Sunday, December 29, 2019

Computer Security As A Critical Problem For Computer Systems

ABSTRACT Over the past decade computer networks have rapid growth, but the computer security became a critical problem for computer systems. Thus in the recent years various soft computing technique based methods were proposed to detects the growth of intrusion. Also many researchers have reported that the large set of pattern classifications and machine learning algorithms are trained and testing is made on the knowledge discovery data intrusion detection dataset is unsuccessful in finding the remote-to-local attacks and user-to root attacks. Moreover Hyperbolic Hopfield Neural Network(HHNN) based Intrusion Detection Systems (IDSs) detection stability, detection ratio, particularly low-frequent attacks are still required to be improved. Thus this paper proposes a new method known as K-Medoids-HNNN using the technique HHNN and K-Medoids clustering. This system achieves the higher intrusion detection rate, detection stability and less false positive rate. At first the proposed system implements the K-Medoids clustering technique on the various training subsets. Afterwards a mono HHNN model is trained using the different training subsets to detect the intrusion. The experimental results shows the K-Medoids-HHNN approach achieve better results rather than other framework. Keywords: Network Security, Intrusion Detection System, Hyperbolic Hopfield Neural Network, K-Medoids Clustering approach 1. INTRODUCTION In the last decades, the computer network systems are veryShow MoreRelatedSecurity And Risks Of Information Systems Essay1268 Words   |  6 Pages Most significant IS security and risk issues Information systems have developed rapidly over time and are being relied by more people. With the increasing reliability of Information Systems, businesses have adopted them a lot. Companies or businesses using Information System have an advantage in competitiveness and efficiency (Hilton, 2013). AIC uses an IS in its activities to enhance communication and collaboration. Due to the wide use, Information Systems have become an important part of everydayRead MoreThe Problem Of Cyber Warfare1531 Words   |  7 PagesIn computer science, there is a law named â€Å"Moore s Law† which states that every eighteen to twenty-four months, the number of transistors that can fit on a computer chip will double. This exponential growth of computing power has brought the human race to a point where we can almost no longer be completely human. While these advancements were done with strong and positive intentions, new security dangers have arisen along with them. Though a large chunk of the se dangers are studied and well knownRead MoreNetwork Support For Computer Network Security Problems Essay705 Words   |  3 PagesNetwork Support For Computer Network Security Problems By Daniel A Hughes | Submitted On September 12, 2011 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest Expert Author Daniel A Hughes Computer networking was inventedRead MoreThe International Telecommunication Union ( Itu ) Defines Cyber Security1551 Words   |  7 Pagescelestial bodies known in our solar system, our technology has literally and figuratively rocketed the human race into the future. While our technology becomes increasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives. What is Cyber Security? The International Telecommunication Union (ITU) defines Cyber Security as â€Å"Cybersecurity is the collectionRead MoreThe International Telecommunication Union ( Itu ) Defines Cyber Security1547 Words   |  7 Pagescelestial bodies known in our solar system, our technology has literally and figuratively rocketed the human race into the future. While our technology becomes increasingly more advanced so does the ability to steal information from these systems. Cyber Security is one of the biggest threats our nation faces as we become more dependent on the use of technology in our day to day lives. What is Cyber Security? The International Telecommunication Union (ITU) defines Cyber Security as â€Å"Cybersecurity is the collectionRead MoreInformation Technology And Its Impact On Our Lives1731 Words   |  7 Pages Abstract First thing that comes to mind when we talk about information technology (IT) security is computer security. In todays world, as we know technology is on the rise and more and more threats are accruing each day. By increasing and taking proper security measures in the world of evolving information technology has assist organizations in protecting they information assets. As society has grown more complex, the significance of sharing and securing the important resource of information hasRead MoreNuclear Facilities Are Among The Most Highly Secured Infrastructure1592 Words   |  7 Pagesinfrastructure in the nation. As analog system and instruments are becoming obsolete, the nuclear industry is starting to implement new digital systems throughout different facilities. In order to lower the risks of physical and cyber-attacks, nuclear facilities are adopting strict protection policy and practices. Despite the implementation of these safety measures, digital instruments and computer-b ased systems associated with physical protection system and control system inside the facilities can stillRead MoreSecuring And Protecting Information Protection1449 Words   |  6 Pagescommodity that individuals and global corporations use to grow financially, economically, and independently. The protection and security of the information is essential. One of the most vital foundations of protection information is the authentication process. The authentication process is utilized to protect computer and network systems against various types of security threats, such as password-cracking tools, password dictionary attacks, mistreatment of user access rights, and any potential unauthorizedRead MorePresident Reagan Signed Into Law A National Security Decision Directive1344 Words   |  6 Pages 1984 President Reagan signed into law a national security decision directive, NSDD-145, titled â€Å"National Policy on Telecommunications and Automated Information System Security†. Even at that time, the government officials understood that computers were susceptible to interception, unauthorized electronic access, and related form of technical espionage and exploitation. It was noted, that hostile agencies were â€Å"extensively† hacking into computers, and that terrorist groups and criminal enterprisesRead MoreA Research Project On Cyber Security1230 Words   |  5 Pages Cyber Security Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. These concepts are easily augmented with hands-on exercises involving relevant tools and techniques. We have different types of computer related crimes, cybercrimes

Saturday, December 21, 2019

An Example Of Experiencing Fear - 1126 Words

Reflection #3 : Emotions Here’s an example of experiencing fear. You’re walking alone in the middle of night and you begin to hear footsteps mimicking your own pace and going in the same direction as yours, so your heart and thoughts begin to race, and you start speeding up. You’d like to run away as fast as possible but you don’t know if you should start running or not because you don’t know if the footsteps are indeed following you. The process of experiencing an emotion is simple. It first starts with an event or situation that we react to. Then we appraise (evaluate) that event or situation and if it’s deemed relevant an emotional response begins to occur. In addition, appraisal isn’t always a conscious process, most of the time it happens in an instant and automatically. The process of appraisal stimulates an emotional response which consists of physiological, behavioral/expressive, and subjective changes. Once these emotional responses occur, they can be reappraised to experience new emotions in attempt to regulate the emotion. For instance, the emotion of fear can be reappraised into embarrassment after you find out that the person following you was just heading towards the same destination as you were and they were just as scared because something creeped them out. The emotion of fear is a basic emotion along with disgust, anger, happiness, sadness, and surprise. Changing the emotion of fear into an emotion like embarrassment is considered a self-conscious emotionShow MoreRelatedClassifications for Anxiety Disorders Essay579 Words   |  3 PagesAre you or do you know someone, experiencing panic attacks or anxiety attacks? If so, it is important to be familiar with what these terms mean. Individuals frequently use panic and anxiety together, however; there are significant differences in the two and understanding the difference will make it easier to comprehend the relationship. Phobias are irrational fears that create interference within an individual’s daily routine. There are individuals who suffer from a phobia linked to pretty muchRead MoreDescribing all Phobias, but Particularly Coulrophobia and Monophobia1153 Words   |  5 PagesIn this paper I will be describing phobias and fear, but more specifically coulrophobia (the fear of clowns) and Monophobia (the fear of being alone). I also will describe possible causes of phobias, the history of phobias, how fear is helpful in small amounts, what fear does to someone and how to defeat it. Fear is present in all people but some more than others and I would like to know why. The definition of a phobia is â€Å"an extreme or irrational fear of or aversion to something†. Phobias are neverRead MorePostnatal Depression ( Pnd ) Essay1295 Words   |  6 Pagesreport fear of stigma, especially the stigma of being labeled a bad mother. This fear can lead to denial of symptoms and avoidance of help s eeking behavior (Bilszta, Ericksen, Buist, Milgrom, 2008). Women are even reluctant to disclose distress to significant others and family members (Bilszta et al., 2008). Further, women seem to have minimal accurate education about PND and when to seek medical services (Bilszta et al., 2008). Women with PND are at-risk and vulnerable to experiencing both socialRead MoreCase Study : Anxiety Disorders857 Words   |  4 PagesDSM-IV (American Psychiatric Association, 2013). The brief case study did not address how long or how often the client had been experiencing the symptoms. To accurately diagnosis a person with Panic Attack Disorder it is necessary for the individual to have experienced physical symptoms along with the one of four concurring behavioral symptoms. Behavioral symptoms examples: individual has a persistent worry of the attack happening again or exhibits a significant change in behavior related to the attacksRead MoreHow Phobias Affect People And How Can Overcome Their Phobia883 Words   |  4 PagesPurpose: At the end of my speech, the audience will know how phobias affect people and how to overcome their phobia. I. Introduction a. Imagine being so afraid of something that you try everything in your power to avoid it. For example, someone who fears spiders is not going to walk that trail that leads into a wooded area and you can almost guarantee that the person who isn’t too fond of heights isn’t going to walk across that tall bridge. If you ask these people why they won’t partake in theseRead MoreThe Emotional Effects Of Of Ptsd1531 Words   |  7 Pagespresent as a lack of interest in activities that used to be enjoyed (anhedonia), emotional deadness, distancing oneself from people, and/or a sense of a foreshortened future, for example, not being able to think about the future, make future plans or believing one will not live much longer. At least one re-experiencing symptom, one avoidance symptom, two negative changes in mood or thinking, and two hyper arousal symptoms must be present for at least one month and must cause significant distressRead MorePhobias And Its Effects On Phobia s925 Words   |  4 Pagesphenomenon where an organism has a distinct fear of a particular event or object. Phobias can not only be a biological instinct but rather a conditioned emotional response as well. Though, there has been some argument on what causes phobia it is generally accepted that phobias both stem from biological input and environmental experiences. The first reference to phobias was done by Hippocrates, who wrote about one of his patients having an extreme fear over something that others would deem to beRead MorePost Traumatic Stress Disorder ( Ptsd )1352 Words   |  6 PagesPost-Traumatic Stress Disorder is a condition that people develop after experiencing something traumatic. In Santiago PN et al 2014, there is about 8.7% of people who have PTSD affecting their lives. Traumatic experiences include childhood sexual contact, extreme violence, rape, torture, war, and the loss of loved one. After someone experiences any of these events, fear often triggers PTSD. Fear causes split-second changes within the body as a defense mechanism to avoid any danger to the body. InsteadRead MoreManaging Symptoms of Anxiety Essay504 Words   |  3 Pagesreal, as well as, extremely scary for the person experiencing the attack. The symptoms often mimic those experienced during a heart attack, for instance: extreme sweating, blood pressure an d heart rate go sky high, nausea and headache. Add these physical symptoms to the psychological symptoms and the individuals anxiety attack is in full swing. It is imperative for the individual to realize they can take control of their anxiety. When experiencing an anxiety attack it is difficult to comprehendRead MoreThe Physical Effects of Fear875 Words   |  4 PagesFear is an emotion that most everyone is familiar with. The psychological effects of fear are readily apparent but many people are unaware of the physical effects. Some of these are major; others are so minor they go unnoticed. The philosopher Jiddu Krishnamurti who lived during the 20th century said â€Å"What is needed, rather than running away or controlling or suppressing or any other resistance, is understanding fear; that means, watch it, learn about it, come directly into contact with it. We are

Thursday, December 12, 2019

Research in Criminology Project

Question: Discuss about theResearch in Criminology Project. Answer: Chapter One: Introduction Background Authority- The term that enables most of people obey without asking any question. When we see a person who seems to hold an authority or a powerful designation (like wearing a uniform) or a particular getup for instance a woman holding a baby and we may never ever think to question that woman may not in fact be a mother to that baby. Research Question So why is that authority so important? What makes people so easily to accept what an authorized person is saying? Chapter Two: Literature Review In a study done by Hajo Adam, Adam D. Galinsky (Northwestern University Evanston, Illinois, 2006) they concluded that clothes can have an immense psychological effect of the viewer as well as the wearer? Inspired by this, a Dutch photographer Herlinde Koebl clicked several pictures of people in two ways- their "work clothing" and their "casual clothing". Here we can easily see how a uniform can bring a dramatic change in viewer's eye for the knowledge and power they possess. This approach seems particularly well suited for participant's reaction limited to uniforms or on professional clothing. In this project, I will explore how people response to something regardless of the uniform someone is wearing. In particular I will focus on how people response when someone verbally tells them their designation. How their verbal identity can influence participants opinion. Such a study should give an insight to understand human behaviour and the factors that trigger their responses in varying situations. It will also help us understand to what extent a human can feel authoritative or feel the pressure of completing a task when given by a superior authority. Chapter Three: Research Methodology With the help of two more people I will conduct my study over different locations at Langara College. This team includes 2 girls, one in her early 20s who will play the role of a student and other in her late 20s who will be assigned the role of an instructor. Participants- Random students of Langara College will be used as participants. There will be no consents given to them as they will be observed on their instant reactions. Plot Each of the team members will act like an instructor teaching at Langara and a student studying at Langara. They will randomly choose any student from the crowd and ask them to handover a note to a student. As per the plot, the team members will tell the participants that is I s really important for that student to get his notebook because all his lecture notes are written down in it and he needs to go through it for the midterm. Both the instructor and student have to leave the campus because of an emergency and they can't wait for him. Here, I will be acting as one the students standing nearby pretending to be busy with my own things. Duration Over a period of week, weekdays from Monday to Friday. On each day the experiment will be tested on over 4-6 participants. It will approximately take 10 minutes to 20 minutes on a single participant. Focus My primary focus will be on observing how many participants agree to take the responsibility of handing over the notebook in each case i.e. if it is given by instructor or by the student. Chapter Four: Results Throughout my observation, I witnessed how authority shapes the behaviour of the students with respect to handing over a note to the student. My acknowledgement is that the instructor is in this case a symbol of authority while the student is an inferior participant. The results showed that students who were instructed by the instructor handed over the notes to their fellow students. However, the students that were instructed by their fellow student disobeyed the instructions and rushed out escaping the emergence. This results can, therefore, be summarized in the table below. Table 1: Summary of Observations No of student Instructor Handed Over Notes Never hand over Notes Teacher (authority figure) 12 1 Student 1 17 From the above table, it is clear that only one student disobeyed the authoritys verbal instruction to handover the notes to the student and rushed out to run due to the emergency. It can also be observed that only one student obeyed the fellow students instructions and handed over the book. Again, it is clear that more students (12) obeyed the teacher (authority figure) verbal instructions to hand over the notes despite the emergency. On the other hand, more students (17) disobeyed the fellow students instructions to handover the notes to the colleagues. Chapter Five: Analysis And Discussion The bottom line is that students tend to be more obedient to their teachers that fellow students. They will always comply with the commands issued by an authority figure, in this case, the teacher. As indicated by Stanley Milgram (1960) obedience study, people have a firm tendency to comply with authority figures. This explains why the students in this study chose to hand over the notes to the students despite the emergency so long as the command arose from the teacher (McLeod, 2007). The reason is that student obey their teachers and can do anything once commanded. Some students have reported that the fear of being punished by authority have triggered their behaviours. As noted by Stanley (1960) study on the effects of punishment on learning, the authority figure has an undue influence of the subjects. In the similar manner that Stanley (1960) saw teachers administering highest level shock to punish those student who fail to obey to make them do as commanded, this study affirms this act where despite the emergency, students handed over the notes to others as a result of authority figures command. The students in the present study acted in this manner since they were under pressure to do so from the authority figure. The study has noted that there are certain factors that enhance obedience. The first condition is when the command is issued by authority figure instead of the student. For instance, in the current study, it was observed clearly that student had to obey their teacher unlike their fellow student. This account for the high number of students handing over the notes at plot to their fellow student when commanded by the teacher. The obedience is also high where the experiments are performed in a prestigious institution which was the case of the current study. Moreover, it is more intense when the authority figure is present in the room alongside the subjects as witnessed in this study. It is also profound where the subject do observe other subject disobeying the authority figure. Authority obedience has always been related to the need to get reward, prevent negative consequence of disobeying as well as belief that authority is legitimate. In extremist conditions, people have also obeyed the authority when they are needed to violate their individual values or commit crimes. From this, study the reasons why people carry obedience to the extreme ends have been discovered. One of these reasons is that people tend to justify their obedience by assigning responsibility to the authority instead of themselves. People will also carry obedience to the extreme because they define the behaviour which is anticipated to them as a routine. They will also obey at extreme end because they do not want to become rude or offend the authority. Also, authority has been obeyed at the extreme situation since people tend to obey the easy commands initially and subsequently feel forced to obey the more and more complex commands. This is a process dubbed entrapment, and it demonstrates the foot-in-the door context of phenomenon. The authority works on the basis of a group in the lens of social psychologists. This is because a group is considered as one that is composed of two or additional people that interact as well as depend on one another in a given manner. For example, in this case students and teachers can be considered as a group. This is because they interact through teaching and learning. The students, therefore, depend on the teachers to give them knowledge while the teacher is dependent on students to get opportunity to earn money and even become promoted. In the current study, we saw that the instructor and the student gives verbal instruction once a student is picked at random and check whether he will obey the instructions and handover the notes. From the results, it was clear that students that were instructed by the instructor had to handover the notes to the fellow student despite the emergency while those instructed by fellow students disobeyed and left. This is a clear indication of how people respond to something irrespective of the uniform someone wears. Particularly, this instance illustrates how people respond when someone verbally tells them their designation. It shows that the verbal identity of an individual has a great influence on peoples opinion and behaviour. From this example, it is easy to draw an insight in understanding the human behaviour as well as the factors which provoke peoples response in varying contexts. From this observation, it is possible to understand the extent to which a human can feel authoritative and feel pressure of completing a task when provided by a superior authority, in this case instructor. Chapter Six: Conclusion From the results and the analysis and discussion, it is clear that the level of belief that students had on their teacher (authority figure), directly influenced their behaviour to that particular level. This means that the teacher has been placed by students on pedestal and have, therefore, relegated their critical thinking as to what is wrong or right to the authority figure. Authority, therefore, influence everyone in life. This is why despite the emergency, the students had to handover the notes following the verbal instructions by their teacher. However, without putting someone on pedestal, the critical thinking is never relegated to that person as was witnessed when student disobeyed their fellow students verbal instructions and ran away due to emergency (Adam Galinsky, 2012). In this case, the student could distinguish between the right and wrong due to lack of fear of negative consequence of disobeying such an irrational command. From this current study, it was never uniform that was the source of authority but rather, a title (teacher). Title was, therefore, used in this study to influence the perception and hence behaviour of how one (teacher) is viewed by the students. Recommendation The advice is that one should learn to think for oneself as well as to remain more critical where required. An individual should never blindly follow what others say merely because they are viewed as an authority as this might not help or hinder one. There is a need to examine ones own persona values as well as what one feels is right. Everyone should strive to be a lifelong learner to help determine what is right or wrong in every situation one faces. Reference Adam, H., Galinsky, A. D. (2012). Enclothed cognition. Journal of Experimental Social Psychology, 48(4), 918-925. Cialdini, R. B. (1984). The psychology of persuasion. New York: Quill William Morrow. Hofling, C. K., Brotzman, E., Dalrymple, S., Graves, N., Pierce, C. M. (2010). An experimental study in nurse-physician relationships. The Journal of nervous and mental disease, 143(2), 171-180. McLeod, S. A. (2007). Obedience to Authority. Retrieved from www.simplypsychology.org/obedience.html Milgram, S., Gudehus, C. (1978). Obedience to authority.