Free Essay

Privilege Paper

In:

Submitted By tasshj
Words 798
Pages 4
One of the privileges I have is the privilege of citizenship. One of the ways I benefit from this privilege is that compared to the living conditions I fare are better than most illegal immigrants, which for the purpose of this paper I will shorten to ‘aliens’. I live in a house bought by my mother shortly after I was born, this had enabled me to live comfortably in a relatively secure neighborhood and go to nearby schools associated with the school district fixed to my location. I live in a house that is in good repair, not crowded, equipped with AC, a washer and dryer, and cable TV and internet service. I can cook meals in a kitchen with food stored in a refrigerator. I have household utilities like a coffee maker and microwave as well as oven and stove. I have a 46” LED HDTV from a name-brand, with a Blu-ray player. I own two computers; one is a high-spec desktop with two monitors and the other is a portable laptop. I own a smartphone equipped with a data plan and a tablet.
Despite this, I am considered low-income by the federal government because of our annual income. For example, because of this defined status, I can receive a lumpy sum of grants that pay towards all of my tuition, while still leaving a plentiful amount in my bank account, all thanks to the educational system. All of these material possessions and utilities I enjoy because of the legality of my status are compared to an alien’s living conditions. As seen in the immigrant video seen in class, there are some that live in shoddy, cramped apartments that are in need of repair, at times sharing the space with other people, for a monthly fee with no questions asked. It wouldn’t be hard to imagine that these apartments do not have a working heater or air conditioning unit or perhaps insufficient funds to use those utilities, nor would they own a washer/dryer or even have space to store a big refrigerator. They would be required to use a washer/dryer that requires payment either at their apartment complex or at a local laundromat or perhaps handwash and sundry with insufficient funds.
Without internet service, or in matter of fact a computer, in their apartments they would have to resort going to public places such as the local library in order to use their computer and internet. Speaking of transporting from place to place, whereas I have legal status to purchase a car if I so choose and have a driver’s license, aliens aren’t allowed to get a driver’s license, only a state id. Therefore they aren’t allowed to physically or even financially buy a car, so they would need to rely on public transportation to get themselves over a long distance or by taking a walk/bike. This also applies in the larger scale in that as a legal citizen I am allowed to travel to other countries easily by taking the necessary steps to do so, but aliens cannot do so. They do not have the ability to sign into a cell phone contract because of the information required and must rely on using prepaid cell phones/plans that do not have an auto-pay feature that makes payment easier for the majority of Americans, this of course, connects to having a credit card to use the service, which aliens cannot obtain.
Another big privilege is the fact that I am allowed to hold a high-paying job obtained from my legal status and education from a university, compared to being stuck at the lower rungs with practically no chances to rise up the ladder. These aren’t the only privileges that I have, as a legal citizen, I have a relationship with society that grants me security in the fact that I do not have to be deported if I was involved/accused in an illegal activity, as I would have a right to an attorney/fair trial. I can state that I am excluded from the lengthy process of the citizenship process because I am an natural-born citizen and can be assured that if I have children in the U.S, they too will become natural citizens, as opposed to the uncertain status of an alien’s child. The responsibility that I can take holding this privilege is by first acknowledging that I do indeed hold this privilege and it isn’t something I’m just imagining. Then I should be aware of where I stand be take care to not abuse my standing/privileges. Lastly, I can speak out and bring awareness against the inequalities that aliens face that I would too face if I didn’t have my citizenship.

Similar Documents

Premium Essay

Reserch Assignment 2.1

...Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before...

Words: 938 - Pages: 4

Premium Essay

Linux Technology

...Reserch Assignment 2.1 Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system...

Words: 940 - Pages: 4

Free Essay

Parliamentary Privileges

...INTRODUCTION According to Erskine May, "Parliamentary privilege is the sum of the peculiar rights enjoyed by each House collectively... and by members of each House individually, without which they could not discharge their functions, and which exceed those possessed by other bodies or individuals. Thus, privilege, though part of the law of the land, is to certain extent an exemption from the general law. Certain rights and immunities such as freedom from arrest or freedom of speech belong primarily to individual members of each House and exist because the House cannot perform its functions without unimpeded use of the services of its members. Other such rights and immunities such as the power to punish for contempt and the power to regulate its own constitution belong primarily to each House as a collective body, for the protection of its members and the vindication of its own authority and dignity. Fundamentally, however, it is only as a means to the effective discharge of the collective functions of the House that the individual privileges are enjoyed by members. "When any of these rights and immunities is disregarded or attacked, the offence is called a breach of privilege and is punishable under the law of Parliament. Each House also claims the right to punish as contempt actions which, while not breaches of any specific privilege, obstruct or impede it in the performance of its functions, or are offences against its authority or dignity, such as disobedience to its legitimate...

Words: 529 - Pages: 3

Premium Essay

White Privilege Research Paper

...not think white privilege exists, but those opinions prove exactly why white privilege does indeed exist. This is because privilege is a lot more noticeable when you do not have it, rather than when you do. White privilege is a prevalent factor in society, which is abundantly clear to those in a non-white ethnic group but invisible to white people. White privilege is everywhere. From waking up in the morning to going to bed, the average person probably comes across ten or more privileges that benefit white people. This leaves all other races being discriminated against/ being set at a disadvantage daily. The article "White Privilege" defined white privilege as "the unearned privileges that white individuals experience daily (often unconsciously) because they are not subjected to...

Words: 1028 - Pages: 5

Free Essay

Hacking

...a risk. Hacking is the risk that members of society must face. Hackers can find any information they wish to acquire, which puts information, such as finances and personal, at great risk. In order to understand how to prevent hacking, one must first understand what is at risk to be hacked and the way in which the act is done. Technology has become a constant part of every day life. People now manage their bank accounts, pay bills, deal with highly confidential information, and even personal information online. All these aspects of technology in daily life are a temptation to others throughout the internet. Those who find themselves tempted perform the task of hacking, which leaves others and their personal information vulnerable. This paper will discuss society’s reliance of technology in all aspects of life; thereby, leaving personal information vulnerable. Also being discussed will be information hackers find tempting, the steps that some take to hack into systems allowing them access to normally unavailable information and the steps that can be used to help prevent hacking from occurring. Method In the task of preventing hackers from gaining access to information that could be harmful to the individual, you must first understand what information is at risk and how hackers perform the task of hacking. In order to do this, I had to research what systems/files are at risk to be hacked and the way in which hackers perform the task of hacking. By assessing these factors, one...

Words: 2876 - Pages: 12

Free Essay

Linux

...Secure Computing Corporation, Trusted Computer Solutions, and Tresys Technology. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such as network resources and interprocess communication. A Linux kernel integrating SELinux enforces mandatory access-control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the ability of these programs and daemons to cause harm when compromised. This confinement mechanism operates independently of the traditional Linux access control...

Words: 1252 - Pages: 6

Premium Essay

Linux Security Basics

...Linux Security Basics Security is always at the top of the list when setting up a network and also administering a network. Linux is an operating system that can be easily obtained over the internet due to its open source distributions. Linux is one of the most secure operating systems because of having less use than Windows for the end user. There are several security technologies in Linux that can be implemented into a network. The three technologies that I will be discussing are SELinux, chroot jail, and iptables. SELinux was developed by the National Security Administration in an effort to incorporate a strong, flexible mandatory access control architecture into the major subsystems of the Linux kernel. The NSA recognized that operating system security is critical at higher levels. It provides a tool to enforce the separation of information based on the confidentiality and integrity requirements. This helps when addressing threats of tampering and bypassing of application security. It also assists in the isolation of damage that is caused by malicious software or damaged applications. SELinux uses the Flux Advanced Security Kernel which contains components that provide support for enforcing many kinds of MAC policies like type enforcement, role-based access control, and multilevel security. The Linux kernel that is implementing SELinux enforces MAC policies that limit the user programs and system servers to only what they need to complete the job. When a limit...

Words: 1313 - Pages: 6

Premium Essay

It302 Research #1

...IT302 Linux Administration Research #1 I researched three Linux security technologies which are, SELinux, chroot jail and iptables. As you read into this research you will see that they are split up into their own catagories so that it is easy to read information on whichever topic you would like. SELinux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's National Information Assurance Research Laboratory have been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. As a consequence, application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several...

Words: 1295 - Pages: 6

Premium Essay

Chapter 13

..............................................................3 I. Exploiting XP .........................................................................................................................................................4 II. Exploiting Ubuntu ...............................................................................................................................................20 Summary ......................................................................................................................................................................39 1 CHAPTER 13 2 CHAPTER 13 Introduction In the post-exploitation phase, we will look at information gathering on the exploited systems, privilege escalation. Perhaps we’ll find that we can access sensitive data stored on the exploited system. Maybe the exploited system is part of a domain, and we can use it to access other systems on the domain. These are just a few of the potential avenues open to us in post exploitation. Post exploitation is arguably the most important way to get a clear picture of a client’s security posture. 3 CHAPTER 13 I. Exploiting XP Kalis IP Address 4 CHAPTER 13 Windows XP IP Address 5 CHAPTER 13 Starting metasploit 6 CHAPTER 13 Stablished link again from lab 8 to continue this lab 7 CHAPTER 13 Showing help upload 8 CHAPTER 13 Uploading file to C: drive 9 CHAPTER 13 Showing name...

Words: 857 - Pages: 4

Premium Essay

Lunix

...are used to configure TCP Wrappers? host.allow and hosts.deny (e) What keyword in TCP Wrappers matches any daemon or client? All or Exact (f) Given the following entry in TCP Wrappers what will happen when a client address 172.16.24.100 tries to access a Web site running on this server? The IP matches both the access and deny hosts files. It will be allowed access because it matches the first hosts file that is checked. (g) What is a chroot jail? It is a process with a root directory other than /. Say you run a process or program and specify its root as /home/sam/jail, it would have no knowledge of any files above /home/sam. Jail is the root directory. (h) When might a chroot jail not work? Running a chroot utility with root privileges, and also using su or sudo programs. Those are compiled for Fedora/REEL and they call PAM, you would have to modify the source so it does not call PAM. Either one could lead to an unsecure jail. (i) What is the name of the kernel component that uses the iptables rules to filter network traffic? Netfilter 2. Create an iptables rule that will block all traffic from 10.14.34.207 and not let the sender know that the traffic was blocked. #...

Words: 345 - Pages: 2

Premium Essay

Linux

...Chapter 18 Exercises 1.What is the difference between the scp and sftp utilities? copies file to and from a remote system SFTP is the same but is secure 2.How can you use ssh to find out who is logged in on a remote system? Assuming you have the same username on both systems, the following command might prompt you for your password on the remote system; it displays the output of who run on host: $ ssh host who 3.How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? $ scp ~/.bashrc zack@plum: 4.How would you use ssh to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 5.What problem can enabling compression present when you are using ssh to run remote X applications on a local display? When using compression latency is increased and the outcome is always undesirable slower speeds, and data interruption. 6.When you try to connect to a remote system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened?What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s...

Words: 1325 - Pages: 6

Premium Essay

Linux

...still have to reference hard-coded mappings between IP addresses and host names 4. What does the /etc/resolv.conf file do? The /etc/resolv.conf file is the resolver configuration file. It provides access to DNS for Internet address resolution. The nameserver line indicates which systems the local system should query to resolve hostnames into IP addresses, and vice versa. 5. How would you mount an ISO image so that you could copy files from it without burning it to a CD? $ mount -t -o loop image.iso /mnt/image 6. Why are setuid shell scripts inherently unsafe? A normal user acquires root priveleges. So, those commands are dangerous. 7. Some older kernels contain a vulnerability that allows a local user to gain root privileges. Explain how this kind of vulnerability negates the value of a chroot jail. 8. What does FIFO stand for? First in first...

Words: 305 - Pages: 2

Premium Essay

Racism

...Focus on Pellow's discussion of stakeholders and ways in which companies maneuver to obtain approval and minimize opposition. How do these strategies connect to "colonial" hierarchies and institutionalized racism? As Pellow states, the causes of environmental injustice referenced in the scholarly literature include institutional racism in housing… and the exclusion of low-income individuals and people of color from the dominant environmental movement” (Pellow, 13). And the environmental inequality is a social process involving and impacting many stakeholders, such as social movement organizations, private sector firms, the state, residents, and workers. “When different stakeholders struggle for access to valuable resources within the political economy, the benefits and costs of those resources become distributed unevenly” (Pellow, 14). Which means that, those stakeholders with less power suffers from environmental inequality, such as living and working under dangerous conditions; those stakeholders with greater power are able to deprive other stakeholders. Thus, workers and residents with minimal political power are the most vulnerable to environmental inequality. In order to obtain approval and minimize opposition, companies adopt many strategies, which are connected to "colonial" hierarchies and institutionalized racism. “Throughout history, one of the most effective ways of controlling a colony was to create hierarchies (or intensify existing ones) between social classes...

Words: 373 - Pages: 2

Free Essay

It302 4.1 Research Assignment

...Linux Security Technologies There are many ways to have internet access these days. Coffee shops, libraries, airports and even public buses have free wireless access. With all these free accesses to the World Wide Web, there is also many potential ways for hackers to potentially get your personal information and use it for their gain. There are many ways to combat this situation by using several security measures with Linux programming, which the majority of the software is free. Some of those security technologies are SELinux, TCP Wrappers, IPtables and Chroot Jail to name a few. SELinux is a security enhancement to Linux which allows users and administrators more control over access control. Access can be constrained on such variables as which users and applications can access which resources. Was developed by the NSA in December of 2000. These resources may take the form of files. Standard Linux access controls, such as file modes (-rwxr-xr-x) are modifiable by the user and the applications which the user runs. Conversely, SELinux access controls are determined by a policy loaded on the system which may not be changed by careless users or misbehaving applications. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such...

Words: 1350 - Pages: 6

Premium Essay

Information System Security

...Claudia Goodman IT302 Homework 2 Security-Enhanced Linux The NSA has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. It recognizes the critical role of operating system security mechanisms in supporting security at higher levels. End systems must be able to enforce confidentiality and integrity requirements to provide system security. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. Application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several of these projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused by malicious or flawed applications. This is simply an example of how mandatory access controls that can confine the actions of any process, including an...

Words: 1522 - Pages: 7