Tuesday, December 31, 2019

My General Psychology Instructor Lois Lowry Essay

Professor Reed, my general psychology instructor, assigned a list of novels for the class to choose from to write a book report. The author of the book I choose is Lois Lowry. This is a very short, but interesting book, in my opinion. This book has 256 pages, 10 million copies, and was published by Mr. Houghton Mifflin, in 1993. Mr. Mifflin also encouraged Ms. Lowry to write approximately 30 other children s books. Her reasoning and inspiration for writing such a questioning of authority novel such as â€Å"The Giver†, came from the controversial issues she encountered with her aging father, who long term memory was quickly fading. Without his long-term memory, he could no longer recall the things that caused him pain. She realized, if you re unable to remember the physical and emotional pain, it is impossible to understand what it feels like; so in reality, you haven’t experienced it. How can you be plagued by regret or grief if the things that caused it no longer exis t? This novel was awarded the prestigious Newberry Medal in 1993, along with one other novel she wrote. The name of the novel is what caught my interest and what intrigued me the most. Just from something as simple as a name I knew I would be able to relate to this novel, in some kind of way. I was right! Equally important, the main character is an eleven-year-old by the name of Jonas. He is like no other child in this monotonous world. The protagonist of this book, has the ability of perception that isShow MoreRelatedLibrary Management204752 Words   |  820 PagesEdition Arlene G. Taylor The School Library Media Manager, Third Edition Blanche Woolls Basic Research Methods for Librarians Ronald R. Powell and Lynn Silipigni Connoway Library of Congress Subject Headings: Principles and Application, Fourth Edition Lois Mai Chan Developing Library and Information Center Collections, Fifth Edition G. Edward Evans and Margaret Zarnosky Saponaro Metadata and Its Impact on Libraries Sheil a S. Intner, Susan S. Lazinger, and Jean Weihs Organizing Audiovisual and Electronic

Sunday, December 22, 2019

The Long Term Goals Of The Family - 1156 Words

After discussing with the family, the nurse works with them to come up with some goals. The long-term goal is that the family will implement and comply with the prescribed treatments. By complying with the prescribed treatments, it will hopefully lead to less conflict. If Pat Sr. and Pat are taking medicine and going to therapy, the conflict should decrease. The family decides with the nurse that this is a good goal to work toward for long-term benefit. Another, more immediate, goal they decide on is that the family will keep the police from coming for the next two days starting today. This is a goal that the nurse will be able to measure easily. The neighborhood will benefit by not constantly having the police come. The family will benefit because the police come to check in when there is fighting. The family will make one adjustment in the usual activities to incorporate therapeutic regimens of its members. This could be watching Pat take his pills and being sure he actually does, it could be attending family therapy, or even taking some time to be together as a family. The point of this goal is to create a space for the individual members treatment can aid in reducing conflict in the family as a whole. Lastly, the family will express two triggers of tension to the nurse by the end of the session. By being able to verbalize the triggers, it can help the family see what causes conflict. Each person will have their own trigger and hopefully by verbalizing them it canShow MoreRelatedMy Family Is My Long Term Goal902 Words   |  4 Pagesdo what I can. Recently, I realized that I had to start taking care of well being and myself in order to care for others. Getting to that point in my life where I am situated and stable so that it becomes easier for me to do more for my family is my long-term goal. My parents were both born in Central America. They came to the United States â€Å"por tierra† which literally translates to â€Å"through land.† This means they did not have the luxury to sit on a plane and were considered aliens as soon as theyRead More My Personal Goals Essay893 Words   |  4 Pagesset goals for life. On occasion these goals are far stretched and sometimes even fairy-tale like, we tend to see life through a rose-colored glass, not taking into account the many sidetracks life throws our way. At that stage in life our goals tend to be less focused and somewhat unreachable. However, the process of growing up, or maturing, tends organized and center our goals, we learn to make compromises and set goals for our goals. There are different types of goals, short term and long termRead MoreGoals1374 Words   |  6 PagesGoals Kimberly Jones October 14, 2013 Goals My objective to obtaining my professional and personal goals is to increase my knowledge through education and work experience and steps that I will need to take to obtain my goals. In this paper I will discuss skills that I need to obtain and milestones I need to achieve, barriers I need to overcome, and time management strategies that I will need to work on. By obtaining my Bachelor’s degree I will not only fulfill my long-term personal goal butRead MoreQuality Management Assessment Summary Essay1610 Words   |  7 PagesWebb Management will assess quality management in long-term care facilities (LTC).This assessment will address the definition of quality care, and describe key concepts of quality management. This assessment will set short-term and long-term goals of LTC facilities, and describe the internal and external factors that may affect these goals. This assessment will also recommend quality management policy that will facilitate the reaching of those goals. A single definition of quality is elusive becauseRead MoreRisk and Quality Management Assessment Summary1698 Words   |  7 Pagesmanagement in a Long-Term Care facility. The subject will evaluate and will deliver the explanation of quality care, and provide good strategic concepts of quality management. The subject will provide synopsis of long-term and short-term of a Long-Term Care facilities, and will provide an explanation of the external and internal factors that may influence these goals. This paper will also endorse this kind of quality management policy that will simplify the reaching of those goals. â€Å"Quality managementRead MoreStrategic Leadership : A Successful Or Unsuccessful Church And Ministry1638 Words   |  7 Pagesbut also a strategic plan for the present. This research paper contains an in-depth look at the necessary demand to balance short-term and long-term needs and plans in strategic leadership, which is developed from organizational theory, leadership theory and Scripture. This issue in strategically leadership will then be applied to Grace Church and ministry to families. Balancing Current and Future Orientations The definition of strategic leadership is â€Å"when they create the direction, alignment, andRead MorePersonal Goals Paper1281 Words   |  6 PagesPersonal Goals Paper Alice Bennett HCS/301 Undergraduate Nursing Studies March 8, 2011 Cora Barrios Personal Goals Paper A goal is defined as something that you hope to achieve. Setting goals will give you long-term vision and motivation; it will help keep you focused on organizing your time and your resources so that you can make the most of your life. Objectives 1. Identify one professional short-term and one long-term goal. 2. Identify one personal short-termRead MoreMy Personal Action Plan For 20171464 Words   |  6 PagesIncluded in my Personal Action Plan for 2017 are several goals that I need to achieve in order to reach my long-term personal objectives. They include, earning a promotion to Vice President, saving $3.5 million for retirement, maintaining my health, and attaining an MBA degree. All four long-term objectives are specific, relevant to me, in line with my life goals, and time-bound. Most importantly, they are attainable, so I can set new goals once these are met. Furthermore, I am cognizant of theRead MoreOntarios Long Term Care Homes Act1670 Words   |  7 PagesOntario’s Long-Term Care Homes Act, 2007 (LTCHA) was created under the Long-Term Care Homes Act and began on July 1, 2010. The current LTCHA eventually replaced the Homes for the Aged, Nursing Homes Act, and Rest Homes Act as well as the regulations that fall under the above Acts. In Ontario, all of the long-t erm care homes are now administered by one legislation that is called the Long-Term Care Homes Act. 2007. The Long-Term Care Act was to benefit and work with seniors to improve their overallRead MoreGraduate Study Challenges and Strategies for Personal Success1589 Words   |  7 Pagesto pursue a graduate study, and like all major decisions in one’s life, it comes with challenges, which were of an emotional, financial, and organizational nature in my case. To facilitate success, setting goals is most commonly seen as the way forward. In addition to discussing setting goals and milestones, I will be exposing the challenges met in the road to success and the related strategies to overcome them in the next few paragraphs. Background If one research why people pursue a graduate

Saturday, December 14, 2019

Dos Attack Mitigation Free Essays

DDOS Attack and its Mitigation – Simulation in GNS3 Summary: A private LAN network comprising of hundreds of end devices and several servers in DMZ is protected by Cisco ASA (Firewall). In the internet the most commonly found network attack is to take down enterprise resources by DDOS(Distributed Denial of Service) attack either on Servers(which will impact hundreds of end users) or on the network resources like routers itself. In this practical simulation we will analyse how a DOS attack happens on web server placed in DMZ from the internet via traffic flooding, and how we can fine tune ASA to mitigate and stop further attacks on the network. We will write a custom essay sample on Dos Attack Mitigation or any similar topic only for you Order Now Devices used: a) b) c) d) e) Attacker PC – Windows XP – Service Pack3 Web server (Simulated in GNS3) ASA Version 8. 4 (Simulated in GNS3) Cisco Router – 3750 (Simulated in GNS3) Ethernet Switch (Simulated in GNS3) Software used: a) Wireshark (version – 1. 6. 8) b) GNS3 (Version – 0. 8. 3. 1) c) Net tools (Version – 5. 0. ) Step 1: Install Windows XP (SP3) on a virtual machine, (in this case we have used Oracle’s virtual box). This step is to make sure that the system may not get infected with the virus which comes packed with hacking and network monitoring tools. Furthermore, as we are using a virtual operating system, we will be sure that, our actual working pc may not be affected with our experiments. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 1 Image 1: The Oracle virtual box manager showing windows XP(SP3) Step 2: Install GNS3 (Graphical Network Simulator) inside the virtual XP. Image 2: Image of GNS3 installed and running on virtual XP In the above image, the circle shows the virtual network appliances, i. e. routers, switches, bridges, firewall and IPS/IDS are available for simulation using GNS3. In most cases GNS3 comes with Putty, Wireshark bundled. In case if GNS3 doesn’t have Wireshark, we have to install Wireshark on the virtual XP machine too. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 2 Image 3: This image represents the Wireshark software, installed and running on virtual XP. Step 3: Install Net Tools (Network monitoring Hacking Tool) in the same virtual XP machine. This tool can be used to monitor Network activities and can be used as a potential hacking tool. In this simulation we will use this tool to flood the server with icmp packets, which will lead to a DOS attack on the server. Image 4: This represents the Net Tools, which is installed and running on Virtual XP. Step 4: Now, we will setup the devices required to simulate a DOS attack, in the GNS3 software. a) Setup a Microsoft loopback adapter in Windows XP and assign a public IP address to this. This virtual XP will act as the attacker PC from the internet. b) To create a loopback adapter, the first step is to go to command prompt and type the command â€Å"hdwwiz. exe†, this is the shortest way to add a new hardware. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 3 c) Now the â€Å"Add new hardware† wizard will come up and select the second option which says, â€Å"Install the hardware manually†, as shown in the above image. d) On the next screen, please select â€Å"Network Adapters†, from the hardware list, as shown in the above image. ttps://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 4 e) On the next screen, please select â€Å"Microsoft† from the vendor list and â€Å"Microsoft Loopback Adapter† from the Network adapter list as shown in the above image. f) Now Microsoft loopback adapter is added to windows XP, and this can be viewed under Netwo rk Connections in Control panel, as seen in the below image. g) Next step is to configure an ip address to this loopback adapter, so that this adapter can be connected to one of the routers in the simulated internet cloud in GNS3. At this point we have to make sure that the Loopback adapter’s ip address should be something in the public IP range and the interface of the router which is pointing towards the internet should be in the â€Å"same†, public IP range. h) Let us configure the loopback adapter’s ip address as 20. 1. 1. 100/24, and set the default gateway as 20. 1. 1. 1 as shown in the below image. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 5 i) The above configuration means that the virtual XP can also be access by the ip address 20. 1. 1. 100 and the default gateway i. . router’s interface which is connecting to the switch has an ip address of 20. 1. 1. 1. j) In the next step, we are going to create a topology, through which we can simulate the DOS attack, after we create the topology, we have to connect our virtual XP to the topology, which actually represents the internet cloud, a server placed in the DMZ of a corporate (in actual configuration it is placed in Inside zone) and the attacker PC in the internet (i. e. the virtual XP). Between the internet(outside) and the Corporate LAN, we have placed an ASA(Adaptive security Appliance) version 8. , which is has all the functionalities of a firewall and features like NAT, Routing, VPN, AAA services etc. hence it is called UTM(Unified Threat Management) device. The topology which we are going to use for the DOS simulation is in the below image. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 6 Configuration: a) Web Server – IP address: 10. 1. 1. 100/24 Zone: Inside Device: Router c7200 used as a web server. Running configuration of this device : version 12. 2 interface FastEthernet0/0 ip address 10. 1. 1. 100 255. 255. 255. speed auto duplex auto ip http server no ip http secure-server ip route 0. 0. 0. 0 0. 0. 0. 0 10. 1. 1. 1 b) Firewall – IP address : https://www. elance. com/s/feroz_sm/ https:/ /www. odesk. com/users/~013128626566145b05 Page 7 Inside zone interface – 10. 1. 1. 1 (which acts as gateway for LAN users) Outside zone interface – 1. 1. 1. 1 Access-lists: Configuration before DOS security on firewall ASA Version 8. 4(2) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI. 2KYOU encrypted names ! interface GigabitEthernet0 nameif outside security-level 0 ip address 1. 1. . 1 255. 255. 255. 0 ! interface GigabitEthernet1 nameif inside security-level 100 ip address 10. 1. 1. 1 255. 255. 255. 0 access-list out-in extended permit icmp any any access-group out-in in interface outside route outside 0. 0. 0. 0 0. 0. 0. 0 1. 1. 1. 2 1 c) Gateway router for attacker PC: Ip address – Interface towards firewall – 1. 1. 1. 2/24 Interface towards attacker PC – 20. 1. 1. 1/24 Configuration – https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 8 interface FastEthernet0/ 0 ip address 1. 1. 1. 2 255. 255. 255. 0 duplex auto speed auto ! nterface FastEthernet0/1 ip address 20. 1. 1. 1 255. 255. 255. 0 duplex auto speed auto ! ip forward-protocol nd ip route 10. 1. 1. 0 255. 255. 255. 0 1. 1. 1. 1 no ip http server no ip http secure-server Attacker PC: Ip address – 20. 1. 1. 100/24 Operating system – Windows XP – SP3 Location – Internet Connectivity Tests: Now that we have all the devices setup and connected, we should test whether the attacker PC can actually reach the web server, after all if there is no reachability, the DOS attack is not possible. We can find this using a simple and trace route test, as shown in the below images. https://www. lance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 9 https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 10 By the above images, we can find that, the attacker pc has access network reachability to the webserver from the internet. Launch of the attack on webserver using Net tools: In our simulation task we use Net tools 5, which is a network monitoring tool and a hacking tool as well. In the first step, we will check whether the Net tools is able to ping the webserver, by going into network tools - ping option, as shown in the below image. ttps://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 11 We can verify that the software is able to send successful ICMP packets to the web server. This is possible, as we have opened an access control list (ACL) in the firewall which allows any ICMP packets from the internet to the LAN or DMZ. We will analyse what is happening during the Ping, at the packet level using Wireshark. As we can see, four ICMP packets have been sent from the source 20. 1. 1. 100 to destination 10. 1. 1. 100(web server) and the ping is successful. We can also observe that all the 4 packets we sent and received from the internet to the web server in 2 seconds. In the next step we are actually going to deliver the DOS attack on the server, without enabling DOS security on the firewall. To create the DOS attack, first we need to go to Network tools and Http flooder (DOS) in the NetTools, as shown in the below image. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 12 In our case we need to give 10. 1. 1. 100 as the Ip to flood instead of 127. 0. 0. 1. As soon as we hit the start button, the web server is under DOS attack as seen in the below wireshark analysis. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 13 As we can observe that hundreds of syn packets from the source 20. 1. 1. 100 are flooded to destination 10. 1. 1. 100 in less than â€Å"one† second. The below image from Cisco’s website, clearly elaborates, what happens in a typical syn flood attack, which represents the above Wireshark capture. The description of each packet says it is a â€Å"SYN† packet, that means it is a half open connection, without the TCP 3 way handshake. With these SYN packets, a certain amount of buffer is allocated for each SYN packet and in less than a minute all the server resources are allocated to these half open connections and the servers failed to respond to genuine queries, stating that it us under Denial Of Service (DOS) attack. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 14 Mitigation techniques: As we have already discussed, a Cisco ASA firewall can be very helpful in mitigating and stopping DOS attacks on LAN or DMZ servers. The above image from Cisco’s website, describes how ASA firewall stop syn flood attacks can. In this process we will limit the number of â€Å"embryonic† or â€Å"half open connections† a client can have. If the embryonic connection limit is reached, then the security appliance responds to every SYN packet sent to the server with a SYN+ACK, and does not pass the SYN packet to the internal server. If the external device responds with an ACK packet, then the security appliance knows it is a valid request (and not part of a potential SYN attack). The security appliance then establishes a connection with the server and joins the connections together. If the security appliance does not get an ACK back from the server, it aggressively times out that embryonic connection. In this scenario we have used Modular Policy Frame work, which limits number of half open connections to the server and thus stops DOS attack. We have used the below configuration in the Firewall to stop half open connections, which will have a maximum of â€Å"100† open connections, a maximum of â€Å"200† embryonic connections, and a maximum of â€Å"10† embryonic connections from a particular client (identified by an IP address). Furthermore we have set connection timeout timer for a normal connection as 2 hours, timeout for embryonic connections as â€Å"45† seconds and â€Å"25† minutes for a half closed connection. Firewall(config)#class-map tcp_syn Firewall(config-cmap)#match port tcp eq 80 Firewall(config-cmap)#exit Firewall(config)#policy-map tcpmap https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 15 Firewall(config-pmap)#class tcp_syn Firewall(config-pmap-c)#set connection conn-max 100 Firewall(config-pmap-c)#set connection embryonic-conn-max 200 Firewall(config-pmap-c)#set connection per-client-embryonic-max 10 Firewall(config-pmap-c)#set connection per-client-max 5 Firewall(config-pmap-c)#set connection random-sequence-number enable Firewall(config-pmap-c)#set connection timeout embryonic 0:0:45 Firewall(config-pmap-c)#set connection timeout half-closed 0:25:0 Firewall(config-pmap-c)#set connection timeout tcp 2:0:0 Firewall(config-pmap-c)#exit Firewall(config-pmap)#exit Firewall(config)#service-policy tcpmap global Now we will run a DOS attack on the server after the security is enabled and check what will be Wireshark output. The below image shows that the attacker PC is still able to ping the web server, after we have enabled DOS security, but it is able to ping because, this is a normal ping. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~0131286265661 45b05 Page 16 The above image represents the wireshark capture between the Internet router and the firewall, which clearly shows that syn flood attack is happening from source 20. 1. 1. 100 to destination 10. 1. 1. 100, and we can see hundreds of packets flooding 10. 1. 1. 100 in less than a second. At the same time the above image shows the wireshark capture between the firewall and web server, which clearly explains that all the syn-flood packets have been dropped by the firewall as soon as they reach it. At the same time we can obser ve normal ping packets which came from the attacker pc which have been passed by the firewall. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 17 Inference: The above simulation experiment shows that the firewall before the corporate network has stopped one of the most common attacks over servers, i. e. the DOS attack, using Modular Policy Frame work, which can be used to define intersting traffic and the actions to be taken on that traffic. https://www. elance. com/s/feroz_sm/ https://www. odesk. com/users/~013128626566145b05 Page 18 How to cite Dos Attack Mitigation, Papers

Friday, December 6, 2019

Smoking Health Promotion free essay sample

During the nights they had to sleep with a machine to help him breath but during the days he would still manage to get outside for a smoke while he was in recovery. Feelings. Obviously this was a bad thing that was happening to this patient as smoking can slow down recovery because it effects how the body works with regards to oxygen intake and oxygen circulation (Thibodeau Patton 2010). As smoker though, I can see how the patient would of benefitted emotionally as smoking can relieve stress and boredom, though these temporary fixes dont outweigh the health problems it was obviously causing the patient. One of the nurses on duty and myself tried talking to the patient about their smoking and the first thing we needed to know is if they ould like help to quit. As this is important because to change, the patient has to want to change (Cocoran N, 2007). We will write a custom essay sample on Smoking Health Promotion or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The model from Prochaska and diclemente (1984) illustrates this point very well with their trans theoretical model of change. We tried to explain how smoking could effect this patients ability to heal and also problems caused to their breathing during the night. I understood why the nurse was suggesting this and that I should be promoting health also but if the patient needed to smoke for that short term fix, then why shouldnt they be able to. Personally I felt ike a bit of a hypocrite because I smoke myself and to promote it to someone else that they should not smoke did not seem right, but as a nurse, professionally I know we have to do this, and I have to remember that it is the patient in the bed who needs to recover from surgery, not me. What sense I made of this. I brought this up with the nurse later on and asked if it wasnt better for the patient to have some emotional relief from smoking while they were in hospital, rather than saying they cant smoke and the patient becoming stressed out. The nurse said that I wasnt understanding health promotion properly. She explained that if the patient chooses to smoke whilst in hospital it is up to them, but that she was concerned with the long term effects of smoking, so the nurse was thinking about him even when he would be discharged from our ward. I understood what the nurse was doing now and saw logic behind what she was saying the patient and explaining to myself. My understanding as to why smoking effects the bodies healing ability is due to a number of reasons. Smoking destroys the cilia in the throat which helps us fght intections and rids us ot bacteria and micro-organisms (Layman 2 ). Also when eople smoke they intake carbon monoxide and other substances that obstruct and kill alveoli which passes oxygen into the blood (Norris and Siegfied 2012) and for tissue to heal it needs a good blood supply that is richly saturated with oxygen (Chambers and Leaper, 2011). We tried to explain this to the patient in a simple way so that there was not any medical Jargon. What did I do The patient seemed to be up for the idea of stopping smoking but I had feeling it was a little bit of lip service because he was being polite. We told the patient that there are numerous ways to help quit smoking. There was a smoking cessation nurse who would offer advice, tips, and plans to help to quit. We mentioned that there were numerous products help quit smoking such as chewing gum, patches, tablets and sprays. The patient asked about Electronic Cigarettes and I argued that it is a little healthier because all the toxins are not present that you would get in regular tobacco, but its not really an aid to quitting because there is still nicotine in the electric cigarettes and that is what we get addicted to. What could I of done During the time we were explaining to the patient about thinking to stop smoking here wasnt much I feel I could have done or added to what the nurse was already saying. The nurse covered most of the routes that help and support could have been provided. Action Plan If I came across this again I would hope that I know enough now to explain to a patient why they should think about not smoking whilst in recovery and also keeping it going long term so that they can benefit from it after they are discharged. I could give them some leaflets and things and getting them in contact with the smoking cessation nurse. I could empathise why they are smoking whilst they are in hospital ut maybe try and use a diversion tactic to try and get them avoiding smoking whilst they are in recovery on the ward.