Thursday, February 20, 2020

Individualsm and collectivism Assignment Example | Topics and Well Written Essays - 500 words

Individualsm and collectivism - Assignment Example Collectivism advocates for the importance of social groups always having cohesion. Therefore collectivists will focus mainly on the society or the nation or even the community and not on individuals (Donohue, 1995, p.7). In the United States, individualism and collectivism can be seen in many ways. Individualism can be dated back to the 17th and 18th century in United States. A perfect event of individualism in American history was the frontier. A person was believed to fail or to succeed based on their own individual effort. Many people actually died during this period trying to prove to them that they can be individualists in the frontier farms and the forests. Certain people like Franklin and Washington succeeded based on their own intelligence and ambition and they are perfect examples of individualism (Kim, 1994, p.23). Collectivism is something that was mainly practiced in United States after the world war. Events like United States gaining its independence from Europe in 1776 also shows that individualism worked really well for America. Today, United States wants to be a bigger part of something by practicing collectivism. An event of collectivism in United States was the political system whi ch happened to be representative democracy. In such an event when a president is elected by the majority the people are all expected to embrace their new leader. An ideal case in point would be the choice of Barack Obama as the president in 2012. The totality of the votes casted in the college showed the collectivism of the people in the election of the president (Kitayama, & Cohen, 2007, p.259). In the real world experience some people believe that individual work is what will make them successful while others believe working collectively in a society is what will bring about success. These two aspects help one understand the cultural differences of people. In individualist culture they put the

Tuesday, February 4, 2020

Network Security Planning Assignment Example | Topics and Well Written Essays - 750 words

Network Security Planning - Assignment Example White (2001) defines Cisco SAFE as architecture in security that offers guidelines for modular networks design approach (Cisco, 2010). This approach makes its ease for network designers to understand relationships thus proceed to execute security based on one module after the other unlike the traditional approach of implementing one broad approach for the entire enterprise. Despite its advantage of maximizing control and visibility, Cisco SAFE has limitations and this paper explores these limitations in detail and their impacts on network security. With Cisco SAFE, denial of service attacks is a widespread threat especially for organizations that do not implement protocol analysis in network security design. With poor protocol analysis, the network lacks significant pattern matching with IDS guaranteeing that the rules of each protocol are followed and this results to sending of both protocol related and unrelated data streams. Consequently, traffic is not valid and is an attack that bypasses security systems or an attack crashing the system due to invalid data presence in the intended system. DoS is overcome by ensuring that IDS in Cisco SAFE has the right knowledge of ordinary system protocols like UDP, TCP, FTP, and HTTP. A second limitation is distributed denial-of-service (DDoS). Without proper configuration of Cisco’s firewall Intrusion Detection System (IDS), organizational networks are subject to DDoS attacks preventing networks from bandwidth access (World, 2002). DDoS attacks consume entire business network bandwidth by attackers while Cisco IDS offers distinctive protection against DDoS by detecting attacks proactively and mitigate them. However, Cisco IDS requires configuration after router configuration to enable it to identify and block attacks prior to the occurrence of intrusion or unauthorized transactions and this calls for effective configuration of Cisco IDS. For any