Thursday, November 28, 2019

Wrath of war an Example of the Topic Literature Essays by

Wrath of war The main component that comes out clearly, is the openness with which the authors foresaw their fate. They expected the occurrence with courage made know that they had gone to war with a vision in mind. They had something they wanted to achieve. That is: - victory, liberation and a peaceful world. For example Lester in his letter to the parents showed what he thought would be his fate when he said. Need essay sample on "Wrath of war" topic? We will write a custom essay sample specifically for you Proceed The letters also showed the different expectations that the authors had towards the war. Some had resolved to die for their country while others hope of going back safe and hence live for it. Generally, the letters bring out an illusion of what the war was, the lives of those involved, their suffering, expectations, excitement, perseverance, conditions, injuries, death and their dedication. Among the facts that have come out in this chapter is love. The love the authors had for their people made some go for the war. This includes the love they had for their wives, spouses or children all in an effort to make them happier and proud. The other fact is suffering and endurance.The war led to the death of many men and the conditions that the soldiers endured were pathetic. They lived for long periods in rat infested houses, mud-soaked and stinking of human waste and rotting corpses. They were in constant fear and anxiety of what the next minute entailed. Lastly, the fact that remains so obvious in this chapter is the dedication with which the soldiers faced the war. Despite the hardships that came their way they remained dedicated to serve despite the fear of death, lack of assurance to live. Work cited Madureira, J. (2008). Docksides: Wrath of War. UK, Matthew Walker Publishers.

Sunday, November 24, 2019

Short Commentary on Othello Act 4 scene 1 lines 1-46 Essays

Short Commentary on Othello Act 4 scene 1 lines 1-46 Essays Short Commentary on Othello Act 4 scene 1 lines 1-46 Paper Short Commentary on Othello Act 4 scene 1 lines 1-46 Paper Essay Topic: Othello The opening scene of Act 4 in Othello succeeds one in which Othello begins to confront Desdemona about Cassio via the loss of her handkerchief. Bewildered by her husbands strange new violent and jealous behaviour, Desdemona, unknowingly, tries even harder to help Cassio. She continually implores that Othello gives him back his position as officer, if just in order to remind her husband of his esteemed position among the society, and in general, of his own sense of honour and morality that she, as his wife, had always seen in and respected of him. Act 4 Scene 1 opens up in media-res of a conversation taking place between Iago and Othello. This scene chiefly introduces to the audience Iago as having gained full control, as we see Othello now to be the one unconsciously repeating after him. Through the use of intimation, imagery and the theme of appearance vs. reality, the audience is convinced of Iagos success and Othellos deterioration.   In this scene, the overarching theme of appearance vs. reality is an implied but a recurrent and significant one. Through Iagos character, Shakespeare analogizes materialistic/physical things to the main values explored in the play, successfully conveying to the audience the importance of both, but on a deeper level, how Iago has the ability both to hinder and manipulate them in his acts of double knavery. The handkerchief Othello gives to Desdemona, for example, embodies his love and trust for her, but more deeply his honour in her having accepted him, the moor, the outcast. Thus, the loss of the handkerchief grew to become synonymous with the loss of its value, as is evident from Othellos change in narrative form, as it goes from a form of verse to prose. In addition, Othello says, in line 35 on page 153, Handkerchiefconfessionshandkerchief! To confess and be hanged for this labour. First to be hanged and then to confess. in prose form, and Shakespeares use of it accommodates Othellos use of chiasmus in his speech. Ironically, where chiasmus is used typically as a device to articulate balance or order within a text, the use of it in Othello marks precisely the opposite. Through this Shakespeare conveys Othellos convoluted state of mind both mentally and emotionally, and therefore, Iagos success in his motivations. Furthermore, in pairing both the physical and non-physical things, Iago is also able to draw contrasts between them, as, unlike Desdemonas handkerchief, her honour is an essence thats not seen, thus insinuating her deceit to Othello. Likewise, the reverberation of Iagos use of the word poison throughout several acts reflects his own duplicity, almost as if he chose to name it as such. Poison works slowly but effectively the same way Iagos deception worked on Othello. However, on a deeper level, it also marks Iagos character development as his successes continually accelerate more of his schemes and plans, while at the same time weakening Othello. However, it is the analogy between and a value and a sensual physical action, in an unauthorized kiss in line 3, that epitomizes and conclusively portrays Iagos complete manipulation of Othello, that by combining values of reputation and authority with love and emotion, Othellos weaknesses are used in Iagos power, leaving Othello to seemingly self-destruct. In conclusion, it is Shakespeares use of language and his successful implicit portrayal of themes through characters that allows his audience to unwrap themselves not only the true nature of the relationships between the characters, but also the complementing and contrasting values and ideals that inevitably exist amongst them.

Thursday, November 21, 2019

Crime and Ethical Standards Term Paper Example | Topics and Well Written Essays - 750 words

Crime and Ethical Standards - Term Paper Example The individual is only suspected to be under influence of drugs. Therefore, this crime can be argued to be misdemeanor possession of a controlled substance (Braswell et al., 2005).   An individual who illicitly obtains or uses items coded controlled substances is charged with a crime. It is a criminal offense to possess a controlled substance. In my state, the quantity, the nature of the drugs and the circumstances that one is assumed to possess a controlled substance influence the nature of conviction that one receives. The penalty for this crime depends also on the classification of the drug. An individual is charged with misdemeanor possession of a controlled substance in the event that the very individual is found to be in possession of coded substances below a specific limit (Leighton & Riemann, 2001).   Societal factors influence individual’s behaviors. Societies where social values and norms are adhered to the letter experience less social problems because individua ls are discipline. In the paradigm case, Jones’ negative behavior that has put him into troubles can be associated with various societal factors. It can be suggested that Jones is brought up in a society where people commonly engage in drug abuse. The first duty of any government is to ensure safety of its citizens. Social contract theory states that government sets rules governing individuals’ behavior that is wholly accepted by rational citizens. The state exists to enforce these rules and laws for positive social living. It is in Jones’ interests that the law enforcing agencies, police in this case, do not take advantage of their powers and abuse him. This implies that they must adhere to the rules that protect the suspect. It is the responsibility of the government to ensure that the criminal justice system in place is effective to prosecute suspects of crimes while protecting their rights by providing fair trials and rational punishment. Government’s duty to offer security and safety is in Jones’ interest. The government would require law enforcing agencies and the criminal justice system to pursue critical analysis of the condition of the suspect before making any conclusion (Leighton & Riemann, 2001).   Marconi is a police officer hence has a role to ensure that there is law and order in the society. The law requires law enforcing agencies such as police to pursue their duties diligently for the benefit of the citizens. In this event, Marconi has a number of roles to play. He ought to question the suspect before arresting as a matter of procedure. However, this did not happen. The officer has a duty to proof the nature of the crime committed by Jones in order to guarantee far trial and punishment. Police officers are expected to be subjective in their undertakings to avoid prejudicial mistreatment of the suspect as it happened to Jones (Leighton & Riemann, 2001).   The clearest miscalculation by Officer Marconi is his failure to read the suspect (Ms. Jones) her Miranda Rights. Ms. Jones’ custodial interrogation satisfies her Miranda needs, â€Å"†¦the person in custody must, prior to interrogation, be informed that he [she] has the right to remain silent†¦Ã¢â‚¬  (Miranda v Arizona (1966), 384 US 436) and further, anything she says can and will be suppressed by applying â€Å"†¦the product of a rational intellect and free will†

Wednesday, November 20, 2019

Childlink Essay Example | Topics and Well Written Essays - 1500 words

Childlink - Essay Example Yet, sometime despite our best efforts, children and even the parents fall further into social problems with crime, substance abuse, and destructive behavior. This creates questions of how to moderate social crisis in families, and relates to the professional development of my career in counseling and social work. Findings, or discussion: The basis for most foster care placements are deterioration of the family structure through crime, substance abuse, domestic violence, and poverty as they combine to create a situation where a child may be taken from his or her birth family to a safer environment under the auspices of Child Protection Services, a court order, or a recommendation from social welfare. The psychological effects of these family traumas may affect all involved in a profound, life-changing manner, hurting the children the worst in learning how to process emotions born out of abusive or abnormal patterns of family behavior. Because of this, I decided to do a literature rev iew of academic sources in psychology and sociology relating to the foster care experience as it is reported from all of the different perspectives in the relationship, including: the child, the birth family, the foster family, the counselor, social services, and the legal or judicial aspects of the process. In reading the academic literature related to psychology, for example, I became interested in child development stages and also the patterns or reactions of the children as they developed through different responses to the alienating situation. I began to realize that some of the children naturally reacted passively to the situation, and that they were apt to close up emotionally more often when confronted with confusion or emotionally charged situations. Conversely, others were always active and aggressive and more apt to resist violently or irrationally when confronted with conflict. The recognitions of patterns of introversion and extroversion led me to the conclusion that di fferent approaches should be prepared in advance to address the needs of the children uniquely, for example introducing activities to calm or moderate the behavior of the active children while attempting to stimulate a more positive response from the withdrawn children. I feel that further research on this topic can lead to a better understanding of what a counselor needs to do in order to recognize signs in individuals and introduce treatment through unique diagnosis of the psychological issues and personality types underlying the individual cases. The same approach can also be taken with regard to family members who are displaying outward signs of substance abuse, or alcoholism. These two combined are the usual gateway to family destruction, especially when intersecting with the prison justice system. The roots of substance abuse in theory are important to academic research for my work at Childlink and also for further progress in the field of social work and counseling. Substance abuse and alcoholism are the most common problems that lead to the further domestic violence, criminal behavior, and deterioration of the family structure that tragically results in foster care. The question of treatment and recovery for those suffering from long term or chronic alcoholism and drug abuse is an important part of my research at Childlink, as they relate as a key cause to the social and personal breakdowns that create the family

Monday, November 18, 2019

Leadership Failure Position Essay Example | Topics and Well Written Essays - 1000 words

Leadership Failure Position - Essay Example Weiner demonstrates a charismatic and relationship-motivated leadership approach.Indeed, a New York Times article announcing Weiner’s resignation notes that some of his colleagues described him as, â€Å"a publicity seeker unwilling to put in the hard work needed to pass serious legislation† (Hernandez, 2011). This is seemingly indicative of an individual that is task-averse. To an extent then the action’s Weiner took may be thematically indicative of his situational approach to other aspects of his career. One also considers if Weiner’s gender may have contributed to his increased scrutiny. Such a consideration has long been a question in prominent sex cases where an older woman engages in consensual relations with a minor. While Weiner’s situation is clearly different, it seems that to an extent the logic could be applied to this situation. In Weiner’s situation, the nature of him sending photos of a sexual nature to a woman seemingly is in dicative of an abuse of power on his part. The nature of such an act is more pronounced when emerging from a male because of both masculine physicalities, as well as the social connotations.While Weiner’s personal responsibility is a prominent element of his leadership failure, it’s also necessary to consider Weiner’s institutional position as Congressman. Clearly, the scandal gained media attention for Weiner’s position as a member of the House of Representatives. One considers that prior to the scandal Anthony Weiner had gained a reputation for bombastic and sensational speeches.

Friday, November 15, 2019

Network Attacks in Real Time Scenario Over Campus Network

Network Attacks in Real Time Scenario Over Campus Network Amit Mahajan* Vibhakar Mansotra** ABSTRACT This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper discusses about the dependency over the IDS/IPS signatures and proposes for a solution which records the events with raw traffic and visualizes the traffic to give better understanding of the behavior of the traffic flow over the network. Keywords: UTM, Attacks, Visualization, Afterglow, tcpdump. I INTRODUCTION Networks have been under attack from the time Internet came into existence. There is consistently some lack of determination connected with the effect of these attacks. In the present situation of PC innovation, any institution can have enormous machine frameworks of distinctive natures. With the advancement of technology, Organizations have started facing difficulties due to different types of computer viruses and attacks. This resulted in tremendous loss of the internal assets like data and utility of time. Thus there is an urgent need to study these attacks and network breaches by means of which one will be able to devise preventive measures and thereby protect the internal assets. In view of the above objectives one has to understand the networks and how they expand widely. Also one has to understand the attacks and breaches. Mostly the internet is one of the sources of the viruses and attacks but quite often the local network is also a major source of threats for campus networks. Generally administrators and organizations safe guard their networks from outside threats but the internal attacks and breaches are very crucial. The IDS/IPS ( ) are installed over the gateway level to scan the outgoing and incoming traffic. Where these kind of mechanism to study the behavior of internal attacks is vague. One is very much interested in knowing the kind of traffic flow, and its identification etc in the network. This kind of approach will help the user community to adopt preventive measures or in other words one has obtain a solution by studying the internal attacks and network breaches and thereby how to minimize and protect the internal assets . Analysis of the netw ork can be used as a tool to scan the network traffic. The behavior of the network may be understood through penetration tools, simulations etc. Alternatively a tool like IPS having capability of network behavior analysis also can be of great help in understanding the problem. SURVEY OF WORK Asmaa Shaker Ashoor and Sharad Gore in their research differentiated the Intrusion Detection System and Intrusion Prevention System (IDS/IPS) technology which is used in the computer networks. They compare the stability, performance and accuracy wise result of IDS and IPS. They highlighted that the major difference between the IDS / IPS is among their deployments over the network. IDS technology works on out band system which means it is not lined with the network path but IPS technology works on in-line with the system, means it can pass through in between the devices in real time. Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit discusses about the Present run-through for fighting cyber-attacks which are typically used by the Intrusion Detection Sensors (IDS) to inactively detect and block multi-stage attacks. The algorithm, TANDI, helps in reducing the problem difficulty by separating the simulations of the attacker’s capability and opportunity and thus fuses the two to determine the attackers intent. The results of the research demonstrate that the algorithm TANDI predicts that the future attack action precisely as long as it is not a coordinated attack and which contains no internal threats. In the presence of the malicious attack events, the algorithm TANDI, will give alarm to the network analyst for further analysis. This can be further analysed with the help of simulation. Nilima R. Patil and Nitin N. Patil in their paper discussed about the importance of attack graph to check the possible attacks in the network. Using attack graph, analysis can be done effectively. This helps the administrators to further analyze the attack graphs deeply to know where their system weaknesses lie. Accordingly help them to decide what kind of security measures can be opted for effective deployment. They study different ways to analyse attack graphs and to provide future scope for research on these attack graphs. Rosslin John Robbles, Tai-hoon Kim, Seung Lee in their paper have shown that a second level in addition to access control intrusion confinement can dramatically enhance the security especially integrity and availability of a system in many situation. It showed that intrusion confinement can effectively resolve the conflicting design goals of an intrusion detection system by achieving both a high rate of detection and a low rate of errors. Developing a more concrete isolation protocols will further be studied in the future research. Meera Gandhi and S.K Srivastava in their paper highlighted the importance of Intrusion detection in business sector and in active area of research. They describe IDS as important tool for information security. An IDS is intended to identify and fight with some common attacks over the network systems. In such systems log displays the list of attacks to the administrator for ambiguous action. This system works as an observant device in the event of attacks directed towards an entire network. In the light of the above available information a need has been felt to undertake similar type of work in the University of Jammu as well. This will help in study of attacks received by the network of the campus. The network is setup on optical fiber backbone with around 100 distributed switches across the campus. Which also has WI- FI wireless Connectivity with access points around 200 approx. Such an ICT facility available over the network is plays an important role in helping the students, researches, teacher and staff. The number of users in the UOJ campus network appxo 3000. Thus the analysis of the attacks is taken up in this campus. II EXPERIMENTAL SETUP USING UTM University of Jammu is one of the pioneer higher educational institutes in the state of Jammu and Kashmir, India. Whose vision is to be an internationally competitive academic and research institution? To achieve University of Jammu has lot of focus on the information technology. In 2003 university started its initiatives to be an IT enabled university by setting up a university campus network on optical fiber backbone. Later this network was further converged with Jammu University JU Wi-Fi. This facility is playing a very crucial role in order to help the students, teachers, researchers and administrative staff to use the ICT facilities available over the network. University of Jammu is having huge internet bandwidth connectivity’s to cater the needs of the university fraternity. This internet bandwidth connectivity’s constantly keeps on upgrading from time to time. At present university is having 40 mbps Internet bandwidth 1:1 OPTICAL FIBER lease line from reliance an d 1 Giga optical fiber connectivity from National Knowledge Network. Students, researchers and teaching faculty are able to access the scholarly contents online from any location within the campus. There are around 37 departments comprising of teaching and centers other than administrative blocks which are connected through this optical fiber back bone network. All the three girls and boys hostels are also connected through the optical fiber backbone. There are around 100 distributed switches (Cisco and Dlink) and approx. 200 indoor wireless access points (Linksys and Dlink) and 18 outdoor access points (Dlink) which are installed at the various locations of these departments / blocks of the university. All the equipment’s are connected through optical fiber backbone to the control room campus network of the university with Cisco catalyst switches 4507R, 4506. In order to maintain such vast network and ICT Facilities University has deployed a UTM device in the network. This UTM device helps the university it administrators to maintain the university campus network more efficiently. UTM installed at the university is a product from world’s top IT security company Cyberoam. This UTM is installed almost all the major academic institutes of the country. The UTM device has multiple solutions in a single box. It comprises of load balancing of internet bandwidths, Antivirus and anti-spam scanning at the gate way level, User identity based firewall rules, gateway level IDS and IPS scanning and AAA authentications etc. This UTM device is installed between the ISPS Routers and Cisco catalyst switches so that the whole traffic gets scanned through the UTM device. All the policies are applied on the firewall rules as per the requirement of the University network. Figure: 1 UTM Deployment in Gateway Mode With the increase in the University network and ICT facilities over this network, it is observed that the ratio of attacks also gets increased. These attacks reduce the performance of the University Network and other ICT facilities available. Thus to study the kind of attacks, their significance and a solution how to reduce them is proposed in this paper. UTM device installed in the University network is considered for collecting the IPS attacks data. Since it has the ability to produce the Attack reports, this will help the University IT administrators to see the trend of the attacks how they are generating and affecting the system. The critical IPS attacks will be studied over a time to find the patterns of the attacks and their significance over the network applications and ports to which they are associated. This study will help the university and other institutes which are using the same UTM to fine-tune the rules and other parameters so that network bandwidth and other services performance does not get affected with the attacks and users of the ICT facilities should have performance oriented service. III DATA COLLECTION AND ANALYSIS USING UTM As described in the previous about the network system university campus. The information on the number of IPS attacks has been collected since 1 July -2013 to 2-dec -2013 (22 weeks). The total number of attacks is 1301567. Out of these the type of attacks having frequency more than approx 100 is 1299646 lakh. These 13 lakh IPS attacks have been classified into 5 categories broadly example HTTP/ HTTPS, ICMP, UDP, FTP, TCP based on the signatures. The display of the number of IPS attacks belonging to each category is shown in figure-2: Figure -2 Classifications of Attacks Out of the above 13 lakh of the attacks the top 14 critical attacks from the five major categories have been identified to 162810 by the IPS and them display is shown in figure-3: From the figure-3 it may be noted that the prominent attack having a frequency greater than equal to 4.38% are 6 types (responses 403 forbidden type is 45.62% , 17.38 % web misc handler access 8.57 % is https/ssl renegotion , 7.38% web php , 7.34% web cgi count , 4.38% info ftp bad login) . While rest of the 16 attacks less than 10 % are having very small frequencies. The percentage of attacks each of the 22 weeks is shown in the bar diagrams in figure series: Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week7 Week 8 Week 9 Week 10 Week 11 Week 12 Week13 Week 14 Week15 Week 16 Week 17 Week 18 Week 19 Week 20 Week 21 Week 22 Out of 22 weeks, the percentage of Attack Responses 403 Forbidden is the most dominant one. Forbidden attack response is the highest attacks with 45.62% overall in the 22 weeks, this incidence is generated when a 403 error response code is returned to a client by a web server, which indicates that an effort is made to take an unauthorized access to a web server or an application running on a web server. The 400 series error messages indicate an error on the part of the browser client making the request to a web server. The 403 response shows a request for a forbidden resource which cannot be gain access to even with authentication identifications. Many events can show a determined effort to exploit vulnerability on the victim’s server. Certain applications do not perform strict checks when confirming the credentials of a client host linking to the services offered on a host server. It can lead to an unauthorized access and probably escalated rights to that of the administrator. Information stored on the machine will be compromised and trust relationships established between the victim server and the other hosts that can be exploited by an attacker. In such Attack Scenarios; attacker can access the authentication mechanism and provide his/her own credentials to gain access. On the other hand the attacker can exploit the weaknesses to gain the administrator access without any exploit code.While the other prominent attacks are:- ICMP trace route: This attack is generated when a Windows trace route (tracert) is detected. A trace route is be used to discover live hosts and network topologies. A Windows trace route command uses an ICMP echo request with a lower than normal Time to Live (TTL) value to identify live hosts and network topologies. Web- MISC handler Attacks: this attack is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server. The other attack which has very high severity level is the SNMP attack. From the figure- 4 shown below , it is noted that there is a peak in the number of attacks in the 8th (19-0ct-2013 and 9th week).It may be noted that this peak is due to SNMP attack responded by UDP with application whose activity is pronounced. Figure: 4 shows16 different types of attacks out of 22 attacks per week are shown Figure –5 different types of major attacks per week Figure: 5 Shows 16 different types of attacks out of 22 attacks per week are shown over the entire period. Of these 6 are found to be more conspicuous: ATTACK-RESPONSES 403 Forbidden (ATK-RES403F) 71067, ICMP trace route (29205), WEB-MISC handler access (13959), SNMP request UDP (11954), SNMP public access UDP (11952), HTTPS/SSL Renegotiation DoS (7062) IV FRAME WORK FOR EVALUATION AT THE GATEWEY LEVEL TO STUDY THE ATTACKS USING RAW PACKETS GENERATED BY THE NETWORK To study the attacks more affectively, a frame work was deployed using open source software like Ubuntu, tcpdump with visualizing software like afterglow to capture real time at the core switch. This will help to monitor and analyze the network traffic in real time scenario. Data was evaluated for two hundred thousand packets captured using tcpdump –nnelr data.pcap l wc –l at the root. This will capture the raw traffic for two hundred thousand packets for data analysis and visualization. The data captured by the tcpdump will be converted to a csv file with all fields. Tcpdump-vttttnnelr ju.pcap|./tcpdump2csv.pltimestamp sourcemac destmac sip dip sport dport flags len proto ttl id offset tos ipflags > ju.csv. The Csv file is then exported to Mysql database. load data infile ’ju.csv’ into table analysis fields terminated by ’,’ lines terminated by ’n’ (timestamp, sourcemac, destmac, sourceip, destip, sourceport, destport, proto, tcpflags, length, ttl, ipid, iptos, ipflags, offset); Further, ju.csv file was converted to dot file, which was converted to png file. tcpdump -vttttnnelr Ju.pcap |./tcpdump2csv.pl|./afterglow.pl-c color.properties > Ju.dot Cat Ju.dot | neato -Tpng –o Ju.png Figure 6 shows Whole Traffic captured for network Figure-6 shows that the outgoing traffic is greater than incoming traffic, which states that traffic is compromised. Therefore there is need to identify the port 80 traffic and identify the machines which are compromised. From figure 7 we identify visually that the out traffic on port 80 is very high. Therefore, needs to identify machines which are compromised. Figure 7 shows the out going traffic of port 80 Figure -8 shows ATTACK from IP 192.176.2.25 Figure-8 Shows visualization of machine with IP 192.176.2 25 that is connected over the network which is compromised and sending malicious traffic outside. This helps the administrators to identify the machine irrespective of any signatures within the IPS database. Similarly other machines can be identified. V CONCLUSION AND FUTURE SCOPE IDS/ IPS are installed in almost every organization but they are designed to work on signatures. To study attacks which exist other than signatures, we need to further do the analysis through the frame work created with high end hardware which is required to capture and analyze the traffic for longer duration. So that fine tuning of the IDS/IPS as per the campus network requirement will be done to further increase the network performance. VI REFERENCES [1] Paxson. Bro: A System for Detecting Network Intruders in Real- Time. In Computer Networks, volume 31 (23– 24), pages 2435–2463, 1999 [2] G. Stein, B. Chen, A.S. Wu, and K.A. Hua, â€Å"Decision Tree Classifier for Network Intrusion Detection with GA- Based Feature Selection,† Proc. 43rd ACM Southeast Regional Conf.—Volume 2, Mar. 2005. [3] Schwartz, Matthew, â€Å"Beyond Firewalls and IPS: Monitoring Network Behavior.† February 2006, available on http://esj.com/articles/2006/02/07/beyond- Firewalls-and-ips-monitoring-networkbehavior.aspx [4] S. J. Yang, J. Holsopple, and M. Sudit, â€Å"Evaluating Threat Assessment for Multi-stage Cyber Attacks,† in Proceedings of IEEE MILCOM: 2nd IEEE Workshop on Situation Management (SIMA), Washington, DC, Oct 23-25, 2006 [5] Z. Yu and J. Tsai, â€Å"An efficient intrusion detection system using a boosting-based learning algorithm†. International Journal of Computer Applications in Technology, Vol. 27 (4), 2007, 223-231. [6] Meera Gandhi, S.K.Srivatsa â€Å"Detecting and preventing Attacks using network intrusion detection systems† International Journal of Computer Science and Security, Volume (2) : Issue (1) June 2009 [7] Asmaa Shaker Ashoor, Prof. Sharad Gore, â€Å"Intrusion Detection System (IDS) Intrusion Prevention System (IPS): Case Study†. International Journal of Scientific Engineering Research Volume 2, Issue 7, July-2011 [8] Rosslin John Robles, Tai-hoon Kim,SeungLee,† A Study on Intrusion Confinement for Internal Network†, Journal of Security Engineering), vol.5issue no1, P73, 2008 [9] Patil, Nilima R.; Patil, Nitin N, † A comparative study of network vulnerability analysis using attack graph† World Journal of Science Technology; 2012, Vol. 2 Issue 3, p91 *University of Jammu, e-mail id :[emailprotected] , **University of Jammu, email id: [emailprotected] 1

Wednesday, November 13, 2019

Essay on Diomedes, the True Hero of Homer’s Iliad -- Iliad essays

Diomedes, the True Hero of The Iliad In The Iliad, written in a 3rd person omniscient point of view, Homer gives a very serious account of the tenth and last year of the Trojan War.   It was in Homer's account that the very idea of becoming a legendary hero reached its pinnacle; the choice of the better hero was not decided on the events they participated in, but rather by their characteristics.   The ancient Greeks had strict criteria for individuals to follow if they were to be seen as heroes. Above all, a man needed to be a skilled warrior, but this was not the only requirement. To be a hero, a warrior had to respect authority, both governmental and religious. The Greeks gave heroes no room for pride. These men were to be modest, not only giving credit to their culture and the gods for any great deeds they had done, but also accepting everything that happened as Fate, not scenarios they had created for themselves. In other words, they did not make themselves what they were; rather, they had been predestined to be come it. The final requirement of being a hero was coolness. Heroes were not permitted to be blinded by rage or have mood swings. In The Iliad, two Greeks are presented to the reader as heroes. They are Achilles and Diomedes. Although they are both good contenders for the title of hero, Diomedes is by far the better of the two. Diomedes is one of the finest and bravest of the Greek warriors. He is respectful to all authority figures and has little or no pride. Always wise and reasonable, he may be the vision of the perfect nobleman. Both Achilles and Diomedes easily meet the first requirement, that a hero must have skill on the battlefield. Throughout The Iliad, Homer tells of their incredible (though usually go... ...kill in battle, respect for authority, humility, and coolness under fire. Not many men met all requirements, including Achilles, but they were still viewed as heroes. Between Achilles and Diomedes, Diomedes was the better choice for the title of hero. He was one of the finest Greek soldiers. Diomedes was respectful of authority, humble about his successes, and was very levelheaded. Achilles had great fighting skill as well; however, he had trouble respecting authority and keeping his cool, both results of his excessive pride. If Achilles had not been so prideful, he could have been a much greater warrior and hero, perhaps achieving status equal to the gods. He simply had too much pride. Diomedes was humble; therefore, it was easier for him to respect authority and keep a level head. Works Cited: Fagles, Robert, trans. The Iliad. New York: Penguin Books, 1990.