Saturday, May 23, 2020

Investigating Website

Investigating Website Introduction The advancement of technology has enabled businesses to seek technological solutions to improve operational efficiency. Companies have realized that operating on the frontiers of technology drives success and boosts the quality of service. However, regardless of the many benefits that technology brings, various challenges affect its adoption. Hacking has become a big concern for most organizations. Some of the software solutions used in businesses possess security risks as they are as vulnerable to attacks. Hackers are individuals with advanced skills in information technology and spend most of their time analyzing the vulnerabilities exposed by these solutions to find ways to penetrate the organizational systems. Established companies face the risk of hacking as the primary goal of these individuals is monetary gain by exposing sensitive company information including financial statements and trade secrets. They use sophisticated hacking tools that bypass the security perimeters put in place. Significantly, adhering to the security best practices can go a long way in discouraging hacking. Factors such turning on software updates, using the current versions, using strong antiviruses, and using monitoring tools such as IDS (intrusion detection systems) and IPS (intrusion prevention systems) can help mitigate these risks before they cause harm to the infrastructure in place. Fundamentally, the internet is considered insecure as it is not regulated. As such, users might download malware while visiting unverified sites that might compromise the system. As such, using firewalls and other monitoring tools can block the unwanted packets, thus serving as an additional layer of defense. Choosing the right network devices and software for the IT infrastructure is essential. Apart from improved efficiency, the software from recognized vendors ensures high security as they have enhanced features that block some common security threats. Software vulnerabilities and how to mitigate them Cross-scripting is one of the main attacks that affect systems in the contemporary society. This attack involves initiating malicious payloads into vulnerable web applications and software such as PAN-OS. Essentially, the hacker injects unencoded input into the output the web application generates. Most users usually visit unverified sites in the workplace during their free time to access information about entertainment, shopping experience, and general information about politics. Most of these sites might have malicious scripts injected in the web pages visited by end-user that might download into the computer. In many cases, these untrusted websites pop up with an attractive deadline to lure the end user to click on them. The hacker uses this opportunity to administer browser-side scripts to the targeted and unsuspecting end-user. Since the internet does not have security parameters to filter which content is malicious, the attackers take advantage to initiate attacks of this natur e. There exist two XSS attacks: reflected and stored attacks. For stored attacks, the injected scripts are severe and persistent as they permanently embed in the target end-users computer in the form of logs. When the user revisits the same site, the malicious script is replicated and it is permanently stored in the application database. On the other hand, the reflected attack appear when the injection is manifested in the form of error message when the end user tries accessing the website. Most of the reflected attacks are initiated by clicking web links that appear in emails. For instance, they tend to trick the user that he/she has won a prize and needs to click on the provided link to claim. The user is then prompted further to input personal details such as an email and phone number after which the script will be embedded into the target users email. Consequently, these two types of scripting attacks cause annoyance. They usually hijack the users sessions by redirecting to othe r sites that the customer did not request. This might lead to installing other malware such as Trojan horse and modifying content presented in the existing sites. There have been instances where cross-scripting attacks have resulted in changing the financial information of companies including their stock prices in the market. Other reports indicate that these attacks have compromised healthcare information by modifying prescribed dosage resulting in under-dose, or overdose. On the other hand, Synology and DSM software allow an authenticated-remote user to download any system file. The software does not consider the privileges each user as while accessing files. This possesses as a threat as the attack can use this capability to initiate cross-site scripting. However, ensuring the best practices when using the internet can help mitigate this type of attack. Firstly, users should be discouraged to access any site that is not https (secure). Http websites are untrusted as hackers use such site to initiate attacks. Also, it is advisable to refrain from clicking on any site that pop-up into the browser. Some of these attacks assume the exact links of the original site, and it is difficult sometimes to tell if they are fake. As such, always search the real company information by manually typing their links. Kerberos key distribution center (KDC) affects window server 2012 R2 and other older versions. This vulnerability grants users who sign into an active dir ectory domain system remotely administrative privileges using invalid session signature. By having administrative privileges, the hacker can access any computer belonging to the same domain. Microsoft is working countering this attack in future. On the other hand, versions of windows operating system exhibit a number of vulnerabilities including file sharing permissions, insufficient firewall protection, and lack of malware protection. Essentially, the file sharing capability in Windows 7 and 8.1 grants everyone on the network permission to access files from a file server located in another computer. This is risky as anyone on the network can access such file and inject scripts into the system corrupting all files. Also, the firewall feature present in the OS is inefficient as it cannot block all untrusted applications that masquerade as trusted. Also, it is incapable of filtering packets from the internet and blocking malicious ones. However, installing strong antivirus such as Kaspersky can help block unwanted programs. Also, installing host-based intrusion prevention software monitors malicious packets and blocks them. Hardware vulnerabilities and how to mitigate them Hardware components such as routers, PCs, Switches, Firewall, and servers also present a number of weaknesses. For instance, CAM table attack is common among switches. When the attackers gain unauthorized entry into the local area network, they flood the switch with mac-address until it becomes full; thus can listen to any frame across the network since it now acts as a hub. However, port security can help mitigate this problem by only enabling the switch to learn a specified number of mac addresses. In routers, especially, those that do not have firewall feature enabled. The attack can send requests through SQL injection to the local area network from the internet, accessing personal credentials of the users. As such using network-based honeypots and IPS (Intrusion Prevention systems) can help block such requests from the outside. Concerning the firewall, lack of creating zone to distinguish trusted zone and untrusted zone can pose a threat as anyone can easily infiltrate the system . To mitigate this problem, the administrator can implement the firewall functionality by using ACL command to filter and inspect packets. In summary, the ability to have the right measures in place for combating security vulnerabilities can help the company avoid losses. As such choosing the right software solutions and hardware is fundamental in securing the system from both the internal and external attacks

Monday, May 11, 2020

Unstable Urbanization Between The Years 2017 And 2050

Iaian Singletary Dudek English IV H 2nd 9 March 2017 UNSTABLE URBANIZATION Between the years 2017 and 2050, â€Å"the United Nations projects that global population will increase significantly by nearly 2.5 billion people putting the global population at around an estimated 9 to 10 Billion people† (Jiang). In the near future it is predicted that the global urban population will nearly double if not possibly triple in size. Which will create a global imbalance in quality of life and put an even greater strain on our planet’s resources as we reach earth’s carrying capacity. Particularly in less developed and developing countries in which cities are increasingly becoming a more economically viable and beneficial option than living in more rural†¦show more content†¦Throughout human history, cities have been constructed along bodies of water. Such as rivers, deltas, and coastlines, which provide water sources, transportation routes, and power. These water sources have been modified to meet urban needs, which is often at the expense of local aquatic ecosystems surrounding the city. â€Å"The concentration of transportation and industry in urban areas also alters biogeochemical cycles, which significantly affects the flow of chemical elements and certain compounds† (Jiang) Metropolitan centres often concentrate sources of CO2, emissions and other various greenhouse gases and pollutants, which can heavily induce an imbalance of air quality in neighboring ecosystems. In more populous cities, such as Mexico city, major roadways have thousands o f cars on them at one time and traffic congestion in megacities contributes to a concentration of emissions along nearby highways, beltways and typically in the central business district in a downtown area. In our ever expanding cities across the globe, it is estimated that only about 20% of the current world population can be said to have a generally adequate and sustainable standard of living. By â€Å"standard of living†, referring to the the income levels of individuals of the developed world consisting mostly of North America, Western Europe, and Japan. In the remaining 80% of the global population most of the inhabitants of â€Å"developing nations† live in conditionsShow MoreRelatedWater as a Source of Future Conflict in Sa26984 Words   |  108 Pagesresources, because it does not have choices and alternatives. As a consequence of global warming and pollution, importance of water has increased much. Some 2 billion people† already lack water supplies. Water use has risen six-fold over the past 70 years. By 2050, it is estimated that 4.2 billion people live in countries that cannot meet people’s daily basis needs. South Asia is a region of water abunda nce and scarcity. â€Å"Issues concerning water allotment are the basic strategic distress over the state

Wednesday, May 6, 2020

Management Control System Free Essays

Management Control System Assignment â€Å"Budgeting Preparation† * Budget Preparation Budget preparation is a summary of company’s plans that sets specific targets for sales, production, distribution and financing activities. It generally culminates in a cash budget, a budgeted income statement, and a budgeted balance sheet. In short, this budget represents a comprehensive expression of management’s plans for future and how these plans are to be accomplished. We will write a custom essay sample on Management Control System or any similar topic only for you Order Now It usually consists of a number of separate but interdependent budgets. One budget may be necessary before the other can be initiated. More one budget estimate effects other budget estimates because the figures of one budget is usually used in the preparation of other budget. This is the reason why these budgets are called interdependent budgets. * Gudeline of Budget Preparation Operating Budgets An operating budget is a statement that presents the financial plan for each responsibility centre during the budget period and reflects operating activities involving revenues and expenses. The most common types of operating budgets are  expense,  revenue, and  profit budgets Expense Budget An expense budget is an operating budget that documents expected expenses during the budget period. Three different kinds of expenses normally are evaluated in the expense budget -fixed,  variable  and  discretionary  (Discretionary expenses – costs that depend on managerial judgment because they cannot be determined with certainty, for example:  legal fees, accounting fees  and  RD expenses). Revenue Budget A revenue budget identifies the revenues required by the organization. It is a budget that  projects future sales. Profit Budget A profit budget combines both expense and revenue budgets into one statement to show  gross and net profits. Feature article about  Production Management Profit budgets are used to make  final resource allocation, check on the adequacy of expense budgets relative to anticipated revenues, control activities across units, and assign responsibility to managers for their shares of the organization’s financial performance. Financial Budgets Financial Budgets outline how an organization is going to acquire its cash and how it intends to use the cash. Three important financial budgets are the  cash budget,  capital expenditure budget  and the balance sheet budget. Cash budget Cash budgets are forecasts of how much cash the organization has on hand and how much it will need to meet  expenses. The cash budget helps managers determine whether they will have adequate amounts of cash to handle required disbursements when necessary, when there will be excess cash that needs to be invested, and when cash flows deviate from budgeted amounts. Capital Expenditure Budget Capital Expenditure Budgets,  Investment in property,  buildings and  major equipment  are called capital expenditure. Such capital expenditure budgets allow management to forecast capital requirements, to on top of important capital projects, and to ensure the adequate cash is available to meet these expenditures as they come due. The balance sheet budget The balance sheet budget plans the amount of  assets  and liabilities  for the end of the time period under considerations. A balance sheet budget is also known as a  pro forma (projected) balance sheet. Analysis of the balance sheet budget may suggest problems or opportunities that will require managers to alter some of the other budgets * Budgeting Process * Behavioral Aspects Actually, an effective budget preparation process blends the two approaches. Budgetees prepare the first draft of the budget for their area of responsibility, they do so within guideliness established at higher level. Senior managers review and critique these proposed budgets. Research has shown that budget preparation where the process in which the budgetee is both involved and has influence over the setting of budget amounts and it has positive effects on managerial motivation for two reasons : 1. There is likely to be greater acceptance of budget goals if they are perceived as being under managers’ personal control, rather than being imposed externally. This will leads to higher personal commitment to achieve the goals. 2. Participative budgeting result in effective information exchanges. The approved budget amounts benefit from the expertise and personal knowledge of the budgetees, where the budgetees have a clearer understanding of their jobs through interactions with superior during the review and approval phase. The budget department has a particularly difficult in behavioral problem. It must analyze the budgets in details, and it must be certain that the budget are prepared properlu and that the information is accurate. To accomplish the tasks, the budget department sometimes must act in ways that line managers perceive as threatening or hostile. To perform, their function effectively, the members of the budget department must have a reputation for impartiality and fairness. If they do not have this reputation, it becomes difficult, if not impossible, for them to perform the task necessary to maintaining the effective budgetary control system. Citation Anthony, R. N. , ; Govindarajan, V. (2007). Behavioral Aspects. In Management Control System (pp. 391-393). New York: McGraw-Hill. How to Prepare Budget. (n. d. ). Retrieved November 02, 2012, from CWA – Communication Workers of America: How to cite Management Control System, Essay examples Management Control System Free Essays Coca Cola Goes Small in India The coca-cola company is the number one seller of soft drinks in the world. Every day an average of more than 1 Billion servings of Coca-Cola, Diet Coke, Sprite, Fanta and other products of Coca-Cola are enjoyed around the world. The company has the world’s largest production and distribution system for soft drinks and sells more than twice as many soft drinks as its nearest competitor. We will write a custom essay sample on Management Control System or any similar topic only for you Order Now Coca-Cola products are sold in more than 200 countries around the globe. For several reasons, the company believes it will continue to grow internationally. One reasons is that disposable income is rising Another reason is that outside the United States and Europe, the world is getting younger. In addition, reaching world markets is becoming easier as political barriers fall and transportation difficulties are overcome. Still another reason is that the sharing of ideas, cultures and news around the world creates market opportunities. Part of the company mission for Coca-Cola to maintain the world’s powerful trademark and effectively utilize the world’s most effective and pervasive distribution system. In June 1999 Coca-Cola India introduced a 200-milliliter Coke bottle in Delhi, India, in a campaign to market Coke to its poorest customers. This strategy was successful for Coca-Cola in other countries such as Russia. The bottle sells for Rs. 12, making affordable to almost everyone. In 2001, Coca-Cola enjoyed 25% growth in India including an 18% increase in unit case sales of Coca-Cola. Because of the variability of bottling machinery, it is likely that every 200 milliliter bottle of Coca-Cola does not contain exactly 200 milliliters of fluid. Some bottles may contain more fluid and other less. Because 200 milliliters fills are somewhat unusual, a production engineer wants to test some of the bottles from the first production runs to determine how closely they are to the 200 milliliter specification. Suppose the following data are the field measurements from a random sample of 50 bottles. Consider the measures of central tendency, variation, skewness. Based on this analysis, explain how the bottling process working? 200. 1 200. 1 199. 7 200. 1 200. 4 199. 6 200. 1 200. 3 200. 2 200. 2199. 9 200. 9 200. 4 199. 4 199. 8 200. 4 200. 8 200. 5 200. 5 199. 5200. 2 200. 1 200. 3 199. 6 199. 9 200. 4 199. 9 199. 9 200. 2 200. 6200. 2 200. 3 199. 8 199. 2 200. 2 200. 6 200. 0 201. 1 199. 7 200. 3200. 0 200. 5 199. 3 200. 2 199. 6 200. 6 199. 9 199. 7 200. 9 199. 8 How to cite Management Control System, Essay examples