Monday, December 30, 2019

Should America Be The Same - 1648 Words

Would America Be The Same? Protests and chants full of discriminance and disparity filling America’s vast crevices of segregation. Long ago, The Civil Rights Movement was blossoming into a nation-wide dilemma as America began to be a nation of racism and segregation but the Civil Rights Movement’s effect on other minorities, race equality, and the important role it plays in society today makes it so greatly impactful on America. From the beginning, African Americans were always treated differently from others whether it was equal pay or going to designated place just because of their skin color; the Civil Rights Movement changed all of that to where they are as equal as white Americans. â€Å"At that time, there had never been a black presidential cabinet officer or a black Supreme Court Justice† (Kennedy). Because of the Civil Rights Movement, African Americans attained more civil rights and have even become president which is a very impressive accomplishment in terms of race equality. This mere fact is quite stunning since Barack Obama is now the president of The United States and has powerful political authority. Likewise, the Civil Rights Movement has also caused America to have more of an equal point of view when it comes to making political and national decisions. As these decisions are made, America’s wholeness, in most communities, has become more evident and prominent ever so. The country known as the United States has become more nation-widely accepting andShow MoreRelatedAmerica Is Not So Great850 Words   |  4 PagesAmerica Is Not So Great Americans have been breaded to believe America is the greatest country in the world. America is a place of the freedom and possibilities, an outside looking in a very desirable place to live. However, America is not as great as Americans believe. Sure Americans have a wider range of freedom then most countries, but has plenty of issues that will repulse others from coming to the land of the free. Issues such as women’s rights, racism, and discrimination plague U.S. citizensRead MoreYo Soy Joaquin Thesis1495 Words   |  6 PagesThe meaning of his quotes are what he has been thru america. Destroyed by modern society symbolize the deaths of people’s culture, religions and how not all america is great as they say. Immigrants come to america for better life and hopes,dreams ,better education. As an child with immigrant parents i understand what Rodolfo might have been going thru the years he has been in america. Is America really a good america or just America. America is a world where it has discrimination,equality, patrioticRead MoreFamily Values Linda Chavez Summary1304 Words   |  6 Pagesactually hurting America? In the article â€Å"Supporting Family Values† Linda Chavez writes to inform Americans about immigrants. In American people make the assumption that immigrants are here to hurt America instead of improving America. In reality there is only a small group of immigrants that hurt America. People need to separate the groups to realize that there are immigrants who help America and that they should be allowed to stay in America under certain circumstances. Immigrants should be given amnestyRead MoreWhat Is The Controversy Behind Involvement?824 Words   |  4 PagesThe Controversy Behind Involvement Franklin Delano Roosevelt once said that America ‘must be the great Arsenal of Democracy. For us, this is an emergency as serious as war itself. We must apply ourselves to our task with the same resolution, the same sense of urgency, the same spirit of patriotism and sacrifice as we would show were we at war.’ Meaning that America should use their workforce to have an impact on a war that supports the protection of the ideals of democracy. That we mustRead MoreRhetorical Analysis Of Donald Trump s Inaugural Address1196 Words   |  5 Pageswill put America and its citizens first to unite the country and change America for the better. The 45th president of the United States, Donald Trump, uses diction and syntax to give Americans the feeling that they are put first and involved in the government. One of Donald Trump’s campaign goals was to give the power of the government back to the people and he uses his inaugural address to express that he will follow through with that plan. In lines 127-131, he states, â€Å"We will make America wealthyRead MoreFreedom In Langston Hughess Let America Be Again1251 Words   |  6 PagesOne of Langston Hughes’s most famous poems is, â€Å"Let America Be Again†. It is quite long, and full of expressions about freedom and equality between white and black people. Among the great writer of his time, he inspired others, people to find their freedom. His poems revealed his steadfast admiration for black, especially the poor. Hughes shows all the different community and races in America and, how the rich and powerful overpowering them all. This research paper is to relate the theme, voiceRead MorePrejudice Essay : Prejudice And Racism862 Words   |  4 PagesAldon Shelton Ms. Mosley English III Due October 19, 2017 Prejudice and Racism in America The difference between racism and being prejudice is nothing. They’re the exact same thing. Both affect different minorities in America based on stereotypes. Stereotypes aren’t the only thing. Not everyone gets to live the American Dream because of their race beliefs. People struggle feeding their families at the end of the day because they couldn’t get a better job because of their skin tone. Others can’tRead MoreUndocumented Immigrants Should Be The Same Rights As American Citizens1359 Words   |  6 Pagespresupposition that undocumented immigrants should receive the same rights as American citizens are a categorical truth. Although some advocates against undocumented immigration would argue that they have overpopulated our nation, these romantic critics are too dogmatic in their provincial ideology. Everyone has the human rights and have the authority to enter to the country without being deported. People should know the reasons why immigrants come to America before deporting them. More than 11 millionRead MoreAmerica s Civil Rights Movement1524 Words   |  7 PagesAmerica has seen many civil rights movements. Yet, Americans cannot say that every race has gotten the civil rights many races have fought for. African American’s, in particular, have had a very hard time in America. On average a black job seeker must put in 15 applications to get a call back while whites only have to put in 10. This alone shows that America has not moved as far forward in civil and racial rights as some would like to think. To top that, African AMerican women are stereotyped andRead MoreTeach for America: Ensuring A Good Education for Students in Need1475 Words   |  6 Pagesthe program, Teach for America, ensuring a good and ever-changing education for those students in need. The videos embedded within the article gives a clear depiction of what a â€Å"good† teacher appears and acts like in front the classroom. These examples derive from actual teachers working with Teach for America illustrating a successful teacher and classroom. Although the Motivator, Tour Guide, Manager, and Connector are all great examples for teachers, current teachers should not epitomize and mimic

Saturday, December 21, 2019

The Problem with Selling Sex Essay - 877 Words

With only the purchase of sex being illegal, johns can be rightfully punished by the law and the sex industry wouldn’t go underground. While people think that sex workers, because they create the opportunity, should be punished, it is often the men who initiate sex with prostitutes. It is the johns who pay sex workers to â€Å"to submit to his sexual demands as a condition of employment (Jeffreys 260). Yet despite this, most police officers focus the attention on prostitutes, rather than the johns and as a result of that, citizens mimic the attitudes of the law enforcers. An unfair balance is created between the number of sex workers arrested versus the number of johns who are arrested. While one could say that both are deserving of the†¦show more content†¦When women are allowed to sell sex, they can feel safer in their practices because they have protection. When sex workers feel like they can go to police officers for help, the sex industry would remain within the public eye and would have little need to remain a secret back-alley business. Furthermore, when prostitution is illegal the business is forced deeper â€Å"underground†, sex worker cannot access social services like welfare (Meg). Regardless of how one is employed, all people should have access to the same government issued services. Since prostitution is illegal, sex workers can’t get access to those agencies and therefore, are being treated as second class citizens. When selling sex is legal, and in the public eye, sex workers can retain their rights as people and no longer worry about being treated like a lowlier person just because of their chosen profession. For example, in Sweden, a law was passed in 1999 that made buying sex illegal but still allowed prostitutes to work legally (â€Å"How Europe Deals† Sweden). Sex workers in Sweden are able to get healthcare, report problems to the police and be treated like humans with rights. By allowing women to wor k as they want to, they are freer, able to protect themselves and less stigmatized. The people of Sweden are better able to address problems that face sexShow MoreRelatedProstitution Is The Act Of Selling1409 Words   |  6 PagesLaws of Nevada, 2009). Prostitution is the act of selling the sex either personally (selling oneself) or with the use of an organization (ie a brothel where an owner rents rooms and prostitutes for a timed use based on an entry fee or a pimp selling another human for the sexual use of others). Prostitution is a hot topic that sparks controversy wherever it goes either by sparking moral indignation or victim concern. Many prostitutes are not selling sex of their own accord but are either trafficked inRead MoreWhy Prostitution Is Wrong?1156 Words   |  5 Pagesis wrong because the practice of women selling their sexual services to men perpetuates gender inequality. If we accept that prostitution is wrong then we should look for a good argument to explain why that is so. Many people feel that it is wrong in that there are some things humans can do that should not be put on the open market. This is the asymmetry thesis, which says that selling sex and reproductive services on the market is more wrong than selling other services. In order to make this thesisRead MoreProstitution Between Canada And Canada1712 Words   |  7 PagesLegislation Due to the fairly recent changes regarding the legality of prostitution in Canada, individuals who use and provide these services have been cautious (Warnica, 2015). Unfortunately, new laws may create more problems than benefits, such as, financial problems due to fewer people buying sex because it is illegal to do so. In this paper, I will explicate and assess the new changes to the law regarding prostitution in Canada, arguing that prostitution should be legal in Canada. Prostitution laws varyRead More Slavery and Sex Trafficking Essay1303 Words   |  6 PagesSlavery and sex trafficking is occurring not just abroad but at home as well. In 2004, â€Å"800,000 to 9000,000 men women and children are trafficked across international borders every year, including 18,000 to 20,000 in the US. Worldwide slavery is in the millions† But the issue doesn’t stop at just slavery but at also includes sex trafficking and prostitution. (p. 506) In Kate Butchers article she discusse s the difference between prostitution and sex trafficking and that solution to this problem is to addressRead More Trafficking Essay1005 Words   |  5 Pages Human trafficking has become a major problem worldwide which affects many people. An estimated 600-800 thousand people are moved unwillingly between international borders each year (Kristof, et al, pg. 10). There is an even larger number of 12.3 million people who are estimated to be forced to work in agriculture, manufacturing, and the sex trade (Shepherd, pg. 94). A majority of the people forced into labor, especially into the sex trade, are children, most of which are women, at an estimatedRead MoreThe Problem Of Sex Abuse Essay1519 Words   |  7 PagesShe was a sex worker and a mother of one. A recent law enforcement crackdown targeting sex workers led Mariana to work alone that night, rather than as usual with other women, to avoid arrest. She was also allegedly working late to pay a fine she had received for solici ting. Mariana’s tragedy is not uncommon. Sex workers are 400 times more likely to become a victim of homicide than the average worker. Current legislation regarding prostitution in the United States works directly against sex workersRead MoreShould Prostitution Be Legalized?889 Words   |  4 Pagesmajority of people regarding prostitution is the â€Å"psychological damage† that can be caused by selling oneself. This argument is validated by the statistics produced by prostitutes. They are not only more likely to commit suicide(almost six times the normal rate of an average American)but are more likely to struggle with depression and insomnia. They also often reported that they felt guilt and remorse after selling sex. This is all pretty convincing evidence that prostitution does cause psychological issuesRead MoreSex Trafficking And The United States1405 Words   |  6 Pagesestimated that there were 4.5 million victims trapped in forced sexual exploitation, or sex trafficking, globally. Most would believe that this is a problem that does not occur in the United States, but they would be wrong. In 2007 alone, 14,588 sex trafficking cases were reported in the United States and the problem is only getting worse. This research paper will discuss multiple topics such as the definition of sex trafficking, recruitment and those at risk, where it occurs, organizations, consequencesRead MoreHuman Trafficking Is The Modern Slavery1415 Words   |  6 Pages When forced into sex trafficking statistics state that 67 percent of prisoners are forced into labor, 55 percent are women and girls, and 26 percent are children that endure the conditions and harshness of this generation s modern slavery. Human trafficking is the modern slavery throughout the globe and 27,000 cases have been reported to the NHTRC hotline in the last eight years alone (Human Trafficking). Human trafficking is of all ages, all genders, and anyone can be forced into the labor. ThereRead MoreProstitution And The Act Of Prostitution1401 Words   |  6 PagesThe â€Å"world’s oldest profession,† also known as prostitution, is considered a grey area in morality (Thiroux). Prostitution is defined as selling oneself or one’s talents for base purpose (Agnes). Contrary to popular belief, there are plenty of arguments for prostitution and the act of prostitution becoming legal. Coinciding with popular belief, there are more arguments against the act of pro stitution being legalized. While some consider the act of prostitution to be an immoral act others will consider

Friday, December 13, 2019

Descriptive Names Free Essays

THE PEARL OF THE ORIENT SEAS During the early ages, many Filipinos use pearls for accessories. The Philippines as we all know is really surrounded by different bodies of water because of these, many sea divers dive in seas just to get big and beautiful pearls. The Philippines is also rich in natural resources containing beautiful places because to these, they export different sizes of pearls in the different parts of the country. We will write a custom essay sample on Descriptive Names or any similar topic only for you Order Now With all its grandeur and magnificence, the Pearl of the Orient Seas lays claim to its naturally abundant environment with beautiful beaches and enthralling panoramic sights. In the past few decades the Philippines have been frequented by tourists for countless reasons. The Philippine sunset is one of the most breathtaking views one could ever see. You would love to feel that fleeting bliss when you see the sky tinted with scarlet, the scarcely diffused light of the setting sun as twilight unfolds. VOCABULARY: GRANDUER – the quality or condition of being grand magnificent ENTHRALLING – something you enjoy and give your complete attention and interest FLEETING – used to describe something which only last for a very short time REFLECTION: Philippines is a beautiful place which is abundant with natural resources especially different kind of pearls. The Philippine sunset is the most beautiful creation that God has given. With these abundance tourist love to come in the Philippines. The Philippines was named the The Pearl of the Orient Seas because of its abundance of pearls which is located in the Philippine Sea Jean Aeriel Marie A. Manansala Gr. 4 – Courtesy THE LAND OF THE RISING SUN The Japanese called their country, Nihon, which means â€Å"the source of the sun† or â€Å"the land of the rising sun†, because it is so far east. It is a land of mountains and lakes, of great cities and skyscrapers. And it is one of the wealthiest and most technologically advanced countries of the world. The Japanese built their national and cultural heritage on a chain of volcanic islands. The transition from a closed society to one that opened to the outside world had a profound effect on Japan. Even today, when Japan is super-modern and technological, it retains a stark conservativeness and guards its unique tradition very closely. Our tour provides a wonderful opportunity to visit this amazing country where the ancient and the innovative are wonderfully interwoven; contemporary and traditional architecture embrace one another; amazing scenery and bustling cities; and polite, welcoming people everywhere. VOCABULARY: SKYCRAPERS – a very tall buildings INTERWOVEN – very closely connected or are combined with each other BUSTLING – a place with people with very busy or lively activities REFLECTION: Japan is one of the most polite country in the world. The Japanese are so hospitable with tourist. Japan is one of the most advance country. Japan is a place where people will be amazed because of its ancient and heritage living. Jean Aeriel Marie A. Manansala Gr. 4 – Courtesy THE LAND OF GOLDEN PAGODAS Myanmar, formerly known as Burma, is recognized by the world as the Golden Land. It is one of the earliest homes of mankind, where one can have exclusive experiences of a life-time. You have to find out why. Myanmar, officially Union Of Myanmar, also called Burma, Burmese Myanmar, or Pyidaungzu Myanmar Naingngandaw, is a country lying along the eastern coasts of the Bay of Bengal and the Andaman Sea in southeast Asia. It is a land of hills and valleys and is rimmed in the north, east and west by mountain ranges forming a giant horseshoe. Enclosed within the mountain barriers are the flat lands of Ayeyarwaddy, Chindwin and Sittaung River valleys where most of the country’s agricultural land and population are concentrated. Myanmar is endowed with a rich diversity of habitat types arising largely from its unusual ecological diversity. It is home to nearly 300 known mammal species, 300 reptiles and about 100 birds species, and a haven for about 7,000 species of plant life. Since Myanmar considers such a rich pool of bio diversity as an important national asset, the Government has drawn up strict regulations to protect its biological resources. As some folktales have said, the map of the country itself resembles the figure of a dancing lady. VOCABULARY: RIMMED – has color or substance around its border BARRIERS – something that makes it difficult or impossible for something to happen or be achieved. ENDOWED – desirable ability, characteristic, or possession that ones have which they have by birth or by chance. REFLECTION: Myanmar is a place of mankind where we can experience in a life time. Myanmar is a beautiful place where we can find different kinds of animals. It is a place where one should go and experience the beauty of nature. Jean Aeriel Marie A. Manansala Gr. 4 – Courtesy THE TINY DRAGON OF ASIA Lying on the eastern part of the Indochinese peninsula, Vietnam is a strip of land shaped like the letter â€Å"S†. China borders it to the north, Laos and Cambodia to the west, the East Sea to the east and the Pacific Ocean to the east and south. Vietnam is considered one of the most popular destinations in the south-east of Asia. Hanoi, the capital of the country, is an ancient city, the political, economic and cultural center. The city began its rapid development in the 11th century, when the Emperor Wan Li Kong, moved his capital to the citadel of Thang-Long. Today it is one of the most interesting cities in Asia, with its wide avenues and European-style skyscrapers, numerous lakes, parks and fountains interspersed with hundreds of colonial houses and pagodas. VOCABULARY: RAPID – fast or quick CITADEL – a strong building where people could shelter for safety INTERSPERSED – the second thing happen or occur between or among the first thing REFLECTION: Vietnam is a land which is shaped like a letter â€Å"S†. Vietnam has a lot of ancient cities where tourist are fun of. With Vietnam’s development it is now one of the most exciting place in Asia because of its wide avenues and tall buildings. Jean Aeriel Marie A. Manansala Gr. 4 – Courtesy RICHEST NATION IN SOUTHEAST ASIA From the 14th to the 16th century, Brunei was the center of a powerful native sultanate occupying what are now Sabah and Sarawak and extending northward through the Philippines almost to Manila. By the 19th century, much of this empire had been whittled away by war, piracy, and the colonial expansion of European nations. During the 1970s, Brunei emerged as the richest state in Southeast Asia, profiting from its oil wealth and the steep increases in international oil prices. Much of this vast oil income has been expended by the state on modernization and social services. VOCABULARY: WHITTED – having wits or understanding, intelligence as specified COLONIAL – controlled by powerful countries VAST – extremely large REFLECTION: Brunei is one of the most richest country in the world. Brunei is lead by a sultan. Brunei uses its own natural resource to develop their country most especially their oil wealth. This is why Brunei was named as the richest nation in Southeast Asia. Jean Aeriel Marie A. Manansala Gr. 4 – Courtesy THE LAND OF JEWELS Sri Lanka – the teardrop shaped nation, said to be the jewel of the Orient has always attracted travelers to its shores because of its white beaches, beautiful historic ruins and fascinating culture. The land of spices, nature and history. Floating like an emerald jewel in the dreamy Indian Ocean, the captivating isle of Sri Lanka stands as testament to the beauty of Mother Nature’s handiwork. One of Asia’s most biologically diverse countries, Sri Lanka is home to elephants, leopards, buffalo, deer, monkeys, squirrels, snakes, chameleons as well as hundreds of bird species. The island of Sri Lanka, also known as â€Å"Ceylon† has a long heritage for gem-mining and trading that dates back some 2,000 years. Sri Lanka is a tropical island situated in the Indian Ocean, off the southeastern tip of India. Sri Lanka has earned its namesake as the â€Å"Island of Gems,† or â€Å"Gem Island† (Ratna Dweepa), with its abundance of corundum gems, chrysoberyl and alexandrite, garnet, moonstone, peridot, spinel, topaz, tourmaline, and zircon. Sri Lanka has been known by many different names. Due to the rich gem stone deposits, the Arabs named it ‘Serendip’ meaning â€Å"Island of Jewels’. VOCABULARY: RUINS – a part or remains after it has been damaged or destroyed HERITAGE – qualities, traditions or features of life that have been continued over many years and have been passed on from one generation to another CORUNDUM – an extremely hard mineral REFLECTION: Sri Lanka attracts its tourist because of the beauty of its white beaches, historic places and fascinating cultures. Sri Lanka proves the beauty of Mother Nature’s handworks. Sri Lanka is abundant with gems this is why it was called the land of jewels. How to cite Descriptive Names, Essays

Thursday, December 5, 2019

Network Security Assessment Detect a Denial of Service

Question: Discuss about the Network Security Assessment for Detect a Denial of Service? Answer: Vulnerability Assessments Vulnerability in network security is defined as the weakness or flaw in the flow of network which minimizes the assurance of information that available in the corresponding device ie., Vulnerability is the state at which the device is not secure and open for the attackers. Most common network vulnerability [8] which pushes the device to the insecurity level are, Shellshock attacks Backdoor attacks Denial of Service(DoS) attacks SSL attacks Botnet attacks Brute force attacks Browser attacks Among the above mentioned vulnerabilities, Denial of Service attack [1] is the most common attack that occurs often, in both industry and also in domestic level. The attack that suspends the network to the device or system, the attack due to the network servers is called as Denial of Service attack. In simple words, DoS prevents the network servers to be available to the users. Most commonly these DoS attack occurs due to the flooding of network with a network. When the user types a particular website or URL into the browser, the device sends a request to the corresponding site server. The network server can acquire only few sets of requests, if the user overloads the server with too many requests, the server cant process the request, where the user cant access the corresponding site, such state of inaccessibility of users is called as DoS attack. In other words (DoS) attack is also called as Distributed Denial of Service (DDoS), in which the attacker uses the own computer to attack more than one targeted device. Due to the Distributed Denial of Service (DDoS) . Due to the attacking of the computer from the current computer, the user could take advantage of using the defected device. This attack is called as Distributed DoS, because the attacker is using multiple computers. The another form of implementing the DoS [1] is through Email messages, where the attacker can launch the similar form of attack through email account. These kinds of attacks, often occurs due to the free service of mails such as Yahoo or Hotmail. By sending bulk number of email messages to the single mail address, an attacker can get the provisions to use the corresponding mail account. Once the computer is attacked by the Denial of Service (DoS) attack, the web browser will show the message like HTTP error (Error Number), the service unavailable. How to Overcome DoS: To overcome this kind of attacks, the corresponding website should have the capacity to handle 10,000 users[1], only then the site can handle 1,00,000 users. Check the flow of the website periodically, to check whether the website is in the normal flow or in a slothful manner Periodically check the statistics of the web sites, if it is in a normal form then the site is not attacked by DoS, if the statistics has more flaw then the user can confirm that the site is attacked with DoS or DDoS. If the website is attacked with the DoS, the user can check the source of the attacker through the Unix command called netstat-an [2] , which will describes the Protocol, Local Address of the site, Foreign address (IP address of the attacker), and the State, where the state may be Listening, Established, or Time Wait. If the user is waiting for the response of the site then the state will be listening, the user is currently using the site then the state will be in Established, the user is closed the site then the state will be n Time-Wait site. Scenario Security of wireless network of small accounting firm: Wireless Network In our case we required to secure our wireless network. So this case we can do by using our NETGEAR MR814 router device security settings. Here given below are the steps to secure wireless network infrastructures: Before we get started there is a little bit of background info that you should be familiar with Wireless Name Your wireless network needs to have a name to uniquely identify it from other wireless networks. If you are not sure what this means we have a guide explaining what a wireless name is that you can read for more information. Wireless Password An important part of securing your wireless network is choosing a strong password. Wireless Channel Picking a WiFi channel is not always a simple task. Be sure to read about WiFi channels before making the choice. Encryption You should almost definitely pick WPA2 for your networks encryption. If you are unsure, be sure to read our WEP vs WPA guide first. Login to the Netgear MR814v2 To get started configuring the Netgear MR814v2 WiFi settings you need to login to your router. If you are already logged in you can skip this step. Find the WiFi Settings on the Netgear MR814v2 If we login to our router device then we should see this screen. For the Netgear MR814v2 you begin on the Router Status page. Click the Wireless Settings option in the left sidebar under the Setup heading. Change the WiFi Settings on the Netgear MR814v2 On this new page we are able to configure the Wireless options to our liking. There are four settings that really need to be changed for the best and most secure wireless experience. The first is titled Name (SSID). This is our local network's ID. Be creative but avoid personal data. The second setting is titled Channel. For the least interference our channel should not partially overlap our neighbor's channel. Completely sharing a channel is okay though. If everyone used channels 1, 6, or 11 there would be a lot less interference. Make sure our wireless network is using channel 1, 6, or 11. Read our WiFi Channels Guide for more information. Now we need to change the Wireless Encryption. This router allows for WEP security. This is a very weak form of encryption and can be cracked quickly. Do not use WEP. Use WPA2-PSK security option for more private secure network. Now we had WPA2-PSK then you would need to enter a Passphrase PASSWORD. Create a strong and memorable password to login to our internet. That's it, just don't forget to click the Apply button before you leave this page. The password we have created to log in, by only this password one can access to our internet. So we have 20 Pcs and 2 printers and 1 iPad by applying the log in password to all this devices, this devices are now accessible to use internet. Also this device create a network infrastructure to share file and folders between all this devices. Network/System Security Recommendations Generally, there are two forms of Denial of Service (DoS) attack, which are as follows, Flooding Services attack Crashing Services attack Flooding Services Attack: Flood attacks occurs when the website or the system receives too much of service requests, which causes the system to be shut down or stops the overall process, Some of the Flooding service attacks are ICMP flood SYN Flood Buffer Overflow attack (BOA) In the BOA the attacker sends bulk amount of service requests to the websites, which will be beyond the number of requests that can be handled by the site, these kind of buffer overflow attack is specific only to some of the applications such as Web applications, Internal memory of the device. The two main types of BOA are, Heap Based Overflow Stack Based Overflow Some of the common ways to handle BOA are, Use canaries or default values in the website, when the default value changes the user will get the notification that the attacker has entered ie., DoS has occurred Protections can be made to the internal memory through shell code Use of address layout randomization to prevent the attackers in the specified location. ICMP Flood: ICMP is abbreviated as Internet Control Message Protocol, ICMP [4] attackers not only attacks the single system also attacks the devices which are connected to the targeted device. This attack is also called as Smurf attack or Ping of death. The ICMP error messages are up to 1280 bytes. The IPv4 [5] protocol possess ICMP messages and IPv6 protocol possess ICMPv6 messages. Some of the ICMP messages with type numbers [5] are, Unassigned [1] Source quench [4] Echo [8] Router advertisement [9] Timestamp Reply [14] Timestamp Request [15] Echo Reply [0] Redirect [5] Timestamp [13] Destination unreachable [3] SYN Flood Attack: In the SYN flood attack [4], the attacker pools the targeted system by sending n number of SYN requests, where the targeted system fails to send the acknowledgement message or the targeted system becomes unresponsive. SYN flood attack is also called as half open attack. Crashing Services Attack (CSA): In the CSA, the attacker aims to crash the targeted device. In the crashing service attack the targeted system is attacked from the multiple attackers which makes the targeted system to shut down or affects the processes in it [4]. The another method to detect DoS is IP reputation, some Internet Protocol addresses aims to produce malevolent traffic than the other attacks. Internet Protocol reputation is referred as a system of scoring that goes through at a sites penchant to get the targeted system which is as like as DDoS attack, vulnerability scanning and web application attacks. This attack can also be used to alert filter the site traffic automatically. Internet Protocol reputation can easily be overcome by cloud security. Scenario 2 - Expanding Network by Using Network Switch: Let say accounting firm has a network which is shown as below. The router bought only got 4 Ethernet LAN ports. All 4 ports are connected to PC. Still there are 20 Pcs in office. So how to connect remaining PC to our network. You can use a network switch to solve your problem. This is a device that joins multiple computers in your network, and so those connected computers can communicate with each other. The switch is commonly used to expand wired network and the good thing is it's not expensive. There are 4-port, 8-port, 16-port, 32-ports also 50-ports switch available in the market. The Ethernet that can be supported by the switch are 10Mbps, 100Mbps or 1000Mbps. usually 100Mbps switch would be sufficient to support your network unless you run Gigabit network (1000Mbps). This is what we need to do: Buying a switch and connect Ethernet LAN port from router to one of the normal ports on network switch by using crossover cable. If there is uplink port on the switch, you can connect it to routers Ethernet LAN port using straight cable, but usually this is not available for those entry level switches. After that, you can connect computer and notebook to the switchs normal port by using straight Ethernet cable, finally they are all connected to network and able to access Internet. The LED on the switch will show you which ports are connected. This is 50-port Switch to use in network sharing system. III. Application/End-User Security Recommendations The risks that are occurs due to denial of Service(DoS) attack is affects the network bandwidth, decreases the server memory, Application exceptions, CPU usage, minimizes the hard disk space, database space, database connection pool. Attack Mitigation Systems (AMS) [3] is the most known application and recently used technique to overcome DoS attack. The attacks that are overcome through AMS are web destruction, pilfering of information, exploitation of application vulnerability. In order to prevent the attacks in network flow the Attack Mitigation System (AMS) is also called as Attack Mitigation Network (AMN) [3], AMN combines the distributed detection elements and mitigation elements to synchronize the traffic baselines and to prevent the information from the attackers. AMN increases the frequency, difficulty and brutality of information, security solutions. The another way to avoid DoS in web server is controlling the performance of the server, which adjusts the server response with respect to the server requests, Low Rate DoS (LRDoS) is the attacking of cyber physical systems in order to reduce the performance of the feedback based applications. XSD (XML Schema Definition) is the current technique which is used to avoid the DoS, which is most popularly recommended by World Wide Web Consortium (W3C), where the prevention of the user through XSD is done through XML (Extensible Markup Language) document. XSD provides the C++/Tree mapping to customize the attackers of the particular user. Step by step procedure for XSD is, Analyze the state for each user login Create a separate service request and acknowledgement for each user Analyze the number of service requests and acknowledgements provided Validate the acknowledgements The another method to detect DoS is Clogging Participation Rate(CPR), in the CPR method the user can filter and detect LDDoS attacks, also to analyze the intention to attack the site. In the CPR method the user can detect the attacker with the help of the statistics report, which peculiarly shows the attacked part. The CPR approach is more quick and better than the previous method Discrete Fourier Transform (DFT). But in CPR the user can analyze only the websites or web servers based on the Transaction Control Protocol (TCP), because only in TCP protocol the network congestion and loss of packets will not occur. The CPR analysis is based on sending of packets and receiving the acknowledgement for the same. Scenario Use of firewall in context of network system of small accounting firm Firewall A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. In our scenario we have used NETGEAR MR814 router device and it is connected to a Motorola SB3100 cable modem. So our NETGEAR MR814 router device itself acts as a hardware firewall. So we dont need to use any software firewall. If in our system, any individual or particular programs we need to stop allowing internet access to that only program or application then we can use software firewall system. Microsoft Firewall system gives this type of facilities. But in our case we did not required to do this. Bibliography Mindi McDowell , Security Tip (ST04-015) Understanding Denial-of-Service Attacks, US-CERT. Available: https://www.us-cert.gov/ncas/tips/ST04-015. [Accessed: 06- Feb- 2016]. Greg Thatcher, How to Detect a Denial of Service (DoS) attack, Thatcher Development Software, 2013. [Online]. Available: https://www.gregthatcher.com/Azure/Ch2_ Detecting Denial OfService.aspx. [Accessed: 07- Feb- 2016]. Palo Alto Networks, Denial of Service Attack - Prevent DoS Attacks with Palo Alto Networks - Overview of DoS attacks. [Online]. Available: https://www.paloaltonetworks. com/resources/learning-center/what-is-a-denial-of-service-attack-dos.html. [Accessed: 07- Feb- 2016] Gorry Fairhurst, Internet control Message Protocol [Online]. Available: https://www.erg.abdn.ac.uk/users/gorry/eg3567/inet-pages/icmp.html. [Accessed: 08-Feb- 2016] Gorry Fairhurst, ICMP Type Numbers, [Online]. Available:https://www.erg.abdn.ac.uk/users/gorry/eg3567/inet-pages/icmp-code.html.[Accessed: 08-Feb- 2016] Peter Crowcombe, Network Vulnerabilities, Infosecurity. [Online]. Available: https://www.scmagazine.com/network-vulnerabilities/article/30530/. Accessed: 08- Feb- 2016] Derek Manky, "Top 10 vulnerabilities inside the network", Network World, 2016. [Online]. Available: https://www.networkworld.com/article/2193965/tech-primers/top-10-vulnerabilities-inside-the-network.html. [Accessed: 09- Feb- 2016]. Calyptix, Top 7 Network Attack Types in 2015 so far, [Online]. Available : https://www.calyptix.com/top-threats/top-7-network-attack-types-in-2015-so-far/. [Accessed: 08-Feb- 2016]