Monday, February 17, 2020

Midterm Essay Question about Germany Example | Topics and Well Written Essays - 1750 words

Midterm Question about Germany - Essay Example Strategy The Germany’s military strategy was to control Alsace region up to the mountain range, the Thionville and Metz in order to protect the borders and sovereignty of Germany. The military had also planned to control the Thionville and Metz during the war. The developing of the strategy of taking over the aforementioned lands helped Germans to win in the Franco-Prussian war in 1871 and contributed to the defeat of France and emergence of united German state. Economy According to Pohlsander (27), the military had interest in some states like the Alsace-Lorrain which had iron-ore and coal resources. With the help of these natural resources German leaders planned to develop the country’s economy. The main goal was military annexation since France had lost some land and inhabitants. It had also lost its mining and steel potential. The German Empire wanted to achieve growth of its economy and so the creation of a free independent nation-state able to wage war against its neighbors was a must at that time. Factors from European World that Contributed to Germany’s Development from 18 Century through 1871 Germany’s development was contributed to by different factors during that period; these included political and military factors, the factor of French culture and religious reforms among others. The Prussian State The German Prussian state played a major role in the development of Germany. Prussia was the biggest state and also most developed one which controlled Zollverein and most of the German states during that period. Zollverein was a union that was used to enable the states to compare their developments and statuses within the context of... The European world contributed majorly to the development of Germany. The victory in the war made the nation stronger as from 1871 the military forces continued becoming more powerful and grew in number as the French wanted revenge (Pohlsander 53). There was economic growth due to the unification of the states, which enabled them to trade and contributed to civilization growth. Despite the fact that a lot of citizens lost their lives either in war or due to epidemics like different diseases, Otto von Bismarck was able to defeat France in war. Germany established its own state which it is still among the most powerful nations in the world. We have learnt that the economic development from 1815-1871 contributed to Germany’s unification as only after the war with the economic boom Germany became the nation as it is today.

Monday, February 3, 2020

Network Risk Assestment and recommended actions Research Paper

Network Risk Assestment and recommended actions - Research Paper Example Application attacks are gaining popularity. Networked based fire walls will not be able to effectively keep the system secure from this kind of attack. Though some firewalls in networks have application firewall capabilities, most are considered to be underpowered by experts, providing less protection than the available firewalls that are single purpose. Actually, network firewalls have no capacity what so ever to protect against custom web applications (Eschenauer and Gligor, 1). This nature of a network security infrastructure leaves the organizations web resources at risk with dire consequences on the organization Quantitative risk analysis regarding the network architecture Asses Value Asset Value Cost of maintenances Profits to the company Worth in competition Recovering cost Acquisition cost Firewalls 4,000 100 per month 10,000 per month 2,000 1,000 5,000 Web server 5,000 100 per month 10,000 per month 2,000 1,000 7,000 Database Server 5,000 100 per month 10,000 per month 2,000 1,000 7,000 Table: 1 Estimate of potential Loss per Threat The table below shows the estimate potential loss per threat Asset Cost of physical damage Cost of loss in productivity Cost if information is disclosed Cost if critical devices fail Firewalls 4,000 10,000 120,000 10,000 Web server 5,000 15,000 1,000 15,000 Database Server 5,000 30,000 200,000 10,000 Table: 2 Application attacks can also be used to gain access into various departments in an organization, For instance gaining access into a database administrator, financial controller, or system administrator can provide an attacker access to information to these departments which may be having information that may contain passwords for credit card numbers which can be used to steal identity, or have dire financial implications to an organization or a company. Risk factor two Another issue is that the basic implementation has its default use of well-known UDP and TCP and ports for communication. Unfortunately for this organiz ation’s Web applications are packaged-solutions, hence the organization is unable to makes change to the prescribed ports. Therefore, systems in the demilitarized zones (DMZ) will be compromised; it is easy for the attacker to compromise the systems because of the default TCP/UDP portals. In addition, systems in the demilitarized zones experience little to no monitoring or security-controls. Only one server that will be compromised before an intruder to access the Web applications Because of these shortfalls, the basic architectural technique no longer gives the kind or level of security currently being required by online cash transfer companies like VISA Cardholder-Information-Security- Program (CISP) and Payment-Card-Industry (PCI) security standards, Federal-Information-System-Management-Act (FISMA), GLBA, SOX and more other regulatory and industry-security standards engaged in this compliance effort. Risk Factor 3 Physical factors like act of nature, earth quakes, floods and fires often cause irreversible damage on networking hardware. Some of these calamities are unpredictable, and can cause extensive damage in an organization’s network system with great loses, damaged equipments can result to loss of sensitive data and information, negatively affecting productivity with end effect being heavy losses on an organization. Another physical factor that poses security threats to the network system is unauthorized access to where the various devices and