Sunday, October 6, 2019
Anth2 Final Exam Assignment Example | Topics and Well Written Essays - 750 words
Anth2 Final Exam - Assignment Example Intimate relations of close family members or incest are usually regarded as a taboo which may be disastrous. 5. Family status influences gender role in that the conduct of single and married people is different. Ethnic culture is another factor that affects gender roles whereby certain ethnic backgrounds may be passive than others and vice versa. 7. Leadership in tribes is uncentralized due to lack or very little forms of stratification. In case stratification is present, the leadership in place determines its level. On the other hand, chiefdoms are centralized with highly regarded and exalted leaders. Therefore, the leader has more control over subjects in his domain more than at the tribe level. 8. Formal means of social regulation or control refers to the external undertakings by civil authority to deter development or establishment of anomie within the society. On the contrary, the informal means alludes to socialization which causes internalization of values that impart morally accepted behaviors within the society. 9. Both these rites have great importance attached to them because they usually bring the community closer when they are being undertaken. In this regards, they serve a means of improving relationships among people and creating harmony within a community. 10. One way in which religion and magic are similar is use of rituals. Rituals are actions or undertakings which are accompanied by vague chanting. Secondly, these two also have unique symbols that are both mystical and spiritual. These symbols are routinely used during the time of rituals. Besides, these two also believe in the contagion principle where there is continued connection and communication between two objects that had been in contact and are separated. 11. One of the functions of revitalization cults is to deliver the followers from deprivation which is political in nature. This is important for amelioration
Saturday, October 5, 2019
Nursing Implication for Teenage Pregnancy Essay
Nursing Implication for Teenage Pregnancy - Essay Example The paper "Nursing Implication for Teenage Pregnancy" talks about the problem of teenage pregnancy in the US which is having the highest incidence of teen pregnancy though the rate is declining everywhere. Probably ongoing sex education and improved accessibility to condoms have helped to get it down. Young parents and kids usually have a severe impact on their lives sacrificing education, career, and most importantly health. This essay gives detail information regarding statistical facts of teen pregnancy state wise information along with the implication of nursing. A teen can also have a healthy pregnancy if she is able to detect pregnancy on time and receive pre and post natal care promptly. The importance of prenatal and postnatal care education is understood in the essay as in teen pregnancy cases chances of getting preterm labor with low birth weight babies are higher. Young mothers are provided with genuine support by healthcare system along with parenting classes and counseli ng. Parenting is a tough task for every individual and it is indeed very difficult if the parents are teenagers. Teenage pregnancy has become a major issue of concern for almost all the western countries. Incidences of teen pregnancy are rising in the US too and teens are battling to establish child-friendly situations in their lives. Teens are not the only sufferer but their children also face frequent health problems in future. These pregnancies are usually unplanned and are not pleasant phenomena to the society.
Friday, October 4, 2019
Multiple Intelligence Theory Essay Example for Free
Multiple Intelligence Theory Essay Many students choose to attend APUS because the University fosters differing educational styles and empowers the students through education. The Student Handbook states, ââ¬Å"The University System fosters an environment that promotes a life of learning for its constituents and uses feedback from its participants and supporters to improve the quality of its teaching, learning, and supportâ⬠¦ The University System anticipates and adapts to its changing environment and responds to the needs of the organization and its constituencies in manners both appropriate and timely. â⬠In the beginning of College 100, students are introduced to the different learning styles and the theory of multiple intelligences. By becoming familiar with other students learning styles and exploring the multiple intelligences students became more tolerant towards others and were able to strengthen their learning power. Being familiar with multiple intelligence theory, knowing the different learning styles, utilizing appropriate classroom methods, and exploring the interdisciplinary classroom will empower students towards a lifetime of learning. Recognizing the multiple intelligence theory is the first step in capturing the different learning styles. ââ¬Å"Howard Gardners multiple intelligence theory (Gardner, 1993) proposes the idea that we all have various levels of intelligence across a range of intellectual areasâ⬠(Pritchard, 2008). The concept that people learn in different ways, and perceive and learn by different methods is what makes up the theory of multiple intelligences. There are at least nine different intelligences in which people display in varying ways (Pritchard, 2008). The styles are as follows: linguistic, logical/mathematical, musical, spatial/visual, kinesthetic, interpersonal, intrapersonal, naturalistic, and existential (Pritchard, 2008). Studentââ¬â¢s particular academic strengths have a direct impact on how effective their learning will be for their overall education. When applying multiple intelligences to the classroom, it is very important to cater to all the types of learning styles. When discussing learning styles in the forums of College 100, every student had a different way of learning that especially worked for them. If every single assignment or activity in a classroom is slanted towards visual learning, then the students who are auditory or kinesthetic learners will be at a serious disadvantage. These students will not be able to express themselves or be able to conform to the teaching style if their learning needs are not met. ââ¬Å"In planning for multiple intelligences, teachers consider the range of activities related to the content of the lesson and the intended learning outcomes will give a range of opportunities to the childrenââ¬â¢s different intelligence strengthsâ⬠(Pritchard, 2008). It is very important for a teacher to introduce a range of activities and presentations in order to make the most out of multiple intelligences. A learning style is reflected by a students preferred method of learning, which is a direct result of their type of intelligence. It is irresponsible for a teacher to assume that all of their students will learn in the same manner. The four main styles of learning are visual, auditory, kinesthetic, and extrovert. Every style has strengths and weaknesses. It is crucial in the educational environment to exploit the studentââ¬â¢s strengths and protect the weaknesses. A studentââ¬â¢s self-worth and esteem can be very much tied up with their learning capability. Teachers must exhibit a range of teaching styles, so that their students learning styles will be compatible. ââ¬Å"Diverse personalities impact relationships, motivation, and ease of learning in classroom and work environments. Where there are diverse personalities within groups, people generally prefer and choose to be with others who are similar to themselves; individuals may even dislike those who have different attitudes and behaviors from their ownâ⬠(Richardson Arker, 2010). What Richardson and Arker are implying is that people of different personalities and learning styles tend to stick in the same groups. It would be to the benefit of everyone if individuals of different personalities and persuasions were put together in one group, that way the group will be more powerful and will benefit greatly from the input of everybody. A truly good teacher will ensure that they have designed their curriculum in such a way so that students learning needs are met. Classroom arrangements can be made so that individuals of similar temperaments are brought together in what is called compatibility scheduling. This arrangement will enhance the overall productivity of students as well as teachersâ⬠(Richard son Arker, 2010). As multiple intelligence theory has developed, advances in classroom methods have also been made. There are at least three different methods that combine multiple intelligence theory with learning styles in order to better the classroom environment. ââ¬Å"Brain-based education supports the need to differentiate instructionâ⬠(Richardson Arker, 2010). Some studies in brain research have shown that there is such a thing as a left-brain and a right-brain. People can be left or right brain dominate, which largely determines the individuals learning style. ââ¬Å"Collaborative learning is a method of teaching and learning in which studentââ¬â¢s team together to explore a significant question or create a meaningful projectâ⬠(Educational Broadcasting Corporation, 2004). This type of classroom learning will serve to help the entire group. The students and teachers will be able to pick out the roles that suit them best, thus serving the group to the best of their ability. Another method that is similar to collaborative learning is cooperative learning. In cooperative learning, ââ¬Å"Students work together in small groups on a structured activity. They are individually accountable for their work, and the work of the group as a whole is also assessed. Cooperative groups work face-to-face and learn to work as a teamâ⬠(Educational Broadcasting Corporation, 2004). Cooperative learning is becoming a very popular method. It uses individuals best qualities for the betterment of the group. By using these methods in the classroom learning becomes an active process and engages all types of learning styles. The Western world has divided education into blocks, and then further divided the blocks into disciplines. While convenient on paper, it is clear that education and disciplines overlap, the world is a fluid place. Interdisciplinary education is an approach that blends different disciplines and utilizes multiple intelligence theory and varying learning styles. ââ¬Å"The exponential growth of knowledge in the twentieth century revealed how disciplinary cultures and perspectives could discourage inquiries and explanations that spanned disciplinary boundaries. Disciplines, it now seems clear, are powerful but constraining ways of knowingâ⬠(Lattuca, 2001). By breaking down the walls of the disciplines, students are empowered to use their differing learning styles. This will result in students having positive experiences with education. Students will then seek out a lifetime of learning, and encourage other to seek knowledge. Recognizing the theory of multiple intelligences and defining each studentââ¬â¢s learning style will lead to success in education. By utilizing methods such as brain-based learning, cooperative learning, and collaborative learning teachers can empower students by giving them the educational method that works best for each individual. Combining all of these aspects yields the concept of interdisciplinary learning, leading to a lifetime of successful education, teaching, and learning. References Concept to Classroom: Course Menu. (2004). THIRTEEN New York Public Media. Retrieved December 2, 2012, from http://www.thirteen.org/edonline/concept2class/index.html Lattuca, L. R. (2001). Creating interdisciplinarity: Interdisciplinary research and teaching among college and university faculty. Nashville: Vanderbilt University Press. Pritchard, A. (2008). Ways of Learning [electronic resource]: Learning Theories and Learning Styles in the Classroom. Hoboken, NJ: David Fulton Publishers. Richardson, R., Arker, E. (2010). Personalities in the Classroom: Making the Most of Them. Kappa Delta Pi Record, 46(2), 76-81.
Thursday, October 3, 2019
Strategies for Breaking Wireless Protocols
Strategies for Breaking Wireless Protocols CHAPTER 1 INTRODUCTION 1.1 Background Starting of wireless Network is a result of a research Project carried out by University of Hawaii. Initially its called as Aloha net, but later it used to call as Wireless Local Area Network or WLAN. At the beginning of aloha net, is capable of transferring 1 to 2 mbps data. But over the last few years aloha net changed to WLAN and it came with so many enhancements to the initial technology. Newer days, wireless networks become more popular than the wired networks. The main reason for this is, wireless networks are high in portability and the flexibility, increased productivity, and lower installation cost. Wireless Network Devices let Users to move their laptops from one place to another without warring about their network connectivity. Minimizing the wiring gives the maximum flexibility over the network and it reduces the wiring cost for the whole network infrastructure. However, when we comparing the security factor, wireless networks are more vulnerable to attack by outsider than the wired network. Main reason for this is, anyone can see and make the initial connection through the wireless network. But establishing the initial connection in a wired network is bit difficult than the wireless network. Loss of confidentiality like password cracking and man in the middle attacks are typically associated with wireless networks. Some other way, this kind of attack can easily practise in wireless Networks rather than the wired network. Even though a wireless network has this kind of problems, its not a failed concept. The main reason for that is we can protect a wireless network in maximum and make invincible from unauthorised users or attackers. Configuring the wireless devices correctly and accurately can minimize the attacks. We are going to discuss about this topic in future. 1.2 Objectives Breaking wireless protocols is the main objective in this project. Mostly the WEP, WPA and WPA2 will be my major preference. So the goal of this research is break the wireless protocol and get data from the wireless devices and the network. 1.2.1 Comparison of Hacking Tools Available. There are lots of tools that can use to hack a wireless protocol. Some of the tools are very user friendly. We can install it on our Windows Based Systems and it does our work very easily. Those tools are 100% Graphical User Interface and very easy to use. AirCrack-ng Windows version is the common example. But Some Other tools are available; we need to have some technical knowledge to use those tools. Mainly those tools run on command base mode and running platform is Linux. These tools do not provide any graphical user Interface, and bit difficult to learn without any proper guidance. But the final result is very accurate than the windows version. The major difference between these two types of tools are the software which runs on linux is more accurate than the Windows version. So I have decided to use Linux version hacking software to carry out my testing. But to hack a wireless network we need few of software to download from the internet. And then we can install those on a Linux machine and we can start the research. But, I think its very easy to use a one operating System rather than struggling with lots of softwares. So I decided to download latest version of worlds famous Hacking Operating System ââ¬Å"Back Trackâ⬠. It has built in hacking tools that need to hack a wireless network. 1.2.2 Downloading related software. Back Track is free to download, and its open source. Anyone can download Back Track from its developers web site www.backtrack-linux.org for free. So I have downloaded the latest version of Back Track v4 to carry out my research. We will discuss about BackTrack in further chapters. 1.2.3 Cracking WEP Using AirCrack-ng In order to crack a WEP Password, I have chosen few amazing tool. That is BackTrack 4 Hacking Operating System. It has all the hacking tools to crack a WEP Network. Airodump-ng can use to get the information about the wireless network and then I can use the Aircrack-ng to crack the password. 1.2.4 Cracking WPA Using AirCrack-ng We Can Use the same Process to Crack the WPA using AirCrack-ng. Same as in WEP I am going to use the Airodump-ng and Airoreply-ng to collect all the informations about the wireless Network and AirCrack-ng to decrypt the Password. 1.2.5 Cracking WPA2 Using Cowpatty In here, I am going to use a special cracking Software to crack WPA2. The software is Cowpatty. Cowpatty bit different than Aircrack-ng. And cowpatty specially designed to crack WPA and WPA2 Passwords. All these tools are built-in tools which we can find in the BackTrack4 Linux based operating system. So I dont need to download these softwares from the internet. 1.3 Dissertation Structure This Documentation mainly divided in to 4 Main Chapters. Including entire Practical and theoretical concepts. Chapter 1: Introduction In this section, I am going to give a introduction about what is wireless Network, Start of the Wireless Network and Basic Problems that wireless Networks faced. In the Second Section explain about the whole Research objectives and aims. Chapter 02: Literature Review This Chapter Consist all the theoretical informations relating to my research. In here I am discussing about wireless Networks and its Types, Wireless Network Devices, Security Methods that WLAN Uses, WLAN Security Protocols, Deep discussion about WEP, WPA and WPA2, Protocol Hacking tools like Air Crack-ng, Cowpatty, and Hacking Methods that use by the Hacking tools. Eg: Dictionary Attacks, Brute Force Attacks etc. Chapter 03: Methodology In here, I am going to show my Practical Work that I have done all over my research. Installing the Hacking OS, Use of Hacking tools, Problems Faced all over the project and the final results will be my main concerns. Chapter 04: Result and Discussions In this section I am comparing all the results I have gain all over my project. Chapter 05: Conclusions This Chapter will be my conclusions of the Research. In here i am planning to compare my final result and the objectives in my initial project proposal. CHAPTER 02 Literature Survey 2.1 Wireless Networks Wireless Networks enables to communicate devices without any physical media. These Networks are divided to three main categories according to their communication level. Those are, Wireless Local Area Network, Wireless Wide Area Network, Wireless Personnel Area Network. Wireless Wide Area Network has larger coverage than the WLAN and WPAN. WWAN uses 2G or 3G Cell Phone Networks to connect each and every device in the network. WLAN represents local area network that connected using wireless access point or a wireless router includes 802.11. WPAN is a small network topology. This includes Bluetooth and Infrared technologies. 2.1.1 Wireless Local Area Networks As I Mentioned earlier, Wireless LANs has more portability and flexibility over traditional Wires Local Area Networks. In WLAN, All the Computers and other devices connect to each other using Wireless Access Points also called as APs. And Access points communicated with the Wireless Network Adaptors that fixed in to computers. Access Points normally has coverage are up to 75-100 meters. In that area users can move their laptops and other wireless devices while maintaining their network connections. We can connect access points together and expand the wireless LANs coverage. In my thesis, I am going to discuss more about wireless LAN in further chapters. 2.1.2 Wireless Wide Area Networks This is the most familiar wireless Network type for everyone. This networks are Combinations of few WLANs. In these networks, Antennas acts as the access point for all WLANs. There are connections between Antennas to Antennas, to expand the Service of the network. Mobile Phone Networks also a good example for WWAN Networks. 2.1.3 Wireless Personnel Area Networks These Networks are so smaller when comparing to the other networks. It does not give much coverage as other 2 network type we discuss earlier. And this network does not require Main Access Point to make the connection with other WPAN Devices. Source WPAN device directly connect to the other WPAN device when its needs to transfer data. 2.2 Wireless Local Area Networks This is the most important topic of my thesis. We are going to discuss about this topic all over the project. As I mentioned in my objectives I am going to analyse the security of WLAN and Break few of WLAN Protocols. Before that we need to get a clear Idea about ââ¬Å"What is WLAN?â⬠and ââ¬Å"How it operates?â⬠WLAN is same as the wired Local Area Network. But the only difference is, its using wireless method to connect all devices. WLAN combined with the Client Station and the Wireless Access point. The Client Station connects to the AP (Access point) using the wireless Network Adaptor. We can connect the wireless adaptor to the computer using Personal Computer Memory Card International (PCMCIA) slot or using the USB Port. IEEE 802.11 is the Standard of WLAN technology. The coverage of the Wireless network totally relay on the Strength of the Wireless Access Point. Normally its can covers up to 75-100 meters circular area. 2.2.1 Architecture of 802.11 Standards This architecture allows initiating a peer to peer connection between Client Station and the wireless Network based on access point in an infrastructure network (WLAN). The coverage area of an access point called as a ââ¬Å"Cellâ⬠. A Cell also called as ââ¬Å"Basic Service Setâ⬠(BSS). The collection other cells of the infrastructure network called as Extended Service Set (ESS).Any access point that work with 802.11 standards has this 2 data sets for their functionality. BSS is the most important data set in the Access point. BSS contain all the information about wireless Network. This is the security key negotiation protocol of the Access point. BSS consist of APs Hardware name, Communication protocol informations, Signal strength etc. The Access Point identify in the WLAN using a specific identifier. This is called as ââ¬Å"Basic Service Set Identifierâ⬠(BSSID). When Laptop or any other wireless device needs to connect to wireless network via access point, the guest station (Eg: Laptop) searches for the available access points in the area by releasing discovery packets. If there any access points available, APs respond to the guest station by sending the BSSID. Normally BSSID is in a Human Readable format. BSSID also called as ââ¬Å"AP Name or Router Nameâ⬠by Technical personals. This identifier always represents a Specific Access point. Likewise each and every access point of the network has its own BSSID. NOTE: BSSID is very important to accomplish my main objective of the project. We need to retrieve the routers BSSID before we crack the routers password. We can discuss about the retrieving methods in future chapters. 2.2.2 Advantages of WLANs Following are the advantages. Increased Mobility- Users can be mobile while accessing to all the network resources. Fast Installation Installation of the network is very quick since there no adding wires like wired network. Flexibility anyone can easily install and uninstall a small wireless Network. 2.2.3 Wireless Protocols Use in Wireless Networks There are 3 main wireless protocols use by the 802.11x wireless networks. Those are, Wired Equivalent Privacy This Protocol primarily protect the WLAN uses being a victim from eavesdropping. WEP uses 64 bit RC4 key to generate encrypted data and then those encrypted data transferred over the network. Wi-Fi Protected Access This is introduced by the Wi-Fi Alliance to overcome certain restrictions in WEP. This uses Temporal Key Integrity Protocol (TKIP) to encrypt the wireless data packets. Wi-Fi Protected Access Version 2 This is the latest movement in wireless LAN Protocols. Only the Difference is WPA 2 introduces new AES algorithm to be much more secure than the WPA. These 3 protocols widely using in wireless Networks. Every protocol has significant advantages and disadvantages. In the next chapter I am going to illustrate features, advantages and disadvantages of each and every protocol. 2.2.4 Wired Equivalent Privacy (WEP) WEP is an authentication protocol that use in 802.11 wireless networks to secure all the transmitting data. This protocol introduced in 1997 and main intention was increasing the confidentiality of the data than wired network. Any wireless network that uses WEP encrypt the data packets using RC4 cipher stream generated by a 64 bit RC4 key. IEEE 802.11 has few basic features when it comes to Security. These concerns provide a better security for the wireless environment. This all security elements embedded in to the wireless network protocols. Following are the basic security concerns in a wireless Network. Authentication This is the main goal of the wireless protocols. This means identifying the Client Station by using a password. If any client station failed to comply with this requirement the AP will deny giving the access to the Client Station. Integrity In here, the data should not be changed while it transmitting from the AP and/or to the AP. That mean those data should not be a victim of active attack. Confidentiality in this goal, the Protocol should protect the security of all data elements that transmit. In other word, the data should not be a victim of passive attacks. 2.2.4.1 Authentication 802.11 Networks have 2 kinds of authentication methods. ââ¬Å"Open System Authenticationâ⬠and ââ¬Å"Shared Key Authenticationâ⬠. 802.11 Authentication Open System Authentication Shared Key Authentication Any Client Station can join The Station should Provide the To the network without authentication Network password in order to join Network In Open system authentication does not use any cryptographic password to gain access to the network. Any client station can connect to the network and use the network resources. As an example, Internet facilitys in a public locations like Air Port or a Bus Station. In these places anyone can connect their Laptop or PDAs to the Wireless Access Point and start browse the internet. No Password required at all to login to the network. In open system method, the client station sends its MAC address just as a reference to the Access point. Then the AP makes that client as a member of that APs network. The major problem with this authentication mode is its vulnerable to attack. Shared key authentication is password based authentication model. The client must have the password to make the connection with AP. when client made a request to the AP that asking the connection, the AP generate a challenge and send it to the client station. If the client station responds to that challenge correctly AP gives the permission to be a member of wireless network. Figure 2.7 give the clear idea about the Shared Key authentication. Authentication Request Challenge Response Confirm the Result 2.2.4.2 Integrity 802.11 Standards also concerns about the integrity of the data transmitted. This always checks the data content whether it got changed while happening the transmitting process. It uses Cyclic Redundancy Check (CRC) approach to check the content of data. Once the CRC completed those data encrypted by using the RC4 key Stream. On the receiving end, data will be decrypted and again check for CRC to check the integrity of the data. If the receiving end CRC value does not match with the initial CRC value the data will be rejected and retransmitting will be required. WEP Uses an algorithm called Stream Cipher to encrypt all the data. It expand short version of key in to a random key stream. The sender encrypts the Plain text along with the Short key and creates the cipher text. In the receiver end has the same short key to decrypt the data. Once the data stream received by the recipient, it uses the short key to generates cipher text back to plain text. If one data bit lost on its way to the destination, the decryption process will mislead the data in to incorrect information. To prevent this problem WEP has ââ¬Å"Cyclic Redundancy Checkâ⬠to keep up the Message Integrity correctly. 2.2.4.3 Privacy 802.11 standards use cryptographic techniques to support Privacy. It uses RC4 Symmetric Keys to protect the data. Normally 802.11 standards support different cryptographic key lengths to protect the data from a attack. Generally, WEP supports 40 bit cryptographic key size for the shared key. But numerous vendors support different key sizes like 104 bits and 128 bits. Increasing the key size increases the security of the cryptographic technique. 2.2.4.4 Problems with WEP Even though WEP has so many security measurements to protect the transmitting data, it has few failures. These failures make the way, an attacker to break the security of WEP and lost the Integrity and privacy of the transmitting data using WEP. 2.2.4.4.1 Shared WEP Key WEP Uses single security key to Access the network. So this key should be distributed to all the users who access the network. So this security key might go to an attacker very easily who trying to get the access to the network. 2.2.4.4.2 WEP Key Size As I mentioned earlier, WEP uses 40 bit Cryptographic Key Size. This key can be crack very easily regardless of the time. So the encryption key is not sufficient to provide a better security for data. 2.2.5 Wi-Fi Protected Access This is a WLAN protocol created by the Wi-Fi alliance. This is created because of several weakness of the WEP Protocol. WPA has some advanced features when comparing with WEP. To get the optimum performance from the WPA, The WPA protocol implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into WPA. TKIP could be implemented on pre-WPA wireless network interface cards that began shipping as far back as 1999 through firmware upgrades. Because the changes required fewer modifications on the client than on the wireless access point, most pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have since discovered a flaw in TKIP that relied on older weaknesses to retrieve the key stream from short packets to use for re-injection and spoofing. [wiki/WPA] 2.2.5.1 Features of WPA WPA uses Temporal Key Management (TKIP) as its Key encryption system. WPA does, Data Encryption and Discretion based on TKIP technology. It uses 128 bits for encryption using RC4 cipher. 2.2.5.2 Temporal Key Management TKIP along with the WPA has introduced three security features to overcome some security issues that come with WEP networks. TKIP mixing the security key with the initialization vector before it pass it to the cipher routine. In our case TKIP uses RC4 as the cipher. This method avoids certain kind of key attacks that came along with WEP. And then, WPA protects the data packets against reply attacks by implementing a sequence counter to the data stream. Finally its implements a message integrity check called ââ¬Å"MICâ⬠to check the consistency of the data stream. As i mentioned earlier, TKIP uses Rivest Cipher 4 (RC 4) as its cipher. Rekeying, also an important feature of TKIP. And the most important feature is TKIP always ensure to send data with a Unique Encryption key. But in certain situations it uses same mechanism like WEP. So TKIP also vulnerable to some kind of attacks which WEP faces. Any how the advance development of Message Integrity Check, Isolated Key Hashing on every packet, Sequence Counter prevents those attacks successfully. The Best thing is TKIP resolving most of the problems came along with the WEP. The next section discuss about that. 2.2.5.3 Michael Message Integrity Code Unlike WEP, WPA uses special feature to check the integrity of the transmitted message. This is called as Message Integrity Code (MIC). This is also called as Michel. This is a short cryptographic checksum that use to authenticate a message. This is also known as Message Authentication Code (MAC). This is a 64 bit algorithm that controls several types of attacks like, Splicing Attacks, Payload Truncation, and Fragmentation Attacks. 2.2.5.3 Extensible Authentication Protocol (EAP) EAP is an Authentication Method that widely use in wireless networks. This is not specifically designed for wireless networks. This can be use to authentication in wired network as well. EAP use to transmit the packets containing Authentication informations. WPA and WPA2 Networks supports 5 EAP Authentication Mechanisms as it Authentication Standards. Those are, EAP-TLS, EAP-SIM, EAP-AKA, PEAP, LEAP. 2.2.5.3.1 EAP-TLS EAP-Transport Layer Security is well known among Protocol for wireless communication. TLS provide very strong confidentiality for the User Credentials. This uses PKI to secure the communication between the AP and the RADIUS Server. EAP-TLS is the original, standard wireless LAN EAP authentication protocol. Although it is rarely deployed, it is still considered one of the most secure EAP standards available and is universally supported by all manufacturers of wireless LAN hardware and software. [Wiki/EAP] A compromised password is not enough to break into EAP-TLS enabled systems because the hacker still needs to have the client-side private key. The highest security available is when client-side keys are housed in smart cards. This is because there is no way to steal a certificates corresponding private key from a smart card without stealing the card itself. [Wiki/EAP] 2.2.5.3.2 EAP-SIM EAP for Subscriber Identity Module used for authentication and Session key distribution using the Global System for Mobile Communication (GSM) SIM. [Wiki/EAP] 2.2.5.3.3 EAP-AKA EAP for Authentication and Key Management Agreement is used for Authentication and session key distributing using the Universal Mobile Telecommunication System (UMTS). [wiki / EAP] 2.2.5.3.4 PEAP PEAP is a joint proposal by Cisco Systems, Microsoft and RSA Security as an open standard. It is already widely available in products, and provides very good security. It is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication. [Wiki/EAP] There were two PEAP sub-types certified for the updated WPA and WPA2 standard. They are: PEAPv0/EAP-MSCHAPv2 PEAPv1/EAP-GTC The terms PEAPv0 and PEAPv1 refer to the outer authentication method, the mechanism that creates the secure TLS tunnel to protect subsequent authentication transactions. EAP-MSCHAPv2, EAP-GTC, and EAP-SIM refer to the inner authentication method which facilitates user or device authentication. [Wiki/EAP] 2.2.5.3.5 LEAP The Lightweight Extensible Authentication Protocol (LEAP) A proprietary EAP method developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. [Wiki/EAP] LEAP uses a modified version of MS-CHAP, an authentication protocol in which user credentials are not strongly protected and are thus easily compromised. Along these lines, an exploit tool called ASLEAP. [wiki/EAP] 2.2.6 Wi-Fi Protected Access 2 WPA 2 implements IEEE 802.11i standards same as the WPA. WPA 2 supports Advanced Encryption Standards as the encryption cipher. This is an encryption standard that implement by US Government. 3 block of ciphers available in the AES. Those are AES 128, AES 192, and AES 256. In WPA2, Advanced Encryption Standards using counter Mode-Cipher Block Channing to provide the high confidentiality to the data. [Microsoft] WPA2 architecture must contain following network components to provide better security to the network. An Authentication Server to authenticate the users, Robust Security Network to maintain the pathways of associations, and AES based methodology to provide the privacy, integrity and authentication. The authentication server holds all the user name and passwords of the users of wireless network. When a user wants to connect to a network that uses WPA, The User must provide His / her identical user name and password when the network asks for it. Then the AP sends that informations to the Authentication server to verify the validity of the user to access network resources. Once the authentication server gave a positive feedback, the user allows connecting to the network otherwise the request will be discarded. 2.2.6.1 The Four way Hand Shake The Authentication Process has 2 Parts, the access point (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived. The earlier EAP exchange has provided the shared secret key PMK (Pair wise Master Key). This key is, however, designed to last the entire session and should be exposed as little as possible. [1] Therefore the four-way handshake is used to establish another key called the PTK (Pairwise Transient Key). The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. The product is then put through a cryptographic hash function. [1] The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic. The actual messages exchanged during the handshake are depicted in the figure and explained below: [1] 2.2.6.2 Group Key Hand Shake The GTK used in the network may need to be updated due to the expiry of a preset timer. When a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP. [2] To handle the updating, 802.11i defines a Group Key Handshake that consists of a two-way handshake: [2] The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA and protects the data from being tampered using a MIC. The STA acknowledges the new GTK and replies to the AP. [2] 2.3 Differences between WEP, WPA and WPA2 2.3.1 Encryption Methods WEP uses only one encryption method for the whole network, but in WPA, encryptions are dedicated for every user. One user has its own encryption method. 2.3.2 Authentication In WEP Authentication, it uses Open or Shared key authentication method. In WPA operates on Pre-Shared Key Method. As well as WPA uses an authentication server to validate the user and it using EAP to send all the informations to the Server. But WEP does not use any authentication server. 2.3.3 Security Protocols and Key Streams WEP uses WEP as their Security protocol. This is a primary wireless protocol that has few loop hols for attackers, in WPA use Temporal Key Integrity Management as the security protocol. WPA 2 uses bit advanced security protocol than both of the WEP and WPA. It uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). WPA and WEP both use Rivest Cipher 4 as their cipher, but WPA 2 uses Advanced Encryption Standards. WEP uses 40 and 104 bits key length for the encryption key. WPA use 128 bit for the encryption and 64 bit for the Authentication. WPA2 uses 128 bit key streams for the both Encryption and the authentication. 2.3.4 Data Integrity and Key Generation WEP use Cyclic Redundancy Check 32 bit Method to check the Integrity of the data. WPA use Michael Message Integrity Code to check the integrity of data. WPA2 has CBC-MAC for that operation. WEP does the key generation by using Concatenation. In WPA used ââ¬Å"Two phase mixing function (both TKIP and RC4)â⬠. WPA2 doesnt require any key generation. 2.4 Security Threats Associated with Wireless Networks As Discussed above, nowadays wireless networks become more popular than the wired networks. Many organisations including Commercial Companies, Hospitals, government offices and most of the houses use wireless networks to facilitate different services. But the problem is WLAN are not 100 percent protective from attacks. 802.11x networks are vulnerable to certain attacks. There are thousands of papers and reports available in the internet that describes those kinds of attacks and security threats to WLANs. These security threats mainly target on Confidentiality, Integrity and Network availability. WLAN attacks normally divide in to 2 types. Those are ââ¬Å"Active Attacksâ⬠andââ¬Å"Passive Attacksâ⬠. Then those 2 main classes sub divided into types of attacks. 2.4.1 Active Attacks Active attacks are the most dangerous attack type. In here, hacker or the unauthorised party gain access to the system and do the modifications to the system or the message transmitting. This outcome a receiving an incorrect message stream or a file to the recipient. Active attacks result a loss of integrity of the network. Active attacks are possible to detect by using special software like packet monitors. But the problem associated with this kind of attacks are, its difficult to prevent these kinds of attacks. Active attacks can be sub categorised in to 4 Methods of attacking. Following explain those, 2.4.1.1 Masquerade In here, Attacker imitates as an authorised user in the network and gains the access to the network. This kind of attacks can be happened in few ways. The first consideration is authorised user give away the password to an unknown person or a group of people. So automatically they are possible to get access to the system. The other consideration is hacker can use some software pieces to collect the passwords or access keys of authorised users. There are many methods to perform this kind of attack. Installing Key Board Activities Recording software is a very successful method to collect these kinds of informations. 2.4.1.2 Reply The Attacker can monitor the transmissions of the source and destination machines and re transmit the informations as a legitimate user. So the attackers computer acts as the Source and destination accordingly, to get the actual source and Destinations informations. Reply attacks are offline attacks. The attacker first gathers all the data and then later decrypts that information. This informations could be users authentication session informations that carries WLAN password. 2.4.1.3 Message Modification In here, attacker tries to modify a particular message or informations. This could results a transmitting wrong informations to the legitimate user. 2.4.1.3 Denial of Service This is a very popular attack type and very easily does in a WLAN environment. The main goal of this attack is make the network unavailable to the users. it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely [wiki]. This attacks cause Loss of Network a
Wednesday, October 2, 2019
Gun Control Essay -- Gun Control, 2015
Firearms are dangerous weapons used to intentionally and unintentionally kill people, which lead to one of Americaï ¿ ½s most heated debates: gun control. With increasing crime and violence, many people look to gun control laws as a way to slow these trends down. On the other hand, others believe that owning a gun is a constitutional right that should never be taken away. James Q. Wilsonï ¿ ½s essay ï ¿ ½Just Take Away Their Gunsï ¿ ½ is an attempt to offer a solution to both sides of this argument. He claims that illegal possession of firearms is the problem and that frisking suspicious characters would be a good solution to the debate of gun control. However, random frisking to end illegal gun possession is a violation of privacy and an overbearing task that would be impossible to take on. First of all, Wilson states that ï ¿ ½legal restraints on the lawful purchase of guns will have little effect on the illegal use of gunsï ¿ ½ (106). However, Wilson fails to neglect that lawbreakers have to get their guns from somewhere. Of course some criminals will steal their firearms, but others look to breaking a different law. Buying guns from an unlicensed dealer gives criminals a feeling of safety. The criminal does not have to worry about being caught with breaking and entering and can also feel safe knowing that there is not a file containing records that says he owns a gun. Federal law limits who can purchase a gun on the basis of age, criminal status, and mental health (Zimring 37), but it does not put a limit on the amount of firearms a person can purchase. Enabling people to buy as many guns as they would like supports the black market. Without any restrictions on gun laws a criminal can buy firearms freely from whoever wants to sell one to him. Forgetting these facts weakens Wilsonï ¿ ½s stance that gun control will not be able to help solve the issue of illegal gun possession. A large setback with Wilsonï ¿ ½s plan is the potential for racial profiling. He even recognizes this and says that ï ¿ ½young black and Hispanic men will probably be stopped more often than older white Anlgo males or women of any raceï ¿ ½ (109). Some say that, to cut down on gun violence, it is necessary to target groups, neighborhoods, and races that are more likely to commit these crimes; however it is demeaning and backwards. A good example of how the stop-and-frisk can lead to racial profiling is a case filed... ... but to go about it in the way Wilson suggests will only hurt the nation. Instilling a random frisk would cause more problems than it would solve. First and most important, Americansï ¿ ½ privacy would be at risk. Another point to look at is the large possibility of racial profiling. To come so far in the area of civil rights and adopt Wilsonï ¿ ½s plan would be taking a step backward. Also, it would be a travesty for the police to waste their time frisking possible suspects when there is already so much crime for them to be putting a stop to. Wilson fails to realize the problems his plan will cause America. Forgoing the end of illegal gun possession as Wilson proposes is not worth it when one looks at the harms it will create. Works Cited Boyd, Herb. ï ¿ ½Cops Must Pay.ï ¿ ½ New York New Amsterdam News. 25 September 2003. 1. Wilson, James Q. ï ¿ ½Just Take Away Their Guns.ï ¿ ½ The New York Times Magazine March 24, 1994. Rpt in Current Issues and Enduring Questions 7th ed. Sylvan Barnet and Hugo Bedau. Boston; Bedford/St. Martinï ¿ ½s . 2005. 106-109. Zimring, Franklin E. ï ¿ ½Firearms, Violence, and the Potential Impact of Firearms Control.ï ¿ ½ Journal of Law, Medicine, and Ethics 32.1(2004): 34-37.
Colonialism, Imperialism, Symbolism, and Materialism in Heart of Darkness :: Heart Darkness essays
Imperialism, Symbolism, and Materialism in Heart of Darkness In Conrad's Heart of Darkness Marlow, the main character, symbolizes the positiveness of Imperialism. Marlow, as a character realizes the evil that negative Imperialism has caused and decides it is truly unnecessary. When Marlow states, "I had got a heavenly mission to civilize you," he expresses his good intentions to help the Africans progress and advance. Furthermore, when he says, "I was an impostor," Marlow recognizes the fact that he is an invader into a foreign land, yet he sticks to his moral values. Marlow observes many kinds of abuse of power by other whites, simply because they have better weapons of war. When the manager severely battered a young black boy for the burnt shed Marlow disapproves. However, when he sees abuses and unjust treatment he does not physically try to stop it. Instead, he just turns away and accepts that it is happening. That is one of Marlow's flaws, he does not support his convictions. Marlow also symbolizes the uncorrupted men that traveled to foreign lands to help the 'uncivilized' become cultured, but unlike the others Marlow does not become indoctrinated by an alternative motive. He is able to see through the materialistic ideals that had plagued the men before him. Marlow has the open-mindedness and sensitivity that was absent during Imperialism, but doesn't have the courage or power to stop the abuses that where ongoing. Marlow is proof that when confronted a man's evil side can be both informative and perilous. The manager is the epitome of the negative effects of the institution of Imperialism. He is corrupt, uncaring, arrogant and self-centered. He symbolizes the arrogance of Europeans as they encountered native Africans. His good health symbolizes the everlastingness of Europeans who invaded Africa and their ability to continually come to Africa and rape it of its natural resources. He is the true symbol of the evil and cold-heartiness of imperialists. The manager was an illustration of an established imperialist power. He was well settled in, as demonstrated by the fact he controls all the stations. An example of his power over others was when he had the black boy thrashed for the burning of a shed. In addition, he is expansionist and wishes to destroy Kurtz and gain a monopoly on the ivory trade. The manager's discussion with his uncle is yet another example of his ruthlessness and amoralness. Colonialism, Imperialism, Symbolism, and Materialism in Heart of Darkness :: Heart Darkness essays Imperialism, Symbolism, and Materialism in Heart of Darkness In Conrad's Heart of Darkness Marlow, the main character, symbolizes the positiveness of Imperialism. Marlow, as a character realizes the evil that negative Imperialism has caused and decides it is truly unnecessary. When Marlow states, "I had got a heavenly mission to civilize you," he expresses his good intentions to help the Africans progress and advance. Furthermore, when he says, "I was an impostor," Marlow recognizes the fact that he is an invader into a foreign land, yet he sticks to his moral values. Marlow observes many kinds of abuse of power by other whites, simply because they have better weapons of war. When the manager severely battered a young black boy for the burnt shed Marlow disapproves. However, when he sees abuses and unjust treatment he does not physically try to stop it. Instead, he just turns away and accepts that it is happening. That is one of Marlow's flaws, he does not support his convictions. Marlow also symbolizes the uncorrupted men that traveled to foreign lands to help the 'uncivilized' become cultured, but unlike the others Marlow does not become indoctrinated by an alternative motive. He is able to see through the materialistic ideals that had plagued the men before him. Marlow has the open-mindedness and sensitivity that was absent during Imperialism, but doesn't have the courage or power to stop the abuses that where ongoing. Marlow is proof that when confronted a man's evil side can be both informative and perilous. The manager is the epitome of the negative effects of the institution of Imperialism. He is corrupt, uncaring, arrogant and self-centered. He symbolizes the arrogance of Europeans as they encountered native Africans. His good health symbolizes the everlastingness of Europeans who invaded Africa and their ability to continually come to Africa and rape it of its natural resources. He is the true symbol of the evil and cold-heartiness of imperialists. The manager was an illustration of an established imperialist power. He was well settled in, as demonstrated by the fact he controls all the stations. An example of his power over others was when he had the black boy thrashed for the burning of a shed. In addition, he is expansionist and wishes to destroy Kurtz and gain a monopoly on the ivory trade. The manager's discussion with his uncle is yet another example of his ruthlessness and amoralness.
Tuesday, October 1, 2019
Explore the significance of the character Mercutio in the play Romeo and Juliet
Although Shakespeare's play ââ¬ËRomeo and Juliet' does not focus on Mercutio, he is one of the most unique characters of the play. He manages to manipulate other characters of the play through his imaginative and powerful language. He usually takes the lead in conversations and his friends generally go by what he says. Mercutio is neither Capulet nor Montague but his strong bond with Romeo associates him with the Montagues. In the play, Mercutio tends to stand out compared to the other characters; this is mainly because of his energetic and outrageous personality. His comical character lightens the mood of the tragic love story and helps to increase the sympathy of the audience when he later dies. Mercutio is a catalyst, meaning that he has the ability to change what people think or do. An example of this is in Act 1 Scene 4, where Romeo is sad and doesn't want to go to the Capulet's ball but Mercutio lightens the mood with puns and word play; ââ¬Å"You are a lover; borrow Cupid's wingsâ⬠An Elizabethan audience would have found this funny because cupid was and still is very well known as being the god of love. Mercutio is comedian, always making jokes at every chance he gets. He lives life on the edge and is always looking for something new and exiting to do. This could also make him an antagonist and troublemaker, especially when the Capulet's are involved. His inevitable death and the death of several others are caused by Mercutio living life on the edge. Read this ââ¬â Puns in the Importance Mercutio puts on a front which tells the audience that he does not respect women, such as the way he often uses animal features to describe women, ââ¬Å"spidersâ⬠¦gallopsâ⬠¦pig's tailâ⬠perhaps suggesting that women are less superior to men. However, when you look closer into his language you can see that his feelings go deeper, for example, in Act 1 Scene 4, Mercutio speaks about women being like Queen Mab; ââ¬Å"Her wagon-spokes made of long spiders' legs, The cover of the wings of grasshoppersâ⬠During the queen Mab speech in particular, he uses sibilance, sibilance it the repetition of the ââ¬ËS' sound which makes this speech sound soft and I think that it shows his true passion for women. In contrast, when he is talking to Romeo and giving him advice, he says to Romeo; ââ¬Å"Be rough with love; Prick love for pricking, And you beat love down.â⬠This could show that he may have had a past relationship that may not have turned out so well. He may also be telling this to Romeo because he doesn't want the same thing to happen to him. In Act 1 Scene 4, Mercutio's imagination runs wild as he is describing women as Queen Mab. This will begin to show the audience Mercutio's true feelings for women. He uses passionate language such as; ââ¬Å"Tickling a parson's nose as a' lies asleep, Then dreams, he of another beneficeâ⬠On the other hand, Romeo has a different view to that of Mercutio's towards women. Romeo, who is quite naà ¯Ã ¿Ã ½ve towards love, shows the audience how much he loves everyone and everything. He is always talking about how fabulous love is and that it is the only thing that matters in the world. ââ¬Å"O, speak again, bright angel! For thou art As glorious to this night, being o'er my headâ⬠This can show that Romeo may not have been in a real relationship, but only fantasising about it. Mercutio and Romeo have a strong friendship; they are both extremely loyal to each other and tend to help each other out; ââ¬Å"Nay, gentle Romeo, we must have you dance.â⬠They both have a strong influence on each other, which from Mercutio's side tends to be positive but can sometimes turn out negative but this does not happen all the time. In the death scene of Mercutio he blames Romeo for his death even though Romeo was only tried to stop it. In Act 2, Scene 1, after the ball Mercutio and Benvolio are looking for Romeo; they still believe that he is in love with Rosaline. Mercutio then begins to shout out for Romeo, by way of chanting a spell; ââ¬Å"Nay, I'll conjure too. Romeo! Humours! Madman! Passion! Lover! Appear thou in the likeness of a sighâ⬠The shortness of his sentences and the use of exclamation marks emphasises his humour in his speech, suggesting a light hearted tone, this would have created a more amusing scene for an Elizabethan audience. During this scene the actor playing Mercutio would probably be dancing around with imaginary props, pretending to brew up a potion. He then continues to talk about Rosaline; he speaks about her in a manor that is rude and obnoxious, he mocks Romeo as he believes he is superficial and that he is only in love with Rosaline's beauty; ââ¬Å"By her high forehead and her scarlet lip, By her fine foot, straight leg and quivering thighâ⬠Here Mercutio is saying that Rosaline is a prostitute and Benvolio believes that this would anger Romeo. Mercutio replies; ââ¬Å"This cannot anger him ââ¬Ëtwould anger him To raise a spirit in his mistress' circleâ⬠In this sentence Mercutio begins to use sexual references; he says it would only anger Romeo if someone else was to sleep with Rosaline. During this scene Mercutio is loud and energetic. A modern audience would think this funny and witty but an Elizabethan audience may have been more shocked at what he was saying. During Act 2 Scene 4, Mercutio and the Nurse meet. In much the same way as with Rosaline, Mercutio is again vulgar about the nurse; ââ¬Å"Good Peter, to hide her face; for her fan's the fairer face.â⬠The repetition of the letter ââ¬ËF' emphasizes a harsh tone and suggests to the audience a feeling of disgust towards the nurse. Mercutio is saying that the nurse is unattractive, but she does not let this pass as she is aggressive and says; ââ¬Å"Out upon you! What a man are you!â⬠This shows the Nurses mutual disliking for Mercutio as well. In Act 2, Scene 4, Mercutio compliments Tybalt's skills as a fighter; he calls him ââ¬Å"Prince of Catsâ⬠. This is because Mercutio thinks that Tybalt is quick on his feet and a fast swordsman, Tybalt wins all of his duels, Mercutio says that he has ââ¬Å"nine livesâ⬠for this reason. ââ¬Å"Don't think he's just the Prince of Cats! Oh no ââ¬â he's way more than that.â⬠Although Mercutio is saying how much of a good swordsman Tybalt is, he still ends up fighting him and ironically Mercutio loses, he does this because he is a show off and he thinks he is best. When Mercutio challenges Tybalt to a duel, Tybalt asks ââ¬Å"What wouldst thou have with me?â⬠Mercutio replies; ââ¬Å"Good king of cats, nothing but one of your nine livesâ⬠This shows that Mercutio is still using references to Tybalt being ââ¬Å"the Prince of Catsâ⬠. Also even when he has been stabbed by Tybalt, Mercutio says that the wound is only; ââ¬Å"A scratch, a scratchâ⬠In Act 3, Scene 1, where Mercutio is nearing his death, he suddenly becomes a lot more serious, but because of his ego he still manages to make witty remarks and keeping the comedy going; ââ¬Å"Ask for me to-morrow, and you shall find me a grave man.â⬠I believe that because of Mercutio's personality, and always making things worse, he brought upon his own death even though in his mind he would have thought it was a good thing to do. Shakespeare probably killed Mercutio off here because it builds up a climax and creates a dramatic effect. In my opinion Mercutio has brought his death on himself by his antagonistic personality, and always provoking others. He finally meets his match, Tybalt. Although, I don't think the play would be what it is without Mercutio, as a comic character is needed, for example; to help lighten moods of scenes when needed. Without Mercutio in the play, Romeo and other characters would have died a lot sooner, suggesting to the audience that Mercutio is a hero in some way. On the other hand, everyone may have survived as it was generally Mercutio that pushed things on, often making things worse.
Subscribe to:
Posts (Atom)