Tuesday, December 31, 2019
Justification And Relevance Of Lesson - 895 Words
Justification and Relevance of Lesson The students have learned about the heart, and about several conditions that may affect it. Moreover, they have learned the effects that cholesterol (LDL and HDL) has in the overall integrity or demise of the human body. In this new segment, they will learn about familial hypercholesterolemia (FH), and they will relate it to Annaââ¬â¢s cause of deathââ¬âafter running a gel electrophoresis experiment that will help identify whether or not Anna had the gene that codes for the FH mutation. This will further their knowledge about potential conditions that may have played a key role in Annaââ¬â¢s death. Standards and Learning Objectives Content Learning Standards (s) DCI-LS1.A: From molecules to organisms-structure and function. All cells contain genetic information in the form of DNA molecules. Genes are regions in the DNA that contain the instructions that code for the formation of proteins, which carry out most of the work of cells. Common Core State Standards AS.R.4- Reading: Interpret words and phrases as they are used in a text, including determining technical, connotative, and figurative meanings. Learning Objective (s) The students will be able to apply what they know about gel electrophoresis to identify an FH mutation in DNA. The students will apply genetics to what they learned about Ana and relatives hypercholesterolemia (FH mutation). Student Friendly Learning Objectives (Posted on the white board) I can apply what I know about gelShow MoreRelatedJustification And Relevance Of Lesson Essay954 Words à |à 4 PagesJustification and Relevance of Lesson Energy is the ability to do work. It has the potential to make changes, and any changes are due to work being done. This is significant because work can generate energy, and energy itself can do work (i.e., work done on windmills by the wind produces energy, and energy is used in homes to do work). Standards and Learning Objectives Content Learning Standards (s) HS-PS3-1: Create a computational model to calculate the change in the energy of one component inRead MoreAnalysis Of The Project Management Methodology Known As It Can Tie Into The Area Of The Subject1128 Words à |à 5 Pages INTRODUCTION ââ¬Å"Of all the thing Iââ¬â¢ve done, the most vital is coordinating the talents of those who work for us and pointing them towards a certain goal.â⬠ââ¬â Walt Disney. This quote is directly from Walt Disney himself. The quote has a huge relevance to project management as it can tie into the area of the subject, which is PRINCE2. The question before anything is: What is PRINCE2? The purpose of this paper is to provide a high-level overview of the project management methodology known as PRINCE2Read MoreA Research Study On Using The Talking Circle1190 Words à |à 5 Pages Although their sample size was small, the authors provided relevant justification for the limited number of participants. They cited that low sample sizes are historically common in aboriginal specific research (Gordon, et al 2014, p.7). Therefore, the small sample population and survey participation rates are adequate. Focus groups in a qualitative study allow the researcher to interview several participants simultaneously. Numbers of those within the group are typically no moreRead MoreMartin Luther s Transformation Of Christianity1120 Words à |à 5 Pagesabout a number of the doctrines, beliefs and practices of the Church (Christian History, 2008). These questions became the foundations of the development of his own ideas, formulating them into a doctrine of justification. ââ¬Å"This one and firm rock, which we call the doctrine of justification, is the chief article of the whole Christian doctrine, which comprehends the understanding of all godlinessâ⬠(Paul. A Bishop, 2011). He started challenging the Church by the 95 Theses, a list of his questionsRead MoreShould the U.S. Government Drop Its Sanctions against Cuba?1676 Words à |à 7 Pagesdemocracy and freedom to the people of Cuba, and now it is time to make a new beginning by lifting the embargos, and engaging with Cuba thr ough public diplomacy, communication and international aid. The atrocities of the Second World War were great lessons for humanity about the devastating effect of the use of arms. Specially, the development of atomic bombs, and the possession of mutually assured self-destruction nuclear weapons by the United States and the former Soviet Union renders the use of armsRead MoreAssessment And Data Driven Instruction1495 Words à |à 6 PagesAssessment: What is it good for? Rationale Assessment and data driven instruction are a vital part of teaching. Assessments are used frequently to guide the proceeding lessons. I am interested in learning more about the different types of assessments and the appropriate uses of each. I think it is critical as a future teacher to have many resources to back up my techniques, especially with the growing interest in data and tracking studentsââ¬â¢ progress. Gathering information about assessments willRead MoreThe World And Various Religious Phenomena1363 Words à |à 6 Pagesbeen viewed as a mystery to many, with no specific aspect attributed to its existence. Theories and experiments are used to explain its significance and relevance in human life. Organized religion emerged later to offer a channel through which social and economically large populations would attain their stability. It served to provide justification to the central authority and a great extent, emphasized on doing what is right for the sake of proper relationships. On the other hand, organized religionRead MoreSteps to Writing a Grant Proposal1257 Words à |à 6 Pagesfinding the appropriate request for proposal or application is to write an abstract for the proposal, which would include a summary of the proposal with the agency name, type, purpose and objectives, interventions, target population, location, and relevance of the proposed program to the funding intentions (Terao Yuen, 2003). The next phase of the proposal would be the table of contents, which is a guide of the contents covered and their location within the proposal. Other important parts of theRead MoreCelta: Assignment 3: Skills-Related1182 Words à |à 5 Pagesï » ¿CELTA-June 2013 Assignment 3: Skills-Related Part1: Justification of material choice For this Skills-related assignment, my choice of authentic reading material is ââ¬Å"Few Places with Better Storiesâ⬠. from Asian Geographic magazine (no 78 issue 1/2011, pages 30 and 35). As this magazine is widely read and it is also a popular TV channel, the students will be able to relate to it easily. I decided to use this article as I think it is appropriate for English Language learners at the Intermediate levelRead MoreHSC English Advanced Course Module B: Critical Study of Texts1532 Words à |à 6 Pagesof the film versions and writes a 3-page essay regarding how this difference impacts the overall interpretation of the film In groups, students select one large feature of the text and develop a means of representing this element on film, with justification based on the meaning of such a representation 3 films Formative Assessment Task: Students to visually represent a Scene, Character, Relationship or Theme from Romeo Juliet by William Shakespeare. Students are to submit or perform your Visual
Monday, December 23, 2019
Essay on A Life Changing Moment - Short Story - 3109 Words
A Life Changing Moment - Short Story Blood splattered high on the walls from the force of the blows. Even though the screams of the two children had long since ceased, Linda kept stabbing and slashing, her breath rasping in her throat from the effort entailed, only as her strength began to wane and her mental state start to alter did she slowly become aware that she and the room were covered in nauseating, thick scarlet red blood and in the distance of her darkness she could hear the echoing wail of police sirens! She slumped back exhausted and began to sob, slowly at first, then like a torrential downpour. How do you plead? She barely heard the words, not even realising they wereâ⬠¦show more contentâ⬠¦What sweetie? Lindas eyes met with the childs, her face was cheerful. Can I have some coco pops please? Of course you can sweetheart, but youll have to get them yourself, mummys got a lot of forms to fill out Ok, thanks mummy. The child lovingly pecked her on the cheek and skipped off into the kitchen while Linda pondered on how something as simple as cereal could bring such joy to her young sons life, her mind then skipped to thinking about how unusually quiet her other son tom seemed to be. She rose from her and tiptoed into the living room, peering round the door frame she spotted a single red crayon but as she walked further into the room she was greeted by the sight of her youngest son sleeping awkwardly on their laminate flooring, covered in all sorts of delightful substances such as glue, paint and play doh. Thomas Smith what am I going to do with you? she giggled to herself and began the not so enviable task of cleaning up the little monsters mess. It was three days later and the trial was well underway, it had become obvious to Linda that she was going to be made out to be someone who had suffered from mental problems from a young age, even though it wasnt the truth, only she knew the truth, but they werent interested in the truth, as far as they were concerned she was going down. They had called one ofShow MoreRelatedAnalysis Of Joyce Carol Oatess Where Are You Going, Where Have You Been?953 Words à |à 4 Pagesthroughout the story influences the behaviors and perspectives that she has on her own life, changing the initial thoughts that she had towards her family. In the short story, ââ¬Å"Where Are You Going, Where Have You Been?â⬠by Joyce Carol Oates, Connie encountered a guy named Eddie where they spent a few hours in a restaurant that later led them to being in an alley. Though this moment seemed to of little significance to Connie, an incident with a strange man, Arnold Friend, later on in the story left ConnieRead MoreStolpestad935 Words à |à 4 PagesBender Lassen In Stolpestad from 2008 the author, William Lychack, deals with life in the postmodern society through his main character Stolpestad. A middle-aged police officer not able to settle in the chaotic and confusing postmodern world. What starts out as a routine task of putting down a wounded dog ends up becoming a journey for spiritual awakening, as Stolpestad comes to some life-changing realizations. The story is set in a dull and gloomy town in which Stolpestad grew up and has inhabitedRead MoreThe Bear Came Over The Mountain By Alice Munro Essay1321 Words à |à 6 PagesLove exists in the short story ââ¬Å"The Bear Came Over the Mountainâ⬠by Alice Munro and in the short story ââ¬Å"What We Talk About When We Talk About Loveâ⬠by Raymond Carver. in Munroââ¬â¢s short story the plot is that of a mentally ill wife, Fiona, who falls in love with another patient while her husband still tries to hang on to their old love. Her husband eventually wants to have an affair with the wife of the man his wife is having an affair with. Their love changed because of their circumstances due toRead MoreA Good Man By Flannery O Connor Essay1049 Words à |à 5 Pagesauthor, Flannery Oââ¬â¢Connor states many points in this short story. It is to be said that Oââ¬â¢Connor is a very religious, catholic, in fact (Vol. 2 pg. 97). Oââ¬â¢Connor has stated her religious views in most of her fiction stories. Oââ¬â¢Connor was also known for her stories on violence. Readers sometimes find Oââ¬â¢Connorââ¬â¢s fictions to be weird with such turning points in her stories. ââ¬Å"A Good Man is Hard to Findâ⬠has many turning points and moods. The story starts off random with an elderly woman not wanting toRead MoreAn Analysis Of Yiyun Li s Book, Gold Boy, Emerald Girl, And A Man Like Him1487 Words à |à 6 PagesYiyun Liââ¬â¢s collection of short stories in Gold Boy, Emerald Girl share the common theme of loneliness in a collection of short stories: ââ¬Å"Souvenir,â⬠ââ¬Å"Sweeping Past, and ââ¬Å"A Man like Him.â⬠While the characters of each story encounter different hardships and tragedies, each character seemed to show development. At first glance, they seemed to have grown from their experiences. However, they eventually fall into a downward spiral of regret and sorrow after having epiphanies of their mistakes. The identifiableR ead MoreEssay on Good People1177 Words à |à 5 Pagescomprehend the complexity of being ââ¬Ëgood peopleââ¬â¢? Is it possible to write about an issue like this? In David Foster Wallaceââ¬â¢s short story ââ¬Å"Good Peopleâ⬠from 2007 we experience an attempt to do so. In the short story â⬠Good Peopleâ⬠Wallace manages to reflect upon the complex discussion of what ââ¬Ëgood peopleââ¬â¢ are, as this is the main theme of the text. To discuss this the story revolves around supporting themes of religious, existentialistic and ethical character. The religious theme is expressed inRead MoreFree Essays : Free Soul Free Women1237 Words à |à 5 Pageswillâ⬠. There are many literary works that illustrate stories about freedom and how sometimes to get that freedom one needs to do something or it naturally comes. The short stories ââ¬Å"Story of an Hourâ⬠by Kate Chopin and ââ¬Å"Woman Hollering Creekâ⬠by Sandra Cisneros illustrate this idea of freedom. Both of these stories have different characters with different backgrounds, but they share something in common. Both women have to face some difficult moments concerning their marriage and its outcome. HoweverRead MoreSymbolism In Ernest Hemingways The Snows Of Kiilimanjaro12 22 Words à |à 5 Pagesof the great American 20th century novelists, visit the house of God through his short story ââ¬Å"The Snows of Kilimanjaroâ⬠. Hemingway uses strong symbolic imagery to connect his readers with the life changing realizations of his main character Harry. The symbolism used in ââ¬Å"The Snows of Kilimanjaroâ⬠pertain not only to the main character, but also to the life of Ernest Hemingway. At the beginning of the short story, Harry comments that the birds circle around in the sky above, attracted to the smellRead MoreEvery Rose Has a Thorn Essay954 Words à |à 4 Pagesall can feel trapped in the day to day monotony of life. In something as simple as an hour that can all change. In The Story of an Hour by Kate Chopin a young woman reflects on the information of her husbandââ¬â¢s death symbolizing a surprisingly ironic mixture of misery and liberation. The basic idea of this story is the oppression a young woman faces in her marriage. This short but touching story is written about one hour in this young womanââ¬â¢s life, in the last decade of the nineteenth century, whereRead MoreComparison Of Flight And The Masquerade Of The Red Death1042 Words à |à 5 PagesIn the story ââ¬Å"Flightâ⬠by John Steinbeck and ââ¬Å"The Masquerade Of The Red Deathâ⬠by Edgar Allen Poe, both protagonists meet a similar fate. In ââ¬Å"Flightâ⬠, the main chara cter named Pepe, of mexican descent, is described as a lazy kid at the age of 19. His mother sends him to Monterey to get medicine and bath salts. In town, pepe gets insulted by a white man, and kills him with his fathers knife. His vision of being a man was taking someones life. He is hunted down by men seeking revenge for the man who
Sunday, December 15, 2019
What is DNA Free Essays
Alright, let me help you start off with the facts, DNA stands for Deoxyribonucleic Acid. Sound like a mouthful? Donââ¬â¢t worry youââ¬â¢ll get used to it. Anyway, from reading the title you can suggest that DNA is pretty important, itââ¬â¢s what everything living on the planet is made out of, from a tiny piece of bacteria, to the tallest tree in the world. We will write a custom essay sample on What is DNA? or any similar topic only for you Order Now Cells are a little bit bigger, but not that much bigger, theyââ¬â¢re still invisible to the naked eye. Alright, thatââ¬â¢s enough introduction for now, letââ¬â¢s get into some Deoxyribonucleic Acid! DNA is really important, from back in the billions of years ago without much life when the most lively thing on earth were bacteria, they were made out of DNA. Those bacteria were just Prokaryotic cells, but weââ¬â¢ll get into that later. You can think of DNA like some code on a computer program, itââ¬â¢s what makes it, without it, youââ¬â¢ve got nothing. It makes up the organism, tells it how to make more of itself, and displays what it can and cannot do. DNA is made out of a sneeze called ATCG which stands for Adenine, Thymine, Cytosine, and Guanine. ATCG in DNA are called nucleotides. Its structure is a double helix, it looks like a spiral staircase almost, or a spiral ladder. Adenine is connected through a bond made out of hydrogen atoms to Thymine, and only Thymine. The same goes for Cytosine and Guanine. These four substances can be arranged into almost anything, from a virus to the Chromosome of a Cell. DNA is you in a sense. It makes up everything you are, everything down to the smallest construct of you. Even down to the tiniest of red blood cells, thereââ¬â¢s DNA there too. Fun fact, one of the only things able to reach down far enough to break those hydrogen bonds I talked about earlier is called RNA; Which is what weââ¬â¢re about to get down into right now! There are many types of RNA. Think of RNA like half of a DNA strand. Instead of DNA being Deoxyribonucleic Acid, RNA is just Ribonucleic Acid, no more of that Deoxy stuff, it sounds like a detergent. Anyway weââ¬â¢ll be going over just 3 types of RNA, mRNA, rRNA and tRNA. Just a quick fact before we get into RNA, RNA contains AUCG. RNA is Adenine, Uracil ,Cytosine, and Guanine, all the same holds true for the bonding. Cytosine still binds to Guanine and Guanine only, but Adenine only bonds to Uracil now! mRna is messenger RNA. No, not that messenger app on your phone, mRNA is what copies half of the DNA strand information and sends off the DNA sequence information down to the tRNA, which is the next step in this whole DNA reproduction! The tRNA is what transfers that information down to the next stage rRNA. rRNA is the ribosomal or receiver RNA. It receives the rRNA and just builds that other half of the DNA and just rinse and repeat after that. All of this is happening inside you right now constantly until you die. Alright! Letââ¬â¢s get into genes! Not those pants youââ¬â¢re wearing, weââ¬â¢re talking about genetic genes. And as such letââ¬â¢s talk about a person for a moment. His name was Gregor Mendel, He was born in 1822 and died in 1884. But letââ¬â¢s talk about what happened in between those points. Gregor mendel is referred to the father of genetics. A long time ago he had an experiment with pea plants. He took a pink pea plant, and a white pea plant, and cross breed them, meaning he took a seed from one and pollen from another and put them together. After all the seeds grew up, he got 100% pink pea plants and 0% white ones. ââ¬Å"How could this be?â⬠he thought. He performed the experiment again and he got 75% pink and 25% white ones. This is due to Dominant and Recessive Genes. A dominant gene, in this case was the pink leaf. The recessive gene was the white one. Letââ¬â¢s say the white petals were ww chromosomes and the pink ones were PP. Remember how I said DNA could display what is could or could not do? well the chromosomes are just that. Only ww could make up white, but PP and Pw could make up pink. Cross breeding would get you 16 different results. And to how reproduction works you only pass down one of those chromosomes. So all of them came out pink if you do the math, thatââ¬â¢s the only possible combination being Pw. But cross breeding those two again gave him another 16 results, but this time, it wasnââ¬â¢t PP vs ww, it was Pw vs Pw. And as such, the results were 4 white and 12 pink, because you only have 1/4th chance of getting a ww. And the others were either Pw or PP. And thatââ¬â¢s how recessive and dominant genes work. Now. Letââ¬â¢s talk about something called Cells, I know youââ¬â¢ve heard of them, reader. Cells are made up of a membrane bound nucleus, lots of ribosomes, mitochondria, the Golgi apparatus and the soft and hard endoplasmic reticulum and a little bit of cytoplasm for filling. Letââ¬â¢s start off with the center of a cell, the nucleus. The nucleus is the heart of the cell, however the nucleus is like a casing for the nucleolus, like the brain of the cell. The nucleolus is surrounded by chromosomes, which are in every cell, and those chromosomes look like a giant, but still tiny X. Farther out from the nucleus, we have the Endoplasmic reticulum (ER) right outside. The ER is useful in modifying and transporting proteins. Some of the time they stay put in the ER and sometimes they go out onto the Golgi apparatus! The Golgi apparatus is like the boxing part of the factory, it packages the proteins into lipids and vesicles. A lipid is what that makes up the cell membrane, like the outside shell. A vesicle is this bubble that actually leaves the cell and releases the proteins to other cells in the area. This is constantly happening inside your body as you are reading this. As you probably learned in biology some day that the mitochondria are the powerhouse of the cell. Something else that is really cool is that mitochondria have their own DNA that is specific to them, not shared throughout the cell. However mitochondrial DNA is highly susceptible to mutations because it does not have robust DNA. Inside the mitochondria is adenosine triphosphate or you can just call it ATP for short. ATP is energy for cells, it can transfer energy, and is sometimes referred to as the currency of the cells. Another thing they do is that they generate heat and help with signaling activities, and mediate cell growth and death. The number of mitochondria in the cell varies, like say in the liver, there are sometimes hundreds of mitochondria for energy to break down foods. Now, we are going to talk about Plant Cells. Actually, before we go and talk about Plant cells, letââ¬â¢s talk about the difference between them. Plant cells are very similar to Animal cells, but Plant cells have Cell Walls, and Chloroplasts. Thatââ¬â¢s pretty much it actually. Most of the rest is the same. You all know that plants perform photosynthesis, turning light energy into food, or ATP. But how do they do it? Well it starts was down in the cells with something called chloroplasts. This is something that animal cells do NOT have. Inside a chloroplast is many of these little green disks called thylakoids. These thylakoids contain chlorophyll, thatââ¬â¢s where the magic happens. If you didnââ¬â¢t know, chlorophyll is green, and that is the major role in what makes most leaves and most plants green! Thatââ¬â¢s why Big trees have so many leaves. They need so much food, so they need a wide area to capture sunlight,. Alright, letââ¬â¢s get into some history. Plant and animal cells are called Eukaryotes and Iââ¬â¢m about to talk about something much older. Prokaryotes are 2 billion years older than Eukaryotes. Fun fact: Eukaryotes came from Prokaryotes. Prokaryotes are very simple, they only have a singular but long strand of DNA that just floats inside the cell. Prokaryotes are just bacteria, thatââ¬â¢s the domain they belong to. The story on how Prokaryotes become Eukaryotes is that one day a Prokaryote swallows another bacterium, and the relationship works nicely. That other bacterium is called mitochondria. so when the cell reproduced through binary fission it split half of the mitochondria, and then the cycle repeated and other things were engulfed and then evolution came and then suddenly you have a Eukaryote after 2 billion years. But now, letââ¬â¢s talk about our final category, Viruses. Everybody has heard of them and been infected by them, but what are they? s you may have guessed there are many different types of viruses. This is Called biological diversity. If there were only one virus in the world, we would become immune and the virus would die off without hosts. Viruses can only survive if they have host cells, and all viruses want to do is spread as far and wide as possible. How to cite What is DNA?, Papers
Friday, December 6, 2019
Journal Of Bodywork And Movement Therapies ââ¬Myassignmenthelp.Com
Question: Discuss About The Journal Of Bodywork And Movement Therapies? Answer: Introducation From the aspect of looking at the point of users and the persons linked to the use of the companys website then the users are liable to share their personal information with the company (Tankard, 2012). The users would want to keep their data safe from the hand of the hackers and breaches. The online portal requires the user to submit their personal information as well as bank details from where they are able to purchase the items from the companys online e commerce website. The company should take into consideration that if there is an increase in the number of users in the companys website there would be more the amount of revenue will be flowing into the company (Whittaker, 2015). This would in turn help the company to keep them afloat in the market competition. It can also be said that the number of crimes on the data source increases with the increase in the number of users of the website. More the number of users more will be the amount of information on the server this would c ost more to the hackers when they sell the information on the black marketing. Thus, the company being one of the top leaders in the selling of products in the form of departmental chain the technological revolution would push the users to make purchases on the online e commerce website (Tankard, 2012). Thus looking from the financial point of view if the company invest a certain amount of money in acquiring the cloud server for the organization then the company would be able to keep many of the data safe from the hackers and the data breaches that might occur in the companys data servers. The logging of information has to be located in different co locations of the server (Whittaker, 2015). The safe guard of the data can only be maintained if the data that is being inserted is being committed after every step of data inserted. The committed data should follow a specific norm, which is to be relate to the investigation that can to take place along with the evidence that the vendor w ill be able to view with the prospective of the activity. Apart from this process, there is no other safe guarding procedure for the data of the user, which is being stored in the servers of the company (Whittaker, 2015). Security Posture Review The major aim, which is to be followed when moving into the cloud server can directly help in the achievement of the cloud computing resources like data servers, and application based on the working of the data servers (Rosrio, 2014). The company achieves the procedure by the help of a simple pay and use procedure, which requires the company to pay a certain amount of money to the cloud service provider in return for a certain amount of storage on their servers. The overall model of the cloud servers in based on the concept of the use of virtualization and intelligent computing techniques based on the distributed mechanism of cloud architecture (Pratyusa et al., 2013). The main module architecture of the cloud servers can be achieved by the company with the help of the use of high amount of resources, which should be abstracted in nature, use of instant scalability and flexibility properties of the data that is being transferred onto the cloud. The data that is being used should also follow the property of the near provisions of the instantaneous of the visual aid of the data (Pagliari and Kevin, 2014). All the resources should be shared among all the other resources so that the whole system will be able to function in a proper manner. The service on demand facility of the cloud servers should be taken up by the company, which would help the organization to not pay extra for any unwanted space and just buy the space when they require it. The management of the cloud resources should be done using the best form of programmatic management otherwise the data will fail to get stored in the server and there will be a huge loss in money. The different types of cloud services that are offered by the cloud service providers are Software as a service (SaaS), Platform as a service (PaaS) and Infrastructure as a service (IaaS). Software as a service (SaaS) can be said to be related to the use of software related services based on cloud servers which are delivered by a thir d party company which is mainly made available on the pay for the demand basis (Luiijf, 2012). The use of the server is provided through the help of a remote configurable internet remote. These services come in the form of CRM software and spreadsheet tools. Platform as a service (PaaS) is a form of cloud service providing procedure which makes use of an API ton provide the customer with the delivery of the new cloud service. The company is provided with an API interface, which helps in the use of the services in the form of a deployment platform or a configuration tool or in the form of a development tool (Kowalski, Rostyslav and Robert, 2012). This type of services are provided by Microsoft Azure and google search engine services. Infrastructure as a service (IaaS) is the use of the virtual machine concept for the provision of the cloud servers to the users who require a separate cloud server for their company but does not want to take the responsibility of looking after the serve r all the time (Kim, Ronnie D. and Kyung, 2012). This is done by the cloud providers and are controlled by the user by an API. The most common use of this type of service is by the Amazon web services. With respect to Myer, the best solution for the company would be to buy a certain amount of space on the cloud server and avail the use of the Infrastructure as a service (IaaS). This would help them to have a separate location for their services on the cloud and the care to be taken for the cloud server is zero for them. They would only be required to be charged for the servers that is being provide for them (Jo, Hakkon and Kwangwoo, 2014). The security aspect of such use of technology is very high. The cloud provider has the maximum headache on their mind because if their services are compromised then they would receive a bad name in the market and the user would start to back out of their services. The business of providing cloud services in the form of Infrastructure as a service (IaaS) is of a very high risk as well as of a very high profit margin for the company. Though the initial cost of the purchase of the servers is high, it would help the company in the long run to keep th eir users data safe on the cloud. The timely update of the servers will come at no extra cost for the organization. Thus, it would be the best choice for Myer to select Infrastructure as a service (IaaS) for their organizations use (Ductor, Lorenzo, and Daryna Grechyna, 2015). Threats, Vulnerabilities and Consequences Assessment Taking into account of the different threats that are constantly being produced for the cloud servers, many of the companies are not even ready to move to a cloud based data server. The use of the servers always poses threats to the company as they are not always satisfied with the cloud servers. They imagine that the server might shut down at any time and all the data might get lost into the network stream (Chou, 2013). This is not the case that is occurring on a cloud server. The data that is being used for the transaction procedure is always safe. The data is being processed using the process of roll back and deadlock mechanism, which uses keeps the data safe even if the server fails to keep up with the transaction procedures (Chen, Deyan, and Hong Zhao, 2012). The vulnerabilities for the use of a cloud server is that the hacker might be able to get in to the server without the company even knowing about it. The hacker can then steal the information from the sever and leave withou t leaving behind any kind of trace of the working they had just done on the server. This would become harmful and should be stopped with the help of regular monitoring of the network stream (Cardenas at al., 2013). If there were any kind of wrong IP address in the network stream then the officials will be notified instantly and they would start working on the problem as soon as possible. The service providers will do everything to keep their data as well as the data of their customers safe form the attack (Buldt et al., 2013). Apart from this active attackers there is another kind of attackers termed as passive attackers. They does not cause havoc on the servers but start their work slow by collecting information from the network stream that is connecting the server to the company. They read packets and try to make out the information that is being transferred. Once they gain enough knowledge, they leave and come back with a planned out bigger attack. This attack can be easily reduc ed with the help of effective cryptographic techniques when the data is being transferred through the network (Baicu and Andrei Mihai Baicu, 2012). Data Security The concept of data security is of high importance when it comes to keeping data safe from the hands of hackers and from the attack of data breaches. The company chosen for the report, Myer has recently moved into the field of e commerce technology. This means that the company will be having a data set of large amount of users and their respective personal information and bank account details. This details if gets leaked then the users will be compromised (Andreosso-OCallaghan and Jrn Carsten Gottwald, 2013). The situation would not be able to be controlled into a small location. The hackers will be able to clear out money form the accounts of the user of the Myers online e commerce website. For the safety of the company as well as for its users the company should invest in a cloud server which would help the company to keep the data related to all the sensitive work safe and out of the reach of the hackers. Once on the cloud server, the data is encrypted using two-step verification model, which would require extensive work in cracking the data. More over the data is kept safe from all types of virus attack and breaches. The breach will be detected even before they are able to get into one layer of the security protocol of the cloud servers (Aloul, A R Al-ali and Mamoun, 2012). The use of the cloud also helps the company to spread their data over a large amount of area and in turn making it hard for the hacker to locate the continuity of the data stream. Apart from all this facts the company should always follow a risk mitigation procedure, which should be kept at arm length at all, times. This would help the company to reduce the minimum amount of risk as soon as it occurs (Aduda and Elizabeth, 2012). Conclusion To conclude this report, it can be said that the organization Myer would be successfully implement the clouds computing servers in their system if they are able to follow the report that has been produced for the organization. The use of a cloud server would help them to keep their data a safe as well as keep it away from the hackers and data breaches which might occur on the organization. As already discussed in the report it would be highly beneficial for the organization to shift to the use of Infrastructure as a service (IaaS) on a cloud server which would make the data of the users safe. References Aduda, Josiah, and Elizabeth Kalunda. 2012. Financial Inclusion and Financial Sector Stability With Reference To Kenya: A Review of Literature. Journal of Applied Finance Banking 2(6): 95120. Aloul, Fadi, A R Al-ali, Rami Al-dalky, and Mamoun Al-mardini. 2012. Smart Grid Security : Threats , Vulnerabilities and Solutions. Smart Grid and Clean Energy Smart (971): 16. https://www.aloul.net/Papers/faloul_ijsgce12.pdf. Andreosso-OCallaghan, Bernadette, and Jrn Carsten Gottwald. 2013. How Red Is Chinas Red Capitalism? Continuity and Change in Chinas Financial Services Sector during the Global Crisis. Asia Pacific Business Review 19(4): 44460. Baicu, Floarea, and Andrei Mihai Baicu. 2012. Risks Management Relating to Information Systems Security Vulnerabilities and Threats in Information Systems. Quality - Access to Success 13(128): 11216. Buldt, Andrew K. et al. 2013. The Relationship between Foot Posture and Lower Limb Kinematics during Walking: A Systematic Review. Gait and Posture 38(3): 36372. Cardenas, Alvaro a., Pratyusa K. Manadhata, and Sreeranga P. Rajan. 2013. Big Data Analytics for Security. IEEE Security Privacy 11(6): 7476. https://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6682971. Chen, Deyan, and Hong Zhao. 2012. Data Security and Privacy Protection Issues in Cloud Computing. 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE) 1(973): 64751. files/443/Chen and Zhao - 2012 - Data Security and Privacy Protection Issues in Clo.html. Chou, Te-shun. 2013. Security Threats on Cloud Computing Vulnerabilities. International Journal of Computer Science and Information Technology 5(3): 7988. https://www.airccse.org/journal/jcsit/5313ijcsit06.pdf. Ductor, Lorenzo, and Daryna Grechyna. 2015. Financial Development, Real Sector, and Economic Growth. International Review of Economics and Finance 37: 393405. Jo, Hoje, Hakkon Kim, and Kwangwoo Park. 2014. Corporate Environmental Responsibility and Firm Performance in the Financial Services Sector. Journal of Business Ethics 131(2): 25784. Kim, Ju Young, Ronnie D. Caytiles, and Kyung Jung Kim. 2012. A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks. Journal of Security Engineering 9(3): 24150. Kowalski, Stewart, Rostyslav Barabanov, and Robert Hoffmann. 2012. Cyber Security Alert Warning System: A Socio-Techinal Coordinate System Proposal. In Proceedings - 2011 3rd International Workshop on Security Measurements and Metrics, Metrisec 2011, , 2124. Luiijf, Eric. 2012. Understanding Cyber Threats and Vulnerabilities. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7130: 5267. Pagliari, Stefano, and Kevin L. Young. 2014. Leveraged Interests: Financial Industry Power and the Role of Private Sector Coalitions. Review of International Political Economy 21(3): 575610. Pratyusa K. Manadhata HP Labs, Princeton, NJ, USA, USA Alvaro A. Crdenas University of Texas, Dallas, and Sreeranga P. Rajan Fujitsu Laboratories of America. 2013. Big Data Analytics for Security. IEEE Security Privacy (December): 7476. Rosrio, Jos Lus Pimentel do. 2014. Biomechanical Assessment of Human Posture: A Literature Review. Journal of Bodywork and Movement Therapies 18(3): 36873. Tankard, Colin. 2012. Big Data Security. Network Security 2012(7): 58. https://linkinghub.elsevier.com/retrieve/pii/S1353485812700636. Whittaker, Perry. 2015. Financial Services Sector Feels the Buzz of Disruption. Australian Financial Review. https://www.afr.com/news/special-reports/age-of-disruption/financial-services-sector-feels-the-buzz-of-disruption-20150614-ghnyb1
Subscribe to:
Posts (Atom)