that this same user logs in at 3 Am., starts using compilers and debugging tools, and has numerous file access errors, it will flag this activity as suspicious. The main advantage of anomaly detection systems is that they can detect previously unknown attacks. By defining what’s normal, they can identify any violation, whether it is part of the threat model or not. In actual systems, however, the advantage of detecting previously unknown attacks is paid for in terms of high false-positive rates. Anomaly detection systems are also difficult to train in highly dynamic environments [5]. MISUSE DETECTION Misuse detection systems essentially define what’s wrong. They contain attack descriptions (or â€Å"signatures†) and match them against the audit data stream, looking for evidence of known attacks. One such attack, for example, would occur if someone created a symbolic link to a UNIX system’s password file and executed a privileged application that accesses the symbolic link. In this example, the attack exploits the lack of file access checks [5, 10]. The main advantage of misuse-based systems is that they usually produce very few false positives: attack description languages usually allow for modeling of attacks at such fine level of detail that only a few legitimate activities match an entry in the knowledge base. However, this approach has drawbacks as well. First of all, populating the knowledge base is a difficult, resource intensive task. Furthermore, misuse based systems cannot detect previously unknown attacks, or, at most, they can detect only new variations of previously modeled attacks. Therefore, it is essential to keep the knowledge base up-to-date when new vulnerabilities and attack techniques are discovered. Figure 2 shows how the misuse detection based intrusion detection system works is [11]. RESPONSE OPTION FOR INTRUSION DETECTION SYSTEM Once intrusion detection systems have obtained event information and analyzed it to find symptoms of attacks, they generate responses. Some of these responses involve reporting results and findings to a pre-specified location. Others involve more active automated responses. Though researchers are tempted to underrate the importance of good response functions in intrusion detection systems, they are actually very important. Commercial intrusion detection systems support a wide range of response options, often categorized as active responses, passive responses, or some mixture of the two [2]. IMPORTANCE OF THE INTRUTION DETECTION SYSTEM Usually we place a burglar alarm on the doors and windows of our home. We are installing an intrusion detection system (intrusion detection system) for our house. The intrusion detection systems used to protect our computer network operate in similar fashion. An intrusion detection system is a software and possibly hardware that detects attacks against our network. They detect intrusive activities that enter into our network. We can locate intrusive activity by examining network traffic, host logs, system calls, and other areas that signal an attack against our network [14]. There are different benefits that an intrusion detection system provides. Besides detecting attacks, most intrusion detection systems also provide some type of response to the attacks, such as resetting TCP connections [14]. DESIRABLE CHARACTERSTICS OF INTRUSION DETECTION SYSTEM There are different characteristics for an ideal intrusion detection system, which are listed below [many references]: An ideal intrusion detection system must run with minimum human supervision. An ideal intrusion detection system must be easy to deploy. An ideal intrusion detection system must be able to detect attacks intrusion detection system must not produce false negative alarms. intrusion detection system must not produce false positive alarms. intrusion detection system must report intrusion as soon as possible after the attacks occur. intrusion detection system must be general enough to detect different types of attacks. An ideal intrusion detection system must be fault tolerant; it must be able to recover from crashes and must restore previous state, either accidental or caused by malicious activities. An ideal intrusion detection system must impose minimal overhead on the system. An ideal intrusion detection system must be configurable to implement the securities policies of the system. THE PERIMETER MODEL AND DoS The perimeter model is an architecture commonly used by today’s organizations to protect critical infrastructures. This security model divides network architectures into two distinct groups; trusted and entrusted. The trusted group is often the finite internal infrastructure, whilst the entrusted group consists of infinite external networks. In this model two types of devices are used; firewall to control the traffic entering and leaving the trusted domain, and intrusion detection system to detect misbehavior of trust with in the trusted area boundary [18]. WHERE IDS SHOULD BE PLACED IN NETWORK TOPOLOGY Depending upon network topology, the intrusion detection system can be positioned one or more places. It’s also depends upon what type of intrusion activities should be detected: internet external or both. For example if the external intrusion activities should be detected, and only one router is connected to the internet, the best place for an intrusion detection system may be just inside the router or firewall. If there are many different paths to the internet, then the intrusion detection system should be placed at every entry point. However, if the internal attacks should be detected then the intrusion detection system should be placed in every network segment 2. Placement of the intrusion detection system really depends upon security policies 3 [8]. Note that more intrusion detection systems mean more work and more maintenance costs. Which defines that what should be protected from the hackers [8]? IDS AGAINST DENIAL-OF-SERVICE ATTACKS (DoS) The goal of a DoS attack is to disrupt some legitimate activity, such as browsing, web pages, an on line radio and many more. The denial of service is achieved by sending message to the target that interferes with its operation and makes it hang, crash, reboot or do useless work [16]. A denial-of-service attack is different in goal, form, and effect than most