Wednesday, November 27, 2019

Public Health Essay Example

Public Health Paper Public health is the science and art of protecting and improving the health of communities through education, promotion of healthy lifestyles, and research for disease and injury prevention. Public health is concerned with protecting the health of entire populations. These populations can be as small as a local neighborhood, or as big as an entire country. Public health can make a difference in the lives of tens, hundreds, and even thousands or millions. Public health program is very important beause these are some of the threats to our health that we will be facing in the years to come such as avian influenza, HIV/AIDS, obesity, cancer, bioterrorism, domestic violence, substance abuse, mental health, drug resistant diseases, emerging and re-emerging diseases, environmental toxins, inequities in health care access and manymore. Most experts agree that these problems cant be tackled with new medical findings or cures; it is up to public health to protect us from these threats. Seeing the health problems such as highly increasing of disease prevalence, public health offers the best solution program because public health is a very diverse and dynamic field incorporating many disciplines that consist of biology, sociology, mathematics, anthropology, public policy, computer science, business, environmental science, communications, etc. We will write a custom essay sample on Public Health specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Public Health specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Public Health specifically for you FOR ONLY $16.38 $13.9/page Hire Writer This means, public health is multidisciplinary. Public health professionals try to prevent problems from happening or re-occurring through implementing educational programs, developing policies, administering services, and conducting research, in contrast to clinical professional, such as doctors and nurses, who focus primarily on treating individuals after they become sick or injured. Theres something for everyone in public health. Some of the possible careers in public health are in these broad fields such as environmental health, biostatistics, behavioral sciences or health education, epidemiology, health service administration, maternal and child health, nutrition, etc. Because the field of public health is so broad, so I could have a greater opportunity to obtain employment opportunities in many multidisciplinary that suited my interests and abilities. Besides that, I have a passion to make a difference, to help others, and to be challenged intellectually, spiritually, mentally, and even physically. In conclusion, i choose public health program to contribute myself in decreasing the incidence of disease in a way to prevent, promote and protect the people who are susceptible to illnesses. In public health, we can choose our careers depends on our passion for providing health education programs, health management and policy setting that can easily accessed, conducting research and many other appropriate ways to support medical specialisation that will be taken with the aim of making people healthy and more productive. Public Health Essay Example Public Health Paper 1) Which of the following phrases best describes the authors view of the status of health education? Health education is A) a calling. B) a profession. C) an applied discipline. D) an emerging profession. Answer: D 2) The body of knowledge, principles, and concepts used in health education/promotion come from a variety of disciplines. Which one of the following is not one the major disciplines supporting health education/promotion? A) Physics B) Biology C) Sociology D) Medical sciences Answer: A We will write a custom essay sample on Public Health specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Public Health specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Public Health specifically for you FOR ONLY $16.38 $13.9/page Hire Writer 3) Which one of those below is not used to define a profession? A profession A) has a code of ethics. B) provides an income. C) provides a unique and essential social service. D) has an association that represents the profession. Answer: B 4) A professional prepared individual trained to use appropriate educational strategies and methods to facilitate the development of policies, procedures, interventions and systems conducive to the health of individuals, groups, and communities is known as a A) community planner. B) promotion specialist. C) health educator. D) professional. Answer: C 5) During the 1850s to 1950s, the primary focus of the public health effort in the United States was to A) reduce health care costs. B) control chronic diseases. C) control infectious diseases. D) develop national health care coverage. Answer: C 6) The greatest potential for reducing morbidity, saving lives, and reducing health care costs in the United States through health promotion and disease prevention was realized by the A) early 1900s. B) late 1950s. C) mid 1970s. D) early 2000s. Answer: C 7) Which one of the following is not recognized as a dimension of health? A) Physical B) Emotional C) Spiritual D) Political Answer: D 8) An approach to health that focuses on balancing the dimensions of a persons life through the adoption of health enhancing behaviors is known as A) public health. B) wellness. C) community health. D) health promotion. Answer: B 9) Which of the following surveys utilizes a telephone interview to collect health data? A) The National Health and Nutrition Examination Survey B) The Behavioral Risk Factor Surveillance Survey C) The Youth Risk Behavior Surveillance System D) The National Health Interview Survey Answer: D 10) Which of the following surveys collects health data about college students? A) The National Health and Nutrition Examination Survey B) The Behavioral Risk Factor Surveillance Survey C) The National College Health Assessment D) The National Health Interview Survey Answer: C 11) The federal governments 1980 document that provided a blueprint of the health promotion and disease prevention strategy is known as A) Code Blue. B) Healthy People 2020. C) Quality of Life in the United States. D) Promoting Health/Preventing Disease: Objectives for a Nation. Answer: D 12) The number of deaths per 100,000 population is known as A) crude rate. B) a specific rate. C) the mortality rate. D) the morbidity rate. Answer: C 13) A rate for a specific population subgroup (e.g. death rate for 40—50 year olds) is referred to as A) mortality. B) life expectancy. C) the specific. D) Years of Potential Life Lost [YPLL]. Answer: C 14) The average number of years of life remaining is known as the A) death rate. B) mortality rate. C) life expectancy. D) Disability-Adjusted Life Years [DALY]. Answer: C 15) Which rate is the measure of premature mortality? A) Mortality rate B) Infant mortality rate C) Years of Potential Life Lost [YPLL] D) Health-Related Quality of Life [HRQOL] Answer: C 16) The primary difference between the health education/promotion profession and other helping professions in achieving the goals and objectives of the profession is A) the establishment of written objectives by health education specialists. B) that other professions do not have stated goals and objectives. C) the use of the teaching-learning process by the health education/promotion profession. D) that the cost of health education/promotion is much less than other helping professions. Answer: C 17) The primary role of a health education specialist includes A) delivering health education/promotion programs and evaluating health education/promotion programs. B) developing health education/promotion programs for the people they serve and evaluating health education/promotion programs. C) assessing the needs and diagnosing medical problems. D) serving as a resource person, communicating with the public and marketing health education/promotion programs. Answer: B 18) Which of the following steps is generally found in most planning models? A) Learning activities. B) Needs assessment C) Policy commitment D) Review of self-help materials Answer: B 19) The primary role of a health education specialist includes all of the following EXCEPT A) program development. B) program evaluation. C) program planning. D) program redirection. Answer: D 20) According to the best available estimates, behavioral patterns impact what portion of the populations early death? A) 70% B) 40% C) 30% D) 15% Answer: B 21) According to the best available estimates, social circumstances impact what portion of the populations early death? A) 70% B) 40%. C) 30% D) 15% Answer: D 22) The use of the DTP vaccine is an example of which level of prevention? A) Primary prevention B) Secondary prevention C) Tertiary prevention D) Community prevention Answer: A 23) The use of condoms to prevent the spread of sexually transmitted infections (STI) is an example of which level of prevention? A) Primary prevention B) Secondary prevention C) Tertiary prevention D) Community prevention Answer: A 24) Providing education to a diabetic on how to use his/her insulin is an example of which level of prevention? A) Primary prevention. B) Secondary prevention C) Tertiary prevention D) Community prevention Answer: C 25) Encouraging individuals to take a daily dose of aspirin to reduce the chance of a heart attack is an example of which level of prevention? A) Primary prevention B) Secondary prevention C) Tertiary prevention D) Community prevention Answer: B 26) The use of a sports physical examination as a requirement to participate in high school athletics is an example of which level of prevention? A) Primary prevention B) Secondary prevention C) Tertiary prevention D) Community prevention Answer: A 27) Which one of the following disciplines and professions was not identified by the authors as contributing to the principles and concepts of health education/promotion? A) Medicine B) Education C) Epidemiology D) Anthropology Answer: D 28) The Health Field Concept divides the health field into four elements. The four elements are A) education, epidemiology, medicine, and sociology. B) development, planning, implementation, and evaluation. C) human biology, environment, lifestyle, and health care organization. D) human biology, education, social work, and behavioral psychology. Answer: C 29) The greatest importance of the Health Field Concept has been the A) focus of health care reform legislation. B) focus on health promotion and disease prevention. C) institution of the Centers for Disease Control and Prevention. D) identification of health risks related to morbidity and mortality. Answer: B 30) The focus of health promotion and disease prevention efforts should be directed toward A) biological limitations. B) the Chain of Infection. C) modifiable risk factors. D) non-modifiable risk factors. Answer: C 31) What percentage of death could be prevented by controlling modifiable risk factors? A) 10% B) 20% C) 20% D) 40% Answer: D 32) The interruption of the sequence of events to prevent an infection is descriptive of which of the following? A) The Socio-ecological Approach B) The Chain of Infection C) Multicausation Design Model D) Communicable Disease Model Answer: B 33) The major components of this model include agent, host, and environment. A) Epidemiology B) The Chain of Infection C) Multicausation Design Model D) Communicable Disease Model Answer: D 34) Which of the following disease models is most applicable to the prevention of chronic diseases? A) The Chain of Infection. B) The Health Field Concept C) Multicausation Design Model D) Communicable Disease Model Answer: C 35) Epidemiology is A) a method of applying primary, secondary, and tertiary prevention in a community setting. B) concerned primarily with the empowerment of individuals in the of care their own health. C) the study of the distribution and determinants of diseases in a specific population. D) concerned only with life expectancy of humans. Answer: C 36) The level of prevention that includes strategies designed to reduce the incidence of disease is called ________ prevention. A) primary B) secondary C) tertiary D) community Answer: A 37) Screenings are used by which level of prevention? A) Primary B) Secondary C) Tertiary D) Community Answer: B 38) Providing training or instructing patients on how to modify their diets and take their medications to prevent a second heart attack is an example of ________ prevention. A) primary B) secondary C) tertiary D) Community Answer: C 39) Which of the following is the best descriptor of the socio-ecological approach? A) Behaviors are influenced by interdependent domains. B) Social circumstances are the prominent domain that influences health behaviors. C) Genetics and the environment are the only variables of interest when developing interventions. D) Family influences are the most important determinant of health. Answer: A 40) The first national document that presented a comprehensive national agenda for prevention presented objectives in three main areas. The areas include A) prevention services, health protection, and disease prevention. B) increase quality of life, increase years of life, and the elimination of health disparities. C) improve child mortality rates, decrease teen pregnancy rates, and reduce tobacco use. D) improve the number of years of independent living, reduce mortality rates of cardiovascular diseases, and increase high school graduation rates. Answer: A 41) Which of the following identify three levels used in the socio-ecological approach? A) primary, secondary, and tertiary B) public policy, medical care, and prevention C) intrapersonal, interpersonal, and organizational D) population control, professional development, and policy implementation Answer: C 42) Having the ability to understand and respect values, attitudes, beliefs, and mores that differ across cultures is a description of a ________. A) health education specialist B) culturally competent person C) professional D) epidemiologist Answer: B 43) The differences in health between populations is known as ________. A) crude rate B) Years of Potential Life Lost [YPLL] C) Health-Related Quality of Life [HRQOL] D) health disparity Answer: D 44) The two primary causes of health disparities are lack of access to care and the lack of quality care. Answer: TRUE 45) A crude rate is expressed in numbers per 100,000 population. Answer: TRUE 46) Health education/promotion is considered to be an emerging profession because it does not meet all the characteristics of a profession. Answer: TRUE 47) Health education/promotion may be considered on emerging profession because it is not clearly defined by itself or others. Answer: TRUE 48) If health education/promotion is not considered a profession, then health educators are not considered professionals. Answer: FALSE 49) The greatest potential for reducing the cost of health care in America is believed to be accomplished through the use of advanced technology. Answer: FALSE 50) The first set of Health Objectives for the Nation (Healthy People) provided a blueprint for health promotion and disease prevention strategies. Answer: TRUE 51) According to McGinnis, modifiable behaviors are the single most prominent domain of influence of health. Answer: TRUE 52) According to the World Health Organization, health is merely an absence of disease. Answer: FALSE 53) Years of Potential Life Lost [YPLL] is often described as the most comprehensive indicator of health and disease in a society. Answer: FALSE 54) Years of Potential Life Lost [YPLL] is a measure of premature mortality. Answer: TRUE 55) A rate used to express the impact of injury or disease is known as the Disability-Adjusted Life Years [DALY]. Answer: TRUE 56) Disability-Adjusted Life Years [DALY] is a measure developed by the World Health Organization and the World Bank. Answer: TRUE 57) Disability-adjusted life expectancy [DALE] is based upon mortality rates. Answer: FALSE 58) Health-adjusted life expectancy [HALE] can be calculated at any age. Answer: TRUE 59) The ultimate goal of the health education/promotion profession is to prolong life. Answer: TRUE 60) The terms of public health, health promotion, and wellness are all defined in terms of preventing diseases. Answer: FALSE 61) The primary role of all health education specialists is to evaluate behavior change in their clients. Answer: FALSE 62) Crude rates and adjusted rates are both expressed in terms of the total population. Answer: TRUE 63) Epidemiology is the study of how states prevent disease outbreaks. Answer: TRUE 64) The term pandemic refers to an outbreak of a disease over a wide geographical area. Answer: TRUE 65) The term endemic refers to the regular occurrence of a disease in a given population. Answer: TRUE 66) The Health Field Concept focuses only on the health care system. Answer: FALSE 67) Keeping a childs immunizations up-to-date would be an example of primary prevention. Answer: TRUE 68) The use of antibiotics to treat a bacterial infection would be an example of secondary prevention. Answer: FALSE 69) A persons age is considered a modifiable risk factor for disease. Answer: FALSE 70) The basic premise of the Chain of Infection Model is that modifying events that lead to infections can prevent infections. Answer: TRUE 71) There are several different models that have proven useful in the prevention of disease. Answer: TRUE 72) Health surveys can be used to measure health or health status. Answer: TRUE 73) Epidemiology can be used in health education/promotion to identify the needs of a given population. Answer: TRUE 74) Empowerment is the skill used to influence policy development. Answer: FALSE 75) Empowerment refers to people gaining mastery over their lives. Answer: TRUE 76) Advocacy is a skill needed by health education specialists. Answer: TRUE 77) Explain why health education/promotion is considered an emerging profession. Include at least two characteristics of a professional in your rational. 78) Identify the four limitations of prevention and explain each. 79) Compare and contrast the Chain of Infection, Multicausation Disease Model, and the Communicable Disease Model. 80) Identify four professions/disciplines that support health education/promotion. Provide an example of how each profession/discipline is supportive of the health education profession. 81) Identify the three levels of prevention and provide an example for each level. 82) Describe the role advocacy plays in health education/promotion. 83) You have been asked to provide evidence of the health status of a given population (state or country); which rates and measurements would you use? Why? 84) Identify a health issue in which you have utilized advocacy skills and describe two activities you used in your advocacy effort. References: Haines, Andy, et al. Climate change and human health: impacts, vulnerability and public health.  Public health  120.7 (2006): 585-596. American Public Health Association, et al.  Standard methods for the examination of water and wastewater. American Public Health Association., 1913. American Academy of Pediatrics, et al.  Caring for our children: National health and safety performance standards: Guidelines for out-of-home child care. Amer Academy of Pediatrics, 2002.

Sunday, November 24, 2019

F-100 Super Sabre in the Vietnam War

F-100 Super Sabre in the Vietnam War The North American F-100 Super Sabre was an American fighter aircraft that was introduced in 1954. Capable of supersonic speeds, the F-100 was North Americans successor to the earlier F-86 Sabre which had seen great success during the Korean War. Though plagued by early performance and handling issues, the definitive version of the aircraft, the F-100D, saw extensive use during the Vietnam War both as a fighter and in a ground-support role. The type was phased out of Southeast Asia by 1971 as newer aircraft became available. The F-100 Super Sabre was also utilized by several NATO air forces. Design Development With the success of the F-86 Sabre during the Korean War, North American Aviation sought to refine and improve the aircraft.  In January 1951, the company approached the U.S. Air Force with an unsolicited proposal for a supersonic day fighter that it had dubbed Sabre 45.  This name derived from the fact that the new aircrafts wings possessed a 45-degree sweep.   Mocked up that July, the design was heavily modified before the USAF ordered two prototypes on January 3, 1952.  Hopeful about the design, this was followed by a request for 250 airframes once development was complete.  Designated the YF-100A, the first prototype flew on May 25, 1953.  Using a Pratt Whitney XJ57-P-7 engine, this aircraft achieved a speed of Mach 1.05.   The first production aircraft, a F-100A, flew that October and though the USAF was pleased with its performance, it suffered from several crippling handling issues.  Among these was poor directional stability which could lead to a sudden and unrecoverable yaw and roll.  Explored during the Project Hot Rod testing, this issue led to the death of North Americans chief test pilot, George Welsh, on October 12, 1954.   YF-100A Super Sabre prototype in flight. US Air Force   Another problem, nicknamed the Sabre Dance, emerged as the swept wings had a tendency lose lift in certain circumstances and pitch up the aircrafts nose.  As North American sought remedies for these problems, difficulties with the development of the Republic F-84F Thunderstreak compelled the USAF to move the F-100A Super Sabre into active service.  Receiving the new aircraft, the Tactical Air Command requested that future variants be developed as fighter-bombers capable of delivering nuclear weapons. North American F-100D Super Sabre GeneralLength:  50  ft.Wingspan:  38  ft., 9  in.Height:  16  ft., 2.75  in.Wing Area:  400 sq. ft.Empty Weight:  21,000  lbs.Max Takeoff Weight:  34,832  lbs.Crew:  1PerformanceMaximum Speed:  864  mph (Mach 1.3)Range:  1,995  milesService Ceiling:  50,000  ft.Power Plant:  Ã‚  1 Ãâ€"  Pratt Whitney J57-P-21/21A  turbojetArmamentGuns:  4Ãâ€"  20 mm  Pontiac M39A1  cannonMissiles:  4  Ãƒâ€"  AIM-9 Sidewinder  or  2Ãâ€"  AGM-12 Bullpup  or  2 Ãâ€" or 4 Ãâ€"  LAU-3/A  2.75 unguided rocket dispenserBombs:  7,040 lb.  of weapons Variants The F-100A Super Sabre entered service on September 17, 1954, and continued to be plagued by the issues that arose during development.  After suffering six major accidents in its first two months of operation, the type was grounded until February 1955.  Problems with the F-100A persisted and the USAF phased out the variant in 1958.   In response to TACs desire for a fighter-bomber version of the Super Sabre, North American developed the F-100C which incorporated an improved J57-P-21 engine, mid-air refueling capability, as well as a variety of hardpoints on the wings.  Though early models suffered from many of the F-100As performance issues, these were later reduced through the addition of yaw and pitch dampers.   Continuing to evolve the type, North American brought forward the definitive F-100D in 1956.  A ground attack aircraft with fighter capability, the F-100D saw the inclusion of improved avionics, an autopilot, and the ability to utilize the majority of the USAFs non-nuclear weapons.  To further improve the aircrafts flight characteristics, the wings were lengthened by 26 inches and the tail area enlarged.   While an improvement over the preceding variants, the F-100D suffered from a variety of niggling problems which were often resolved with non-standardized, post-production fixes.  As a result, programs such as 1965s High Wire modifications were required to standardize capabilities across the F-100D fleet.   RF-100 Super Sabre in flight.   US Air Force Parallel to the development of combat variants of the F-100 was the alteration of six Super Sabres into RF-100 photo reconnaissance aircraft.  Dubbed Project Slick Chick, these aircraft had their armaments removed and replaced with photographic equipment.  Deployed to Europe, they conducted overflights of Eastern Bloc countries between 1955 and 1956.  The RF-100A was soon replaced in this role by the new Lockheed U-2 which could more safely conduct deep penetration reconnaissance missions.  Additionally, a two-seat F-100F variant was developed to serve as a trainer. Operational History  Ã‚  Ã‚   Debuting with the 479th Fighter Wing at George Air Force Base in 1954, variants of the F-100 were employed in a variety of peacetime roles.  Over the next seventeen years, it suffered from a high accident rate due to the issues with its flight characteristics.  The type moved closer to combat in April 1961 when six Super Sabres were shifted from the Philippines to Don Muang Airfield in Thailand to provide air defense.   With the expansion of the U.S. role in the Vietnam War, F-100s flew escort for Republic F-105 Thunderchiefs during a raid against the Thanh Hoa Bridge on April 4, 1965.  Attacked by North Vietnamese MiG-17s, the Super Sabres engaged in the USAFs first jet-to-jet combat of the conflict.  A short time later, the F-100 was replaced in the escort and MiG combat air patrol role by the McDonnell Douglas F-4 Phantom II.   Later that year, four F-100Fs were equipped with APR-25 vector radars for service in suppression of enemy air defense (Wild Weasel) missions.  This fleet was expanded in early 1966 and ultimately employed the AGM-45 Shrike anti-radiation missile to destroy North Vietnamese surface-to-air missile sites.  Other F-100Fs were adapted to act as fast forward air controllers under the name Misty.  While some F-100s were employed in these specialty missions, the bulk saw service providing accurate and timely air support to American forces on the ground.   A USAF F-100F of the 352d TFS at Phu Cat Air Base, South Vietnam, 1971. United States Air Force Historical Research Agency As the conflict progressed, the USAFs F-100 force was augmented by squadrons from the Air National Guard (ANG).  These proved highly effective and were among the best F-100 squadrons in Vietnam.  During the later years of the war, the F-100 was slowly replaced by the F-105, F-4, and LTV A-7 Corsair II.   The last Super Sabre left Vietnam in July 1971 with the type having logged 360,283 combat sorties.  In the course of the conflict, 242 F-100s were lost with 186 falling to North Vietnamese anti-aircraft defenses.  Known to its pilots as The Hun, no F-100s were lost to enemy aircraft.  In 1972, the last F-100s were transferred to ANG squadrons which used the aircraft until retiring it in 1980. Other Users The F-100 Super Sabre also saw service in the air forces of Taiwan, Denmark, France, and Turkey.  Taiwan was the only foreign air force to fly the F-100A.  These were later updated to close to the F-100D standard.  The French Armee de lAir received 100 aircraft in 1958 and used them for combat missions over Algeria.  Turkish F-100s, received from both the U.S. and Denmark, flew sorties in support of the 1974 invasion of Cyprus.

Thursday, November 21, 2019

War and Peace in Middle East Essay Example | Topics and Well Written Essays - 1750 words

War and Peace in Middle East - Essay Example Middle East has its own recognition on the globe for sensitive political developments. The area is well known for its rich oil resources and for its religious divisions between the people. Starting with the important and North African Country in Middle East; Egypt played vital role in the activities of Arabian countries in the history of the area. Many activities of the Arabian countries revolve around Egypt till the occurrence of revolution in 1952. The country was under the ruling of Khedives and kings for years together. Hence, it made the country fully corrupted and it remained backward. Simultaneously, European countries like Britain and France eyed Egypt for business opportunities. In the course of time, the revolution ruined the country and the later situations were totally different. The socio-economic conditions were changed. The fertile land in the country remained unused and people have become poor and even begged for food. Thus the country was trouble-torn for a long time (Peter Mansfield, 1965). The rest of the Middle East is always in news due to political and socio economic equations. According to David Fromkin (1989), the boarder quarries between the countries like Iraq, Syria, Turkey, Iran and Jordan make the area hot and the countries frequently exchanged fire at their boarders. More or less, UK, USA, Russia, and France involved in the daily activities of above-mentioned countries. The developed countries considered the Middle East as a play ground for their battle enthusiasm keeping in view that it is rich in oil resources. The proposal of alliance between Turkey (Ottomans) and Germany was a cause for Russia's unhappiness and it provoked Britain to invade Turkey and bagged a bitter experience. As a result, the involvement of Europeans from 1922 in the Middle East resulted in rise of Arab nationalism. That made all Arabian countries in the Middle East to act as one against the acts of Europeans but did not ensure the establishment of a country like Israel in case of Jews. In the above course of activities, UK wanted to make Husain as the king of Saudi Arabia to control the area of Middle East. However, it was not possible due to the socio-political situation at that time. Consequently, UK has to maintain its army troops there for years together and it becomes burden to that country. In the course of time, Britain and other European countries wanted to mend the situation in the Middle East according to their wish. As the religious differences between people resulted in disputes between states, to exploit that situation the UK implemented Balfour declaration to advocate Jewish national home in Palestine. Consequently, substantial part of Palestine has become the land of land mines and thousands of people were killed in Wars between Israel and other Muslim dominated countries in Middle East. As Palestinians want to rule themselves from Gaza and Israel wants to control them, the deviations between the two races always put th e area in blood bath and concept of Arab Nationalism has been strengthened.  

Wednesday, November 20, 2019

Foreign film report Movie Review Example | Topics and Well Written Essays - 1000 words

Foreign film report - Movie Review Example The story is a series of flashbacks that tackled their struggles and triumphs during their college life. Rancho, Fahran and Raju were labeled idiots by the dean whom the students call Virus like the computer virus. The dean had several attempts to break their friendship by calling in Fahran and Raju’s parents telling them that Rancho is a bad influence to the two, blackmailing them and several others that had constantly failed. There was one part in the story that really made an impact, it was when Raju’s dad, the postmaster, was rushed to the hospital, after that they had to take an exam. All three were worried that they will fail the exam and when results were released, Raju and Fahran were the last two on the list that passed. Initially they had thought that Rancho failed but then it turned out that he topped the exams. And it continued to be like that for until they graduated. Their friendship was tested when Raju jumped off the third floor or the building because V irus has blackmailed him into choosing whether to tell on Rancho and he would be off the hook or he would keep his silence and he would be the one expelled. He chose to jump off the building therefore putting him on a comatose for a period of time. Rancho and Fahran did everything to make him wake up and succeeded. The story ended with the two finding their long lost friend and finding out that he had become a scientist. I liked the movie since it had emphasized the value of education, the importance of friends and that excellence comes from doing what you love the most. It is sometimes hard to find a film that can both inspire and make you laugh at the same time. And the film brought a greater understanding of the Indian culture. There were points of the film that it would just simply inspire one to excel, appreciate the triumphs and failures that are part of college life. It also shows that real friends are the rare and must valued. The film can also boast of a lot of moral lesson s in the film that are sometimes unexpected since a lot of segments in the movie shows the mischief that the three has gotten themselves into. The simplicity of the movie made it very entertaining. In the movie what struck me as different from the movie is the fact that there are parts of the movie that they had musical segments in it. There would be intervals in the movie wherein there would be a musical or a song to express the thought or to make a point. In the film, Rancho was the odd one; he doesn’t conform to the normal standards of the school. He would always be an outcast, the one always misunderstood because he views things in a different way. And when it comes to their family, what I have observed is that they follow whatever their parents want. It seemed like disobeying them is somewhat a grave offense so even if they are forced to the course that they do not have any interest in, they would do it just to obey their parent’s wishes. The time flow in the movi e seemed slow at first, but after the first few minutes, it became very much interesting that one wouldn’t notice how long the movie really is. There was a lot of humor put into the story and a lot of lessons from life that one would simply be unaware of

Sunday, November 17, 2019

The management of salivary gland infection Essay

The management of salivary gland infection - Essay Example The management of these two types of salivary gland infection is possible with certain preventive measures and treatments. In certain cases, treatment is not required for curing these infections. The acute bacterial infection of the salivary glands occurs because of two important physiological mechanisms. Firstly, there are certain bacteria present in the oral cavity. Due to poor oral hygiene, the salivary duct and parenchyma tissue inhabited by these bacteria is contaminated which results in the infection. Secondly, the obstruction of salivary gland results in the stasis of salivary flow through the ducts and parenchyma promotes acute suppurative infection. The bacterial infection can affect any of the three pairs of the salivary glands however the most commonly affected gland is the Parotid gland. Several physiological and anatomic factors attribute to the predilection of the Parotid gland's infection. The composition of the Parotid gland secretion is completely different from that of the submandibular and sublingual glands. The saliva secreted by the Parotid gland is serous while that of the other two glands have higher proportion of mucinous material. The kind of saliva secreted by the other two glands contains lysosomes and IgA antibodies, which serve an antimicrobial function in protecting these glands from the bacterial infection. Mucins also contain sialic acid, which agglutinates bacteria, preventing its adherence to host tissues. Finally, specific glycoproteins found in mucins bind epithelial cells, competitively inhibiting bacterial attachment to these cells. There are certain anatomic factors as well that contribute to the p redilection of the parotid gland's infection. Stensen's duct lies adjacent to the upper mandibular molars, whereas Wharton's ducts rests on the floor of the mouth near the tongue. Tongue mobility may prevent salivary stasis in the area of warton's ducts, reducing the rate of infections involving the submandibular gland. The submandibular gland is more prone to bacterial infection rather than the sublingual gland in spite of its composition. Sialothiasis can produce mechanical obstruction of the duct, resulting in salivary stasis and subsequent bacterial infection. Calculus formation is associated frequently with acute bacterial infections of the submandibular gland because Wharton's duct is far more likely to harbor a calculus than stensen's duct.85 % to 90% of salivary calculi is located in the submandibular duct. Submandibular secretions are more mucinous than parotid secretions and therefore more viscid. They are also more alkaline containing a higher percentage of calcium phosphates. These characteristics contributes to the formation of submandibular calculi, despite the submandibular gland's predisposition for calculus formation. The parotid gland remains the most common site of acute suppurative salivary infection. Sialography, a method used for diagnosis of the internal structure of the salivary gland can also result in the infection of the submandibular glands rather than sublingual glands. There are small and numerous sublingual ducts which may not allow the catheter to enter unless there are anatomic variations.[ Bailey, Byron , Healy, Gerald ., Johnson, Jonas , Jackler, Robert , Calhoun, Karen , Pillsbury, Harold ,

Friday, November 15, 2019

Trusted Platform Module (TPM)

Trusted Platform Module (TPM) Trusted Platform Module (TPM) is a term used to define a chip or microcontroller. This chip or microcontroller can be placed into a motherboard configuration such as devices like mobile devices, or a personal computer (PCs). The requirements and application was presented and established by the Trusted Computing Group (TCG), to deliver a solution where a reliable and genuine relationship exists amongst hardware and software configurations. This facility was executed through cryptographic and hashing algorithms. Additional, TPM offers remote confirmation, a verification and authentication process for other third party software. TPM is a global standard for a protected crypto processor, which is a devoted microcontroller or chip intended to protect hardware by joining cryptographic keys into devices. TPMs technical requirements were established and written by TCG and launched in 2003. TCG was created as a nonprofit from inception and known to have brands like Microsoft, IBM, Intel, and Hewlett-Packard as clients. TPM just as well as others has flaws, and suffers from attacks. These attacks include offline dictionary and OIAP attacks; nevertheless, when joined with other endpoint control systems like multifactor authentication, network access control, and malware detection, TPMs contribution to a sound security platform is valid. (Sparks, 2007) This survey is a complete review of research conducted on TPM, its components, mechanisms, application, and authorization protocols. Furthermore, a description of some common attacks to which TPM has been a victim will be presented. Finally, more recent and future implementations will be discussed, such as the incorporation of TPM within mobile and smart devices and even within cloud computing. First, it is important to start with an overview of the TPM specification, its components, and its purpose. The TPM background section discusses in some detail an overarching summary of TPM. This will include what the motivations and advantages are to using TPM as well as how the different types of keys function. Also discussed is the evolution of TPM over time in how it functions in both its hardware encryption but also its capabilities. 2.1 TPM Summary A Trusted Platform Module (TPM) is a cryptographic coprocessor that replaced smart cards in the 1990s and then became present on most commercial personal computer (PCs) and servers. TPMs are almost ubiquitous in computer hardware and typically not seen by users because of the lack of compelling applications that use them. However, this situation has changed effective with TPM version 1.16 by adding the Federal Information Processing Standards (FIPS) bit which is a static flag that verifies if the device or firmware the TPM is attached to is FIPS 140-2 cryptographic module compliant. This compliance is then registered by the consolidated validation certificates granted when FIPS 140-2 is validated and are then registered and published at NIST as public record listed alphabetically by vendor located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm. (TCG FIPS 140-2 Guidance for TPM 2.0, ver 1, rev.8, 2016) Therefore, the line of thinking of TPM has increasingly becom e one of importance and an essential ingredient to cryptographic defense community whom are required to prove their FIPS 140-2 compliance. However, this was not always the case since security was not a mainstream issue in the early years of the Internet. 2.2 Motivation to use TPM The motivation for TPM began decades after the advent of what is known as the Internet. From the creation of Advanced Research Projects Agency (ARPA) in 1969 it took almost nineteen (19) years for us to become aware of the first known exploit called the Internet Worm in 1988. (Pearson Education, Inc., 2014) Until this time the focus had always been on the development of the computer with no security hardware and software that was easy to use. There was a real concept of information security threats. However, in the 1990s there was the concept of the potential of commerce the Internet would have and the need to secure the PCs that would exchange with that commerce. This prompted many computer engineers to convene and form and develop the first TPMs which became known to be as the Trusted Computing Group (TPM: A Brief Introduction, 2015). A main objective of this group was a cost effective approach to create a hardware anchor for PC system security on which secure systems could be buil t. This first resulted in a TPM chip that was required to be attached to a motherboard and the TPM command set was architected to provide all functions necessary for its security use cases. 2.2.1.Evolution TPM has evolved considerably over the years to become the trusted platform it is today. The earlier TPM 1.2 standard was incorporated into billions of PCs, servers, embedded systems, network gear and other devices, the evolving Internet of Things and increasing demand for security beyond traditional PC environment led TCG to develop a new TPM specification, which recently was adopted as an international standard ISO/IEC 11889:2015. For more flexibility of application and to enable more widespread use of the specification, TCG created TPM 2.0 with a library approach. This allows users to choose applicable aspects of TPM functionality for different implementation levels and levels of security. Also, new features and functions were added, such as algorithm agility, the ability to implement new cryptographic algorithms as needed (Trusted Platform Module (TPM): A Brief Introduction, 2015). ISO/IEC 11889-1:2015 ISO/IEC 11889-1:2015 defines the architectural elements of the Trusted Platform Module (TPM), a device which enables trust in computing platforms in general. Some TPM concepts are explained adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in a computing platform, ISO/IEC 11889-1:2015 provides some guidance for platform requirements. However, the scope of ISO/IEC 11889 is limited to TPM requirements (Trusted Platform Module (TPM) Summary, 2008). 2.3 TPM Working Functionality The TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform on a PC or laptop. These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platform measurements that help ensure that the platform remains trustworthy. This is critical because Authentication and attestation are necessary to ensure safer computing in all environments. Trusted modules can be used in computing devices other than PCs, such as mobile phones or network equipment (Trusted Platform Module (TPM) Summary, 2008). . Figure 1: Components of a TPM 2.3.1 Hardware-based cryptography This cryptography makes certain that the data stored in hardware is guarded against malicious threats such as external software attacks. Also, many types of applications storing secrets on a TPM can be developed to strengthen security by increasing the difficulty of access without proper authorization. If the configuration of the platform has been altered as a result of unauthorized activities, access to data and secrets can be denied and sealed off using these applications. TPM is not responsible for control of other proprietary or vendor software running on a computer. However, TPM can store pre-run time configuration parameters, but it is other applications that determine and implement policies associated with this information. Also, processes can be made secure and applications such as email or secure document management. For example, if at boot time it is determined that a PC is not trustworthy because of unexpected changes in configuration, access to highly secure applications can be blocked until the issue is remedied. With a TPM, one can be more certain that artifacts necessary to sign secure email messages have not been affected by software attacks. And, with the use of remote attestation, other platforms in the trusted network can make a determination, to which extent they can trust information from another PC. Attestation or any other TPM functions do not transmit personal information of the user of the platform. 2.3.2 Capabilities TPM can improve security in many areas of computing, including e-commerce, citizen-to-government applications, online banking, confidential government communications and many other fields where greater security is required. Hardware-based security can improve protection for VPN, wireless networks, file encryption (as in Microsofts BitLocker) and password/PIN/credentials management. TPM specification is OS-agnostic, and software stacks exist for several Operating Systems. 2.4TPM Components Trusted Platform Module (TPM) is the core component of trusted computing. TPM is implemented as a secure hardware chip and provides the hardware Root of Trust. TPM has been designed to provide trusted computing based on Trusted Computing Group (TCG) specifications. TPM functions can be implemented either in hardware or software. A secure cryptographic chip (Figure 2) can be integrated on the motherboard of a computing device according to TPM 1.2 specifications (Angela, Renu Mary, Vinodh Ewards, 2013). Figure 2: A TPM 1.2 Chip (Source http://www.infineon.com) A logical layout of the TPM is represented below (Figure 3) along with the TPM components. Figure 3: TPM Component Diagram (Zimmer, Dasari, Brogam, 2009) Information flow is managed by the I/O component through the communication bus. The I/O component handles routing of messages to various components within the TPM and establishes access control for TPM functions and the Opt-in component. The non-volatile memory in the TPM is a repository for storing the Endorsement Key (EK) and the Storage Root Key (SRK). These long-term keys are the basis of key hierarchy. Owners authorization data such as password and persistent flags are also stored in the non-volatile memory (Trusted Computing Group, 2007). Platform Configuration Registers (PCR) are reset during power-offs and system restarts and can be stored in volatile or non-volatile region. In TPM v 1.1, minimum number of registers that can be implemented is 16. Registers 0-7 are allocated for TPM usage leaving the remaining registers (8-15) to be used by operating system and applications (Angela, Renu Mary, Vinodh Ewards, 2013). In TPM v 1.2, number of registers can be 24 or more and categorized as static PCRs (0-16) and dynamic PCRs (17-22). The Program Code, also known as Core Root of Trust for Measurement (CRTM) is the authoritative source for integrity measurements. Execution engine is responsible for initializing TPM and taking measurements. The execution engine is the driver behind the program code. RNG (Random Number Generator) is used for generating keys, nonce creation and to fortify passphrase entropy. The SHA-1 engine plays a key role in creating key Blobs and hashing large blocks of data. TPM modules can be shipped with various states ranging from disabled, and deactivated to fully enabled. The Opt-in component ensures the state of TPM modules during shipping. The RSA engine can be used for a variety purposes including key signing, encryption/decryption using storage keys and decryption using EK. The AIK (Attestation Identity Key) is an asymmetric key pair typically linked to the platform module that can be used to vouch for the validity of the platforms identity and configuration. The RSA key generation engine are used for creating symmetric keys of up to 2048 bits. 2.5 TPM Keys TCG keys can be categorized as signing or storage keys. Other key types defined by TCG are Platform, Identity, Binding, General and Legacy keys (Trusted Computing Group, 2007). Signing keys can be classified as general purpose keys and are asymmetric in nature. Application data and messages can be signed by the TPM using signing keys. Signing keys can be moved between TPM devices based on restrictions in place. Storage keys are asymmetric keys and primarily used for encrypting data and other keys as well as for wrapping keys. Attestation Identity Keys (AIK) are used for signing data pertaining to the TPM such as PCR register values. AIK are signing keys that cannot be exported. Endorsement Key (EK) is used for decrypting the owner authorization credentials as well as cryptic messages created by AIK. EK is not used for encryption or signing and cannot be exported. Bind keys (symmetric keys) come in handy to encrypt data on one platform and decrypt it on a different platform. Legacy keys can be imported from outside the TPM and used for signing and encrypting data. Authentication keys are responsible for securing the transport sessions related to TPM and are symmetric in nature. Endorsement Key (EK) in the TPM plays a critical role to maintain system security. TPM uses a private key EK to generate other keys which are bound to a specific EK. EK should be secured and protected from being compromised. A 160-bit AIK authentication value is necessary to use the AIK by TPM (Sparks, 2007). The parent key used for generating other keys should be loaded first and authenticated by users before TPM can load all other keys. The EK is unique to the TPM and embedded within the tamper resistant non-volatile memory (Angela, Renu Mary, Vinodh Ewards, 2013). Public EK is used for creating AIK certificates and during the process of encrypting data within the TPM. The private key pair of EK is not touched when generating signatures. Multiple AIKs can be stored within a TPM to ensure anonymity between various service providers requiring proof of identity. AIK keys should be stored in secure external storage (outside the TPM) to make them persistent. AIKs can be loaded on to th e volatile memory in the TPM when in use. TPM has a Storage Root Key which stays persistent. Keys are not stored permanently in TPM due to limited storage space. A brief description of the process involved in key generation, encryption, and decryption in TPM is outlined below (Osborn Challener, 2013). A new RSA key is generated by the TPM when a key creation request is initiated by a software. TPM concatenates a value to the RSA key, appends authorization data and then the data is encrypted using the public section of the Storage Root Key and sends an encrypted blob to the requested software. A request is sent for the key to be retrieved from the blob storage when requested by the software program. TPM uses the Storage Root Key for decryption and validates the proof value and password before loading the key into TPM memory. This loaded key is referred to as the parent key and can be used for subsequent key creation forming key hierarchies. The TMP security section discusses in some detail the various ways in which security is implemented and vulnerable. TPM authorization protocols in both version 1.2 and version 2.0 are addressed. Several examples of different types of TPM vulnerabilities are outlined as well as ways to verify the integrity of the system to protect against this vulnerabilities and what the future holds for TPM. 3.1 TPM Authorization Protocols TPM 1.2 Authorization The basic definition of TPM authorization is the process of verifying that software is allowed to use a TPM key. For TPM 1.2 this process is accomplished by utilizing a couple basic commands in an authorization session; typically using passwords or values stored in the Platform Configuration Registers (PCRs) which are referred to as authorization data. The three types of authorization sessions for TPM 1.2 are: Object Independent Authorization Protocol (OIAP), which creates a session that allows access to multiple objects, but works only for certain commands; Object Specific Authorization Protocol (OSAP), which creates a session that can manipulate only a single object, but allows for new authorization transfer; and Delegate-Specific Authorization Protocol (DSAP), which delegates access to an object without disclosing the authorization data (Nyman, Ekberg, Asokan, 2014). Commands are then used to manipulate the keys within an authorization session. Software can prove that it is trusted by sending a command which includes the password hash to verify it has knowledge of the password. Also the locking of non-volatile random-access memory (NVRAM) to PCRs and particular localities is utilized for two different authorizations; one for reading and one for writing. While effective, these authorization mechanisms created a relatively rigid authorization system which make it difficult to administrate the sharing of TPM keys and data (Osborn Chaneller, 2013). 3.1.2 TPM 2.0 Authorization The implementation of TPM 2.0 on the other hand, takes a couple different approaches by introducing enhanced authorization (EA). EA takes methods from the TPM 1.2 authorization methods and improves upon them by incorporating features mentioned in Table 1 below. Table 1. TPM 2.0 Authorization Feature Description Passwords in the clear Reduces overhead in environments where the security of hash message authentication (HMAC) may not be feasible due to its extra cost and complexity HMAC key In some cases when the software talking to the TPM is trusted but the OS is untrusted (like in a remote system), it could be useful to use HMAC for authorization the same way as used in TPM 1.2 Signature methods Allows IT employees to perform maintenance on a TPM by authenticating using a smart card or additional data such as a biometric fingerprint or GPS location. This ensures that passwords cant be shared or compromised by unauthorized users and that an additional verification check is conducted PCR values as a proxy for system boot state If the system management module software has been compromised, this prevents the release of the full-disk encryption key Locality as a proxy for command origins Can be used to indicate whether a command originated from the CPU in response to a special request. Time Can limit the use of a key to certain times of the day Internal counter values Limits the use of an object so that a key can only be used a certain number of times indicated by an internal counter Value in a non-volatile (NV) index Use of a key is restricted to when certain bits are set to 1 or 0 NV index Authorization is based on whether the NV index has been written Physical presence Requires proof that the user is physically in possession of the platform (Table created with information from (Arthur, Challener, Goldman, 2015)) These features can be combined to create more complex policies by using the logical operators AND or OR which allows for the creation of policies to include multifactor/multiuser authentication of resources, limited time constraints for resources, and/or revocation of resources. (Arthur, Challener, Goldman, 2015). 3.2TPM Vulnerabilities When ranked against other standards, TPM comes in as highly secure but that isnt to say that it is immune to all attacks. There are several vulnerabilities that can allow an attacker to circumvent TPMs level of security. The sections below explain a few vulnerabilities that attackers can use to exploit TPM, and the mitigation techniques one could deploy to manage the risk. Dictionary Attack TPM authorization relies on a 20-byte authorization code that is sent by the requestor which if not properly locked down can result in an attacker guessing their way past the authorization. TPM issues guidance on how best to mitigate and prevent these attacks; however, the guidance is not very detailed and rather leaves the specifics up to the implementer. For example, one could implement a design that has TPM disable further input whenever it encounters more than 3 failed attempts. This would effectively prevent online dictionary attacks and has the added benefit of also preventing Denial-of-Service attacks. Weve spoken about preventing online dictionary attacks but where the threat truly comes into play is with an offline-based attack. This vulnerability comes into play when the authorization code is easily guessable, or in other words, poorly implemented. An attacker could observe a given command, the associated Key-Hash Message Authentication Code (HMAC) sent by the requestor and finally, the TPM response back. Since the HMAC is created from the authorization code, session handle and nonces; an attacker can utilize a dictionary attack to try different nonces and authorization codes with the given HMAC algorithm. A match would then provide the attacker with the correct authorization code. This offline attack bypasses TPMs lockout policy and though the attacker but sift through the random nonces and authorization codes, the method is a viable means of attack because it can be reasonably executed given the availability of time and computing resources. The mitigation for this comes down t o proper configuration and ensuring that the authorization code is not easily guessable. DRAM Attack Though this attack is not directly against TPM, it is worth mentioning as it is a viable way to circumvent TPMs security authorization protocols. TPM maintains its keys within non-volatile memory within the TPM component; however, when these keys are pulled by a requestor or requesting application, they are stored within Dynamic Random Access Memory (DRAM). It is well known that one can easily exploit DRAM to extract valuable information (keys, passcodes, etc) with this even being demonstrated against Microsofts BitLocker encryption utility. During reboot, Windows would load the encryption keys stored within TPM into DRAM, prior to even prompting the user. Given this, an attacker could go in and dump the raw memory to an external device, obtain the keys, then utilize those keys to decrypt the disk. This flaw enabled attackers to gain access to data on stolen laptops, even with full disk encryption. This hits on how a system is designed and ensuring that every detail is accounted for. Even if your system has a TPM, it is only going to be as secure as the weakest component within the overall system. OIAP Replay Attack Replay attacks are a method used by many attackers across a multitude of systems. TPM is no exception and is vulnerable to replay attacks based on several characteristics. First, a TPM Object-Independent Authorization Protocol (OIAP) session can be left open for an indefinite period. The authorized session is only closed by the requestor whenever an abnormal message is received and finally, the HMAC that wraps the message can detect alterations to the message but cannot distinguish between a deliberate alteration and a simple network error. For example, an attacker would first capture a requestors authorized command for later use. The attacker then sends an abnormal message to the requestor which then fools it into resetting the session. The requestor is unable to distinguish between the abnormal message and a network error so no concern is raised. Since there is no concern, the TPM keeps the authorized session open, allowing the attacker the ability to replay the previously captured command through the open session. This could lead to the attacker being able to corrupt or even overwrite a subsequent command issued by the requestor. The TPM would not be able to notice this type of attack which is truly concerning based upon the foundational principles of TPM and its assurance of being able to detect unauthorized modifications to data. 3.3TPM Attestations Attestation is the method a platform uses to prove to another platform that it is in a particular configuration by using a digitally signed set of cryptographic hash values which creates a trust between platforms (Fisher, McCune, Andrews, 2011). The network server first creates a cryptographic random value (used to prevent replay attacks) called a nonce, which is then sent to the client. Software on the client then sends the nonce to the TPM and specifies an identity key. The TPM hashes the PCR values along with the nonce and then signs the hash with a private key. The client software sends this back to the server which then verifies the platform configuration by comparing the public portion of the identity key. This process provides hardware-based assurance that software on these platforms has not been modified. (Osborn Chaneller, 2013). Figure 5 provides a visual representation of attestation as provided by (Osborn Chaneller, 2013) Figure 5: Attestation In order for the attestation process to be valid however, it must be able to be proven that the TPM values from the client are not being spoofed. This can be accomplished using a couple of key components: attestation identity keys (AIK), which are created by the TPM and securely stored on disk before being reloaded into volatile TPM memory; endorsement keys (EK), which are hardcoded by the manufacturer into the TPM chip; and a privacy certificate authority (CA), which is a third-party validation entity. The first step of this process occurs when the public half of the AIK and EK is sent to the CA. The CA then uses the public EK certificate to verify that the request comes from a valid TPM by comparing it to a list of all valid TPM manufacturers public keys. The CA then puts the public AIK in a certificate and encrypts it with the public EK. This ensures that the only party that can decrypt it is the computer with the AIK of the corresponding TPM, thus confirming that the TPM from the requesting platform is trusted, and therefore, the attestation method is trusted as well. (Uppal Brandon, 2011). 3.4Application of TPM With the ever-evolving landscape of technology, there is an increased need for faster, more reliable and more secure methods of protecting private and personal data. TPM is a product of those evolving requirements and has thus been incorporated into many different sets of applications. This section will expand upon those sets of applications and delve into how TPM is utilized within the industry today. Encryption One of the most popular uses of TPM is to ensure the confidentiality of user data by providing full encryption capabilities for disks and file systems. The full disk encryption utilizes symmetric encryption with a key created from the users supplied passcode and used during the initial configuration and system boot. This protects against the loss of the disk drive and serves to facilitate disposal or repurposing of the drive since deleting the keys will result in the drive being wiped. The same method is utilized for the encryption of file systems and can be done so to protect specific nodes. Policy Enforcement With Bring-Your-Own-Device (BYOD) policies becoming more and more prevalent within the commercial businesses, TPM has found a use as a policy enforcement mechanism for remote access. TPM can be used to establish trust and verify a devices integrity before allowing remote connection to an organizations intranet. This utilization of TPM is comprised of a series of hashes that measure the predefined sequence of code loads, starting with the boot of the BIOS through the loading of the applications. The chain of hash measures are then compared to the stored value in order to validate the systems integrity. This is very useful for establishing the base operating environment and developing a baseline with which access control policies can be developed. Password Protection TPM protected storage provides a method of storing encryption/decryption keys as well as providing utility management of user passwords. Typically, the password manager retrieves the then encrypted password from TPM, decrypts it, and then sends it to the client application for validation. Since the passwords are usually sent to the client applications over plain-text, this is a serious vulnerability in which TPM can provide a solution for. Using the 20-byte authorization code, a TPM object is created for each user password with this then being saved in the objects authorization field. To verify a password, an application would need to send an OIAP request to access the TPM object. TPMs response to this request would indicated whether the password was correct or not. As a plus, this serves as both password storage and verification with the password never being sent to the application thus eliminating the vulnerability associated with plain-text. 3.5TPM Future TPM is compatible with many hardware and software platforms in use in todays commercial markets and is already in use by several major business functions, to include: Banking, E-Commerce, Biometrics and even Antivirus applications. Looking forward, TPM will play an even bigger role in the evolving mobile market, providing more enhanced security for cell phones, GPS tracking systems, tablets and more. TPM can be used to secure the Mobile Operating System (OS) from being modified by attackers and can be used to further secure authorized access by implementing a hard-coded digital signature solution. For GPS devices, TPM can be used to protect against the modification of system defined location parameters, thus preventing an attacker from adjusting those parameters to satisfy their ends. The biggest constraint facing TPMs implementation within the mobile realm is the space and power constraints on mobile devices. Research is being done on whether a mobile instantiation of TPM should be based on firmware, software or even hardware. A hardware implementation would be the most secure; however, the firmware-based option will likely prove to be the best approach as it will balance the security of the device with the size limitations. TPM is also being looked at with regards to providing security enhancements for cloud-based services. Cloud computing has migrated most of the standard desktop to a virtual and remotely

Tuesday, November 12, 2019

Characteristics of a close relationship

Characteristics of a close relationship PSYCH/220 – Positive Psychology: What's Right with me August 17, 2014 It is safe to say as I move along and our population grows we meet new and interesting people every day. Whether we encounter people on the subway, buses, or elevators we form a bond with people even if all we have in common is taking the same train or bus at the same time every day.These situations build comfort and security, the more and more we see each other eventually It would become a dally outing and a friendship or acquaintance can be formed. As stated In chapter 1 1, an intimate relationship does not mean it Is physical or has the potential to become physical; an intimate relationship is structured by six components, an intimate relationship Is formed by Knowledge, Trust, Caring, Interdependence, Mutuality, and commitment. A perfect example for me of this relationship is the one I share with my father.I am 26 years old now and I have been married since I was 2 0 and I have two beautiful boys, and everything I set a new goal and challenge and I accomplish It I hank my dad because I feel he made me the man I am today. Growing up I was a bit difficult and to be quite honest I did not have much of a relationship with my dad, I was always well defended by my mom and I usually always stuck with her. My father was born on Dominican Republic, so his way of living and ways of being where different from what I seen here with my friends and even on Television.Since he had his way and I felt his way was a bad one we never seen eye to eye and we were choices in life, I noticed his happiness, then I started to realize that my father Just anted the best for all his kids, Just that his methods for expressing himself and actions where outdated. I turned over a new leaf with my dad, I consider my father my superhero, my mentor and best friend especially when I had kids of my own. I realized as a father everything my father did for me and my sibling to path the way for us to succeed.An intimate relationship relies on Knowledge, The knowledge of mutual understanding based on self-disclosure which consists on revealing personal details f one's self to another. My father and I have reached, when I am in need of advice or help he speaks from experience, tells me if he had ever experienced a particular situation and how he responded to it. Aside from knowledge we must have Trust, in this case is the security that no harm will be done. I trust my father to give me advice and criticism which will better myself and with my best interest at heart.Now as a father I would assume that possessing the characteristics of caring should be unsaid cause it is a father son relationship, however in reaching a new level of appreciation for my dad I have realized that I not only care for my dad as my father but as a person, as another human being. I care for him because he cares for me and my children; he continues to be a great father and even better gran dfather. These are Just a few of the many characteristics that my intimate relationship with my father consists of. Every day I am grateful to have established this level communication, comfort, and trust with one another.

Sunday, November 10, 2019

Philippine President Benigno Simeon Essay

Philippine President Benigno Simeon C. Aquino delivered his sixth State of the Nation Address on Monday, July 29, 2015 at the Batasang Pambansa in front of joint session of the Upper and Lower House of the country’s Legislative Branch of Government. Some students will surely give their reaction paper with the Pres. SONA as part of their assignment. The State of the Nation Address (SONA) of President Benigno S. Aquino started at around 4:00 PM (PST) and concluded after two hours and 15 minutes. The SONA 2015 is one of the highly anticipated date of the administration, as the head of state reports his accomplishments and plans for the country. During the entire SONA, the President received a total of .. rounds of applause. President Aquino started his Sixth SONA by issuing an apology that the traditional processional walks was not made because Main Topics for Discussion: Blaming the Previous Administration: President Aquino once again blamed the previous administration of former President Gloria Macapagal Arroyo mentioning the problems he inherited during his earlier days as President such as the NBN ZTE Deal, Hello Garci controversy, questionable bank accounts of Jose Pidal, Maguindanao Massacre, MWSS Bonuses and the NFA anomalies. Highlighting the Achievement of His Cabinet Members: The President applauded the members of his Cabinet for an excellent jobs as members of his Daang Matuwid program. He showcased the achievements of his administration in transportation and communications, tax/revenue, labor and wages, international relations, education, budget and finance, peace, social welfare, justice, calamity and disaster preparedness, national security, economy, infrastructure, governance and reform. Pres. Aquino lauded Commissioner Kim Henares for her tax reforms mentioning the 380 cases filed against tax evaders. The collections of the BIR also went up to P1.3 trillion and this year 2015, the BIR collection went up to P1.5 trillion. Manufacturing & Unemployment: Pres. Aquino stated that there’s a 3% average growth in the manufacturing  sector from 2001-2009 but under his administration from 2010 to 2014, the manufacturing sector grew by 8%. The unemployment rate of the Philippines also dropped to 6.8% last year and considered as the lowest ever recorded in a decade. 4Ps and the Education Sector: Pres. Aquino highlighted the ‘Pantawid Pamilyang Pilipino Program’ or 4Ps which now have 4.4 million beneficiaries from 786,523 in 2010. In 2008, there were 2.9 million out of school youth in the country. In 2013, only 1.2 million out of school youth remained. On education sector, PNoy said that Alternative Learning System helped to ensure that even indigenous peoples and street children are not left behind. The requirements for the K to 12 programs – backlogs of 66,800 classrooms, 145,827 teachers, 73.9 million textbooks already provided. For TESDA program of the government, studies show that 71.9% [of TESDA graduates] found employment right away, compared to the 28.5% recorded before. Health and Social Welfare: Around 89.4 million Filipinos are already member of the Philhealth program of the national government and beginning in 2014, the poorest 40 percent of the population were treated in public hospitals for free. In social welfare, PNoy said that in the Sitio Electrification program, 25,257 sitios out of 32,441 were served. Aviation & Transportation Sector: In aviation, ICAO lifted the safety concerns it imposed to the Philippines in 2013. The EU Air Safety Committee lifted the travel ban in all local carriers. For the unresolved problem on Metro Rail Transit (MRT), Aquino said plans of purchasing of new MRT train coaches. Armed Forces of the Philippines: In the Armed Forces of the Philippines (AFP) modernization, the government has plan to buy 2 more C-130. There will be additional 6 landing craft utilities and 3 C-295 medium lift transport. President Aquino mentioned the PNP’s project such as their Capability Enhancement Program of which 2,523 patrol jeeps and 577 utility vehicles were purchased. Important Bills and Legislations: Pres. PNoy wish to pass the Bangsamoro Basic Law and his interest on the controversial Anti-Dynasty Law which received the loudest applause from SONA expectators. When he mentioned his interest on Anti-Dynasty Law, it received the loudest applause from SONA expectators. â€Å"Panahon na para ipasa ang isang Anti-Dynasty Law.† PNoy also thanked Congress and Senate for other bills and acts such as Philippine Competition Law, Sin Tax Reform Act and Responsible Parenthood Act. The president also thanked officials of the government for their contributions, sacrifice and wellspring of inspiration to the nation. He lauded Interior and Local Government Secretary Mar Roxas for his contributions to Daang Matuwid. Pres. Aquino ended his speech with the following statement â€Å"Simula pa lang ito. [Palakpakan] Nasa unang yugto pa lang tayo ng dakilang kuwento ng sambayanang Pilipino. Sa gabay ng Panginoong Maykapal, at sa patuloy nating pagtahak sa Daang Matuwid, lalo pang tatayog ang mga pangarap na maaabot natin. Lalo pang lalawak ang kaunlarang tinatamasa natin. Nasasainyo pong mga kamay ang direksiyon natin. Magandang gabi po sa inyong lahat, maraming salamat sa inyong lahat po.† Reactions to President Aquino’s SONA: President Aquino missed so many important topics during his last and final SONA, the entire SONA centered on his administration’s accomplishment and giving credits to his partners on his â€Å"Daang Matuwid.† Some of the important issues that the President failed to mention during his sixth SONA are the following, the controversial PDAF issue, the Mamasapano Massacre, the expansion of Chinese territories in the West Philippine Sea and the Freedom of Information Bill to name a few.

Friday, November 8, 2019

Case Study Essay on Nursing Informatics

Case Study Essay on Nursing Informatics Case Study Essay on Nursing Informatics Nursing Informatics in today’s Healthcare Delivery System: This paper highlights the essentiality of informatics processes and technology in informatics in enhancing the safety of patients and summarizes nursing research that is relevant to the matter. The paper makes use of numerous material most of which is current to highlight the importance of informatics in improving health care. The author arranges the information logically, first by defining and describing the key aspects of the article, as well as, key terms. The information is seen as largely accurate and valid as it is cited correctly fro current materials and arranged in a manner that supports the topic and purpose of the article. The conclusions of the paper are based on most of the information cited in the main body of the paper. The recommendations are deducted from the analysis of the information presented and, therefore, are believable to a certain level. One of the things that reduce the level of accuracy of the conclusions of the author is that he introduces new materials at the conclusion level and that makes the conclusion less valid. Though the author might have included this new citation to support the conclusions he draws, it would have been more accurate if the conclusions and recommendations were entirely drawn from the body of the paper. The purpose of this article was to utilize an approach that was qualitative in exploring perceptions in nursing of the effects of health information system utilization in the work place. To achieve its purpose, the research utilized three institutions in National healthcare Group. It also involved seven nurses and interviews. The researchers provided a brief overview of the major aspects of the study which was supported by a number of current studies and literature. The literature is current and well cited and the information is arranged in a manner that is logical. It is highly probable that the information is accurate and valid as it is cited from current material. The authors get their conclusions from a careful analysis of the results of the study. The conclusions and the recommendations of the study, therefore, are believable as one can follow and make sense of them from the methods, results and analysis of the interviews carried out in the study. There are a number of limitations, however, that the study presents. For instance, study was small and, therefore, it is impossible to generalize the results of the study to represent a larger population. Additionally, the quality of the article is determined largely by the skills of the researchers. As it follows, the outcomes might not be wholly accurate or valid. The validity of the truth of the results is also doubtful as the researcher asked the participants sensitive questions regarding HIS and its barriers and effects. However, the study is essential as it gives the audience a first- hand opinion of the users of health information systems and the kind of effects it has on health care, and qu ality of outcomes in patients. The purpose of this article id to look at the level at which Canadian medical institutions have adopted health informatics and the impacts the informatics have on health delivery. The author basis her arguments on a number of materials most of which are current. This indicates that the accuracy of her deductions is assured. Additionally, the work is properly cited and, therefore, it can be thought of as valid. The author introduces the article by giving to her audience the main perspective and focus of the paper. Additionally, the author also carries out her own surveys to add on to the information derived from the literature. The conclusions of the study are made after the careful analysis of the results of the survey and after the careful study of the literature. Though the article is of uttermost importance to the nursing industry, it also poses a number of limitations. The study makes conclusions about Canada and, therefore, the recommendations can only be made about Canada and c annot be generalized with a larger population. This paper is a systematic literature review that seeks to explore the current, available studies that indicate whether the nursing population in the US today, other than the current graduates, have the required, sufficient knowledge and competencies to utilize knowledge in informatics and skills to enhance the advancement of practice based on evidence and utilization of electronic systems of medical records effectively and associated technologies. The author uses articles derived from the period between 1999 and 2006. The currency of the articles he chooses to use in the literature review indicates that the information displayed in the article is current and valid. The information is also properly cited and referenced to indicate that it is accurate; the author arranges the information logically by first defining the main aspects of the subject matter. The author makes several conclusions all of which are based on the information obtained from the literature reviewed. The author does not include any other information that is not priory highlighted in the reviewed literature. There are some limitations in the article nevertheless. For example, the author highlights four different limitations that he deems are the contributing factors to the incomplete study and research if the clinical population. The author does not show how he came with these conclusions. It is not clear that his recommendations are backed up with evidence or they are just personal recommendations. However, the study is extremely significant in today’s health care as they highlight the areas in need of improvement when it comes to nursing informatics in providing health care. The article can be used in the making of the concepts paper as it can be used to help nurses improve their informatics knowledge by highlighting areas of need. The article discusses the importance of electronic health records in improving the kind of health care hospitalized patients get in hospitals. The article also shows how essential it is for nurses to use sources of electronic documentation as it is the only relevant and meaningful way of majority of the essential information about their patients. The article draws a lot of its information from numerous articles and other materials that are logically organized. The material the article draws its evidence from seem appropriate for the subject are, therefore, appropriate. The cited materials help the authors discuss and show the relevant aspects of electronic documentation and its implications. Additionally, the authors carry out their own studies which involve an integrative review of the available literature and the examination of the associations between the quality of health care and electronic documentation. The study does this by following the quality framework by Donabedian. The general discussions and summary of the article are used by the authors to provide an essential overview of the conclusions that article draws. They also could be highly useful to support the conclusion in the research paper. The paper, however, had one significant limitation and that is the researchers did not seek to answer the question, ‘how does electronic documentation aid nurses in delivering quality health care?’ the study did also not evaluate the outcomes of the patient. These limitations, however, can be used as new topics for future research whereby researchers in the future can find out from nurses how electronic documentation help in improving delivery of health care so as to obtain and define variables for evaluating some outcomes in patient health. This source is extremely essential because it provides one with the essential information on how health care can be improved. This is one way that one can come up with recommendations of how today’s he alth care can be improved and enhanced. Are you ready to pay for custom case studies written by highly qualified writers? Dont hesitate to contact our company right now!

Wednesday, November 6, 2019

Germanys Surrender in WWI essays

Germanys Surrender in WWI essays Germany both at home and working in the army were spiralling down hill fast, even though the government was hiding the worst of the war under its belt. The German people had suffered immensely throughout the war because of the British blockade. Food riots had broken out in some major towns and cities and thousands of workers had gone on strike for the high cost of living. During the harsh and terrible conditions of the trenches of the Western Front something else swept through the trenches other than the normal bugs. It was called the Spanish Flu it hit the Western Front in 1918 and was as deadly as the Plague. It often killed its victims within just hours of the first signs of infection. Of course this did not go down to well with the soldiers in the trenches as u can imagine. Killing each soldier one after another and not particularly helping the German Army. Erich Ludendorff was Germany's chief strategist during World War I. He believed that Germany needed to concentrate on both land and sea warfare to defeat Britain. He led and unrestricted submarine war on Britain, which was largely responsible for the entrance of USA into the war. With the aid of the United States, the Allies were able to defeat the Central Powers and defeat Germany. In October 1918 United States President Woodrow Wilson demanded an unconditional surrender from Germany. Ludendorff opposed and then later resigned. On November 11, 1918, at 5:00 am the Allied and German delegates signed an armistice on terms made up by the Allies, at 11:00 the same morning hostilities on the western front came to an end. The end of the war on the 11th hour of the 11th day of the 11th month of 1918. The Germans had surrendered. ...

Sunday, November 3, 2019

Lesson 4.3 -Outlines Essay Example | Topics and Well Written Essays - 500 words

Lesson 4.3 -Outlines - Essay Example The topic on climate change is growing with each day; this is due to the adverse effects felt in regions that are worse hit by the problem, resulting into drought unpredictable rainfalls poor harvests for some regions and poor air quality resulting from pollution. Thesis statement: This paper will aim at solving the problem of climate change through going through the progress of the problem, its origin and giving suggestions as to how the problem can be fixed and its effects eradicated from the face of the earth. This is not a new topic; hence, some reference will be given from already existing contributions made towards fixing the problem. This is the unpredictable weather patterns as to what has been observed over long periods. The various aspects of human life that have and are still contributing to climate change necessitate this. However, some groups and scientists are of the opinion that climate change is not manmade and that it is part of normal changes within the solar system. This paper will provide evidence that climate change is manmade and can be controlled. Climate change did not exist in the early days; this problem was realised not long ago through the effects it portrayed. Climate change and pollution of the environment have a direct link to each other, hence it is right to say climate change is a result of pollution and that human beings or manmade activities result in pollution of the environment. That translates to the fact that climate change is manmade. There are gases that are released into the atmosphere as a result of human activity through burning of fossil fuels that end up polluting the air and causing effects such as warming around the world that ends up melting the ice caps. This is finally manifested through flush floods and rise in sea levels having negative impact on the people living near large water bodies. As it is indicated through the paper, climate change is as a result of human

Friday, November 1, 2019

1-Why is the GLOBE Study so important to the development of Assignment

1-Why is the GLOBE Study so important to the development of multicultural studies2- How can you develop Cultural Intelligence (CQ) Is CQ related to Emotional Intelligence (EQ) - Assignment Example The GLOBE study is significant in the development of multicultural studies since it relies on support from cultural scholars like Hofstede, Schwartz, and Smith. We can develop cultural intelligence by being curious and interested in different cultures. Devising learning strategies and finding entry points into new cultures develops cultural intelligence (Rasmussen, 2014). Developing awareness about issues relating to other cultures also develops cultural intelligence. Embracing cultural diversity and accepting people from different cultures develops cultural intelligence (Rasmussen, 2014). Developing awareness on my bias towards other cultures helps one to avoid cultural ignorance. Believing in one’s ability to adapt to culture helps in understanding different cultures that defines cultural intelligence (Rasmussen, 2014). Evidently, cultural intelligence relates to emotional intelligence in that emotional intelligence is one of the components of cultural intelligence (Earley & Mosakowski, 2004). Other components of cultural intelligence include cognitive and physical intelligence. Moreover, emotional intelligence factors that relate to social competence define cultural intelligence. As such, specific aspects of emotional intelligence relate to certain cultural intelligence factors (Earley & Mosakowski,