Thursday, October 31, 2019

Dental Clinic in Montreal Essay Example | Topics and Well Written Essays - 500 words

Dental Clinic in Montreal - Essay Example Dental marketing has entered a new phase with the use of internet. Montreal dental companies like Dental Marketing Canada focus on dental marketing online. This is meant for local dentists in the area. These types of techniques are utilized as a cutting edge advertising system that opens business for internet users. These exposures have helped these companies to increase the clientele lists and gain more profit. Dental business is now a huge phenomenon for Montreal and other parts of Canada. Online transactions have enabled better dealings. Growing number of active users of internet in Montreal have accelerated the dental marketing exposure. Internet is used as the leading source for marketing exposures. Dentist visits and treatments increase as more and more people visit dentists for routine check up and other tests. Service providers maintain websites and are available online in different modes. This has helped people to improve their awareness. Online advertisements, bookings and other dealings have brought good revenue for companies. Dental clinics set up websites so that potential patients can call for quotes and enquiries. The online presence has helped Montreal dental businesses to grow rapidly. Montreal Dentists even create social networking websites to enable patient interaction and communication. Parishioners set up websites that educate people about the dental procedures and treatments. These valuable educational tools help patients have a proper overview of the processes. Patient education pages help them access the invisible braces available in Montreal. Dentistry businesses increasingly rely on advanced technologies and internet to improve their business. They swear they provide the best level of dental care through patient education and quality treatment. Service providers in Montreal are highly specialized in services like implants, velscope testing and CEREC. Certain Montreal service providers provide excellent

Tuesday, October 29, 2019

Time you were shamed Essay Example for Free

Time you were shamed Essay Ive had great embarrassing moments in my life. Most occurred during my childhood days. One of these happened when I was 8. I got my   most humiliating spanking which I will never forget in my entire life.   Studying should be at the top of every students priority. During this age I need to do some homework everyday.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   My parents used to monitor my studies and pay lots of attention to my school work and the grades on my report card. I was a very lazy kid and forgot to do my homework most of the time. My teacher once caught having no homework. She then decided to report it to my parents. We have a school handbook wherein every important school reminder should be written. My teacher wrote a letter to my parents that they were supposed to read and to sign. I really wanted to avoid any punishment from my parents and so I confidently signed the letter by forging their signature. It was a very bad idea since a childs handwriting is far different from an adults . The next day it was time for my teacher to see if my parents were already aware of my misbehavior and told me that she wanted to talk to them after the class. I can never forget the day after that. It was Saturday which meant no class and so I have to face the truth since my parents already knew what I did. Two birds in one stone. First is by not doing homework and next is by copying their handwriting.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As I woke up I went to the bathroom downstairs but my father saw me already and told me that I should be punished. He grabbed my arms and took me to the kitchen. I was about to pee in my pants and to my surprise, dad pulled down my pajamas and slid it together with my underwear to my ankles. I was standing naked and what I didnt notice was that my mom and my teacher on the subject which I failed to do homework were standing right in front of me. They both saw everything and were both staring at my genitals and laughing. It was very embarrassing and I was really ashamed of my lazy deed.

Saturday, October 26, 2019

Literature Review of Reflexivity in Qualitative Studies

Literature Review of Reflexivity in Qualitative Studies Every research study needs to be contextualised, understood within the background and context of its place within the theoretical and practice spectrum (Fink, 2005). Nursing research, as with every other aspect of nursing practice, should be ethically sound (Carrick, 2000), and should also be founded within sound methodological principles and developed along the lines of evidence for practice. Within a primary research study such as this, the ability to understand the nature of the practice and evidence base of the study is very important, and there are two pre-existing spheres of theory which can support this. The first of these is the field of evidence-based practice, and the second is reflective practice, both of which contribute to the processes of critical thinking which are involved in research practice as much as they are in clinical practice. The combination of these two practices within this primary research study relates to the need to in-build a clear decision trail and map of the reflexivity involved in a qualitative approach to generating and analysing data. Reflection in nursing practice is an importnat component of ongoing professional development (Driscoll, 1994; Gustafson and Fagerberg, 2004), how it contribues to professional development is what concerns the author here. Processes of structured and purposive reflection on practice, and on learning and knowledge acquistion of development (Coutss-Jarman, 1993), contribute to the development of critical thinking skills which contribute to the processes of applying evidence to practice and assimilating knowledge into the wider schema which relate to nurses ways of knowing (Daly, 1998;Rolfe, 2005). Therefore, the author, being aware of the contribution of good reflection to a reflexive process of clinical learning and application of knowledge (Gibbs, 1988; Hargreaves , 2004), aimed to apply a similar critical and reflexive approach to the process of reviewing and critiquing the literature relevant to this research study. Although there are those who argue that reflection per se is a biased and often self-referential (Jones, 1995), this author would argue that reflexivity is a fundamental component of inductive processes of qualitative research practice, particularly in relation to the interpretation of data (Silverman, 2001). and therefore, set out to review the literature using a critical and reflexive approach, building in principles of reflection and critical thinking (Price, 2000), but applied to the relationship between the nurse as researcher and their burgeoning knowledge and understanding, as it feeds into their tacit and intellectual knowledge. Critical science within nursing is established as a means of developing critical thinking and analysis skills and incorporating multiple ways of knowing into the theory and practice domains (Fontana, 2004). Nursing research and the principles of theory generation intersect naturally with this kind of approach, because nursing research is, however abstract or applied, concerned with the improvement of nursing practice, one way or another (Freshwater and Bishop, 2003). It is also imperative that nurses who carry out research ensure that the research is of the highest possible methodological quality, so that it can be used as evidence for practice, or else it would not be ethical to carry it out, particularly if vulnerable people are being asked to participate (Hedgecoe, 2008; Carrick, 2000). Thus the author set out to ensure that the critical reflexive review of the literature was carried out to the highest possible quality, by combining the critical principles of research critique and evidence based practice with research searching skills. Therefore, the author structured the literature review as a means of both identifying relevant research and discussion or commentary on the research question, and critiquing the quality of that research as evidence for practice in its own right, as a means of taking a more rigorous and focused means of contextualising the research study and contributing to the ultimate process of theory generation. The focus of the literature review is literature available, and literature as evidence for practice, because this focus on evidence is part of the current trend towards quality of care (Elliot, 2000). All those involved in the provision of healthcare at a professional level are required to be able to identify and apply research for their sphere of practice (Rycroft-Malone et al, 2004), particularly if this evidence can improve practice. But for this, the nurse must be able to evalute the evidence in relation to methodological quality (Freshwater and Bishop, 2003; Hek, 2000; Elliott, 2001). Thus, to begin with, the author considered the kinds of research evidence available, fully aware that the scientific rationalist paradimg is considered to provide the highest quality of research for practice (Upshur, 2001; Sackett et al, 1996 ), but also fully espoused to the value of qualtative research in the evidence paradigm (Rycroft-Malone et al, 2004, Upshur, 2001; Stevens and Ledbetter 2000 ). A nurse evaluating research to feed into their own study needs to understand research methodology and practice, and to understand the principles of research critique and evaluation. A range of critiquing frameworks exist which provide useful insight into the quality and usefulness of research, as a foundation for developing the inteded reflexive critical review of the literature, such as the ones suggested by Cormack (2000), CASP (2004), Daggett et al (2005), Duffy (2005). These provide clear guidelines for the critiquing of both qualitative and quantitative research articles, as well as case studys and systematic reviews. The author proposes to develop a critiquing framework using a combination of these approaches, which feeds into the process of reflection so that the author will reflect on every step of the literature review whilst carrying it out, and modify their approach according to what that reflection brings to the surface. The aim, as stated earlier, is to use reflexivity to evaluate the evidence base for practice (Stevens and Ledbetter, 2000; Sackett et al, 1996). Evidence based practice is both a goal and a process, and therefore it could be argued that identifying the state of the evidence base is a fundamental starting point for the research project overall, not just an element of the required research process. This may be all the more important in this study because of the challenges of ensuring qualitative research is viewed as a valid contribution to theory and to practice (Cohen and Crabtree, 2008; Kearney, 2001). Thus the process of literature review is aimed at providing something which, on its own, will contribute to the evidence base for practice (Pepler et al, 2006), as well as providing the necessary critical, clinical and thoeretical context for the authors own study. Following on from the development of the critiquing model, with its in-built reflexivity, the author wil carry out an initial search of the literature using a set of key words and search terms that wil be developed using a brainstorming technique. Given the authors pre-existing knowledge of the topic, informed by the literature which was used to develop the research proposal, this brainstorming exercise is also an exercise in reflexivity. The author will then develop a short list of search terms to be used in isolation and in combination to search the available literature. The search will be carried out in all the relevant and available electronic gateways and search engines, including BNI; CINAHL; EMBASE; MEDLINE; Cochrane Collaboration; Science Direct; and Google Scholar. The author will also search online to look for guidelines and recommendations using the same search terms. As the search continues, the author will revise the search terms in response to the kinds of papers that are returned, keeping a record of these revisions, until they feel they have accessed all the relevant articles. Those deemed relevant to the study will be retrieved, and the most pertinent will be critiqued according to the model the author will have developed. The literature review will be presented in themes, but containing comparative analysis, and the author will ensure that, in order to fit in with the overall study, that there is a balance of qualitative and quantitative studies included.

Friday, October 25, 2019

American Treatment of the Indian Tribes Essay -- essays research paper

American Treatment of the Indian Tribes The American Indian lived a life being one with nature. In their way, they understood the ecological demands of the land and knew that if they took care of the land the land would take care of them. They possessed an untouched wisdom living in harmony with the environment. They hunted the land for buffalo, which provided food and clothing for the ages to come. In time they would almost become non existent at the hands of the â€Å"white† man. They would come to lose their land, lose the buffalo and lose their self being and their way of life. Towards the end of the 1800s the Indian territories were reduced by about 95 percent. The U.S. government along with greedy white settlers was the main reason behind this loss of land. The government placed treaty upon treaty on the Native Americans and would not uphold to any of them. Some treaties were made to guarantee safety and permanent reserve for the Indians, but they were not followed through. In most cases the Indians were driven off the land by white settlers looking for gold or rich farmlands. The U. S. government broke some of the treaties by expanding through the promised lands looking for valuable minerals and making way for the expansion of the railways. The U.S. Government in seeking rights to control the land and its natural resources reverted to â€Å"legal† manipulation. In cases were they were met with resistance, the Army was called in to settle the score. The relocation of the Indians from lands east of the Mississippi River to the West represents a dark phase in American history. In the first treaties signed, there were promises of stability for the Indians. One of these sagas is known as the â€Å"Trail of Tears†. This relates to the removal of the Cherokee Indians by the U.S. Army from their native lands in North Carolina, Georgia, Tennessee and Alabama. During the journey they were held in camps and then forced to travel over 1,000 miles during adverse weather. This trail led them to the Indian Territory, which is now Oklahoma. This was a catalyst towards the devastation of the American Indian culture... ...mises such as owning their land â€Å"as long waters run and the grass shall grow.† The Indians would have continued to live "until the end of time" if the white settlers had not intervened. The white settlers created conditions that threatened the existence of the Indians. By the late 1800s, most of the tribes had now been almost completely abolished. The Indians were either beaten into submission or succumbed to the many contagious diseases brought on by the settlers. By the start of the 1900s there were less than one quarter million Native American Indians in the country. These numbers dwindled from over half a million in the early 1880s and over five million since Columbus first set foot on these lands. Most of the Indians now were living in the small reservations. Beaten, tired and humiliated, they lived in poverty, alcoholism, and unemployment. They were now forced to live off the government as wards of the state. Once the rulers of the West they now a lost culture, having lost their identities and sense of being. Although the freedom of their ancient way of life has been lost, the religion, culture, legends, and spirit of the Native American Indian will always endure.

Wednesday, October 23, 2019

Nmap Lab Exercise Essay

2. Is Nmap able to identify the operating system running on each system? Is there any Nmap feature that can be used to guess the OS of a host? Explain your answer. Using the ports that are open and the probable services running on those ports, determine what operating systems are running on the devices. Explain your answer. Nmap was not able to classify the operating system (OS) running on all â€Å"3† hosts provided during the exercise. However, Nmap  was able to identify and determine the OS running on â€Å"Host 1† as presented in Figure 1: Host 1 (192.168.100.103). Located in Nmap there is an attribute which is used to conjecture the OS of a target host. If an individual decides to limit the OS detection to the targets, one can use one open and one closed port by using the (osscan-limit) feature command. With this scan Nmap will attempt a (TCP-SYN) connection to 1000 of the most common ports as well as an ICMP echo request to determine if a host if up. On the other hand if Nmap cannot make a perfect match for an OS it will guess something that is close, but not 100% exact (Orebaugh & Pinkard, pp. 111, 2008). This approach is more aggressive and is called (osscan-guess). The initial scan determined that â€Å"Host 1† was running (Microsoft XP SP2 or SP3) validated by the fact that port 445 is open providing Microsoft -ds services. By using the feature attribute (osscan-guess) as described above Nmap determined that â€Å"Host 3† is running (Linuz 2.6X-2.4X â€Å"96%†) as shown in â€Å"Figure 4† below. When running (osscan-limit & osscan-guess) in Nmap I was unable to determine the OS of â€Å"Host 2† due to the fact that all ports were closed. Figure 4 3. Which host appears most secure? Least secure? When running the scans in Nmap, â€Å"Host 1† appears to present the least amount of security of all three hosts in the exercise. This host had the most open ports and by running a rudimentary scan Nmap was able to disclose the operating system of the host. Host 2 was reasonably secure, due to that not even an â€Å"OS Fingerprinting† scan could disclose much about the system. This scan required the use of more advanced attributes to reveal what OS â€Å"Host 2† was running, inevitably the results were ball park answers. In this exercise â€Å"Host 3† has been determined to be the most secure, based on that not even advanced scanning features of Nmap were able to unveil what OS is running on the host. Of the three hosts delivered in the exercise, â€Å"Host 1† had nine open ports, â€Å"Host 2† had two open ports, and the most secure â€Å"Host 3† only publicized one open port. 4. Describe several uses of Nmap. Nmap (Network Mapper) is an open source tool that is used by network administrators and IT security professionals to scan enterprise networks, looking for live hosts, specific services, or specific operating systems (Orebaugh & Pinkard, p. 34, 2008). Nmap has a variety of features, and  territories the aptitude to perform basic scans, while incorporating the capability to command advanced scans containing a mass of options scanning across a huge continuum of IP address universes while logging specific file types or systems. Nmap has the ability to perform packet fragmentation, TCP scan flags customization, and IP and MAC address spoofing to name a few advanced features of many offered in this scanning tool. Nmap can also discover host, and do proper port scanning. Host discovery is a great way to create and maintain an asset database and to discover rogue devices on the network. The real power attribute of Nmap is port scanning, and its efficiency in security auditing, asset manage ment, and especially compliance. Port scanning gives the ability to locate systems with file sharing ports or unauthorized FTP servers and printers. Open ports disclose potential and probable security weaknesses, provide application and services inventory, and validate compliance with approved software guidelines (Orebaugh & Pinkard, p.99, 2008). 5. Which feature(s) of Nmap did you find the most useful and why? The most useful and most operable feature of Nmap is â€Å"OS Fingerprinting†. This feature offers the most depth of results when running a scan of a host. OS Fingerprinting yields information regarding open ports, types of services, as well as the operating system running on the host. OS Fingerprinting is both passive and active, meaning, in the passive it involves sniffing network traffic at any given connection point and matching known patterns that match pre-existing OS identities. In the active this feature requires the use of a set of specialized probes that are sent to the system in question; the responses from the active give insight to what type of OS has been installed. With the availability of these different attributes to one feature gives the IT professional a full scope and clear picture of the host that is being targeted in the scan. 6. Which feature(s) of Nmap did you find the most difficult to use and why? This was my first time using a system like this and struggled with all the features at first. Thus, after performing significant research I have come to the conclusion that using (osscan-guess) can arise significant problems and red flags and this command as described is giving a guess that near-matches aggressively. This command relays back possibilities, and the match has to be very close for Nmap to do this by default. The only positive to this command is that Nmap will tell you when an imperfect match is printed and will display is confidence level by percentage for each guess. 7. Research a command or feature that you consider important but not covered in the lab. Describe its usage and report your findings when running the command against the host in the lab. The one command of interest is the â€Å"sV† command which enables version detection, with attributes of (intensity, light, all, and trace). When performing a version scan, Nmap sends a series of probes each of which is assigned a rarity value between one and nine. The lower-numbered probes are effective against a wide variety of common services, as the higher numbered probes are rarely useful. The intensity level specifies which probes should be applied, and the default is (7). Version light is a convenience for (version-intensity 2) which makes the scanning much faster, but less likely to identify services. Command (all) in â€Å"sV† is an alias for (version-intensity 9) ensures that every single probe is attempted against each port. The last attribute to the feature is (version-trace) which causes Nmap to print out extensive debugging information about what version scanning is doing. As shown in Figure 5 below the (sV) flag tells Nmap to try to determine service version information, this command of version feature is dependent upon the OS Fingerprint scan finding an open TCP or UDP port. Therefore, after the port discovery, version detection takes over and starts its process of probing for information regarding what is open and running on the target (Orebaugh & Pinkard, p.167, 2008). Figure 5: ASSINGMENT PART B NESSUS SCANNER B. Lab Questions: Part B 1. What operating systems are running on different hosts? The operating systems running on each host are the following: Host 1: Microsoft Windows XP SP2 or SP3 Host 2: Linux Kernal Host 3: Linux 2.6X or Linux 2.4X 2. What web server (if any) is running on each computer? According to the screenshots displayed in (Figures 1-3), â€Å"Host 2† appears to running a multicast domain name service (MDNS) server on port 5353 using the UDP protocol. The third host is running a domain name service (DNS) server  on port 53 using TCP protocol and MDNS server on port 5353 using the UDP protocol. It could not be distinguished if â€Å"Host 1† is running any web servers, but ports (80-HTTP) and (443-HTTPS) are both open when running the scan. 3. What are the several services running on each computer? Below will be snap shots of each host providing the services provided by each host. Figure 6: Host 1: 192.168.100.103 Figure 7: Host 2: 192.168.100.105 Figure 8: Host 3: 192.168.100.106 4. Which host had the highest number of vulnerabilities? And which had the least number of vulnerabilities? Based off the scan run on each host, host 1 (192.168.100.103) had the highest number of vulnerabilities, while host 2 (192.168.100.105) provided the least number of vulnerabilities. Host 3 provided no high risk vulnerabilities, one medium risk with two open ports. The details for each host are provided below. Host 1: 192.168.100.103Vulnerabilities: 71 Host 2: 192.168.100.105Vulnerabilities: 49 Host 3: 192.168.100.106Vulnerabilities: 22 5. Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize risk from the vulnerability. Default password (user) for â€Å"user† account; Microsoft Windows SMB shares unprivileged access When performing the scans for all three hosts, only host (1 & 2) produced high severity vulnerabilities. The vulnerability that produced the biggest red flag in my analysis was protecting user passwords. My scans produced both in host (1 & 2) that default password (user) for â€Å"user† account was at high risk. This vulnerability can be very dangerous to an organization and the users that operate within the network, cloud databases, and encrypted files. This vulnerability can be attributed to pre-established policies on lockout threshold, lockout duration, and cache size. According to Oracle, protecting user accounts is vital and the usernames are stored in a domain server and  are hashed. This vulnerability can be fixed by setting a threshold on an account after invalid attempts to log-in to an account exceed the desired attempts. The numbers of failed user password entries are set before the account is then locked, and subsequent attempts to access the account the account remains locked until the administrator re-sets the password. The lockout duration is the number of minutes that a user’s account remains inaccessible after being locked. Subsequently, administrators should set a cache lockout size which will specify the intended cache size of unused and invalid login attempts. The standard according to Oracle is set at (5), and this is very relevant when a company is audited for IT security. This cache will help the administrator catch logs of failed and unused login attempts for proper compliance reporting. 6. Describe the various uses of Nessus.  Nessus is a vulnerability scanning tool which provides patching, configuration, and compliance auditing. It also encompasses features for mobile, malware, botnet discovery, and sensitive data identification. This is a remote security tool which scans a computer and raises an alert if it discovers any vulnerability that malicious hackers could use to gain access to a computer system that is connected to a network. This operates by running (1200) checks on a given computer, testing to see if any of these other attacks could be used to break the security of a computer and otherwise compromise it. Nessus has many advantages, unlike other scanner solutions Nessus does not make assumptions about your server configuration, yet it is also very extensible, providing scripting language for the IT administrator to write specific tests to the system once the admin becomes familiar with the tool. This tool also provides a plug-in interface. Nessus is open source, meaning it costs nothing and the IT admin is free to see and modify the source as appropriate. This software also encompasses patching assistance when it detects vulnerabilities and it is the best way to mitigate the potential vulnerability (Tenable Network Security, 2014). 7. Which feature(s) of Nessus did you find the most useful and why? The report function is very cohesive and comprehensive which is extremely beneficial to the IT administrator. The client itself will list each vulnerability found as we gauge its level of severity while making appropriate suggestions to the administrator to how the problem may be fixed. The Nessus report lists  the number of hosts tested providing a summary of the vulnerability and detailed instructions and sources to fix the inherent problem. The IT administrator is able to generate graphical reports in vast formats, and this is very beneficial if the administrator is scanning a larger number of computers and would like to get an overall view of the state of the network. 8. Which feature(s) of Nessus did you find the most difficult to use and why? Comparable to my answer given in question (11), the auditing functionality is mediocre at best. It is up to the IT professional or administrator to determine the scope of the vulnerability and may choose to use a different exploitation tool to verify if the reported vulnerabilities credulous. The tool is free, but what price are you willing to risk with using this tool. It also means little support, and understanding false positives. I am by no means an expert when using this tool and really struggled understanding the reports produced. Analyzing the results and recommending valid solutions is the biggest hurdle when using this feature. These vulnerability reports deemed confusing due to the combinations of software and configurations involved. After doing some research it has been established that when provided the report Nessus delivers false-positives because the plug-in is only testing for a software version, or the results produced are unexpected but still somehow valid. If my main responsibility is to evaluate risk, when risk level determines the attention given to the problem, the auditing report should offer this attribute in the report. I noticed that they’re reported as a note or warning and labeled in the plug-in summary as (none; low; medium; high; serious; and critical) though, regrettably these specific classifications are not clear and have been subjectively applied. 9. What are the differences between using Nessus and Nmap? Nessus and Nmap are two solutions that are used for examining the overall security of a network. However, these two scanning solutions are different at a very basic level, Nessus is a vulnerability open source scanner solution whereas Nmap is used to map networks hosts and what ports are open on those hosts. Nessus is installed on a server and runs as cloud application, and the program uses plug-ins to determine if the vulnerability is present on a specific machine. Although, Nessus scans ports similar to  Nmap, Nessus takes those open ports into reason and notifies the user if these ports have potential security threats. In Nessus, the administrator logs into the interface and sets up their own policies, scans, and output reports. These policies are set to determine what specific vulnerabilities are being scanned for (Tetzlaff, 2010). On the contrary, Nmap is a host detection software and port location tool. In Nessus, the tool uses specific vulnerabilities against the host, Nmap discovers the active IP hosts using a grouping of probes (Tetzlaff, 2010). Nmap uses open ports to gather extra intelligence such as versions of databases running on specific servers. This feature is offered once the scan has been completed for the identified hosts on the network.  The grease that this solution holds is host detection and port scanning. 10. What would you change about this lab? Any suggestion or feedback? This lab overall was very challenging for as has this whole experience in the major. I have absolutely no previous knowledge in the field or took classes in undergrad regarding IT or computer science. This is a booming industry and worked closely with the forensic agent group at Department of Treasury, yet never understood the processes and procedures it took to properly manage this content. Moving forward, I would like to see this University system move to a more interactive classroom. Meaning, the ability to offer in face interaction between student and instructor with an application platform like Skype or Google Hangout, as these applications can provide the technology to administer taped or live interaction in the event something is seriously miss-understood. The ability to teach myself the content is very rewarding yet difficult at times. Overall the lab was very influential to my growth in this major, but it would be very beneficial if some sort of video instruction was provided as well as communication means provided be enhanced between the student and instructor. 11. Research a command or feature that you consider important but not covered in the lab. Describe its usage and report your findings when running the command or feature against the host in the lab. When running the scan’s against the provided host with research provided by Nessus, the sensitive content auditing is very cumbersome. This feature was not discussed in the lab, but with researching how to use this solution, I attempted to use this feature in the exercise. It states that it performs agentless audits of Windows and UNIX-based systems to identify sensitive information (PII; Credit Cards;  SSN’s; and Top Secret data) but configuring this feature requires an administrator in-depth knowledge of this feature provided by the program. Without this vital knowledge, and potential plug-ins to enable or disable I became immediately confused as to how to appropriately administer the advanced features of this program. To me as a former investigator this feature is very important in the event that insiders or intruders are attempting to identify sensitive data. This will allow an organization the ability to prioritize security issues. The system feature will inherently allow me to monitor systems and users that are not authorized to process that specific data (Tenable Network Security, 2014). REFRENCES Northchutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R., & Mancini, S. (2006). Penetration testing: Assessing your overall security before attackers do. CORE Impact: SANS Analyst Program. 1-17. Retrieved from https://www.sans.org/reading-room/analysts-program/PenetrationTesting-June06 Symantec. (2010). Nessus part 3: Analyzing Reports. Retrieved from http://www.symantec.com/connect/articles/nessus-part-3-analysing-reports Tenable Network Security. (2014). Nessus compliance checks: Auditing system configurations and content. 75, 1-37. Retrieved from https://support.tenable.com/support-center/nessus_compliance_checks.pdf Tetzlaff, R. (2010). Nessus vs. nmap: Comparing two security tools. Retrieved from http://www.brighthub.com/computing/smb-security/articles/67789.aspx#imgn_1 Oracle. (2014). Managing weblogic security: Protecting user accounts. BAE Systems. Retrieved from http://docs.oracle.com/cd/E13222_01/wls/docs81/secmanage/passwords.html Orebaugh, A., & Pinkard, B. (2008). Nmap in the enterprise: Your guide to network scanning. Syngress Publishing Inc. Burlington, MA: Elsevier Inc.

Tuesday, October 22, 2019

Principal Quantum Number Definition

Principal Quantum Number Definition The principal quantum number is the  quantum number denoted by n and which indirectly describes the size of the electron orbital.  It is always assigned an integer value (e.g., n 1, 2, 3...), but its value may never be 0.  An orbital for which n 2 is larger, for example, than an orbital for which n 1. Energy must be absorbed in order for an electron to be excited from an orbital near the nucleus (n 1) to get to an orbital further from the nucleus (n 2). The principal quantum number is cited first in the set of four quantum numbers associated with an electron. The principal quantum number  has the greatest effect on the energy of the electron. It was first designed to distinguish between different energy levels in the Bohr model of the atom  but remains applicable to the modern atomic orbital theory. Source Andrew, A. V. (2006). 2. Schrà ¶dinger equation. Atomic spectroscopy. Introduction of theory to Hyperfine Structure. p. 274. ISBN 978-0-387-25573-6.