Saturday, August 31, 2019

Saint Columba Altarpiece

The painting depicts the prediction of the birth of Jesus and how it came to pass. This happened after the visitation of angel Gabriel to Mary, who was a simple and humble Jewish woman. The angel broke the news to Mary that she had found favor with God, and she will conceive and give birth to a son, Jesus. He further elaborated that Jesus would be the son of God, the most high. At this point, Mary was totally confused and worried about the abrupt news but she later consoled herself and said since she was God's servant, she will do as he says. Moreover, Mary was betrothed to a man called Joseph, who lived in Nazareth. During this time, a Roman emperor, Caesar Augustus had ordered a census and both Mary and Joseph had to travel to the town of Bethlehem. The journey took them several days and by the time they arrived, the inn was already full and they were compelled to spend their night near the livestock's shed. Coincidentally, Mary gave birth to Jesus and laid him in a manger. In the same night, there were shepherds in the field near Bethlehem and were watching over their flocks. Suddenly, the angel appeared to them and broke the good news to them that savior, the Messiah had been born and is lying in a manger. (Freed, Edwin D 2004). They immediately hurried to the place and found Jesus as they were directed. They later went to spread the news. Later, wise men saw a star in the sky that signified the birth of a new king. They followed it to the place where Jesus was and knelt down to worship him. They brought him gifts of gold, myrrh, and frankincense. According to Mosaic laws, Jesus was taken to the temple where he was named, circumcised and purified. This was conducted by Simeon. During the visitation of Jesus by wise men, the gifts were used as a symbol of honor to the born king. Joseph was a simple village man who lived in Nazareth. He was chosen by God to be the earthly father of Jesus. He was a carpenter and had gathered exceptional skills in craft work. He feared God and he would obey him in face of severe humiliation. He came from a humble background and this subjected him to engage in carpentry. Also, Joseph was a man of strong conviction and lived his beliefs in his actions. He is celebrated for his obedience and patience even after Mary, his fiancà © gave birth to Jesus although she was a virgin. Jesus was regarded as an artist because he used to give verbal, visual and dramatic forms to the complicated situations. He taught the word of God by giving analogies, parables, and creative expressions. According to the gospels, his birth took place on November of 5 B.C at Bethlehem. After he completed his work on earth, he died on A.D 33 at a place called Golgotha. He was known for using parables in his teachings. (John P. Meler 1992). The original location of his artwork was first meant to be viewed in synagogues, where he presented various sermons. Moreover, this artwork was religious and was meant to make his followers think critically so as to understand the word of God fully. Also, they were used as a means of illustrating profound and divine truths. He claimed that such stories were easily remembered and indicated symbolism that was rich in meaning. He further told his disciples that the essence of using parables is because the knowledge of the secrets of the kingdom of heaven has been given to them. According to Michael Grant, the entire artwork can be traced back to Gospel period where absolute chronology of Jesus is explained into details. Further, this historical period is recorded in a number of historical and non-Christian documents like Jewish and Greco-Roman sources. Further information indicated that the baptism and crucifixion of Jesus marked prominent historical events. This period simply means the genesis of the good news and it cut across various groups of people. During this period, Jesus started his ministry, which was later considered as fulfillment of New Testament prophecies. He walked down all cities along with his disciples preaching the gospel and urging the people to repent so as to see the kingdom of God. This took him the whole of his lifetime on earth. During this period, he faced mockery and humiliation from some groups although he had a good number of followers. According to Ben Witherington III, the artwork was made to make the Christians understand that those who humble themselves, God uplifts them. This is portrayed when Virgin Mary, a simple village woman was visited by an angel and informed her of good news. Later, the birth of Jesus in the manger indicated the humble beginning of his life. It also expressed that Jesus was the king since he was visited by various people who came to worship him. Also, Christians should understand the need of recognizing the church as the temple of God. Even the parent of Jesus observed mosaic laws and took him to the temple for various rituals. Therefore, Christians should follow the footsteps of Jesus by obeying the word of God.Works CitedBen Witherington III. (1998). â€Å"Primary Sources†. Christian History, 17(3), 12-20.Freed, Edwin D (2004). â€Å"Stories of Jesus' Birth†. Continuum International: 119. John P. Meler (1992).Bordering Jew on Reconsidering the Historical Jesus. â€Å"A Chronology of Jesus Life,† pp. 375-433. Anchor Bible Reference Library. Michael Grant. (1977). Jesus. An Historian's Review of the Gospels, p.71 Scribner's

Friday, August 30, 2019

CIPD †5DPP Essay

Introduction Within the confines of this report we will investigate the 6 keys headline statements in delivering the finding. These are the project plan, risk assessment, creative thinking, and team working and conflict, political behaviour, ending with formal recommendations. The principal argument will look at the functionality of project management and the delicate balancing act of the different element that would bring a successful outcome or possibly result in failure. 1. Project Planning Definition: What is a project? A project is a programme of activities that have a beginning and end. Projects are generally used to instigate change, improvements or developments. This statement is underpinned by PMI ‘a project is a temporary endeavour undertaken to produces a product, service or result. (Project Management Institute 2008). What is Project Management? Project management is defined by, ‘initiating processes – clarifying the business need; planning processes – detailing the project scope; executing processes – establishing and managing the project team; monitoring and controlling processes – tracking performance and taking actions; closing processes – ending all project activity’ (Portny 2012) What is a project Managers? ‘The project manager’s job is challenging – her success requires a keen ability to identify and resolve sensitive organisational and interpersonal issues.’ (Portny 2012: 21). As one of the principle stakeholders in the project their responsibility is reliant on developing good team dynamics and delegate correctly through a well organised project plan. The project Plan endorses these statements and clarifies the unique role of the manager, understanding of the project and the application of the management process and is cited in appendix 1. 2. Risk Assessment When dealing with human being it is inevitable that risk factors will arise due to different values, perceptions and behaviours leading to an adverse impact on the success of the project. ‘All projects can be affected by outside or inside risk. Planning what possible risks might affect a project and the likelihood of those risk occurring is vital to the success of the project’. (Horn 2012:414) With project control and clear project planning, many identifiable risks during the project can be minimised or averted. In order to identify these risks a Risk Breakdown Structure can use used (RiBS), to ensure that risk is managed appropriate and effectively. Derived from the Work Breakdown Structure (WBS), this chart calculates the impact and probability of various risks associated with the project and then provides methods of contingency to reduce or eliminate the risk. ‘Impact is used in the calculation of the risk factor and is the effect on the project if the risk occurs. Probability is used in the calculation of the risk factor and is the likelihood of the risk occurring’. (Horn 2012:414) Two key areas of risk highlighted in the project are; Scope Creep – where the predetermined scope of the project escalates and the project evolves in size or cost due to a range of changing variables, such as stakeholder and client changes and unforeseen circumstances due to environment, finance or politics. It is in this area that risk levels can be high. ‘Scope creep is a major cause of project failure’ (Horn 2012:405) Scope creep is most likely to happen in the area of team recruitment and development, the most costly part of the project, where any changes in specification may require more staff or specialist staff. Any expansion in the project of this type would be costly for the project. This is confirmed by Horn (2012:406) that ‘when you consider that only about a quarter of projects complete on time and budget’. Early contingencies planning for the effects of scope creep should be interlaid within the RiBS to manage any financial allowance for such eventuality and to communicate the changes across the project and organisation. Roles and responsibilities – It is possible that during the project  development some staff may have difficulty in defining their roles within the team or were not part of the role development process that takes place during the forming stage of Tuckman’s team development model. It is also likely within the project team to have duplication of roles/function, even though Belbin’s Team roles model may have been used. However it is not a pre-requisite that all team must have the nine roles specific by Belbin. ‘Team members can take on more than one role and some roles are not necessary in certain teams’. (Horn 2009:13) Through team meetings and project control, risk associated with roles and responsibilities could be quickly identified. One through work duplication if one or more staff are performing the same task and two through inaccurate, incomplete or delayed work. Left unmanaged they may lead to long term delay and added cost as well as team dysfunction as political behaviours evolved. To resolve these risks, clarity of roles may need to be re-established and a more robust command and control; day to day supervision of roles and task be implemented. Re-evaluation of Tuckman’s forming stages may identify the need for further direct involvement of the project manger, to remind the team of the non-negotiable behaviours expected. ‘Insufficient day-to-day supervision of work is still the largest single reason for lost productivity.’ (Mullins 2005:833) 3. Creative Thinking The aspect of the project that best fits a creative approach is how the project recruits applicants into the organisation. This fits the requirements made by the CEO that they’re looking for a higher calibre of employees that are able to engage with the workforce. This will require a different approach and a move away from traditional routes. ‘Everyone can be a creative thinker; it is a state of mind and a set of skills’. (Horn 2012: 159). To encourage a more creative approach in the team, models such as Mind Mapping, blind, negative and positive brainstorming (Horn 2012:156) would be use in the team on a regular basis. This would work towards promoting open discussion, through using tool that draw on right side brain activity that stimulate creativity and to develop  an environment where people feel comfortable to contribute ideas and solutions to problems. ‘So using the right side of the brain we tend to draw things as they are rather than as we know them to be. It represents innocence which plays a role in creativity, particularly artistic expression’. (De Bono 1985) Paramount to this approach working is a project team of engaged staff that have aligned values to the organisations, where there are shared interests, common causes and an environment built on trust and integrity. ‘The approach is also about celebrating diversity, placing compassion and flexibility at the heart of everything the council does, accepting risk and listening and trusting people to try new and innovative ways of working.’ (David Macleod 2000:56) Alongside these creative mechanisms to support a creative space (De Bono’s 1985) established Six Thinking Hats Model. This method allows everyone to contribute, explore ideas, solve problems and generate creativity without denting egos. This create a non-judgemental environment as a particularly type of thinking is applied to a subject, rather than a personal opinion, allowing free speech and opportunity to explore without feeling defensive. This additional model would be implemented throughout the whole process of the project; for 1-1, team meeting, casual meeting and encouraged in general conversations where it would help resolve problems quickly by removing and instil creativity. In De Bono’s words, ‘the six hats system encourages performance rather than ego defense. People can contribute under any hat even though they initially support the opposite view’. (Burns 2011:17) The key point is that a hat is a direction to think rather than a label for thinkin g. The six hats describe six separate thinking functions as follows; White Hat thinking This covers facts, figures, information needs and gaps. Red Hat thinking This covers intuition, feelings and emotions. Black Hat thinking This is the hat of judgment and caution Yellow Hat thinking This is the logical positive. Green Hat thinking This is the hat of creativity, alternatives and proposals. Blue Hat thinking This is the overview or process control hat. 4. Team Work / Conflict The fundamental ingredient of a team is full and willing participation by each member of the team in whatever task the group faces. The level of participation is perhaps the single most important factor affecting the team’s output. It is only when a group is fully functioning and performing at the optimum level that it can call itself a team. ‘Building successful teams also requires effective leadership with an emphasis on trust, clear communications, full participation and self-management.’ (Mullins 2005:568) The first approach in developing good team work is to establish the different roles individual align themselves to in a team. Understanding and valuing the diversity of skills in a team is essential for good team working and secures the accurate delegation of work. Staff are more likely to be productive when task assignment to them marry up with their skill set and interest. Belbin Team Roles support this explanation in its bid to help team members become aware of their strengths and weakness within a team environment, by completing a personal assessment to highlight people’s behaviour, characteristics and attitudes. These are the aligned to 9 key roles. (Huczynski & Buchanan: 330) The nine roles of Belbin are listed as follows; Plant – creative, imaginative Resources investigator – Extrovert, communicative Co-ordinator – mature, delegates well Shaper – challenging, thrives on pressures Monitor-evaluator – Sees all options, strategic Teamworker – co-operative, mild Implementer – disciplined, reliable Completer – conscientious, delivers on time Specialist – Single-minded, provides knowledge Another method of developing team working and self-awareness is the Betari Box model. It ‘provides a vehicle for discussing the way in which people can get locked into a cycle of attitude breeding behaviour’ (Clements & Jones 2008:217). Implemented within the communication process, in the early stages of the team formation it lends itself to supporting diversity in the workforce. The Betari Box illustrates how our own attitudes and behaviours directly affect the attitudes and behaviours of people around us. When we’re stuck in a negative cycle, then it’s up to us to stop that cycle by changing our attitude. This will positively impact those around us – and therefore break the cycle. My Attitude -> Affects -> My Behaviour -> Affects -> Your Attitude -> Affects -> Your Behaviour -> Affects -> My Attitude and so on. These models are all under pinned by McLeod (2009:9) which states that ‘attitude, behaviour and outcomes – are part of the engagement story’. An engaged workforce are at less risk of conflict and disagreement. As the project manager of a team, understanding changing dynamics and development is essential to grow and functionality. Using (Tuckman’s 1965) team development stages the manager will be better equipped to interpret the team stages of growth. According to Tuckman, in the initial stages of team evolution communication is essential, with the leading voice of the manager guiding an initially dependant team. ‘Members are dependent on some leaders to provide them with structure in the form of ground rules and agenda for action’. (Huczynski & Buchanan: 297) Implementing 1-1s, supervision, regular team meetings, and personal development programme will help to deliver clear modes of operation and behaviourial expectations. Conflict Team conflict can stem from a variety of sources; difference in perception,  departmentalisation, specialisation and role conflict. Mullins (2010) state ‘that there are different perspectives on conflict in the workplace, and in some cases conflict is a driver for creativity, energy and limiting apathy.’ Solving differences in perception is a challenging. The stringent use of management policies and procedures to enforce professional adult behaviour will help deter interpersonal differences of opinion. The reason behind this is ‘conflict is a behaviour that intends to obstruct a person from achieving some of their goal’ Mullin (2010). Informing employees on what behaviours are expect may help eliminate such conflict. Conflict in perception is likelier to arise when there are limited or unclear objectives, expectations and leadership from senior management. ‘Leadership is about creating a vision and direction for people, (Horn 2012:456). Proactive leadership is essential in encouraging conflict resolution. Where possible, promoting a culture of respect and consideration for others needs and opinions, and encourage staff to find mutually acceptable solutions to minimise or avoid conflict situations. ‘People say what they think and trust that the other person will hear the criticism in the spirit of help in which they were intended. They give each other essential feedback that will help to improve individual and collective feedback’. (Ryan & Oestreich 1998:39). One way of managing conflict is the use and awareness of transactional analysis. Encouraging team members to always have adult to adult conversations and to be aware of the possible risk of conflicts when roles change, is critical to conflict resolution. ‘So-called mature people are people who are able to keep the Adult in control most of the time but their child will take over on occasion like anyone else’s, often with disconcerting results’ (Berne 2011:27) 5. Political Behaviour Political behaviour can be linked to the power the individual or team have. The level of power or status will determine how the team or individual will play out their behaviour; possibly removing themselves from involvement with the team if they feel they have limited power or status or firming up power by pushing their view toward a self-interest goal. ‘Involves individual engaging in activities to acquire, develop, retain and use power in order to obtain their preferred outcome. (Huczynski & Buchanan 2001:823) Resistance to the changes recommend by the CEO could initiate many of those political behaviours in order to keep the status quo or to try and sabotage the efficiency drive of the recruitment and selection process. Having an open and clear mechanism for staff opinions and views through, surveys, focus groups, and other staff feedback forums, where staff can contribute constructively, will bring benefit to the organisation and not hinder the progress of the project. Reluctance to take part in team activity or limit information to the team, to negotiate higher status or responsibility because of the knowledge or skill that person has could be a display of political behaviour. This type of behaviour could cause the project to stagnate and caused deeper politicking as other individuals may retaliate in the same or worse manager, causing dysfunctional team dynamics and reduced work productivity as morale plummets. It’s important to note that politics will always be part of a team but it’s not always accepted as adverse to the team or organisation. ‘In every team there are political agendas, so it is as well to be aware of them but try to avoid them’. (Horn 2012:119). ‘Thus organisational recruitment, appraisal and training and promotion policies directly encourages political behaviour’. (Huczynski & Buchanan 2001:824) Influencing In order to bring about change, solve problems or develop ideas that grow and evolve businesses, influencing is critical. Built on Maslow hierarchy of need (Huczynski & Buchanan 2001:242), ‘Cohen & Bradford identified a range of positive sanctions and rewards which they termed organisational currencies. They showed how these could be used to influence others to comply with your request.’ (Huczynski & Buchanan 2001:819): currencies such as resources, information, network/contacts and recognition. Using reward and recognition polices within the organisation to influences positive behaviours and adopt organisational values, would help to shape an open and engaged workforce and decrease the need for political and power play. Persuasion Exploring new ideas, view and thinking is necessary in an organisation to motivate, create innovation, enable development and support change, this require persuasive action. ‘Whatever control is achieved over work behaviour is brought about as much through the processes of negotiation, persuasion’ (Mullins 2005:844). With the De Bono Six hat, the team can be persuaded to see the benefits of the change in recruitment and selection. Using a clinical approach to discussions that remove the ego state associated with political behaviour, individuals will come to understand the importance of a fair political landscape that represents the organisation not a single individual. Negotiation Negotiation involves two parties coming together to confer with a view to concluding a jointly acceptable agreement’. (Gennard & Judge 2005:238) Through the earlier stage of team formation in the project process, issues of political behaviour can be negotiated through clear role selection of Belbin, behavioural expectation and awareness using Betari Box, and transactional analysis. Applied through the traditional route of 1-1s, supervision, team meeting and other informal interaction, leading to a lessening of these behaviours; as a result it can support staff smoothly through the change curve cycle. 6. Recommendations I have used the Cause and Effect Diagram and the Pareto Diagram to argue a preferred decision on which part of the project I should delivery to the CEO. The cause and effect diagram addresses the main problems by identifying what  the causes are associated with that effect; in this case an inefficient, poor quality and disengaged recruitment and selection process. By asking a series of questions to key headings associated with the effect we can reach a range of decisions on what part of the causes are the major or minor reasons for the ‘effect’. ‘Cause-effect’ diagrams are particularly effective of helping to search for the root causes of problems’ (Slack 1998:703). Linked to the Pareto Analysis Model we can analysis which area of the ‘causes’ has the greater impact on the project. (Slack 1998) states that Pareto analysis ‘distinguishes between the vital few and the trivial many’. I have used the cause effect model to help identify where the ‘root causes of problems’ (Slack 1998:704) lie in the project. The Pareto analysis model is then used to identify a specific cause or group of causes, which will solve a greater number of the effects or problems. In this project’s recommendations I have made a few assumptions to pinpoint that, the human resource (people) ‘causes’, would yield the greatest outcomes and it would be in this area that I would apply the ideas for improvement and recommend to the CEO. In appendix 2 have illustrated this explanation. Conclusion With a robust project plan and reliable control measures, issues such as risk and will be identified early on in the project process, ideally during the initial planning stages, with contingencies set in place for those eventualities. With new ways of working applied to not only the process but people through De-Bono Six Hats and adult lead behaviourial awareness of Betari Box and transactional analysis; creativity and innovation should flourish in what should now be a trusting and transparent working environment. Signs of self-interest or personal political behaviours will be limited, though an open dialogue of communication across the team supported by strong influencing, negotiation and persuasion tools by the leadership. Using any project plan methodology or project software to underpin the suggested ideas, the project plans should be able to fulfil it obligations  and delivery the desired outcome for the CEO. References Berne, E. (2011) Games People Play. London:Penguin Books Limited Burns, A. (2011) Engaging with Teams. Unpublished. Birmingham: Birmingham City Council De Bono, E. (1995) Serious Creativity [online] available from http://teaching.ust.hk/~mark329/Papers/serious%20creativity.pdf [29/10/13] Gennard, J. & Judge, G. (2005) Employee Relations. Trowbridge: CIPD Horn, R. (2009) The Business Skills Handbook. London: CIPD Huczynski, A. & Buchanan, D. (2001) Organisational Behaviour. Essex: Pearson education limited Jones, J. & Clements, P. (2008) The Diversity Training Handbook London: Kogan Page Limited Macleod, D. (2008) Engaging for Success Surrey: office of Public Sector Information Mullins, L. (2005) Management & Organisational Behaviour. Essex: Pearson education Limited Portny, S. (2010) Project Management for Dummies. Indianapolis: Wiley Publishing Project Management Institute, (2008) The Project Management Body of Knowledge. Pennsylvania: Project Management Institute Ryan, K. & Oestreich, D. (1998) Driving Fear out of the Workplace. San Fancisco: Jossey-Bass Inc Slack, N. (1998) Operations Management. Kent: Pitman Publishing Bibliography Marchington, M & Wilkinson, A (2008) Human Resource Management At Work. London: CIPD Taylor, S (2008) People Resourcing. London: CIPD Appendix 1 Project Plan Appendix 2 Cause and Effect of Project Management Process

The Start of the Contamination in Man’s Environment

In the late 1960s to 1970s, Americans realized that industry was doing serious damage to air, water, and the earth itself, the most essential natural resources. The whole awareness of the damage being done to the environment stemmed out from the energy crisis of the 1970s. The energy crisis was a ‘slap-in-the-face' for America. They needed to realize the harm that was being done to the natural resources and their decreasing availability as a result. With the decreasing availability and increasing prices of oil, new energy sources had to be discovered. Although scientists found nuclear power to be a clean, cheap, and unlimited source of power at first, the environmentalists fought to minimize its usage for fear of nuclear meltdowns, which could spread nuclear waste. Alternative energy sources were possible, and what appeared to be the most effective were tidal energy and solar energy. These environmentally safe methods of harnessing energy were just what the environmentalists had aimed for, and a new movement had been started – environmentalism. If you read this circle it. The environmentalists also tried to advocate the conservation of energy, so that the cleaner but less effective ways could be manipulated to produce more energy. Despite many efforts to keep the environment clean, some 200 million tons of pollutants were filling the air each year, and clean air in many cities had been replaced by smog. The earth, air, and water were deteriorating as construction of highways, malls, and housing developments caused the destruction of fertile, irreplaceable farmland. Disposal of wastes was another dilemma to be dealt with. Burning could release poisonous gases into the air, and burial could cause harmful decay. By the mid-1960s, people began to really realize the need to conserve the nation's resources. Much credit for arousing public concern belonged to Rachel Carson for her book Silent Spring. This book warned of the central problem of our age being the contamination of man's environment. During the next few years, growing numbers of ecologists, biologists, and other scientists showed their concern about the reckless abuse of the environment. In 1970, Congress created the Environmental Protection Agency (EPA), which helped set laws regulating use of pesticides, insecticides, and other potentially dangerous sprays. They protected endangered wildlife, and ordered that car manufacturers had to provide pollution control devices on exhausts of their vehicles. New waste disposal and sewage treatment plants were being built to prevent further pollution of the land and water and to clean up the rivers and lakes. Government also regulated unsightly junkyards and dumps to restore the natural beauty of the countryside. Federal government set aside more areas as national parks, not to be tampered with, and considerable progress had been made in the management and conservation of America's forests, soil, and water. However, many people felt that it was not necessary for the government to take all this action. President Reagan gave in and allowed the search for minerals on federal lands and oil exploration off the coast of California, which some felt was very risky, because of the chance of an oil spill, which would devastate all ocean life in the area. Environmental decisions were important in the sixties era, as many other nations followed them with concern. With the world's population increasing so rapidly, the earth's natural resources will be heavily taxed, and many people, the environmentalists, believed that resource conservation was extremely important in maintaining the living conditions of the world population.

Thursday, August 29, 2019

Research Agumentative Paper Example | Topics and Well Written Essays - 1750 words

Agumentative - Research Paper Example Although this may be the first major offensive made under the Obama administration, this is actually just the more recent attempt by US forces and its allies to destroy terrorist organizations in Central Asia and the adjacent Middle East, particularly in Iraq. However, the war on Al Qaeda and its local counterpart in Afghanistan, the Taliban, is already nearly a decade old but there are still no signs that it is going to end soon victoriously for the US and its allies. Ever since the Bush administration began waging the War on Terror, with 9/11 as the pretext, the only results achieved were deaths and destruction of civilian populations and structures. As a result, serious debates on the US policy of direct military intervention in countries such as Afghanistan and Iraq have occurred. In fact, this issue was highlighted in the presidential elections of 2008. While military solutions have yet to achieve positive results for the people of Central Asia, alternative and peaceful means of solving the problem in the region have been proven successful. Although these have not been provided enough attention from the international media, these constructive efforts have gained the trust and appreciation of the people northern Pakistan. An effective strategy of quelling the Taliban has been developed by an American civilian and his dedicated group of development workers. However, it is not their abhorrence of terrorism or of the violent tendencies of Islamic fundamentalism that prompted them to intentionally deprive Taliban of a more fertile seedbed. David Mortenson and his organization, Central Asia Institute, has been building schools and transforming the lives of the Balti people in Pakistan’s Karakoram region through education and development projects merely out of human compassion. (Mortenson 24) Their effort is not just a minor aspect in a larger US design of crushing terrorism in Central

Wednesday, August 28, 2019

Renaissance Art and Music Essay Example | Topics and Well Written Essays - 2500 words

Renaissance Art and Music - Essay Example Northern painters, especially those from Flanders and the Netherlands, were as advanced as Italian artists in landscape painting and contributed to the innovations of their southern contemporaries by introducing oil paint as a new medium. Although portraiture also developed as a specific genre in the mid-15th century, Renaissance painters achieved the greatest latitude with the history, or narrative, picture, in which figures located within a landscape or an architectural environment act out a specific story, taken either from Classical mythology or Judaeo-Christian tradition. Within such a context, the painter was able to show men, women, and children in a full range of postures and poses, as well as the subjects' diverse emotional reactions and states. The Renaissance was also a period of avid exploration; ships set sail in search of new routes to Asia, which resulted in the discovery and eventual colonization of North and South America. Painters, sculptors, and architects were dri ven by a similar sense of adventure and the desire for greater knowledge and new solutions; Leonardo da Vinci, like Christopher Columbus, discovered whole new worlds. This paper aims to define the characteristics of visual art and music during the renaissance through the use of examples, know a little about the artists of the artworks which were used as examples for this paper as well as to compare the works selected as examples in terms of the elements of art. In so doing, the paper will establish that renaissance art, however old and different the world it originated from is still continued to be regarded as timeless and valuable pieces in modern day art. Body Renaissance Art is any type of art produced... The two principal components of Renaissance style are the following: 1. a revival of the classical forms originally developed by the ancient Greeks and Romans, and 2. an intensified concern with secular life—interest in humanism and assertion of the importance of the individual. The Renaissance period in art history corresponds with the beginning of the great Western age of discovery and exploration, when a general desire developed to examine all aspects of nature and the world.During the Renaissance, artists were no longer regarded as mere artisans, as they had been in the medieval past. The renaissance has indeed been a period of rebirth because people at that time were given a â€Å"second chance† to live life again. Along with this chance is the realization of the importance of appreciating life and the environment. People were able to have an identity of their own as they were recognized according to what they do best, just like the painters and the musicians. Although, the period is a time of rebirth, still many of its influences, both in visual art and music, comes from religion. Until today, even how old the art pieces of renaissance artists both in visual art and music, their works are still highly regarded and served as guides and models of aspiring artists today. This is manifested in how these new artists study the life and works of renaissance artists and sometimes compare their works to what the young ones of today have created. Truly, renaissance pieces, in art visual art and music, are timeless for until now it has still been considered to be timeless and priceless works of art.

Tuesday, August 27, 2019

How Does Internet Work Research Paper Example | Topics and Well Written Essays - 750 words

How Does Internet Work - Research Paper Example There are several benefits of being internet savvy for both business as well as individuals. In modern times, internet has heavily assisted individuals in gain information and education. Due to the advent of the internet it has become possible for individuals to gain distance learning. This means that internet allows individuals to study and obtain knowledge from where ever they are at any point in time. One of the main features of internet is that it is available 24/7 and this has several benefits for both individuals as well as business (Taylor 200). From business point of view, remaining connected 24/7 means that business no longer need to follow a schedule of opening their organizations or outlets to serve their customers. Customers can be served at any point in time and this has helped businesses in gaining consumer confidence in their products and services. Similarly, individuals are even able to gain assistance from businesses regarding product issues and other problems at any point in time. On one end are the several benefits that are associated with internet and on the other end are the harmful and damaging results of being internet users. Internet users tend to share very important information that is personal in nature with various websites such as social networking websites. This information can come in handy for those who know how to use internet for their own benefit over the expanse of others. They use this information to break into bank accounts as well as mentally torture people in order to gain financial benefits. Another issue associated with sharing information over the internet is the issue of privacy (Deitel 65). Internet has even caused problems in individual’

Monday, August 26, 2019

Financial crime PowerPoint Presentation Example | Topics and Well Written Essays - 750 words

Financial crime - PowerPoint Presentation Example There were financial crimes involved in the issue, which included the addition of $500 million to the company’s loan loss reserve. The company was in fact, not as successful as it claimed to be and many of its executives were also suspected to have been involved in financial frauds. The primary reasons that contributed to the downfall of the company were the bets placed on credit default swaps, the unrealistic accounting strategies of the company and the underlying financial crimes that prevented investors from predicting the downfall of the company. Credit default swap is more like an insurance that would receive payments from the buyer makes payments and in the event of facing loss from debts or loans, the company would give a pay off. The company got itself into riskier financial products as it allowed collateralized assets groups and subprime mortgage pools to invest in credit default swaps, since it would not be possible to assess the real value of these groups. When there were sever losses in the housing market, most of the pools that the company had insured began to face losses. At the point where the company had to pay off almost all of its investors, the company was almost bankrupt. This also made evident that the company had shown its loss loan reserve values to be higher than it was. When the financial crisis faced by AIG was under scrutiny, it was brought to light that the company had been warned twice before of its improper records and books. The liabilities that the company was subject to as a result of the financial products were not accounted for as necessary. The company had been warned of its book records and the assets valuation was reported as lacking in accuracy, failing to provide a clear understanding of the impact of its products on AIG’s finances. The accounting strategy that contributed considerably to the company’s downfall was the â€Å"fair-value† accounting

Sunday, August 25, 2019

What is Technology Green Architecture and Green Electricity Essay

What is Technology Green Architecture and Green Electricity - Essay Example Wheel is considered to be the basis of technological advancement and is still considered to be one of the most influential technological development that mankind has seen. It was during 1760 to 1850 that there was a spurt of developments in technology (Ashton, 1969). This period is often referred to as industrial revolution (Ashton, 1969). Technology was introduced initially in the agriculture industry to facilitate food production. This intensified food production and food processing. However, these technological innovations brought forth massive changes in the life styles and life processes of people. The operational pattern of textile, metal, transportation and some of the other industries were the first ones to get influenced by technology(Ashton, 1969). Later technology was introduces in all spheres of life and was exported across nations. However, technological advancements also resulted in the inappropriate and over exploitation of resources. For example, technological advance ments in oil mining have resulted in overexploitation of fossil fuels. Technology in aviation and transportation in general has caused emissions causing detrimental effects in climate and environment.This indiscriminate advancement of technology has made the scientific fraternity think about technologies like Green Architecture and Green Electricity. Green Architecture Green Architecture refers to a school of thought in the field of architecture which involves minimal use of non-renewable resources and also results in minimal pollution of the environment Vohra S (2007). The facilities created by green architects will ensure optimal utilization of resources like energy, water etc. A sustainable approach is followed in the technologies employed in green architecture. It has been reported that the first green office was built in 1985 in the US (McDonough, 2006). Examples of technologies which go into a green building are water recycling units, traditional roof tops using indigenous mat erials ensuring absorption of heat, indoor greenery, natural light management using sunlight oriented construction, weather proof building skin, solar power, social spaces and waste management technologies(McDonough, 2006). Corporate companies are ensuring that their offices are constructed using green technologies. Green Electricity Green electricity is another technology developed by the industry which is oriented on a sustainability approach. This includes processes to harness energy with least environmental pollution. Some examples of green electricity are wind power, solar energy, geothermal power, anaerobic digestion, biomass power, tidal power and some forms of nuclear power (McDonough, 2006). As many of the technologies which produce green electricity depend on decomposition of waste, this has a mutually beneficial effect. The Benefits The primary benefit of green architecture is that it provides low cost housing. The various green technologies incorporated in a green buildi ng will ensure considerable reduction in green gas emissions (Sunday, O, Suneetha S & , Ademola B K ,2010). It must be noted here that buildings, especially urban architecture is a major contributor to green gas emissions (Sunday, O, Suneetha S & , Ademola B K ,2010). An example to this is the air conditioners, which produces a large quantum of carbon emissions. Green building technologies incorporates changes in roofing which absorbs heat. Moreover Green Technology has come up with evaporative cooling systems which reduce emission (Vohra ,2007). Along with it, it has been reported that a large quantum of energy consumption is caused by buildings. Thus Green Architecture will help in the reduction of global energy consumption. The case of

Saturday, August 24, 2019

Moral Principle Essay Example | Topics and Well Written Essays - 1500 words

Moral Principle - Essay Example Morality of actions define whether an action is considered as morally correct or not therefore it is important that some practical examples of actions which can be considered as good or not are presented. In this section, I will enumerate three examples each of actions which can be considered as morally right or wrong. Above examples indicate that the morality of each of the actions described above are based on their relative connection with the individual perception of good and bad. Individuals may perceive and internalize the truth according to their own mental perception of how they view and process the facts from moral perspectives. The underlying moral principle which I believe can succinctly define above actions is the relativistism of these actions with good or bad. Actions can be considered as good or bad based on the way they are related with acceptable ways of doing things. I, therefore, believe that my underlying moral principle based on the above actions is related with relativistim of actions with acceptable norms and values. For example, war in its strictest sense may be morally wrong, however, considering the circumstances around 9/11 event and loss of innocent lives, it may be a morally justified war because it is based on a contextual point of reference. The moral principle described above therefore is a direct derivative of the examples mentioned above. The basic underlying principles of Utilitarianism advocate on the utility of the actions regardless of their consequences, therefore, any action under utilitarianism is considered as morally right, which can create greatest good for the greatest number of people. This is regardless of the fact the consequences of the action may not be entirely favorable or good, and it was because of this reason that utilitarianism endorses actions, which have significantly different consequences for minority. My principle is similar to the utilitarianism in the sense that both

Friday, August 23, 2019

Community Needs Assessment Essay Example | Topics and Well Written Essays - 2000 words

Community Needs Assessment - Essay Example This literature review explores the meaning of community needs assessment and the different types of needs. It also highlights the data that is sought in CNA and the reasons behind seeking such information. The methods of data collection have been discussed, as well as the principles that underpin the steps involved in the process undertaking a CNA. Community needs assessment is an important strategy that aims at collecting data regarding a community’s requirements, views, and challenges as well as resources that can be applied to establish the actual needs of the community (Stevens et al. 2006). It is a way of identifying the strengths and assets available in the community that can facilitate satisfaction of the needs of all members of the society, whether young or old; working or jobless; able or disabled and any other aspects of diversity in the society. Acosta and Toro (2000) observe that community needs assessment concentrates on the community’s potential all citizens included, groups as well as organizations. It forms the basis for establishing and classifying services and justification as well as establishing a society that upholds and nurtures children and families. Stakeholders in the community such as NGOs, volunteers and any other parties affected by community affairs are involved in the process of comm unity needs assessment. The process enables planners to determine the manner in which a community is currently accomplishing its needs as well as its potential to provide capital and services in future (Alpi, 2005). There are various needs that the community needs assessment tries to establish. These include; the ability to meet the required standards of living. The employment rates within a particular community are an indicator of the people’s capacity to pay the cost of necessities in their day to day lives. Poverty is mainly a consequence of unemployment in the community. Employment is among the community needs

Thursday, August 22, 2019

Case review Essay Example | Topics and Well Written Essays - 2500 words

Case review - Essay Example ts’ willingness to massively punish large corporations financially, the latter ironically suggests what claims could arise if such a practice were to be over-applied. It is clear by both cases that a balance must be struck which finds a middle-ground between the two extremes. In 1992, Stella Liebeck bought a cup of coffee from her local drive-through McDonald’s restaurant in New Mexico. Having stopped to sugar the coffee, she spilled the contents over her lap upon trying to remove the lid. Her upper legs, groin and buttocks suffered third-degree burns and she spent over a week in hospital to undergo skin grafts and a further two years of treatment. As a result, she lost a considerable deal of weight, and incurred medical costs. A battle then ensued between McDonald’s and Steinbeck, over a settlement for Steinbeck’s medical costs – McDonald’s initially would not cover even the medical costs, and offered a modest $800. Steinbeck then brought a claim of gross negligence, stating that the coffee manufactured by McDonald’s was defective and unreasonably dangerous. McDonald’s refused all offers to settle for various sums of money before the trial took place. The main issue surrounding Liebeck’s case was the temperature at which McDonald’s served its coffee. It was argued that the high temperature would cause third-degree burns in very little time, and that a slight reduction would provide valuable time allowing the spillage to be removed from the skin and reduce the extent of burns. McDonald’s argued that serving coffee at such a temperature would allow it to be drinkable for a long period of time, and that those buying it at the drive-through would want to drink the coffee over (or after) a prolonged period of time. It came to light that 700 other reports and claims existed of other customers being burned by McDonald’s coffee (McDonald’s v Greenlee), although McDonald’s argued that this was not a sufficient number to lower the

Recruitment Case Essay Example for Free

Recruitment Case Essay 1a. job advertisment in the news paper, radio through assessment days and recruitment agencies such as REEDS. * Job description and personal specification for the job is included in the job advert for example: Mdec data entry keyer or manager etc. * Candidates fill in application forms through royal mail websites or collect through nearest royal mail post office. * Application forms and refrences of candidates are checked and a short list of the best candidates for the job is drawn. * Canadidates are phoned or email to come to an assessment day. Those who pass will be given an interview date. * Candidates are interviewed and welcomed to the job. * Those who have been uncsucessful are sent a sorry letter. 1b. Individual interviews: in these the manager or supervisor will meet each worker anbd discuss the good work they have done and the mistakes or improvements that are needed. These will include documents such as register for absences, punctuality or any tasks that have been sucessfully or unsucessfully handled. 2a. Personal Development Plan: Get trained into the skills needed for the business e.g. use of machinery, new technology, teamworking etc. Develop time management skills so that i am punctual and able to complete tasks on time by setting aims and odjectives for myself. Improve my listening and communication skills so that good quality service is provided to customers. 2b. Human recources: Recruitment of staff for the IT department in 3 months time ie. from 18th November till 18th of Febuary. Training:Train staff for new use of technology e.g. computerised stock control systems in 2 weeks time of use ie. from 11th of Novmber 2006 till 24th of November 2006. Production: Increase speed of production due to christmas sales by over time given to workers, till 15th December 2006. Introduce quality circles where employees can sit and discuss problems as well as participate in decision making till next month 10th of December 2006. Encourage teamwokring so that workers develop good relationships with colleagues. 2c. By training staff, business will minimise costs by reduced absences, fewer accidents and a fast pace of production. By recruiting staff members for IT department means good quality service produced. Increased production needs to be done during peak times because customer demand is high and not meeting orders means losing potential sales that will affect profits negativley. Through quality circles, employees are motivated and feel they are part of the business. Teamworking will cause good working condition inside the workplace which will make employees have job satisfaction and due to this they will be more committed towards thier work. Read more:Â  Carlton Case 2d. Workers should organise a party to get to know eachother better. Managers and workers should have individual meetings as well ad group meetings so that efficiency is enhanced. Teamworking activities can be non work related e.g. quizzes or sports matches as part of thier training programme. 3. Recruiting the right staff for the business is very important because if the correct Person Sepcification is given then a business can choose from capable candidate the best one for the job. This will include relevent qualifications and skills needed e.g. for IT technicain a degree in IT and work experience in an IT department is required. Secondly, if the right type of Job Description is provided to candidates then time and costs will be reduced because the right type of people will be attracted towards the job. Also, interview proceedures should include equal opportunities for all candidates e.g. same amount of time, atmosphere must be provided with the same set of questions to be asked. This will be a fair selection proceedure to sift the most able, committed and hard working staff. Thirdly, monitoring proceedures such as individual meetings or assessment days will provide appraisals to tell employees thier strengths and weaknesses at work. Producing personal development plans mean workers set themselves tasks and try to achieve them. This will motivate them and able them to work better. All of these points mean that if the staff have good skills and commitment towards the success of the business then this i will improve cusotmer services, sales to generated profit.

Wednesday, August 21, 2019

Analysing Fire Regulation In Malaysia Engineering Essay

Analysing Fire Regulation In Malaysia Engineering Essay In Malaysia, Fire Rescue Department or popularly known as Bomba is the fire and rescue services agency. The fire safety standards must be implemented by following the regulations in the Uniform Building By-Law (UBBL) 1984, National Fire Protection Association (NFPA) Codes and Standards and Fire Services Act 1988. 2.1.1 Uniform Building By-Law (UBBL) 1984 Uniform Building By-Law (UBBL) 1984 is a published document, which is used as a required safety standard and also is emphasized by the government. The Standing Committee recommended that life safety of the building occupants must be considered first and it is to be achieved by giving the minimum requirement regarding to the various aspects. The various aspects refer to egress for the occupants, spread of fire within the building or from one building to another one building and means of detection and extinguishing of fires. In UBBL 1984, 80 percent emphasized on life safety requirement and 20 percent are remaining on the property protection of a building (Goh, 2009). Besides, the basic requirements of the UBBL are adequate fire protection materials and construction system to make sure the safety of the life and property in the building during the fire. Furthermore, UBBL 1984 also stated some fire requirements regarding the construction design in order to minimize and decrease the risk of fire. Automatic fire sprinkler system is mentioned in Uniform Building By-Law 1984 at Part VIII (Fire Alarm, Fire Detection, Fire Extinguishment and Fire Fighting Access). 2.1.2 National Fire Protection Association (NFPA) National Fire Protection Association is an international non-profit organization which is authorized on fire, electrical and building safety. The NFPA was established in 1896 and it serves as the worlds leading advocate in fire prevention and is an authoritative source for information on fire safety (Tharmarajan, 2007). Besides that, NFPA develops, publishes, and disseminates about 300 consensus codes and standards which intended to minimize the effects of fire and other risk. Actually for every building, process, service, design, and installation in society today is already affected by NFPA documents (National Fire Protection Association, 2009). Automatic fire sprinkler is mentioned in NFPA 13 (Standard for the Installation of Sprinkler Systems), NFPA 25 (Standard for the Inspection, Testing, Maintenance of Water-Based Fire Protection System) 2.1.3 Fire Services Act 1988 The Fire Services Act 1988 is implemented to make necessary provision for the effective and efficient functioning of the fire Services Department. In addition, this act is also for the protection of person and property from fire risks and other purposes connected therewith. This Act most likely explains the duties of the Fire service Department, which consists of implementing fire prevention, fire safety inspection and fire hazard abatement, investigation and prosecution (Tharmarajan, 2007). 2.2 Types of fire sprinkler systems Fire sprinkler systems are the most important and successful of the fire fighting systems. There are five main types of fire sprinkler system which are wet pipe, dry pipe, pre-action, re-cycling and alternate wet and dry pipe. The three additional types of fire sprinkler system which are tail-end alternate, tail-end dry pipe and deluge. These three systems may be combined with wet pipe and/or alternate wet and dry pipe sprinkler system to form extensions. The type of sprinkler systems to be selected for the building will be depended on type of building and type of materials to be protected (Hassan, 1996). For example, a storage facility that stores highly flammable liquids will need a different sprinkler system from a shopping centre. 2.2.1 Wet pipe system Wet pipe systems are the most common fire sprinkler system that have been using in the building. This sprinkler system is suitable used in heated buildings where temperatures remain above 0 and there is no risk of the water in the sprinkler system freezing (Hassan, 1996). Water is constantly maintained within the distribution piping. When a fire produced the heat, it will cause the nearest sprinkler heads to open at their operating temperature. Water will immediately discharged onto the fire, at the same time the flow of water activates a hydraulically operated alarm bell outside the building and arrangements can also be made to alert the local Fire Brigade (Hassan, 1996). Figure 2.1 shows a typical wet sprinkler system where the water supply is taken directly from the water main. Figure 2.2 shows how the pipe connected the alarm valve to an alarm gong and turbine. The total number of sprinklers that connected to an installation will be different for light hazard, ordinary hazard and high hazard and, depending on the circumstances. Besides that, the number of sprinklers system fitted to each installation will vary over the range of 500 to 1000 (Hassan, 1996). When fire sprinkler systems installed in a high rise building, the difference in height between the lowest and the highest sprinkler in an installation must not be greater than 45 meters (Hassan, 1996). Distribution pipes are to be connected independently to the main rise pipe at the floor being served and no section shall extend to more than one floor, mean that each section being served by a separate main rise pipe. Figure 2.1 Figure 2.2 2.2.1.1 Advantages of wet pipe sprinkler system Simplicity and reliability system Wet pipe sprinkler systems have the fewest number of components and require less installation time compare to other systems. Due to the systems simplicity, the system maintenance may not be performed as the desired frequency. The reliability of wet pipe sprinkler system is important since sprinklers may be used to standby for many years before they are needed (API Group, 2003). Financial saving The installation and maintenance expense for wet pipe sprinkler system are relative low (API Group, 2003). It is because wet pipe sprinkler systems require least amount of installation time and also less service time is required. Ease of modification The works to modify the wet pipe sprinkler system include shutting down the water supply, draining pipes and making alterations. After then, the following work is to pressure test the system and restore it. Additional work for detection and special control equipment is avoidable which may saves the time and cost (API Group, 2003). Shorter time to repair after fire Wet pipe sprinkler systems require the least amount of effort and time to restore after a fire (API Group, 2003). In most instances, fire sprinkler is reinstated by replacing the fused sprinklers and turning the water supply back on. For other types of sprinkler systems, it may require additional effort to reset control equipment. 2.2.1.2 Disadvantages of wet pipe sprinkler system The disadvantages of wet pipe sprinkler system are that it cannot be installed in an area where distribution pipes are exposed to freezing temperatures. It is because the water inside the distribution pipe will become solid if exposed to freezing temperatures. 2.2.2 Dry pipe system This system may only be used in the conditions that it is impossible to use a wet pipe system, or alternate wet and dry type system. Dry pipe sprinkler systems are installed in areas where distribution pipes are exposed to freezing temperatures. For example, dry pipe sprinkler systems will be installed at unheated buildings and parking garages. The system between dry pipe system and wet pipe system are different. The difference is that, wet pipe sprinkler systems contain water but dry pipe sprinkler systems contain compressed air. The compressed air is supplied by an electric air compressor, nitrogen bottles, or other source. In addition, the air pressure inside the pipes that is about one-third to one-half times greater than the maximum water pressure. Dry pipe sprinkler systems have a valve clapper and alarm port. The function of dry pipe valve clapper is to separate between air pressure and water pressure at the valve interface. When a fire starts, fire release the heat causes a sprinkler head to open and the compressed air would be released. Once this happened, water will enter the pipe and flowing through open sprinkler onto the fire. Due to this system is liable to suffer frost damage, it is important that the pipe work should be self-draining and sprinkler heads must be fitted above the range pipes. The number of sprinkler fitted to each installation shall be within the range 125 to 500, and depends on whether or not an accelerator has been fitted to the system (Hassan, 1996). Figure 2.3 shows how sprinkler heads fitted above the range pipe. Figure 2.3(Sources from Hassan, 1996) 2.2.2.1 Advantages of dry pipe sprinkler system Suitable for freezing temperatures Dry pipe sprinkler systems are suitable to be installed in areas where distribution pipes are exposed to freezing temperatures. For example, dry pipe installations include unheated buildings and parking garages. Suitable for water sensitive areas The advantage of dry pipe sprinkler systems is that it is suitable to be used to protect collections and other water sensitive areas while the wet pipe system does not. While a physical damage on the wet pipe sprinkler systems will cause the pipes leaking, dry pipe sprinkler system will not. It will take 1 minute to release the air inside the pipes before water flowing. 2.2.2.2 Disadvantages of dry pipe sprinkler system Increased complexity According to API Group, dry pipe sprinkler systems require additional control equipment and air pressure supply components which will increase complexity of the systems. If proper maintenance is not followed for this sprinkler system, the system would be less reliable. Higher installation and maintenance cost The installation cost for dry pipe sprinkler system will be higher since the complexity level is higher and installation time is longer compare to wet pipe system. Besides that, the maintenance cost will also be higher due to labour skill is required to maintain this complex sprinkler systems. Lower design flexibility There are strict requirements regarding the maximum permitted size of individual dry pipe systems (API Group, 2003). These limitations may impact the ability of an owner to make system additions. Increased fire response time The total time taken from sprinkler head opens until water is discharged onto the fire is up to 60 seconds (API Group, 2003). The fire extinguishing actions will be delay for 60 seconds and caused the fire damage to the building increase. Increased corrosion potential Dry pipe sprinkler systems must be completely drained and dried. If there is water remaining inside the pipe, it will cause corrosion and premature failure. This kind of problem will not happen on wet pipe system because the water is constantly maintained in piping. 2.2.3 Pre-action system Pre-action sprinkler systems are installed in water sensitive environments such as computer rooms, library and paper records office. When in an actual fire condition, these systems will operate to save the building and its components from fire damage. It will give earliest warning if detected of combustion in the protected areas and which will arise from the action of a smoke detector. This will gives enough time for the outbreak to be dealt with satisfactorily by using portable extinguishers. The pre-action system is similar to a dry pipe system and deluge system. The difference between pre-action system and dry pipe system is that the air pressure may or may not be used for pre-action system. The difference between pre-action system and deluge system is that the valve is electronically held closed and standard closed are used for pre-action system. Two separate events must be presented to initiate sprinkler discharge onto the fire. Firstly, the detection system identifies a developing fire and then automatically sprinkler system would open the pre-action valve. When the pre-action valve is opened, it allows water to flow into system piping. Secondly, each of the sprinkler heads will verify whether there is fire then only permit water flow onto the fire. This system must be self-draining. For pre-action sprinkler system installation, the maximum numbers of sprinklers that may be fitted to an installation for light hazard is about 500, ordinary hazard and high hazard is about 1000 (Hassan, 1996). 2.2.3.1 Advantages of pre-action sprinkler system The dual action required water release The dual action here means that the pre-action valve must operate and sprinkler head must fuse then only water release (API Group, 2003). This feature provides double level of protection against inadvertent discharge. With this reason, pre-action sprinkler systems are frequently installed in water sensitive areas such as book libraries, computer centers and etc. 2.2.3.2 Disadvantages of pre-action sprinkler system Higher installation and maintenance cost Pre-action sprinkler systems are more complex with several additional components, such as fire detection system. Thus the installation and maintenance cost will become higher due to the additions system required. Modification difficulties Pre-action sprinkler systems have specific size limitations which may affect future system modifications (API Group, 2003). Besides that, system modifications must incorporate changes to the fire detection and control system to ensure proper operation. Potential decreased reliability The higher level of complexity with pre-action sprinkler systems the higher possibility that something may not work when needed. Regular maintenance is needed to ensure reliability. 2.2.4 Alternate wet and dry pipe system This system is used for those developments in which the water in the pipes may freeze when change in the climate and where the surrounding temperature does not exceed 70. For example, the system is operated dry in winter and wet in the summer. The system inside the pipes will be changes by following the climate, when it is dry pipe system then the pipes contain compressed air, and when it is changes to wet pipe system then the pipes are filled with water. In some cases, this system may require a duplication of the automatic alarm valves, which may be connected in parallel. The benefit of the automatic alarm valves is to facilities an easy changeover at the turn of the season. Besides that, the system must be self-draining and the number of sprinkler fitted to each installation shall be within the range 125 to 500 (Hassan, 1996). 2.2.5 Recycling system The use of this system is generally restricted to situation where it is necessary: To limit water damage after a conflagration; To prevent inadvertent water damage caused by any accident mechanical interference with the pipe work or sprinklers; and To be able to carry out work on the installation while ensuring that the system remains in a state of readiness at all times. When pre-action valve turn to open mean than the operation of any heat detector activates the alarm driven gong and primes the pipe work ready for the imminent opening of one or more sprinklers. If the fire was put out by portable extinguishers immediately, the heat detectors automatically reset to the normal monitoring position. This has the effect of initiating a hydraulic pressure equalization process which may typically take 5 minutes to complete. After this has occurred, the pre-action valve will be from opened and turn to closed. If the fire begins to rekindle, the heat detectors will be reactivated and cause the pre-action valve again be opened. After then water will be directed discharge to the source of the fire. Others installations use electrical timing units and the use of electrically interlocking circuitry is installed to ensure that the system will not operate solely because of falling air pressure in the pipe work. With this system, any accidental damage to either the pipe work, or the sprinkler heads will not cause the main valve to open. The disadvantage is when operatives working on such an installation must take care that they isolate that part of the system on which they are working from the potentially active main system. The system must be self-draining and the number of sprinklers fitted to such an installation must not exceed 1000 (Hassan, 1996). 2.2.6 Deluge system Deluge sprinkler systems are installed in high hazard operations, such as power generating station, chemical storage, munitions plants, and the areas which store items such as flammable liquids. These sprinkler systems will work together with independent fire detection systems and discharge water immediately to the protected area during a fire. The deluge sprinkler system is similar to a pre-action system. The difference between deluge sprinkler system and pre-action system is that the deluge sprinkler heads are open and the pipe is not pressurized with air. Deluge systems are connected to a water supply through a deluge valve that is opened when smoke or heat detection system is activated. The detection system is installed in the same area as the sprinklers. When the detection system is activated, water will discharges through all of the sprinkler heads onto the fire. Water is not adequate to control or extinguishment fire in areas where flammable liquids are manufactured or stored. Water is require to mixed with the foam concentrate and cause the concentrate to expand when released through the sprinkler head, it may depriving the fire source of oxygen required to support combustion of flammable materials (Hassan, 1996). 2.2.7 Tail-end alternate pipe and tail-end dry pipe systems These systems may be regarded as an add-on system to a standard sprinkler installation and they are intended to deal with comparatively small areas. In a heated buildings will served by a conventional wet pipe system, it is possible that a small part of the building is either unheated or is overheated temperatures. In order to deal with this, it is permissible to join a tail-end alternate system onto the main wet pipe system. The number of sprinklers on any tail-end extension must not exceed 100. If it is more than two tail-end extensions are services by one valve set, the total number of sprinklers in the tail-end extension must not exceed 250 (Hassan, 1996). 2.3 Benefit of fire sprinkler system Automatic fire sprinkler systems have been used to protect industrial and commercial properties for more than 100 years. Nowadays, fire sprinklers are not only installed in commercial and industrial buildings but also installed in residential buildings, office buildings, schools and hotels. Fire sprinkler systems are become common and popular that is because it is provide many benefits to us. 2.3.1 Reduce fatalities It is difficult to estimate how much safer fire sprinklers could provide in the event of fire. Based on evidence from laboratory studies and limited field experience in the United States, the studies prove that fire sprinklers could save an additional 7.7 lives per million houses per year. In addition, the evidence also proves that fire sprinklers could reduce the risk of firefighter death and injury during put out a fire. It is estimated if all the buildings were installed with fire sprinklers, about 0.1 firefighter lives could be saved per million houses per year. Thus, the study concludes that fire sprinkler could save an additional 7.8 lives per million houses per year (Rousseau, 1989). 2.3.2 Reduce injuries Based on the United Stated research, the study proves that if installation of fire sprinkler in buildings could prevent about 87 people injuries per million houses each year. The amount of firefighting injuries could also be reduced through increased installation of sprinklers by as many as 30 firefighting injuries per million houses per year. Based on American Studies, the cost to remedial per injury to a civilian or firefighter is $30,000 (Rousseau, 1989). These costs are included to pay medical bills and allowance for pain and suffering. 2.3.3 Reduce Insurance Premiums Residential fire sprinkler systems are becoming more prevalent with each passing year. If the building installed with fire sprinkler systems, it will cause the additional 1 to 2 % increase in the final cost of the house (Snyder, 2008). Besides that, municipalities must account for the increase in residential system and ensure that they are being maintained in accordance with current National Fire Protection Association standards. After installed fire sprinkler systems, they will actually save money because they can reduce home insurance rates by 5 to 15 percent (Snyder, 2008). These values are expected to be increase in the future. In the event that there is a fire, they will also save money in potential damages. 2.3.4 Increase value of the building A building constructed with fire sprinkler system has more value than a building without a fire sprinkler system. It is because a building with a fire sprinkler system provides additional fire safety for the building and thus, the building worth more and the owner could gain more profit when selling the building. 2.3.5 Reduce property damage cost According to records for decades on property damage, the owner save about 90% on property damage costs with fire sprinkler systems than those without fire sprinkler systems when a fire is happened. This is clear that a fire sprinkler system will pay for itself many times over. According to Daniel Snyder article, the average cost of damages in homes with fire sprinkler systems was about $2,000 and the average cost of damages in homes without sprinkler systems was about $45,000. 2.3.6 More time to escape Fire sprinkler systems provide an additional degree of protection for both life and property above smoke and other fire detection systems. Sprinkler systems obviously help people by giving more time for them to escape when a fire is happening, so they help to save lives. A correctly designed and installed sprinkler system can detect and control a fire at an early stage of fire development and activate an alarm. So with the correct operation of the sprinkler system will rapidly reduce the production rate of heat and smoke, thus allowing more time for the occupants to escape safety or be rescued. 2.3.7 Increase exit access travel distance capacity An increase in exit access travel distances is a major distinct advantage for buildings with sprinkler system over buildings without sprinkler system. The exit access travel distance mean the distance from any occupied portion of a building to an exit. For example, the exit is such as enclosed stairway. Depending on the occupancy of the building, anywhere from an additional 50 to 100 feet of exit access travel distance can be gained when the building is installed with fire sprinkler system (International Building Codes, 2006). Table 2.1 show the maximum travel distance between building with sprinkler and without sprinkler for different types of buildings. SEVENTH SCHEDULE MAXIMUM TRAVEL DISTANCES (By-law 165 (4), 166 (2), 167 (1), 170 (b)) Purpose Group Limit when alternative exits are available (2) (3) Dead-End limit (metre) Un- sprinklered Sprinklered Small Residential Institutional Hospitals, Nursing Homes etc, School Open Plan Flexible Plan Other Residential Hotels Flats Dormitories Office Shops Factory General and Special Purpose High Hazard Open structure Places of Assembly Storage and General Low an Ordinary hazard High Hazard Parking Garages Aircraft Hangars (Ground Floor) Aircraft hangars (Mezzanine Floor) NR 9 6 NR NR 10 10 0 15 15 15 0 NR NR NR NR 15 NR NR NR 30 45 30 45 30 30 30 45 30 30 22 NR 45 NR 22.5 30 30 22.5 NR 45 60 45 60 45 45 45 60 45 45 22.5 NR 61 NR 30 45 45 22.5 Table 2.1 (Sources from Uniform Building By-Law 1984) 2.3.8 Increase Egress capacity For the occupancies buildings which are installed with fire sprinkler systems, except high-hazard and hospital, the means of egress components can be increased 50% for the staircase width and 33% for all other egress components such as corridors, doors, ramps (International Building Codes, 2006). For example, a 44 inch of exit staircase construct in a building which is without fire sprinkler systems only can serve 146 persons, but a same 44 inch of exit staircase construct in a building which is installed with fire sprinkler system can serve 220 persons. Besides that, 44 inch corridor construct with fire sprinkler system can serve 293 persons, without fire sprinkler system can serve 220 persons. 2.3.9 Reduce construction cost As previously mention, if the new building installed with fire sprinkler systems, it will cause the additional 1 to 2 % increase in the final cost of the house. They are not only can cut low the insurance premiums but also reduce in construction cost. This is because most building codes provide large construction leeway for sprinkler buildings. For example, fewer egresses are required and larger floor areas are allowed for the building with sprinkler systems installed. This feasible design will help owners and occupants to cut down the construction cost and material cost. Further more information about the advantages of fire sprinkler system relate to benefits of construction cost saving will be explain as below: 2.3.9.1 Reduction in shaft enclosures For building are not greater than 420 feet in height, the fire rating of vertical shaft such as HVAC, electrical, plumbing, trash/linen chutes, except exit enclosures and elevator hoist way enclosures, is permitted to be reduced to one hour where automatic sprinklers are installed within the shaft at the top and at alternate floor levels (International Building Codes, 2006). This can be a big cost saving in high-rise building construction. 2.3.9.2 Elimination of the access vestibule for smokeproof exit staircase enclosures For high-rise building, the exit staircases off the floors located more than 75 feet above the lowest level of fire department vehicle access are required to be smokeproof exit enclosures (IBC 1020.1.7). The access are to the staircase in a smokeproof exit enclosure is required to be form an open exterior balcony (IBC section 909.20.3) or a ventilated vestibule (IBC Section 909.20.4), with a width of not less than 72 inches (IBC Section 909.20.1). If the high rise building is installed with fire sprinkler systems, under IBC section 909.20.5 is allow to eliminate the open exterior balcony and /or the ventilated vestibule requirements. This alternative saves valuable space on each floor of the building and it can be converted into rental or sellable space for the building owner. This can be a big cost saving in high-rise building construction and also gain extra profit for building owner. 2.4 Problem of fire sprinkler system Fire sprinkler systems can be used to save lives, property and others benefit, whether they used in industrial buildings, offices, or home. But automatic fire sprinkler systems also present some unique technical problems. Fortunately, such problems can be avoided by knowing the most common reasons for fire sprinkler failure. From the National Fire Sprinkler Association report, the most common reasons for fire sprinkler failure that are error sprinkler activate, overheating, freezing, mechanical damage, corrosion, or leaking. 2.4.1 Problem regarding elements of fire sprinkler 2.4.1.1 Corrosion Corrosion or rust can weaken pipes and sprinkler heads. The severe corrosion problems have been commonly attributed to microbiologically influenced corrosion and known as MIC. This can result a sudden and unwelcome activation when a sprinkler pipe or head fails. The National Fire Protection Association states that building owners are responsible for replacing sprinkler components that are corroded or rusted. Corrosion of fire sprinkler piping can lead to potentially hazardous system malfunction, as well as costly water damage and repair costs. Unfortunately, inspections for MIC and corrosion are often overlooked until the problems become serious, such as damaging leaks occur or the corrosion extend to a large areas of the entire fire sprinkler system have to be replaced. This corrective maintenance approach is a retro-active strategy. The task of the maintenance team in this scenario is usually to effect repairs as soon as possible. Cost associated with corrective maintenance include repair, lost production and lost sales. Repair costs are included replacement components, labour, and consumables. Solution to corrosion of fire sprinkler A new proactive approach to fire sprinkler maintenance is available using completely non-invasive, ultrasonic technologies that from the basic of a predictive maintenance approach (Jeffrey, 2005). This approach provides a cost-effective means of detecting the presence and monitoring progression of corrosion and creating a digital record of the system state that can be used to schedule replacement of localized sections of the system before leaks or operation failure occur. 2.4.1.2 Mechanical damage Fire sprinkler systems depend on the integrity of all their parts. If a sprinkler head is hit or a pipe damaged, the parts can separate and the system cannot be activate when fire is present. A common problem with sprinkler heads is damage from nearby construction of forklifts that are raised too high, accidentally knocking off sprinkler heads. Besides that, installing automatic sprinklers can also result in damage to the system if improper tools or techniques are used (Russell and Fleming, 2000). Solution to mechanical damage Fire sprinkler system must always be inspected after the works have been completed by contractor or sprinkler supplier. Homeowner must ensure all elements of the sprinklers in proper manner and without damage. 2.4.2 Problem regarding installation of fire sprinkler 2.4.2.1 Freezing There are two major kinds of fire sprinkler systems which are wet pipe and dry pipe sprinkler systems. Normally wet pipe sprinkler systems are most common used to install in the build

Tuesday, August 20, 2019

Development of Intrusion Detection System Software

Development of Intrusion Detection System Software INTRODUCTION Heavy reliance on the Internet and worldwide connectivity has greatly increased that can be imposed by attacks plunged over the Internet against systems. It is very difficult to prevent such attacks by the only use of security policies, firewall or other mechanism because system and application software always contains unknown weaknesses or many bugs. In addition, complex, often unforeseen, interactions between software components and or network protocols are continually exploited by attackers. Successful attacks inevitably occur despite the best security precautions. There for intrusion detection system has become an essential part of the system because they can detect the attacks before they inflict widespread damage. Some approaches detect attacks in real time and can stop an attack in progress. Others provide after-the-fact information about attacks and can help repair damage, understand the attack mechanism, and reduce the possibility of future attacks of the same type. More adv anced intrusion detection systems detect never-before-seen, new, attacks, while the more typical systems detect previously seen, known attacks [1]. MOTIVATION The speed of growth of Internet is very fast without any end. With this growth the threat of attacks is also increasing. Because as we all know that theft can be occurred over the Internet from all over the world. So we require a system which can detect the attack or theft before there is some loss of information and reputation of organization or any individual. There are many solutions has been provided by the researchers and from many companies like firewall, intrusion detection system and IPS to stop the attacks. But still it is very hard to detect the attacks like DoS and worm propagation before they widespread, because regularly thousands of attacks are being developed and for a signature based intrusion detection system it is very hard to detect these kinds of new attacks with perfect accuracy. Mostly intrusion detection system generates many false alarms. These false alarms can affect the other processing of the network. If somehow any attacker gets to know that there is an intrusion detection system in the network then, the attacker will want to disable the intrusion detection system. His/her first target will be the intrusion detection system before attacking the network. So there should be proper security policies for deploying the IDS to take proper advantages of it. PROJECT OBJECTIVES Security is the main concern for any network. Every day thousands of attacks are created so that alarms and logs should be generated properly for reducing their effect. intrusion detection system and IPS are mostly used devices for providing these kinds of solutions. But there are many issues like performance and accuracy. So the main objective of the project is to develop a signature based intrusion detection system for DoS attacks with better scalability and performance i.e. intrusion detection system with minimum false alarms and with better throughput. In this study the example of TCP SYN flood attack will be taken for implementing and evaluating the performance and scalability of the developed intrusion detection system. Second Objective of this study is to discuss the policies for implementing the intrusion detection system securely. And these policies shall also be evaluated. Intrusion detection system intrusion detection systems (IDS) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations [2, 48]. There are many different types of intrusion detection system and they can be characterized by different monitoring and analysis approaches. Each approach has different advantages and disadvantages. All approaches can be described in terms of generic process model for intrusion detection systems. Many intrusion detection systems can be described in terms of three fundamental functional components information source, analysis, and response [2]. OVERVIEW Chapter 1 In this chapter we will give a brief introduction of whole project, what is the motivation for selecting this project. What are the main objectives of this project? And what is the main problem which will be considered in this project. Chapter 2 is all about the literature review. In this chapter many different aspects of the intrusion detection system will be discussed like why we require intrusion detection system, different type of intrusion detection system, need for intrusion detection system, about attacks different types of attacks and many other different facts about intrusion detection system which can help to improve the knowledge about intrusion detection system. Chapter 3 will focus on the analysis and designing part of the intrusion detection system. How a computer system can be designed. What s the system engineering and different type’s models will be discussed. CHAPTER 2 NEED FOR INTRUSION DETECTION SYSTEM Internet is carrying more traffic than ever before and still growing in the size without any end. Along with the explosive growth comes an increased threat from Internet related attacks. The Internet allows theft to occur from anywhere of the world [14]. Many threats impact on the operation of your computer network. Natural threats such as flood fire and tornadoes, causes unexpected disruptions. Most companies have well-defined procedure to handle these natural attacks. Security procedures designed to combat hacker attacks, an unsecured network will definitely be attacked. The only question is when the attack will occur [14]. COMPUTER ATTACKS AND VULRANABILITIES intrusion detection systems have been adopted by many organizations because the organizations know that intrusion detection systems are necessary component of the security architectures. But still intrusion detection system is not too much popular, most organizations lack experienced intrusion detection system operators. intrusion detection system can be most effective if the human operates it. But before developing a signature based intrusion detection system the knowledge of the attacks is must. Signatures is a set of rules that sensor uses to detect typical intrusive activities. These rules are based on various criteria i.e. IP protocol parameters, transport protocol parameter and packet data [12]. THE PHASES OF THE ATTACKS Attack can be divided into three different phases. The first phase is defining the goal for attack. The second phase is the reconnaissance attack, also known as the information gathering. After collecting the information the attacker proceed to the third phase, the attacking phase [12]. FIRST PHASE: GOALS OF ATTACK Before attacking a network or system, an attacker sets her goals or objectives. When attacking network the attacker can have various goals: Data manipulation System access Elevated privileges Denying availability of the network resources MOTIVATION Revenge Political activism Financial gain Attackers attempt to disrupt network to discredit the particular organization’s image [12]. RECONNAISSANCE BEFORE THE ATTACK Collecting the information is the attacker’s second step in launching an attack against the network. Successful reconnaissance is also important for successful attack. Attackers use two main mechanisms to collect the information about the network. Public data source Scanning and probing An attacker sometime starts his knowledge search by examining public information available about company. By using these kind of information the attacker can determine that where the business is located, the business partners, the value of the company assets and much more. And through scanning, the attackers use remote reconnaissance to find specific resource on the network. The goal of the information gathering is to pinpoint weak points on the network where an attack is likely to succeed. By pinpointing specific weakness on the network, the attacker can launch an attack in the future that generates minimal traffic or noise on the network. This greatly reduces the likelihood of detection during the actual attack [12]. For example: ping sweep, vertical scan, horizontal attack, DNS query, block scan and many more. THE ACTUAL ATTACK After an attacker maps the network, he researches known vulnerabilities for the system that he detected. The attacker’s goal at this stage is to gain access to resources of the network i.e. Unauthorized data manipulation, system access, or privilege escalation. ATTACK METHODOLOGY Regardless of the motivation or personal preferences, an attacker has several attack methodologies from which to choose [12]: Ad hoc (random) Methodological Surgical strike (lightning quickly) Patient (slow) AD HOC (Random) An ad hoc attack methodology is unstructured. An attacker using this methodology is usually disorganized and those types of attacks frequently fail. It is difficult to comprehensively locate targets on the network. METHODOLOGICAL It provides a well-defined sequence of steps to attack a network. First, the attackers use the reconnaissance to locate the targets. Next the attacker locates the exploits for known vulnerability on the target. Finally when he satisfies with his toolkit he starts attacking system on the target network. SURGICAL STRIKE (Lightning Quick) Many times the attacker uses an automated script against a network. The entire attack is completed in a few seconds. Before the system administrator or security analysts have time to react and make any decision. PATIENT (Slow) It refers to how quickly the attacker executes his attacks. Usually the one uses a patient (slow) methodology to avoid detection. Many intrusion detection systems have difficulty detecting attacks that occurs over long period of time. BACK DOORS Viruses and worms provide a vehicle for an attacker to wreak havoc on your network and potentially the Internet. However, the spread of viruses and worms is much harder to determine in advance. Viruses and worms are much harder to determine in advance. Trojan horse program enables an attacker to establish back door on systems. However Trojan horse requires some type of transport vehicle [12]. DENIAL OF SERVICE TECHNIQUES The purpose of DoS attacks is to deny legitimate access to the network resources. These attacks include everything from simple one-line commands to sophisticated programs written by knowledgeable hackers. There are different types of DoS attacks some of them are- Network resource overload Host resource starvation Out-of-band attacks Distributed attacks NETWORK RESOURCE OVERLOAD One common way to deny the network access is by overloading a common resource necessary for network components to operate. The main common resource that can be attacked in the network bandwidth in several ways generating lots of traffic, distributing the attack across numerous hosts, and using a protocol flaws that amplifies the attack by soliciting help from many different hosts on the target [12]. Example- Smurf and Fraggle attack. HOST RESOURCE STARVATION The resources available at the hosts are also known as the attack point as well. One such resource is the buffer that a host uses to track TCP connections. OUT-OF-BOUNDS ATTACKS The first out-of-bounds attack category uses over-sized packet, it overflows the allocated buffer and causes the system crash. An over-sized packet attack is ping of death. DISTRIBUTED ATTACKS The latest trend in DoS attacks is for an attacker to compromise numerous hosts and then use all these compromised hosts to provide a massive against a specific target. These types of attacks are known as the distributed denial of service attack (DDoS). DISTRIBUTION EFFECT To disrupt the victims communication very badly, the attacker must compromise an agent machine that has more network resources than the victim. Locating and breaking into such a machine may prove difficult, if the target of the attack is well-provisioned site [16]. Distribution brings number of benefits to the attackers: By using distribution techniques, the attacker can multiply the resources on the attacking end, allowing him to deny service to more powerful machines at the target end [16]. To stop a simple DoS attack from a single agent, a defender needs to identify that agent and take some action that prevents it from sending such a large volume of traffic. In many cases, the attack from a machine can be stopped only if the machine’s human administrator, or network operator, takes action. If there are thousands agents participating in the attack, however, stopping any single one of them may provide little benefit to the victim. Only by stopping most or all of them can the DoS effect be palliated [16]. If the attacker choose agents that are spread widely throughout the Internet, attempts to stop the attack are more difficult, since the only point at which all of the attack traffic merges is close to the victim. This point is called aggregation point. Other nodes in the network might experience no telltale signs of the attack and might have difficulty distinguishing the attack traffic from legitimate traffic [16]. In DoS attack executed from a single agent, the victim might be able to recover by obtaining more resources. For example, an overwhelmed Web server might be able to recruit other local servers to help handle the extra load. Regardless of how powerful a single agent might be, the defender can add more capacity until he outstrips the attacker’s ability to generate load. This approach is less effective in defending against DDoS attacks. If the defender doubles his resources to handle twice as many requests, the attacker merely needs to double the number of agents- often an easy task [16]. TCP-SYN ATTACK The SYN-flooding attack is a Distributed denial-of-service method disturbing hosts that run TCP server processes. The attack take benefit of the state retention TCP performs for some time after receiving a SYN segment to a port that has been put into the listen state. The basic idea is to utilize this behavior by causing a host to retain enough state for bogus half-connections that there are no resources to establish new genuine connections [51, 52]. A TCP implementation may allocate to LISTEN state to be entered with either all, some, or none of the pair of IP addresses and port numbers specified by the application. In many common applications like web servers, none of the remote host’s information is pre known or preconfigured, so that a connection can be established with any client whose details are unidentified to the server ahead of time. This type of â€Å"unbound† LISTEN is the goal of SYN flooding attacks due to the way it is typically implemented by operating systems [51, 52]. For success, [51, 52] the SYN flooding attack relies on the victim host TCP implementation’s behavior. In particular, it assumes that the victim allocates state for every TCP SYN segment when it is received and that there is perimeter on the amount of such state than can be kept at any time. The [51, 52] SYN flooding attack does not attempt to overload the networks recourses or the end host memory, but merely attempts to exhaust the backlog of half-open connections associated with the port number. The goal is to send a quick barrage of SYN segments from IP addresses (often spoofed) that will not generate replies to the SYN-ACKs that are produced. By keeping the backlog full of bogus half-opened connections, legitimate requests will be rejected. Three important attack parameters for success are the size of the barrage, the frequency with which barrages2 are generated, and the means of the selecting IP addresses to spoof. Usually, [51, 52] systems implements a parameter to the typical listen () system calls that allows the application to suggest a value for this limit, called the backlog. 1 To be effective, the size of the barrage must be made large enough to reach the backlog. Ideally, the barrage size is no larger than the backlog, minimizing the volume of the traffic the attacker must source. Typical default backlog values vary from half-dozen to several dozen, so the attack might be tailored to the particular value determined by the victim host and application. On machines intended to be servers, especially for a high volume of the traffic, the backlogs are often administratively configured to higher. Another aspect makes both DoS and DDoS attacks hard to handle: Defenses that work well against many other kinds of attacks are not necessarily effective against denial of service. For years, system administrators have been advised to install a firewall and keep its configuration up to date, to close unnecessary ports on all machines, to stay current with patches of operating systems and other important software, and to run intrusion detection system to discover any attacks that have managed to penetrate the outer bastions of defense [16]. Unfortunately, these security measures often will not help against denial of service. The attack can consist of traffic that the firewall finds acceptable. intrusion detection systems are of limited value in dealing with DoS, since, unlike break-ins and thefts, DoS attacks rarely hide themselves [16]. WHAT IS INTRUSION DETECTION SYSTEM? intrusion detection systems gather information from a computer or network of computers and attempt to detect intruders or system abuse. Generally, an intrusion detection system will notify a human analyst of a possible intrusion and take no further action, but some newer systems take active steps to stop an intruder at the time of detection [4]. The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all—they only identify evidence of intrusions, either while they’re in progress or after the fact. Such evidence is sometimes referred to as an attacks â€Å"manifestation.† If there is no manifestation, if the manifestation lacks sufficient information, or if the information it contains is untrustworthy, then the system cannot detect the intrusion [5]. intrusion detection systems are classified into two general types known as signature based and heuristic based. Pfleeger and Pfleeger describe signature-based systems as â€Å"pattern-matching† systems that detect threats based on the signature of the attack matching a known pattern. Heuristic based systems, which are synonymous with anomaly-based systems, detect attacks through deviations from a model of normal behavior [6]. intrusion detection systems that operate on a single workstation are known as host intrusion detection system (HIDS), while those that operate as stand-alone devices on a network are known as NIDS. HIDS monitor traffic on its host machine by utilizing the resources of its host to detect attacks. NIDS operate as a stand-alone device that monitors traffic on the network to detect attacks. NIDS come in two general forms; signature based NIDS and heuristic based NIDS [7]. PROCESS MODEL FOR INTRUSION DETECTION SYSTEM intrusion detection systems can be described in terms of three fundamental functional components [2, 48]: Information Sources the different sources of event information used to determine whether an intrusion has taken place. These sources can be drawn from different levels of the system, with network, host, and application monitoring most common. Analysis the part of intrusion detection systems that actually organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place. The most common analysis approaches are misuse detection based (signature based) and anomaly detection. Response the set of actions that system takes once it detects intrusions. These are typically grouped into active and passive measures, with active measures involving some automated intervention on the part of the system, and passive measures involving reporting intrusion detection system findings to humans, who are then expected to take action based on those reports. INFORMATION SOURCE The most common way to classify intrusion detection system is to group them by information source. Some intrusion detection systems analyze network packets, captured from network backbones or LAN segments, to find attackers [2]. It can be describe by dividing three different parts. NETWORK BASED INTRUSION DETECTION SYSTEM NIDS are intrusion detection systems that capture data packets traveling on the network media (cables, wireless) and match them to a database of signatures. Depending upon whether a packet is matched with an intruder signature, an alert is generated or the packet is logged to a file or database [8, 48]. Network-based intrusion detection systems often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console. As the sensors are limited to running the intrusion detection system, they can be more easily secured against attack. Many of these sensors are designed to run in â€Å"stealth† mode, in order to make it more difficult for an attacker to determine their presence and location [2, 48]. HOST INTRUSION DETECTION SYSTEM  or HIDS Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity. Some of these systems are reactive, meaning that they inform you only when something has happened. Some HIDS are proactive; they can sniff the network traffic coming to a particular host on which the HIDS is installed and alert you in real time [8, 48]. These types of intrusion detection systems run on host to reveal inappropriate activities on these hosts. The HIDSs are used for detecting the attacks from the inside and outside network. They provide snap shot about the existing system files and connect them to the previous. If the important system files were modified or deleted, the warning is sent to the administrator for inspection. The HIDS example is notice able on the machines with significant task; these machines do not expect the change of their configuration [9, 48]. APPLICATION-BASED INTRUSION DETECTION SYSTEM Application-based intrusion detection systems are a special subset of host-based intrusion detection systems that analyze the events transpiring within a software application. The most common information sources used by application-based intrusion detection systems are the application’s transaction log files. The ability to interface with the application directly, with significant domain or application-specific knowledge included in the analysis engine, allows application-based intrusion detection systems to detect suspicious behavior due to authorized users exceeding their authorization. This is because such problems are more likely to appear in the interaction between the user, the data, and the application [2, 48]. INTRUSION DETECTION SYSTEM ANALYSIS There are two primary approaches to analyzing events to detect attacks: misuse detection and anomaly detection. Misuse detection in which the analysis targets something known to be â€Å"bad†, is the technique used by most commercial systems. Anomaly detection, in which the analysis looks for abnormal patterns of activity, has been, and continues to be, the subject of a great deal of research. Anomaly detection is used in limited form by a number of intrusion detection systems. There are strengths and weaknesses associated with each approach, and it appears that the most effective intrusion detection systems use mostly misuse detection methods with a smattering of anomaly detection components [2, 48]. ANOMALY BASED DETECTION Anomaly detection uses models of the intended behavior of users and applications, interpreting deviations from this â€Å"normal† behavior as a problem. A basic assumption of anomaly detection is that attacks differ from normal behavior. For example, we can model certain users’ daily activity (type and amount) quite precisely. Suppose a particular user typically logs in around 10 Am., reads mail, performs database transactions, takes a break between noon and 1 Pm., has very few file access errors, and so on. If the system notices that this same user logs in at 3 Am., starts using compilers and debugging tools, and has numerous file access errors, it will flag this activity as suspicious. The main advantage of anomaly detection systems is that they can detect previously unknown attacks. By defining what’s normal, they can identify any violation, whether it is part of the threat model or not. In actual systems, however, the advantage of detecting previously unknown attacks is paid for in terms of high false-positive rates. Anomaly detection systems are also difficult to train in highly dynamic environments [5]. MISUSE DETECTION Misuse detection systems essentially define what’s wrong. They contain attack descriptions (or â€Å"signatures†) and match them against the audit data stream, looking for evidence of known attacks. One such attack, for example, would occur if someone created a symbolic link to a UNIX system’s password file and executed a privileged application that accesses the symbolic link. In this example, the attack exploits the lack of file access checks [5, 10]. The main advantage of misuse-based systems is that they usually produce very few false positives: attack description languages usually allow for modeling of attacks at such fine level of detail that only a few legitimate activities match an entry in the knowledge base. However, this approach has drawbacks as well. First of all, populating the knowledge base is a difficult, resource intensive task. Furthermore, misuse based systems cannot detect previously unknown attacks, or, at most, they can detect only new variations of previously modeled attacks. Therefore, it is essential to keep the knowledge base up-to-date when new vulnerabilities and attack techniques are discovered. Figure 2 shows how the misuse detection based intrusion detection system works is [11]. RESPONSE OPTION FOR INTRUSION DETECTION SYSTEM Once intrusion detection systems have obtained event information and analyzed it to find symptoms of attacks, they generate responses. Some of these responses involve reporting results and findings to a pre-specified location. Others involve more active automated responses. Though researchers are tempted to underrate the importance of good response functions in intrusion detection systems, they are actually very important. Commercial intrusion detection systems support a wide range of response options, often categorized as active responses, passive responses, or some mixture of the two [2]. IMPORTANCE OF THE INTRUTION DETECTION SYSTEM Usually we place a burglar alarm on the doors and windows of our home. We are installing an intrusion detection system (intrusion detection system) for our house. The intrusion detection systems used to protect our computer network operate in similar fashion. An intrusion detection system is a software and possibly hardware that detects attacks against our network. They detect intrusive activities that enter into our network. We can locate intrusive activity by examining network traffic, host logs, system calls, and other areas that signal an attack against our network [14]. There are different benefits that an intrusion detection system provides. Besides detecting attacks, most intrusion detection systems also provide some type of response to the attacks, such as resetting TCP connections [14]. DESIRABLE CHARACTERSTICS OF INTRUSION DETECTION SYSTEM There are different characteristics for an ideal intrusion detection system, which are listed below [many references]: An ideal intrusion detection system must run with minimum human supervision. An ideal intrusion detection system must be easy to deploy. An ideal intrusion detection system must be able to detect attacks intrusion detection system must not produce false negative alarms. intrusion detection system must not produce false positive alarms. intrusion detection system must report intrusion as soon as possible after the attacks occur. intrusion detection system must be general enough to detect different types of attacks. An ideal intrusion detection system must be fault tolerant; it must be able to recover from crashes and must restore previous state, either accidental or caused by malicious activities. An ideal intrusion detection system must impose minimal overhead on the system. An ideal intrusion detection system must be configurable to implement the securities policies of the system. THE PERIMETER MODEL AND DoS The perimeter model is an architecture commonly used by today’s organizations to protect critical infrastructures. This security model divides network architectures into two distinct groups; trusted and entrusted. The trusted group is often the finite internal infrastructure, whilst the entrusted group consists of infinite external networks. In this model two types of devices are used; firewall to control the traffic entering and leaving the trusted domain, and intrusion detection system to detect misbehavior of trust with in the trusted area boundary [18]. WHERE IDS SHOULD BE PLACED IN NETWORK TOPOLOGY Depending upon network topology, the intrusion detection system can be positioned one or more places. It’s also depends upon what type of intrusion activities should be detected: internet external or both. For example if the external intrusion activities should be detected, and only one router is connected to the internet, the best place for an intrusion detection system may be just inside the router or firewall. If there are many different paths to the internet, then the intrusion detection system should be placed at every entry point. However, if the internal attacks should be detected then the intrusion detection system should be placed in every network segment 2. Placement of the intrusion detection system really depends upon security policies 3 [8]. Note that more intrusion detection systems mean more work and more maintenance costs. Which defines that what should be protected from the hackers [8]? IDS AGAINST DENIAL-OF-SERVICE ATTACKS (DoS) The goal of a DoS attack is to disrupt some legitimate activity, such as browsing, web pages, an on line radio and many more. The denial of service is achieved by sending message to the target that interferes with its operation and makes it hang, crash, reboot or do useless work [16]. A denial-of-service attack is different in goal, form, and effect than most