Sunday, January 26, 2020

Strength And Weakness Of Bureaucratic Organization Management Essay

Strength And Weakness Of Bureaucratic Organization Management Essay Mergers often go to the right, in part because the leaders of human resources working successfully with senior administration to ensure that joining and acquisitions are well conjure up planned and executed with respect to persons. As leaders, we ensure communication of clear business logic, attention to the risks associated with people in the agreement, and the planning of effective integration. A lot of articles and studies on mergers emphasizes why mergers be unsuccessful to accomplish their potential. A widespread subject matter is that people-related issues were not treated early or sufficiently effective. For example, a Forbes review of 500 CFOs found that the main reasons why mergers were no financial issues, but problems related to people: mismatched civilizations, incapability to administer the acquired company, the powerlessness to implement the other hand, overestimated synergies, lack of foresight predictable events, or clash of management styles or egos. However it can be guaranteed the effective implementation of the merger integration and retention of talent vital to maintain the pledge and recital through the changeover, and the loom of people-related coordination, progression and union with the strategic bearing of the new entity. Here are seven questions that we must address. Lets discuss the change management: Change management is a set of procedures that is employed to guarantee that major changes are put into practice in an arranged way, controlled and methodical fashion to upshot the organizational change. Goal of change and there outcome One of the goals of change management is with respect to the human aspects of conquer opposition to change in order for organizational members to buy into change and attain the organizations aim of an orderly and effective conversion. Managerial Change Management: Organizational change management takes into thought both the processes and tools that managers utilize to make changes at an organizational level. Most organizations want change implemented with the slightest resistance and with the most buy-in as achievable. For this to take place, change must be useful with a planned approach so that evolution from one type of behavior to another organization broad will be flat. The consequence of Buy In: Buy in means that the organization entirely recognizes that the changes that need to be taken are in due course positive to both the individual and the organization. If an organization seeks to make changes which are naturally bad or are not established positively by an organization, it will be much more hard or close to impossible to put into practice these changes without significant opposition. How Economy dealing with change: A proper change management policy is the essential. There are three components of change management which are crucial for any industry and as well as for economy: 1) Identifying the needs of customers before rival 2) Fast accomplishment of a prepared strategy with the obtainable resources 3) Real-time examine If the industry be unsuccessful in gaining any of the three objectives, it will lag at the back. Competitors will go beyond it. The case for change management cannot be showy in our changing and difficult times, For example how McCain, a company selling ice-covered potato products, mainly chips, changed its product to suit the times and the needs of customers. The customers were worried over heaviness, mainly among children, and the consequent health danger. The corporation modified the product by reducing the salt content and oil and started using especially chosen potatoes. The company carried out an extensive advertising movement to stress the food value of the chips and regained customer reception. Development in food technology also helped the company address some of the problems. It could successfully overcome the problems. Education not compulsion should be the instrument employed by the management. Obviously, there will be opposition from a part of the employees at least to many of the changes required to be introduced by the management. But they can be convinced over a period of time. It can be lengthy but not impossible. What are the people-related issues? decision-making contracts or other restrain compensation arrangements member of staff relations risks, including amalgamation relationships, contracts, and issues permissible actions or compliance issues Retirement, retirement fund or other millstone Availability of capable organization talent for key roles Employee commitment very important for retention of aptitude and continued high recital. Keeping in mind that the Chief Executive has been derived from the one organization so instead of keeping the old norms and values in newly developed organiation, there must be some commonly productive approach must be used by the CE. Once you have join all the pieces together there is little doubt that you will not find ways to increase revenues, decrease expenses, save time, or make a multitude of other positive improvements. This will result in a novel organizational culture, but it will be a change for the superior. An economy depend upon its industry very much if there is a positive change in industry management then obviously is economy goes up. The real sense of Bureaucratic Organization: The main characteristics that bureaucratic organizations contribute are fundamentally the same. First there is a scheming environment in these organizations, higher management makes the policy and the subordinates go after it. There are clear steps and procedures for doing the simplest of things which makes tasks more time intensive. The inferior level in the hierarchy is controlled by the upper one and the preparation and decision making is federal, all the decisions are made in one place. The higher levels in the pecking order have more liberty in doing their work as compared to the lower levels. These organizations are goal leaning and all the processes are designed to attain the goals. The construction of these organizations is based on the principle of separation of labor and they have specialized department doing various jobs. Weaknesses and Strengths of a Bureaucratic Organization for clear picture The main weakness of bureaucratic organizations takes in not to have novelty. All the processes and tasks are fixed to a large extent that the innovation process is approximately eradicate in bureaucratic organizations. Employees get unprovoked because of smaller employee contribution and association. HR cant be used in the fullest manner by optimizing creativity which is the key drawback in bureaucratic structure of the organizations. Advantages contain the increased control and observations of higher rank  board. The nouns of the organizations depend upon the intelligent judgments of upper headship. If the top management is high-quality, then results can be constructive and if the top headship is poor then it can result in adversity. Organizational development focus Contractual relationship between a change mediator and a supportive organization go into for the sake of using applied behavioral science and for other organizational change point of view in a scheme background to get better the organizational presentation and the capability of the organization to develop itself. OD is a designed intervention. They   Ã‚  are plans or series consist of particular activities designed to achieve change in some part of an organization. Frequent interventions have been developed over the years to tackle special problems or create a variety of results. However, they all are geared toward the goal of improving the whole organization by change. In common, organizations that wish to achieve a high grade of organizational change will use a complete variety of interventions, including those planned to change individual and group behavior and attitudes. Units attempting slighter changes will end petite of those goals, applying interventions targeted mainly toward operating strategies, management structures, employee skills, and staff policies. Usually, organization development plans will concurrently mix more than one of these interventions. Types of Interventions: There are many types of interventions can include a variety of specific practices: Human process, * Process discussion * group building * Search meeting (a high-scale intervention) 2.Technostructural * Work plan * worth loop * reformation 3.Human sources management * presentation management (employee) * Employee willingness * payment systems * variety management 4.deliberate * Organizational revolution * Cultural change * Self-designing organizations * Strategic management What is a Stakeholder? Any human being, set of individuals with a good concern (a stake) in the achievement of an organization is measured to be a stakeholder. Why stakeholders are there? A stakeholder is logically concerned with an organization bring projected outcome and meeting its monetary goals. Instance of a stakeholder are a holder, director, shareholder, investor, member of staff, purchaser, colleague and dealer, among others. A stakeholder may make a payment openly or in some way to an organization dealing actions. Types: Internal and External Stakeholders: Scheme managers are internal stakeholders because they are openly involved in the increase of the project. They have power to run the project by handling duty of work presentation, organizing and arranging; efficiently making sure that all stages of the project are complete correctly and well. Salesperson, dealer, and outer concerns of organizations are external stakeholders because they provide desirable essentials for a projects accomplishment; they need to keep on in communication at all times on objective, high point and deliverables. Direct and Indirect Stakeholders: Direct stakeholders are belonging to the day by day activities of a scheme. Team associates are direct stakeholders as their work is planned around the project for each workday. MINIMUM DISRUPTION TO THE STATUS QUO BUT HOW? Leadership is imperative to the triumph of a combination. The selection process should be based on an purpose measurement of skills and competencies, not on following commitment. The appointment process should be seen as fair and rational. Must also be timely moving quickly to the team in place and increase speed integration. Some issues stand out more than the election of directors of the new mutual organization. A merger of equals implies the management representation from both organizations. JUSTIFICATION OF ARGUMENTS BY REAL EXAMPLE When the amalgamation of Glaxo Wellcome and SmithKline Beecham proclaimed, the top four executives were appointed within one month of executives to fill the nine senior officials were appointed. In the first fourteen positions, executives from each companys entire seven years. At Chase Manhattan, the top fifteen decision makers were named to the announcement, and the next two levels of government were established within four months. Indirect stakeholders are not collision by the project. Those can be your customers and consumer, because their concern is with the final project. This would be the excellence of products, cost, covering, and ease of use. Purpose of Stakeholder Analysis? A stakeholder analysis is a procedure which is use to recognize and evaluate the significance of key people, groups of people, or association that may significantly power the achievement of scheme. The reason of being useful? A stakeholder analysis is use to: 1) Identify people, groups, and institutions that will give power to project (either surely or unhelpfully) 2) Expect the kind of power, positive or negative, these groups will have on your proposal. 3) Developing plan to get the most effectual hold possible for your initiative and decrease any barrier to booming completion of program. Stakeholder and their involvement: To engage stakeholders is a pathway to any victorious project, not only from a communication viewpoint, but also for the sake of the information obtained from their ability and skill, which they will offer again and again if we take the time to engage them exactly from the beginning. Be careful, no two stakeholders individually, or groups of stakeholders, are the similar. Each stakeholder is dissimilar, they will be at different height of understanding and approval for the requirement of the change and their hope s will be different. Ways to involve Stakeholder: 1. Understand Them: To understand an individual is a master key to deal with that person in his own way. However, it is predictable that any team will face some kind of opposition from different stakeholder groups, merely on the base of that we are offer is something that is different to what is finished now. 2. Resolve any Whats In It For Me? Issues There is a factor of individual contact when dealing with stakeholders. When a change is planned, self protection come in and people will firstly look at the change from a very personal viewpoint as compare to outer view. It is impractical to supply for each single individual requisite of every sole stakeholder. Though, there will be harmony in their supplies in their Whats In It for me necessities. Personal nervousness is a usual by-product of any change and determine these Whats In It For Me issues can go a long way to dropping them. 3. Demonstrate Success: Occasionally, the most excellent way to engage stakeholders is to demonstrate them what the change will give to them. This can be done by showing examples of parallel plans run within our personal organization, actual life examples, or case studies of other organizations that have put into practice a parallel change. To involve stakeholder is time consuming process and is a Critical Success aspect for any project that wants to apply its changes productively. 4. Benefits: Benefits are the most important term to involve stakeholders in change. That what kind of benefits they can have in this change. And how these changes are useful to them? EVALUATION AND CONCLUSIONS The position of the stakeholders is inner in the organization approach to get change. Change in this project involved changes to tolerant entrance. The bridge fills the space between groups. The short of information and participation in projects that involve change frequently give outcome in manner of separation and anger; however relations between staff their involvement at every phase of the completion establishment to be significant. Recognition of stakeholders in the beginning steps hold up the process of stakeholder analysis, which exposed the collision of specific stakeholders had within the scheme. Model of change management: The model was firstly used as an instrument for formative of change management activities like communications and preparation were having the preferred results during organizational change. For instance, Awareness of the business cause for change is an objective of early communications associated to a business change. Wish to take on and contribute in the change is the goal of protection and opposition management. Knowledge about how to change is the goal of preparation and training. By recognizing the required results or goals of change organization, ADKAR becomes a useful structure for change management teams in the setting up and implementation of their effort. An individual must get every part in series for the change when it has to be put into practice and continued. As a director, one can use this model to make out space in change organization procedure and to give useful instruction for workers. The ADKAR model can be effectively utilize to: identify employee opposition to change to give aid to the employees move through the change path form a successful act sketch for private and skilled development throughout the change extend a change organization map for workers The ADKAR model was initially in print by Prosci in 1998 after investigated with more than 300 corporations suffering from major change projects.. This model is planned to be a training device to help out employees during the change process. The efficiently, one will need to know the underlying structure for change proposal. In the diagram underneath, change occur and flourishing change go on when both dimensions of change occur at the same time.   Trade Measurement of Transform The business dimensions of change take in the classic plan elements.   Business requirement or chance is known. Project is clear (range and goals). Business resolution is planned (new method, arrangement and organization makeup). New processes and systems are advanced. Solution is applied into the association. These are the typical fundamentals of a business change that director feels most contented organization.   CONCLUSION AND RECOMMENDATIONS While human resource leaders can facilitate the integration planning. On the other hand, there is a inclination in many situations for executives who are strength and leadership in the implementation of changes, with minimum human resources, low-level executive or human resources. This may be suitable in some situations. However, in other state of affairs, the participation of employees can be important. Participation generates ideas to improve the integration and further support for rapid integration. Being a Human Resource Director I would strongly suggest that to develop effective plans for implementation of merger and to ensure that plans are implemented many companies use merger integration teams and assign responsibility to the executives of the merging of specific integration. Again, the individual resources privileged can rally round teams or to work effectively and quickly to facilitate their work or actually serving on the teams. The human resource leaders to contribute directly to business performance. Now the question arises that what better opportunity could appear that a union? Here we can apply in any organization and to develop further our ability to lead strategic change effectively. As the frequency of mergers increases, and as top executives recognize the critical impact of issues related to people, we should be on center stage to help ensure that mergers on the right. The chaos is connected with any merger or gaining is a unique occasion for time to demonstrate their knowledge and skill in managing human capital. HR is an inherent part of the integration into a team of M A for their ability to assess the compatibility of communal cultures and diverse options for come together the companies. The guiding principles for the successful merging for change * Take final action and make decisions quickly the secret to keeping good people. * Be honest with employees and treat them with respect. Let them know that the combined entity will be a more valuable. * Each time the property is possible, the use of society represented by stock options and stock grants for all pulling in the same direction. * Be honest about the choices of people to be made. * Treat people coming out with the same respect and attention as those who remain.

Saturday, January 18, 2020

Network VPN and Web Security Cryptography Essay

Securing Internet commercial transactions and sensitive banking data is increasingly becoming critical as threats to computer networks continue to cause significant financial losses resulting from data damage, loss or corruption by spy ware, viruses and other data corrupting hostile codes (Mogollon, 2007). The consequences of having weak security system administration become enormous and companies should step up their security measures to protect sensitive data by cryptographic methods. In online transactions, the secure Web server communicates with the client’s computer by authenticating each other. They do this by enciphering the data which is transmitted by means specific protocols such as transport layer security (TLS), Internet protocol security (IPsec) and secure socket layer (SSL). All Web browsers such as Internet Explorer and Netscape have in-built TLS and SSL protocols. To make internet transactions safe, the problems associated with end-user certificate distribution have to be solved and this was the challenge that led to the fall of secure electronic transaction (SET) technology after its introduction in 1990s (Mogollon, 2007). This paper will discuss important technologies behind VPN SSL and website encryption paying critical attention to algorithms which make encryption in financial systems such as the Internet commercial transactions possible and secure. In particular, the paper addresses advanced and critical issues in online transactions as one of the areas applying cryptography and network security. The Need for Network Security in Financial Systems The modern online commerce and financial systems are rapidly growing partly because several protocols for Web encryption are often implemented hence ensuring secure transactions. In a practical scenario, online clients buying commodities enter the credit card number online and then hit the â€Å"Submit† button. While this information is provided online and can be deciphered by hackers, the Web browser commits to secure this online transaction by enciphering the transmitted data (Mogollon, 2007). Secure communication between the client and the server requires client-server authentication which is a cryptographic key exchange involving an agreement of both parties. The client and the server will agree on a common pre-master secret code or key. Data is then enciphered using the keys which are generated from the agreed pre-master key. This communication agreement between the client and server also involves the decisions on which versions and protocols to use such as SSL2, SSL3, TLS1. 0, and TLS 1. 1 (Mogollon, 2007). They will also agree on which cryptographic algorithm to use and whether to authenticate to each other or not. The use of certain techniques of public-key encryption which generate the pre-master secret key will also be agreed on. Both have to make an agreement that session keys are to be created to help in the enciphering of the messages. Virtual Private Network (VPN) A virtual private network (VPN) serves as an extension of a private network which encompasses links across public or shared networks such as the Internet (Mogollon, 2007). VPN enables users to send data between two interconnected computers across a public or shared network in a way that it emulates point-to-point private link properties. Virtual private networking is the technique of creating and configuring VPN and it emulates point-to-point links (Mogollon, 2007). There should be data encapsulation or wrapping with headers to provide routing information thus allowing it to traverse the public or shared transit internetwork and attain its endpoint. At the same time, to emulate private links, the sent data must be encrypted for security and confidentiality (Microsoft Corporation, 2003). The packets intercepted on public or shared networks cannot be deciphered without the use of encryption keys. Private data is encapsulated in a connection portion known as the tunnel and it is encrypted in a connection portion known as the VPN connection (Microsoft Corporation, 2003). Fig 1. 1 Figure 1. 1: Virtual private network connection (Microsoft Corporation, 2003) The VPN connection provide the capabilities for remote users while at homes, branch offices or even while traveling to securely connect to remote organizations’ servers by the use of routing infrastructure which is provided by a shares or public network like the Internet(Microsoft Corporation, 2003). Since the creation of VPN connection is facilitated by the Internet from anywhere, these networks require strong security mechanisms to avoid any unwelcome private network access and to protect private data while traversing the public network (Microsoft Corporation, 2003). These security mechanisms include data encryption and authentication as well as other advanced VPN security measures such as certificate-based authentication. Virtual private network security (VPNs) is provided by the Internet Protocol security (IPsec), TLS and SSL (Mogollon, 2007). IPsecVPN are commonly used in several enterprises but they are not as easy to use as SSLVPN. Another difference between IPsec VPN and SSL VPN is that IPsec VPN works at Layer 3 and creates a tunnel into networks. This way, IPsec allows for devices to log on as if they have physical connections to the local area network (LAN) (Mogollon, 2007). On the other hand, the SSL VPN work at the application Layer 4 and users can have access to individual applications through the Web browser. In SSLVPN, the administrators can dictate the access by applications instead of providing entire network access. VPN emulates the facility of private wide area network (WAN) by the use of private Internet Protocol (IP) and public internet backbones (Mogollon, 2007). Secure Socket Layer Virtual Private Network (SSLVPN) Security networks particularly those used in online transactions demand increasingly complex cryptographic systems and algorithms (Lian, 2009). Therefore, there is need for individuals concerned with the implementation of security policies in companies to use technical knowledge and skill in information technology in order to implement critical security mechanisms. Unlike the traditional IPsec VPN which requires the use of special client software on computers of end users, the SSL VPN such as Web SSL VPN requires no installation of such software (Lian, 2009). SSLVPN is mainly designed to provide remote users access to various client-server applications, Web application as well as internal network connections. SSL VPN authenticates and encrypts client-server communication (Lian, 2009). Two types of SSL VPNs are recognized: the SSL Portal VPN and SSL Tunnel VPN (Lian, 2009). The SSL Portal VPN usually allows a single SSL to connect to the website while allowing secure access to a number of network services by end users. This common website is known as the portal because it serves as a single door leading to a number of resources. The site is usually a single page having links to other pages. The second example of SSLVPN is the SSL Tunnel VPN which allows Web browsers, and thus users to safely access a number of multiple network services as well as protocols and applications which are not Web-based (Lian, 2009). Access is mainly provided via a tunnel which runs under SSL. The SSL Tunnel VPN requires all browsers to have the capacity to support active content that makes them to have more functionality not possible with SSL Portal VPN. The active content supported by SSL Tunnel VPN includes Active X, Java, JavaScript and plug-ins or Flash applications (Lian, 2009). Secure Socket Layer (SSL) provides a standardized communication encryption deployed for the purpose of protecting a number of protocols (Lian, 2009). For instance, most online transacting sites such as PayPal, AlertPay and MoneyBookers have their Universal Resource Locator (URL) address beginning with â€Å"https://† instead of â€Å"http://. † This means that the Hypertext Transfer Protocol (Http) is wrapped inside the SSL (Lian, 2009). Cryptography and Encryption Cryptography is concerned with the development of algorithms where data is written secretly thus the names, crypto-meaning secret and –graphy, meaning writing (Li, n. d). Cryptography basically provides a number of ways to confirm data security during VPN communication. These various means or algorithms include hash, cipher, digital signature, authentication and key generation (Lian, 2009). Cryptography endeavors to conceal the actual context of data from everyone except the recipient and the sender hence maintaining secrecy or privacy. Cryptography also verifies or authenticates the correctness or validity of data to recipients in virtual private network. As a result of this, cryptography has been the basis of a number of technological solutions to problems such as communication and network security in share networks such as that in VPN. In general, cryptography can be defined as the technique exploiting the methods and principles of converting intelligible data into unintelligible one and then changing it back to the original form (Li, n. d). SSL VPN encryption involves the adoption of traditions and novel algorithms of encryption in the protection of sensitive data such as the one exchanged during online transactions. The original data is transformed into secure data with specific algorithm of encryption by the use of the encryption key. At the same time, the encrypted data can be decrypted back into its original state with the help of algorithms of decryption. Sometimes, attacks to data are common in networked systems where hackers break into systems to obtain the original data which has not been encrypted. The present research focuses on the efficient algorithms of encryption and decryption which are secure against these attacks (Lian, 2009). Typical VPN Encryption Algorithms VPN encryption utilizes a number of encryption algorithms to secure flowing traffic across a shared or public network (Malik, 2003). The encryption of VPN connections is done so as to allow VPN and Web traffic to traverse share or public network like the Internet. Example of encrypted VPN is the SSL VPN and IPsec which uses encryption algorithms to safely allow traffic across shared or public network such as the Internet (Malik, 2003). Apart from classifying VPN in terms of encryption, classification of VPN can also be based on the model of OSI layer which they are constructed in. this is an important classification as the encrypted VPN only allows specific amount of traffic which gets encrypted and the degree of transparency to VPN clients (Malik, 2003). Classification of VPN based on the OSI model layers recognizes three types of VPNs: data link layer, network layer and application layer VPNs (Malik, 2003). Algorithms used for encryption can be classified into partial encryption, direct encryption and compression-combined encryption (Lian, 2009). According to the number of keys used, algorithms can also be classified into asymmetrical and symmetrical algorithms. In general, different encryption algorithms encrypt data volumes hence acquiring different efficiency and security. It therefore remains a decision of system security administrators to select which algorithm to use which will provide the best VPN security (Microsoft Corporation, 2005). There is no single encryption algorithm which is efficient to address all situations (Microsoft Corporation, 2005). However, there are basic factors to consider when selecting the type of algorithm to use in VPN security. Strong encryption algorithms always consume more resources in computer systems compared to weaker encryption algorithms. Long encryption keys are considered to offer stronger securities than the shorter keys. Therefore, Chief Security Officer (CSOs) should decide on longer keys to enhance system securities (Microsoft Corporation, 2005). Asymmetric algorithms are also considered stronger than the symmetric ones since they use different keys (Microsoft Corporation, 2005). However, asymmetric algorithms of encryption are slower compared to symmetric ones. Experts also prefer block ciphers as they use loner keys hence offer stronger security compared to stream ciphers. Passwords that are long and complex seem to offer better security than shorter and simpler passwords which can be broken easily by hackers. It should be factor to consider the amount of data which is being encrypted. If large amounts of data are to be encrypted, then symmetric keys are to be used to encrypt the data and asymmetric keys should be used to encrypt the symmetric keys. It is also critical to compress data before encrypting because it is not easy to compress data once it has been encrypted (Microsoft Corporation, 2005). Direct encryption involves the encryption of data content with either traditional or novel cipher directly. Partial encryption involves the encryption of only significant portions of data and other parts are left unencrypted (Microsoft Corporation, 2003). Compression-combined encryption involves the combinations of encryption operation with compression operation which are simultaneously implemented. Comparably, direct encryption offers the highest data security as it encrypts largest volumes of data. However, this method has the lowest efficiency as it takes much time encrypting all data volumes. The reduction of data volumes in partial and compression-combined encryptions result to lower security but with highest efficiency (Lian, 2009). There are specific examples of ciphering algorithms used by most online companies to protect sensitive and private data such as business data, personal messages or passwords for online banking. The commonly used ciphering algorithms include the DES/3 DES, RC4, SEAL and Blowfish (MyCrypto. net, n. d). Data encryption in VPN client-server communications is critical for data confidentiality. This is because data is passed between VPN clients and VPN servers over a public or shared network which often poses risks of illegal data interception by the hackers. However, VPN servers can be configured to force communication encryption. The encryption will force VPN clients connecting to VPN servers to encrypt their data or else be denied connections. Microsoft Windows Server 2003 employs two different types of encryptions: the Internet Protocol security (IPSec) encryption that uses the Layer Two Tunneling Protocol (L2TP) and Microsoft Point-to-Point Encryption (MPPE) which used Point –to –Point Tunneling Protocol (Microsoft Corporation, 2005). In telephone communication or dial-up clients, data encryption is not necessary between the clients and their Internet Service Providers (ISP) since the encryption is always carried out with VPN client-VPN server connections. This implies that mobile users using dial-up connections to dial local ISPs need not to encrypt anything since once the Internet connection has been established, the users can create VPN connection with corporate VPN servers. In case VPN connections are encrypted, there is no need for encryption between users and ISPs in dial-up connections (Microsoft Corporation, 2005). VPN encryption generally allows for the attainment of the highest possible security standards made possible by key generation in a certified centre using the RSA, 1024 bit (MyCrypto. net, n. d). Smart card technology especially the TCOS-2. 0 Net Key SmartCard OS (operating system) grant a safe mode for key storage which complies with the evaluation criteria of information security systems (Li, n. d). Different types of encryption algorithms employ proprietary specific methods to generate the secret keys and thus the encryption algorithms become useful in different types of applications (MyCrypto. net, n. d). The length of keys generated by these algorithms determines the strength of encryption. The most common algorithms, DES/3DES, BLOWFISH, IDEA, SEAL, RC4 and RSA have different qualities and capabilities which network security administrators may choose to use in providing VPN security (MyCrypto. net, n. d). The RSA algorithm, developed in 1979 was named after its developers Ron Rivest, Shamir and Adleman hence the name RSA (Riikonen, 2002). RSA supports digital signatures and encryption and it is therefore the most widely used type of public key algorithm. RSA takes advantage of the problem of integer factorization to enhance security and it utilizes both private and public keys. It is one of the algorithms which is easy to understand and it has been patent-free since the year 2000 (Riikonen, 2002). RSA is commonly used for securing IP data, transport (SSL/TSL) data, emails, terminal connections and conferencing services. Its security entirely depends on the randomness of the numbers generated by the Pseudo Random Number Generator (PRNG). Data Encryption Standard/ Triple Data Encryption Standard (DES/3DES) has widely been used as a standard in banking institutions in Automatic Teller Machines (ATMs) as well as in UNIX OS password encryption (MyCrypto. net, n. d). DES/3DES allows the authentication of Personal Identification Number (PIN) to be made possible. While DES is basically a 64-bit block cipher, it uses 56-bit keys in encryption and most users don’t regard it as advances in computer technology continue to transform the banking and online industry (MyCrypto. net, n. d). DES has been found to be vulnerable to some cyberattacks and experts have now recommended 3DES as the stronger option. 3DES has the ability to encrypt data 3 times hence the name 3DES. It uses different keys for all the three passes and this gives it a total cumulative of 112-168 bit key size (MyCrypto. net, n. d). IDEA (International Data Encryption Algorithm) is another type of algorithm first developed by Prof. Massey and Dr. Lai in the wake of 1990s in Switzerland (MyCrypto. net, n. d) . It was meant to replace DES algorithm but one of the weaknesses of DES is that it uses a common key for both encryption and decryption and it only operates on 8 bytes at every incident. The success of IDEA in enhancing security lies on the length of its 128-bit key which makes hackers difficult to break especially those who try out every key. To present, there are no known means of breaking the IDEA 128-bit key other than trying each key at a time which is also difficult (MyCrypto. net, n. d). This then makes the algorithm better for security. Since it is a fast algorithm, IDEA has been implemented in most hardware chipsets to male them run faster (MyCrypto. net, n. d). Just like IDEA and DES, Blowfish represent another type of a symmetric block cipher which tales a varying key length ranging from 32 to 448 bits (MyCrypto. net, n. d). This makes it ideal for both exportable and domestic use. Developed in 1993 by Bruce Schneier, Blowfish became not only a fast alternative but also a free option to the other existing algorithms of encryption. Blowfish is now becoming more accepted by many experts because of its strong encryption properties (MyCrypto. net, n. d). Software-optimized Encryption Algorithm (SEAL), developed by Coppersmith and Rogaway is an example of a stream cipher where data is encrypted continuously (MyCrypto. net, n. d). Stream ciphers represent a group of algorithms which are faster compared to block ciphers such as IDEA, Blowfish and DES. However, stream ciphers have an extended initialization phase whereby a secure harsh algorithm is used to complete the set of tables (MyCrypto. net, n. d). It is considered a very fast algorithm as it uses 160 bit key for the purpose of encryption. In addition, SEAL is considered one of the safest algorithms used to protect data from hackers and thus, it can be used in managing passwords in financial systems (MyCrypto. net, n. d). Ciphers and Encryption Ciphers transform plaintext into secured ciphertext and then recover it back from ciphertext with the help of keys (Li, n. d). This way, data is kept private during client-server communication this providing maximum VPN and Web security. The transformation into plaintext and the recovery from ciphertext is commonly known as encryption and decryption respectively. During the decryption process, a key is required and without the key, correct plaintext recovery is not possible. There are several types of ciphers widely known and have been classified according to their properties. Ciphers can be classified as to either symmetric or asymmetric ciphers (Li, n. d). In symmetric ciphers, the decryption key used in cryptography is the same as that used in encryption. The operation for decrypting is often symmetric to the encrypting operation in symmetric ciphers (Li, n. d). In asymmetric ciphers, the decryption operations are never symmetric to encryption operations hence the keys used might differ (Lian, 2009). A simple model for showing asymmetric and symmetric ciphers is as shown below in Fig 2. 1 (a) and (b). Fig 2. 1(a) and (b) (a) Symmetric cipher (b) Asymmetric cipher Fig 2. 1 (a) and (b): Symmetric and asymmetric ciphers (Lian, 2009) In the models shown above, symmetric cipher use same key (K0) in encryption and decryption while asymmetric cipher use different keys (K1) and (K1) for encryption and decryption respectively (Lian, 2009). Since in asymmetric cipher the key is similar in both encryption and decryption operations, the key is known both to the sender and the receiver but not to the third party and it should always be kept private. Otherwise, the third party can decrypt the ciphertext and expose the ciphertext as plaintext. This is why the asymmetric cipher is also known as the private cipher. However, symmetric ciphers such as Advanced Encryption Standard (AES), Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA) have widely been used despite some vulnerabilities of ciphertext decryption by third parties (Lian, 2009). Asymmetric ciphers offer advanced security as the encryption key (K1) can securely be made public but the decryption key (K2) is safely kept private only made known to the receiver. This means that if the sender and the third party only knows one key (the encryption key), he is not able to decrypt the ciphertext hence maintaining maximum network security. The asymmetric cipher is therefore known as the public cipher and the symmetric cipher, private cipher. Asymmetric cipher or public ciphers are regarded more suitable particularly for key exchanges in online communications and internet commercial transactions. The reasons which make public ciphers suitable for VPN securities are for instance the difficulties in large number factorization in RSA cipher. The problem of the discrete logarithm is the concept behind the suitability of Elliptic Curve Cryptography (ECC). The ElGamal encryption is also regarded to offer suitable securities because of the problem with complex computing of discrete logarithms as the encryption is always defines over a wide range of cyclic groups. Cryptanalysis and Security Attacks Cryptanalysis techniques allow hackers to break easily into cipher systems in VPN. According to Kerckhoffs principle, the hacker clearly knows the cipher per se and the security of the cipher is largely depended on the private key (Lian, 2009). Cryptanalysis techniques employed by attackers aim to get access to the cipher’s private key with the aim of knowing the information as plaintext, ciphertext or even encryption algorithm. Cryptanalysis methods can be grouped into four categories according to the information best known to the attackers (Lian, 2009). The attack based on only ciphertext means that the attack only progresses after the attacker has known ciphertext collection. This method is known as ciphertext-only attack (Lian, 2009). Known-plaintext attack is another cryptanalysis method which means that the attack method will only be successful when the hacker has obtained pairs of plain-text-ciphertext sets. Another attack method is the chosen-plaintext attack which progresses only when the hacker has ciphertexts which correspond to arbitrary plaintexts sets. The last possible method of attack is the related-key attack which works after the attacker has obtained ciphertext which are encrypted using two dissimilar keys (Lian, 2009). Encryption algorithms security is determined by the resistance to cryptanalysis techniques including attacks like differential analysis, statistical attack and relate-key attacks. Ciphers used for network VPN and Web security should be analyzed thoroughly before they can be used, otherwise, attackers will break into systems when ciphers don’t provide the required maximum network security. Simple metrics can be employed in measuring resistance to cryptographic analysis and common attacks of ciphers. These metrics include plaintext sensitivity, key sensitivity and ciphertext randomness (Lian, 2009). It can therefore be said that the cryptographic algorithm is of high security only when the encryption algorithm is heavily secured against cryptographic analysis and attacks. In case the algorithm doe not provide this essential requirement, the encryption algorithm is then considered to be of low security. Key sensitivity refers to changes in ciphertext as a result of changes in keys. Good ciphers will recognize the slightest difference in keys and cause significant changes in ciphertext. Plain text sensitivity is almost similar to plaintext sensitivity and is defines as the alteration in ciphertext as a result of plaintext changes. Good ciphers should also be able to recognize any slight difference in plaintext changes and therefore cause significant ciphertext changes. Ciphertext randomness basically differs from the plaintext. In good ciphers, the ciphertext always has good randomness which makes it hard for attackers to establish holes in statistical properties of ciphertexts (Lian, 2009). Ciphers transform original intelligible data into a form which is unintelligible by the help of keys. This method is used to secure data confidentiality. Hash always uses the original data to generate short strings used to protect data integrity. Digital signatures employ the key-based hash in the generation of hash values for the data which is to be protected. Digital signatures are often used in the detection whether operations are done by the authenticated owner or not. This is critical in online transactions such as those involving online payment methods such as AlertPay, PayPal and MoneyBookers. Key generation and authentication provide critical methods which help in the generation and distribution of multiple keys during communication. Hackers use cryptoanalytical methods to analyze and break into networked systems through cryptographic means. Cryptoanalysis provides some special or common means to analyze hash, cipher, digital signatures or key generation and authentication algorithms securities. The best cryptographic methods in VPN and Web security should be immune to cryptoanalytical methods before they can be applied in system network security. Conclusion Encryption algorithms offer secure communication against cryptanalysis used by attackers such as known-plaintext attack, ciphertext-only attack and select-plaintext attacks. Complete encryption offers security to traditional and novel ciphers against cryptanalysis by hackers. Partial encryption allows some parameters to be encrypted using ciphers which are immune to cryptographic attacks. Compression-combined encryption involves the combination of encryption and comprension operations which make it secure from the perspective of cryptanalysis. VPN encryption utilizes basic encryption mechanisms which secure the traffic flowing across shared or public network. The encryption is critical in allowing VPN traffic to traverse public or shared network like the Internet. Banking systems have always employed complex security measures such as SSL VPN and IPsec VPN to encrypt traffics by the use of encryption algorithm in shared VPN connections. References: Malik, S (2003). Network security principles and practices. Indianapolis, IN: Cisco Press. Mogollon, M (2007). Cryptography and security services: mechanisms and applications. Hershey, New York: Cybertech Publishing. Lian, S (2009). Multimedia content encryption: Techniques and applications. New York: Taylor & Francis Group. Li, X (n. d). Cryptography and network security. Retrieved July 31, 2010 from, http://www. cs. iit. edu/~cs549/lectures/CNS-1. pdf. Microsoft Corporation (2005). Data encryption between VPN server and client. Retrieved August 4, 2010 from, http://technet. microsoft. com/en- us/library/cc778013%28WS. 10%29. aspx Microsoft Corporation (2003). Virtual private networking with Windows Server 2003: Overview. Retrieved August 1, 2010 from, http://www. microsoft. com/windowsserver2003 MyCrypto. net (n. d). Encryption algorithm. Retrieved August 4, 2010 from, http://www. mycrypto. net/encryption/crypto_algorithms. html Riikonen, K (2002). RSA algorithm. Retrieved August 4, 2010 from, http://www. cs. uku. fi/kurssit/ads/rsa. pdf

Friday, January 10, 2020

Democracy

Democracy Democracy has become a dominant form of the government, that using in many countries. Democracy is a government form, which is the citizen should have a decision to vote their leader directly for their own country or elect the leader for the other problems. Democracy can develop it, if the majority and the minority party or the association willing works together. Which is everybody can talk and have an opinion, than will put the all idea together and take a better decision for the problem. With democracy form, the one elected leader will work as maximum as possible for the citizens.Than the citizens can see and make a decision about what the elected leader have done to the country and also they have elected the right or wrong leader. Democracy is based on the concept, that everybody in the world is the same, no matter what they are a president or a king. In democracy also have no different between how people look like. For example: White and black, lower class and middle cl ass. Furthermore, not everybody have an equal physically or mentally. The important thing, democracy is all human being have equality. In democracy have an important concept.The first concept is all of the citizens that living in one country, that should be equal, which have an idea and an opinion than issues to the public. The important thing, while elect the candidates for the country leader, that everybody needs to listen to the candidates because the candidates have a different ideas and plans to what they will do for the country. The candidates also need a concept of equality to speech in front all of country citizen, which will vote for the election about what their plans for the future, if they win as a country leader.Even though, the citizens divide to a different side of parties. The United State of America is using the democracy form. Four years ago, Barrack Obama won the election from John McCain as a 44th president of the United State of America, which was using a democr acy form. For the 2012 president election, which Barrack Obama and Mitt Romney were candidates for the president and won by Obama. That is one of example for the democracy form. All American citizen need to participate in the election because all of them are important.They have a better decision to vote and make a difference between both of presidential candidates for the next four years for America. The second concept, the citizens, the government and the candidates should be freedom. This democracy concept is based on equality concept because with freedom people will free to have and issues the idea and opinion to the public and the people also should be listening to each other. Than combine the ideas and opinion and take a good decision, which is can keep a good name of the country. â€Å"Democracy depends on citizen participation in all these ways.But participation must be peaceful, respectful of the law, and tolerant of the different views of other groups and individuals. â₠¬  Even though the democracy concept is freedom and equality, but without participation of citizen, the democracy form cannot work. The country needs a citizen to participate and also need respect for the law. The concept of freedom is not about the citizen become a totally free under the government. That problem can only become an anarchy, where have no government to control the country. The citizens are totally free from everything; they can do what ever they like.For Example: The country has a corruption, everywhere people are poor people and many of them become a murderer to get money, in order to survive their self. Hereafter, the freedom concept has free to choose any religion, to worship and to practice the religion. Further, also free develop their own culture; teach the culture to each other. Democracy also allows the people move from the country. Furthermore, democracy is the system that follows the rule. â€Å"The rule of law protects the rights of citizens, maintains o rder, and limits the power of government. With having a rule of law, the country can be affordable because everything is safe; they have a right of citizen. Everybody who life in a democracy forms that will be equal to each other because the citizens live under the law. With the law people cannot do what ever they like because they will get no excuse for it. For example: One of the government official grafts the money from one of the project. That is a big problem because he or she is breaking the rule of law in democracy form. The sanction at least the government official will go to the jail.For Example: Indonesia, if the government Official and a businessman have a problem with to the government or to other problem, and also corruption, will have a decision to go to the jail. Forward, all of citizens and government have equality under the law. â€Å"No one may be taxed or prosecuted except by a law established in advance. † In democracy country, no one can live without the law, because everybody in one country is all the citizen of the country. Than the citizen cannot make any changes for the law, even for the president cannot break the law because law is established and adhered to.The form of democracy is very good to use in the government. The citizen will have a freedom to chose the country leader, which is they have time to decision and also make it a different for the country, also for their self. Everybody in democracy form always have to get equality between the citizen and the government. The citizen who have an ideas or opinion and can issue their opinion to the government, which is can make any change for the country and help the people in the country.The democracy can make the government easier to control the citizen and the country because the people are obedient against the rule of law. Further, the country is safer from the criminal, from the project corruption and also can help the citizen to improve their self to become a better citize n than useful for the country. Reference: 1. â€Å"What Is Democracy? † What Is Democracy? Web. 09 Nov. 2012. . 2. Grigsby, Ellen. Analyzing Politics. 4th ed.

Thursday, January 2, 2020

Concept Attainment Model Of Teaching Essay - 2008 Words

In the following pages a few models of teaching are described in greater detail. For this purpose only following models have been selected. 1. Concept Attainment Model. 2. Enquiry Training Model. 3. Advance Organizers Model. 4. Operant Conditioning Model of Teaching. 5. Glaser Basic Teaching Model. 6. Computer-Based teaching Model 1. THE CO -CEPT ATTAINMENT MODEL This is a Concept Attainment Model which is derived from the cognitive processes which are used by human beings in collecting and organizing information. The process was studied over several years by Bruner, Good now and Austin (1956). These are the processes, which the people use for forming concepts of categories or concepts, which enable them to describe things or relationships. These categories or concepts make it possible to manipulate the confusing world†. There are certain definite advantages of concepts or categories thus formed. Firstly, they reduce the complexity of the environment; secondly, they enable us to identify objects in the world; thirdly, they reduce the necessity of constant learning; fourthly, they give us direction for activity, i. e., what we should do in a given situation. The process of categorization is known as the process of concept attainment. This isthe process by which we discriminate the attributes of things, people, events andplaces and put th em into categories. There are three types of concepts: (i) conjunctive e, when the category is defined by the joint presence of severalShow MoreRelatedThe Importance Of Teaching Critical Thinking Skills1318 Words   |  6 Pagesvariety in the presentation of lessons. It also lends itself well to preparing for mandated testing. â€Æ' TEACHING CRITICAL THINKING SKILLS IN THE CLASSROOM 3 Teaching Critical-Thinking Skills in the Classroom When a person speaks of being â€Å"critical† today, it is often thought of as a negative thing. What many people don’t realize is that thinking critically is how we determine right from wrong, or something as simple as which fruit to purchase at the supermarket. We draw uponRead MoreTeaching : Teaching Critical Thinking Skills1448 Words   |  6 Pages Running Head: TEACHING CRITICAL THINKING SKILLS IN THE CLASSROOM 1 Teaching Critical Thinking Skills in the Classroom Patty J. Watson Lindenwood University â€Æ' TEACHING CRITICAL THINKING SKILLS IN THE CLASSROOM 2 Abstract This paper discusses the planning and execution of the concept-attainment strategy of teaching. The strategy has been found to be useful at all age levels and across all subject areas. The use of this strategy isRead MoreAnalysis Of Glaser S Basic Teactiing Model Essay1556 Words   |  7 PagesGLASER S BASIC TEACTIING MODEL In the language of DeCecco and Crawford (p.8) this is said to be a stripped-down teaching model which probably means a strategy of teaching which splits the whole process of teaching-learning into its basic component parts and directs how they should be managed separately and in relation to one another. The model was developed by Robert Glaser (1962). It views teaching-learning as a system composed of four basic parts each having its own specific function and allRead MoreMaternal Role : Becoming A Mother1743 Words   |  7 PagesMaternal Role Attainment- Becoming a Mother: Ramona T. Mercer Ramona T. Mercer has been an influential theorist; whose middle range theory has been implemented in nursing more focused on maternity and child. (Masters, 2015 p.284) Keeping in mind that this is a middle range theory it maintains the variables to a minimum and its application to the real world allows its concept to be tested. This theory emphasizes on the interaction and evolving process of a mother and her new infant and the role theyRead MoreThe Legacy Of Imogene King1469 Words   |  6 Pages1990, King retired with the title Professor Emeritus. In addition to producing theories she has made several accomplishments. She died on December 24, 2007 (Nursing Theory, 2013). In the early 1960’s, King introduced her mid-range Theory of Goal Attainment. King was challenged by her Philosophy professor with the question, â€Å"How do you define the nursing act?† She pursued to answer the question and was led to reading courses that brought her to the Literature Systems Analysis and General Systems TheoryRead MoreThe Role Of Gender Challenging Role Models1710 Words   |  7 PagesThe use of gender challenging role models in the classroom is a method I am going to use during my final professional practice and during my year as a Newly Qualified Teacher (NQT). I am going to use these demonstrate to both girls and boys that the media depiction of success is not accurate and that success can be measured in various ways. Role models such as Marie Curie, Dian Fossey and Mary Anning are good historical figures to use but children could see these as dull despite their achievementsRead MoreFactor 3 : Teacher Communication994 Words   |  4 Pageswithin my teaching I have high aspirations for the learners and encourage them to succeed. This is shown within my teaching and planning as I display enthusiasm towards challenging tasks. This inspires students and accelerates students learning. It has been proven that teacher led sessions lowers learners achievements and it is best to deploy an appropriate range of communicative strategies to engage all students. (Ofsted, 2013) Through my development as a teacher I have used 3 main models of communication;Read MoreTeaching And Planning For Motivation And Learner Satisfaction988 Words   |  4 PagesWithin my teaching I have high aspirations for the learners and encourage them to succeed. This is shown within my teaching and planning as I display enthusiasm towards challenging tasks. This aspires students to stimulate and accelerate students learning. It has been proven that teacher led sessions demotes leaners achievements and it is best to deploy appropriate range of communicative strategies to engage students. (Ofsted, 2013) Within my development as a teacher I have used 3 main models of communication;Read MoreNational Curriculum1563 Words   |  7 Pagesschools to ensure that teaching and learning is balanced and consistent.† The National Curriculum is thought by many to be complex and unclear. However, it is at the heart of the education system in England. This is noted by Baumann et al (1997) and Kyriacou (2009) who document that the basis for the National Curriculum was established in the Education Reform Act 1988; creating the idea that education must begin with the needs and interests of the child. The following model acknowledges how the NationalRead MoreNational Curriculum1550 Words   |  7 Pagesschools to ensure that teaching and learning is balanced and consistent.† The National Curriculum is thought by many to be complex and unclear. However, it is at the heart of the education system in England. This is noted by Baumann et al (1997) and Kyriacou (2009) who document that the basis for the National Curriculum was established in the Education Reform Act 1988; creating the idea that education must begin with the needs and interests of the child. The following model acknowledges how the