...cause less environmental damage when they are disposed of. In this environmental sciences project, you will compare the toxicity of "green" and conventional liquid detergents using worms as test organisms. Objective The objective of this environmental sciences project is to determine if green detergents are safer for the environment than conventional detergents. Introduction Reduce, reuse, recycle. These are typically known as the three R's of the environment. Every year, Americans throw away billions of containers and other packaging materials that end up in landfills. Reducing the amount of waste you produce is one way to help the environment. Another way to help the environment is to recycle. Many of the things we use every day, like paper bags, soda cans, and milk cartons, are made out of materials that can be recycled. Recycled items are put through a process that makes it possible to create new products out of the materials that come from the old ones. Reusing is another way to help protect the environment. The idea is simple: instead of throwing things away, try to find ways to use them again. The use of grey water to irrigate plants is an example. Grey water is the water produced by showering, cleaning clothes, washing dishes, etc. It does not include human waste (that is called black water, and is not safe to use for irrigation). Clearly, if grey water is to be used for growing plants, the kinds of detergents used in the house will have to be eco-friendly. In other...
Words: 1886 - Pages: 8
...Studying Ecosystems Report 09/18/12 Emma Waymouth Goal/Purpose To assess the biodiversity of two different ecosystems by collecting qualitative and quantitative data about the biotic and abiotic factors that exist in them. The two ecosystems in which the biodiversity will be assessed are the DCVI soccer field and Sparling Bush. The independent variables that will be examined are temperature, moisture, amount of light, and soil. The dependent variable in this inquiry is the level of biodiversity. Hypothesis (What do you think will happen?) Temperature I hypothesize that it will be warmer at Sparling Bush because creatures, plants, cells, etc, are able to grow and live in a warmer climate much more easily. The temperature will be warmer at Sparling Bush because there will be many trees around creating a higher density which will help keep the heat in better. Wind will be able to pass through the soccer field much more easily compared to Sparling Bush therefore the soccer field will not be able to maintain the heat. For example, plants have a tougher time trying to grow in colder conditions making it harder for the organism to survive. This means that the living organisms at Sparling Bush should have a greater level of biodiversity compared to an open soccer field because trees protect the biotic and abiotic organisms. Moisture / Humidity I hypothesize that the humidity level at Sparling Bush will be higher compared to the soccer field. I believe this because...
Words: 2603 - Pages: 11
...CSS200-1401B-01 Principals of Network Security Instructor: Gregory Roby Phase 2, Individual Project Date: March 08, 2014 By: Gil Palacio Lab #3 Overview: In this Lab I am learning how to use the Zenmap Graphical User Interface (GUI) for the free Nmap Security Scanner application. This application is an open source tool that automates network exploration to perform several different types of security audit scans of large IP networks (LAB 3, CTU. 2014). SO here is what I gather while doing this Lab: I added several IPs to putty in order to build information or to give information to the GUI that I am looking into. I copy pasted the two interfaces that are up,up in the 1st question from the Lab Assessment sheet of the putty profile created: Interface Ethernet0/0 "", is up, line protocol is up Hardware is 88E6095, BW 100 Mbps Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps) Available but not configured via nameif MAC address c84c.7556.de9e, MTU not set IP address unassigned 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 L2 decode drops 0 switch ingress policy drops 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collisions, 0 deferred 0 lost carrier, 0 no carrier 0 rate limit drops ...
Words: 1306 - Pages: 6
...A Declaration of Cyber-War | Vanity Fair April 2011 Stuxnet Worm Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as Michael Joseph Gross reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating. By Michael Joseph GrossPhotograph by Jonas Fredwall Karlsson EMail GAME OF SHADOWS Eugene Kaspersky, co-founder and C.E.O. of Kaspersky Lab—a Moscow-based computer-security company and an early investigator of Stuxnet—photographed on the Bolshoy Moskvoretsky Bridge, near the Kremlin. All over Europe, smartphones rang in the middle of the night. Rolling over in bed, blinking open their eyes, civilians reached for the little devices and, in the moment of answering, were effectively drafted as soldiers. They shook themselves awake as they listened to hushed descriptions of a looming threat. Over the next few days and nights, in mid-July of last year, the ranks of these sudden draftees grew, as software analysts and experts in industrial-control systems gathered in makeshift war rooms in 3 of 14 6/21/2014 10:02 PM A Declaration of Cyber-War | Vanity Fair file:///C:/Users/malbun/Desktop/A...
Words: 7873 - Pages: 32
...Israeli Test on Worm Called Crucial in Iran Nuclear Delay By WILLIAM J. BROAD, JOHN MARKOFF and DAVID E. SANGER Ralph Langner, an independent computer security expert, solved Stuxnet. The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal. Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own. Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms. “To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.” Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting...
Words: 2875 - Pages: 12
...CHAPTER 1 Vulnerabilities, Threats, and Attacks Upon completion of this chapter, you should be able to answer the following questions: ■ ■ What are the basics concepts of network security? What are some common network security vulnerabilities and threats? ■ ■ What are security attacks? What is the process of vulnerability analysis? Key Terms This chapter uses the following key terms. You can find the definitions in the glossary at the end of the book. Unstructured threats Structured threats External threats Internal threats Hacker Cracker Phreaker Spammer Phisher page 21 page 21 page 21 page 21 page 21 page 20 page 20 page 20 page 21 White hat Black hat page 21 page 21 page 28 page 28 Dictionary cracking Brute-force computation Trust exploitation Port redirection page 28 page 29 page 30 Man-in-the-middle attack Social engineering Phishing page 30 page 30 2 Network Security 1 and 2 Companion Guide The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets...
Words: 13317 - Pages: 54
...of Sasser Worm Author Sends Wrong Message Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal copyright law. No part of this publication may be reproduced without prior permission in writing from Course Technology. Some of the product names and company names have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufactures and sellers. Authorities said that once Jaschen realized the havoc the Sasser worm was causing...
Words: 18526 - Pages: 75
...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...
Words: 6103 - Pages: 25
...What’s New About Cloud Computing Security? Yanpei Chen Vern Paxson Randy H. Katz Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2010-5 http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html January 20, 2010 Copyright © 2010, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. What’s New About Cloud Computing Security? Yanpei Chen, Vern Paxson, Randy H. Katz CS Division, EECS Dept. UC Berkeley {ychen2, vern, randy}@eecs.berkeley.edu ABSTRACT While the economic case for cloud computing is compelling, the security challenges it poses are equally striking. In this work we strive to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions. We examine contemporary and historical perspectives from industry, academia, government, and “black hats”. We argue that few cloud computing security issues are fundamentally new or fundamentally intractable; often what appears “new” is so only relative to “traditional” computing of the past several...
Words: 5878 - Pages: 24
...ETEC 522 The Business of eLearning The Phoenix Effect An Environmental Analysis of Apple Inc. Jeff Miller, Alan Doree, David Vogt, Bruce Stewart Jerry BleeckeR MET Program University of British Columbia October 22, 2004 Introduction – “As Bad as it Gets” The year was 1985. Apple Inc., the industry leader in the personal computer industry was bleeding money and floundering in a market it had once dominated. Shares in Apple were trading at an all time low of $7. The company had just announced its first layoff in history and1200 employees were being let go (Goodell, 1996). To make matters worse, Steve Jobs, Apple’s visionary leader had just lost control of the company to John Scully, the former CEO of Pepsi Cola, in a boardroom show down. Jobs was too erratic, it was claimed, and Apple required more steady leadership. Eleven years and two CEO’s later, Apple had still not recovered and teetered on the brink of extinction. It had lost was more than half its market share, and the company now only commanded only 16.5% of sales (Whelan, 98). In addition, it had just posted a $708 million fourth quarter loss and announced a reduction of one-third of its workforce for the second quarter (Goodell, 1996). A shadow of its former self, Apple needed a miracle. It needed a strategic vision and new direction. Ironically, this arrived...
Words: 3798 - Pages: 16
...The Diversityof Life Lab Manual Stephen W. Ziser Department of Biology Pinnacle Campus for BIOL 1409 General Biology: The Diversity of Life Lab Activities, Homework & Lab Assignments 2013.8 Biol 1409: Diversity of Life – Lab Manual, Ziser, 2013.8 1 Biol 1409: Diversity of Life Ziser - Lab Manual Table of Contents 1. Overview of Semester Lab Activities Laboratory Activities . . . . . . . . . 2. Introduction to the Lab & Safety Information . . . . . 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 15 30 39 46 54 68 81 104 147 3. Laboratory Exercises Microscopy . . . . . . Taxonomy and Classification . Cells – The Basic Units of Life . Asexual & Sexual Reproduction Development & Life Cycles . . Ecosystems of Texas . . . . The Bacterial Kingdoms . . . The Protists . . . . . . The Fungi . . . . . . . The Plant Kingdom . . . . The Animal Kingdom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 13 17 22 26 29 . 32 . 42 . 50 . 59 . 89 4. Lab Reports (to be turned in - deadline dates as announced) Taxonomy...
Words: 21204 - Pages: 85
...Exercises Republic of the Philippines MINDORO STATE COLLEGE OF AGRICULTURE AND TECHNOLOGY Main Campus Alcate, Victoria, Oriental Mindoro Name: ______________________________ Course & Year: _____________ Laboratory Exercises No. 1 Identifying Parts/Components of Personal Computers Objectives: o o o o o o Identify the components of a PC Identify the desktop components Explain the PC Start up processes Familiarize with the computer Identify the elements of the computer system Identify the first tasks to be performed while troubleshooting PCs Date: _____________ Score:____________ General Directions Read and understand each statement carefully. Write the questions and your answers on your activity sheet. Avoid unnecessary erasures. Use black or blue pen only. Answer the following: 1. What is computer? Give its characteristics, capabilities, and limitations? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ ____...
Words: 12098 - Pages: 49
...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...
Words: 25969 - Pages: 104
...Acknowledgements I would like to appreciate God Almighty for his faithfulness and for the strength, without him I am nothing. I would like to thank my supervisor Dr Hatem Ahriz for his guidance throughout the writing of this report. I would like to thank Richboy and Ete Akumagba for their guidance and for proof reading this report. I would like to thank my family for their support and love. ii Abstract This era of explosive usage of networks have seen the rise of several opportunities and possibilities in the IT sector. Unfortunately, cybercrime is also on the rise with several forms of attack including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ................
Words: 13171 - Pages: 53
...noter Introduction to Computer The word computer is derived from the Greek work “compute” which means to calculate and it is a device that can perform arithmetic operations and take logical decisions. Computer is an electronic device; used to convert Data into Information, it takes input (data) through input devices process it into CPU, stores it and also displays the result through output devices. A computer is a programmable machine. The two principal characteristics of a computer are; it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program). Modern computers are electronic and digital. CPU The actual machinery; wires, transistors, and circuits are called hardware while the instructions and Data are called software. All the general-purpose computers require the following hardware components: Central processing unit (CPU) The “heart” or “Brain” of the computer, the component that actually executes instructions is known as CPU or Central Processing Unit. Memory It is also known as main memory, primary memory or simply RAM (random access memory). It is volatile type of memory. It enables a computer to store data and programs temporarily. Input devices Devices used to input the data and instructions into the computer system. Usually a keyboard and mouse are used as input devices. Output devices Devices used to...
Words: 10903 - Pages: 44