Recent orders
TOPIC AND WRITTEN PORTION DUE
TOPIC AND WRITTEN PORTION DUE
The purpose of the paper and presentation is to increase your knowledge about a specific disease process, establish basic skills in research, identifying prevalence and implication on patients and population health, and allow students to present information to a public forum.
As future allied health professionals, you will be required to educate your clients and present information in a public forum. This assignment is a small-scale demo within the safety of BIO11.
You should allocate several days for data collection, writing and formulation of key points for your presentation.
Timeline:
Written portion to be submitted *Student presentations will be scheduled during lab.
Topics – Post to BB discussion board as soon as possible. Avoid duplication.
Written portion:
Choose a disease process relevant to an organ systems (syllabus) covered in BIO11* *This may include systems not yet covered, or not in syllabus, but preferably are.
Structure your written part according to the following:
Brief introduction – disease process and systems affected
Statistical information – prevalence in the U.S / NYC (be as specific as possible)
Common signs and symptoms – (what characterize the disease)
Common diagnostic measures – (how do we know/confirm the patient has the disease) try and find the golden standard.
Curative measures – (if any) and any relevant future research.
Each one of sections a-e should have a dedicated section. This is the outline to follow.
Written assignment – Max of 5 pages! 12pt (TimesNR) single space, standard letter size, please do NOT copy paste…rephrase in your own words, include a bibliography (APA/MLA format), any diagrams/photos at the appendix.
Name & course number at the top left. No break page/abstract/separate introduction.
Please write complete sentences, read and reread your work prior to submission, ask a friend/classmate to read it too, avoid technical jargon as possible.
Presentation:
Create a concise and brief (5-7min) presentation about your written assignment and present it within your time slot (oral presentation in front of the class)
Rehearse! , allow time for Q&A, limit info on slides, have cue-cards if needed.
Power point / handouts are optional.
Schedule start after our break – Thursdays. Bring a USB drive for presentation (if needed) and do not worry about appearing in front of the class.
Good Luck !
Principles of incident response and disaster recovery
Presented By
Name
Presented To
Institution
Date
Principles of incident response and disaster recovery
Introduction
Other means of dealing with security threats and incident response existed long before the introduction of computer technology. People used to respond to unexpected incidents that were capable of affecting organizations or a nation at large. Irrespective of the nature of the event, it is always advisable to prepare and respond to an incident that has a negative effect to people. The use of disaster recovery and incident response technologies assists organizations in preparing for unexpected events. Most organizations fail in preparing for incident respond and disaster recovery while conducting their daily businesses. These organizations are not well prepared to offer significance respond to disasters and security incidences. Information security principal takes control of the security information available in a nation or an organization (Federal Information Processing Standard 199; Denning 3-4). Threats to information security are of many forms. Some common these threats found in day-to-day life include: the act of human error, intellectual property, deliberate acts of trespass, software/cyber attacks, forces of nature, technological obsolescence, technical hardware/software failure, and theft (Lewis 2002)
Using incident response and disaster recovery has various steps that should be followed in an effort to address security issues in a country. Understanding the key components in the information technology topic assists in reducing the complexity of the subject for easier elaboration, even by the illiterate people. Information security technology uses of security protection elements that include systems and hardware. The elements use, store, and transmit information necessary for responding to different security threats. (Whitman & Mattord 150-157). The following diagram shows a presentation for the incident response and disaster discovery plan.
Figure 1: incident response and disaster recovery planning diagram
Contingency plan to disaster recovery and incident response
The incident planning and preparation phase is the most critical stage in creating a security response program. This stage combines all the elements in order to prevent any possible instance of an incident occurring, and makes the system ready to respond to any threat. If proper planning of an incident and a disaster recovery method fails, the contingency approaches to disaster controls and response might be ineffective. The disaster recovery and incident response technologies contingency plan makes use of 7 steps. These are:
Developing a contingency plan policy statement
Conducting the Business Impact Analysis
Identifying preventive controls measures for reducing the effects of system disruptions.
Developing recovery strategies
Developing an Information Technology (IT) plan
Conducting plan testing and training.
Maintaining the plan.
The contingency planning policy is established by the executive management that defines the scope of security operations at hand. The planning and preparation phase brings together all the elements aimed at preventing an incident. On the other hand, the planning phase makes the system ready in responding to any event that is likely to occur (ITS Policy Library 1-5; Wright 2001). Form figures 1, several blocks are included in the planning phase. The incident response and disaster recovery plan should consist of responsible teams made of experts in the fields of technology, security, and human psychology. The team number differs with the size of the organization, or the value of assets protected. The team responsibilities include: preventing cyber threats and vulnerabilities; incident prevention, information gathering and analysis; and developing the organizational security policies and procedures in regard to disaster recovery.
Setting policies and procedures is an essential aspect in every organization or government. The responsible teams discuss and weigh different options, while at the same time testing the appropriate approach towards incident response and prevention. The policies should be clearly written and detailed, and tested before implementation. These incident response policies should establish a direct incident response and disaster recovery system capable of responding to all possible threats. In addition, the incident response plan should contain the following key sections. The overview, goals and objectives section defines the expected results, and aims for developing the system. The incident description section classifies the different types of IT incidences likely to bring threats. Other sections include incident notification, incident analysis, communications, and forensics (Nelson, Amelia & Christopher 54-61).
After the planning and preparation phase, the incident response and planning phase follows. This phase brings together all elements for the prevention of any unseen incident, or preparing the system for any future threats that might occur. On this stage, several building blocks are included. These are the organization of the response team, defining communications between the internal and external parties, and reporting the necessary findings to the top security personnel. Developing a perfect technical and managerial personnel respond to an incident in an organization takes a lot of resources. A lot of training is required for the response team in order to equip them with the necessary mitigation measures. It is recommended that, the response team be trained in advance to avoid time wastage in case an incident occurs as the team looks for the best prevention measures. In addition, it minimizes the number of decisions made while the attack is in progress because this might accelerate the amount of damage made (Byres, Leversage & Kube 5-8).
In the present, various computer networking systems are used capable of connecting more than two computers. These are LANs, MANs, and WANs. LANs stands for Local Area Networking and connects computers in a single building. LANs enables security personnel to monitor any threats occurring in a specific part of the building and respond accordingly. In addition, the person at the control room can monitor different users in regard to the login details, areas accessed. The system uses high speed networks making it more efficient making use of typical buses or rings (Mitchel 2012).
MANs stand for Metropolitan Area networks, and generally cover towns and cities. Police use this technology in towns and cities severances. Different cameras are connected to computers where an individual could monitor the operations taking place around the town. This system prevents crimes related to ATM thefts, pick pocketing, shoplifting, and car-jacking. This technology was developed in 1980s and uses optical fibers, and cables to transfer information. The messages delivered through this system are fast and efficient. The system would have been most appropriate in determining the main cause of September 11 plane crash (Mitchel 2012).
The WANs, Wide Area Networks, cover extremely large areas like states, countries, and continents. Google Earth employs this system since it covers the whole earth giving information from different regions. The circuits are connected by routers capable of gathering information from all round the universe and delivering it to a central location. These systems are very useful in preventing disasters and incidences. Satellites are another example of WANs that gives information regarding the weather (Mitchel 2012).
The use of disaster recovery and incident response technologies today
Patch management is a very effective program in incident response and prevention. First, patch management prevents incidents from occurring. Second patch management responds to vulnerabilities and prevents incidences from reoccurring in the future. All incident response and disaster recovery systems should contain patch management program. While selecting the patch management program, the following factors should be considered. The computer operating system should be compatible with the software. The patch should be original and contain the security mark. Moreover, the patches should be tested before installed to check their efficiency and operational values. Testing should occur in a realistic situation to determine any missing element, incomplete or inaccurate systems (Verma, Huang, and Sood 2010).
Conclusion
Before developing a full incident response and disaster recovery system, there should be efforts made to fix the source of the threat. This includes getting rid of any suspected object, or individual capable of causing a threat, or replacement of vulnerable materials to threats. The use of incident response and disaster recovery technologies has assisted many people. Moreover, organizations safe millions of money from potential threats associated with Information Technology insecurity. The steps provided in table one provides an overview of how an organization should go about responding and preventing disasters and incidences. From the discussion, the following actions are emphasized (Bogart and Guenther 12). First, people should learn from experience in preventing incidences occurring in an organization. Second, an effective response plan should be devised for preparation for any potential incident, made of well described policies and procedures. Thirdly, in case of an incident, a clear assessment of the necessary technological mitigation measures should be used and necessary protective measures used in safeguarding the attacked system. The use of incident response and disaster recovery methods is an essential aspect that every government or sate should incorporate in order to safeguard their properties from potential threats (Denning 12).
Works cited
Byres, E., Leversage, D. & Kube, N. Technical Article: Security incidences and trends in
SCADA and process industries, 2007.
Bogart, K. and Guenther, M. Risk Assessment, Disaster Recovery, Data Backups, Data
Classification and Incident Reporting. The University of Arizona: Information Security Office, 2002.
Denning, E. D. Information Technology and Security. Georgetown University Press, 2003.
Denning, E. D. Information Welfare and Security, Addisson-Wesley, 1999
ITS Policy Library. Information technology Disaster Recovery Policy. Weill Cornell Medical
College, n.d. Retrieved from:
http://weill.cornell.edu/its/its/pdf/policy/15.5-Disaster_Recovery.pdfFederal Information Processing Standard. Standards for security categorization of federal
Information and information systems, 2004. Retrieved from:
http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdfLewis, A. J. Assessing the Risks of Cyberterrorism, Cyber War and other cyber
Threats. Center for Strategic and International Studies, 2002. Retrieved from;
http://www.csis.org/tech/0211_lewis.pdfMitchell, B. Introduction to Network Types (LAN, WAN and Other Area Networks), 2012.
Retrieved from:
http://compnetworking.about.com/od/basicnetworkingconcepts/a/network_types.htmNelson, B., Amelia P., & Christopher S. Guide to computer forensics andinvestigations. 4th ed.
Boston, MA: Course Technology Cengage Learning, 2010. Print.
Verma, N. Huang, Y and Sood, A. Proactively Managing Security Risk, 2010. Retrieved from:
http://www.symantec.com/connect/articles/proactively-managing-security-riskWCC. IFIP World Computer Congress Workshop. IFIP World Computer Congress.
Montreal, Quebec, Canada, 2002.
Whiteman, E. M. & Mattord, J. H. Principles of incident response and disaster recovery.
Boston, Mass.: Thomson Course Technology, 2007. Print
Wright, E. Timothy. How to design a useful incident response policy, 2001. Retrieved from:
http://www.symantec.com/connect/articles/how-design-useful-incident-response-policy
Topic 4 Discuss how light and darkness (sight and blindness) are used in Oedipus the King.
Topic 4: Discuss how light and darkness (sight and blindness) are used in Oedipus the King.
Student’s Name
Instructor
Course
Date
The Theme of Light and Darkness in Oedipus the King
The play, Oedipus the King, was originally written by an ancient Greek playwright Sophocles in 750 BC. It was then translated and edited by Ian Johnson. The play begins with a description of a plague that had struck the Kingdom of Thebes. Oedipus begins looking for solutions to end the epidemic and sends Creon, his brother-in-law, to the oracle for advice on what must be done to save the city. Creon reports that the god revealed that to end the plaque, the killer of Laius, the former King, must be sought and punished. Oedipus puts up a mission to try to find the murderer, but in the process, he offends and threatens many individuals. He releases a proclamation declaring that he would expel the person responsible for the plaque from his kingdom. However, in the end, it turns out that the King himself is the assassin. Throughout the play, Sophocles uses light and darkness as the play building block. Sight and blindness are used as allusions to the theme of light and darkness. This theme is used metaphorically and is depicted through two main characters; Teiresias and Oedipus. Sophocles metaphorically uses the theme of light and darkness to symbolize darkness, truth, and ignorance.
Firstly, although Teiresias is physically blind, he is in light, holds reality on the ground, and sees the truth from the beginning. The light is the truth prophesied by Teiresias concerning the murderer of Laius, the former King. Teiresias knows that Oedipus is the killer being sought. He also knows Oedipus’s parents. In a prophecy, he revealed that the murderer of Laius; “will turn out to be the brother of the children in his house—their father, too, both at once, and the husband and the son of the very woman who gave birth to him” (Sophocles 550-560.18). Teiresias is also aware that Oedipus will lose his sight. Also, although Teiresias is blind, he is considered a symbol of truth. The entire Kingdom of Thebes knew Teiresias as a prophet who consistently foretold the truth. For instance, Teiresias is described by the chorus leader as; “…our god-like prophet, in whom the truth resides more so than in all men” (Sophocles 350-360.12). This sentiment indicates that people in the Kingdom saw Teiresias as a beacon of hope and truth. Thus, it can be concluded that Teiresias’ physical blindness symbolizes light, truth, and knowledge of what is going on.
Secondly, although Oedipus has eyesight, he is living in darkness and does not know the truth about himself and his past. Confirming this statement, Teiresias tells Oedipus that; “you have your eyesight, and you do not see how miserable you are, or where you live, or who it is who shares your household” (Sophocles 490-500.16). It is clear that when Oedipus killed Laius, he did not know that he was his father. This was due to a lack of knowledge about his family. He confessed that he had killed a stranger who insulted him. Confirming that he did not know whether he had killed his father, he goes ahead to ask; “If that stranger was somehow linked to Laius, who is now more unfortunate than me? (Sophocles 970-980.33)
Furthermore, Oedipus is in darkness since he failed to foresee his fate despite the prophet’s warning. When Teiresias attempts to explain his vision to Oedipus, he is rebuffed and accused of banding together with Oedipus’ brother-in-law, Crepon. Here, Oedipus asks him “ is this something Creon has devised, or is it your invention?” (Sophocles 451.15). Oedipus initially rejects the prophet’s claim that he killed his father. He asks Teiresias for the second time what he has said. Teiresias again tells him that he is the man who murdered Laius. Enraged, Oedipus tells him, “That’s twice you’ve stated that disgraceful lie—something you’ll regret” (Sophocles 430-440.15). The fact that he denies the fact is an indication that he is in darkness. Also, since Oedipus does not recognize Teiresias’ prophesy is an indication that he was ignorant of the truth that had been presented to him. After Oedipus refuses to embrace the truth (the light), which Teiresias presents to him in the form of a prophecy, in the end, he physically blinds himself (the darkness) by taking away his eyesight. Oedipus chooses to go blind only because he is astonished that the prophecy came true and that the prophet had warned him about it all along. If it were not for ignorance, Oedipus would have acknowledged Teiresias’ prophecy.
The theme of sight and blindness is presented as a metaphor where it symbolizes darkness, truth, and ignorance. Teiresias, who is physically blind, is used to depict light and knowledge. Teiresias holds reality on the ground and is aware of many things, including the King’s murderer and the Oedipus family. He also knows that Oedipus will lose his sight. On the other hand, even though Oedipus has eyesight, he lives in darkness and does not know the truth about himself and his past. He is not aware that he killed his father, Laius, and describes him as a stranger. Also, Oedipus is in darkness since, despite the prophet’s warning, he did not foresee his fate. Thus, based on the theme of sight and blindness, it can be inferred that physical blindness does not deter someone from being in the light and knowing what is happening around them.
Works Cited
Sophocles, E. A. Oedipus the king.