Sunday, October 6, 2019

Cyber Security Essay Example | Topics and Well Written Essays - 250 words

Cyber Security - Essay Example In a computing context, the word security is used to denote cyber security. Effective cyber security employs coordinated efforts throughout the information system. Some of the major elements of cyber security include end-user education, application security, disaster recovery/ business continuity planning, network security and information security (Marshall, 85). World governments devote huge sums of their annual budgets towards enhancing cyber security with the United States in particular, since 2010 allocating over 13 million USD annually for the next 5 years to cyber security. The traditional way of ensuring cyber security has been to dedicate most of the effort and resources on the most crucial system components in attempts to keep in check the biggest known threats while partly neglecting some less important system components. However, this method has proved greatly insufficient especially in the age of the rapidly and constantly changing nature of security risks. Most cyber security measures are now embracing guidelines in their risk assessment framework that recommends a shift towards continuous monitoring and real-time assessments (Singer and Allan,

Friday, October 4, 2019

Nursing research Essay Example | Topics and Well Written Essays - 1250 words - 2

Nursing research - Essay Example It is important for an outcome measure to be reliable, sensitive to change, and valid. Hence, the outcome measure adopted is reliable in that the questions in the measure are easy to understand and enhances easy evaluation of the program. Importantly, the outcome measure provides an accurate indicator of the intended measure it should focus on, which makes the outcome measure valid (Royse, Thyer, & Padgett, 2009). On the other hand, it is evident that the outcome measure evaluated successful implementation of the program. Finally, the outcome measure is sensitive to change since its focus is on aspects that contribute to successful implementation of the program. The outcome measure, which is structured in form of a Likert-Scale questionnaire, will be the best tool to use in order to evaluate the outcome. The questionnaire, which is provided as Appendix 1, will evaluate the effectiveness of the implemented change. The questionnaire focuses on mothers since they are the best suited individuals to evaluate their children’s pain. Importantly, it is essential to point out that the items in the provided questionnaire conceptualize the elements of effective pain management in children. After the implementation of the change, the questionnaire will provide the healthcare facility with an opportunity to evaluate the success of the program. Evaluation requires a combination of human and financial resources in order for it to be effective. In this case, human resources will be an essential component of the evaluation process since they will provide the questionnaires to the parents for filling and consequently collect them after filling. On the other hand, the pain nurse is a component of the human resources required in the evaluation since she will walk through the pediatric ward and identify any inconsistencies in the program. Conversely, it is important to note that financial resources

Environmental Impacts of Aviation Essay Example for Free

Environmental Impacts of Aviation Essay Noise is said to have a variety of definitions. For people who are inclined towards acoustics, noise is identified as a complex form of sound waves that have irregular vibrations and has no known pitch. In the field of engineering, noise is considered as a signal that interferes with the detection and quality identification of another signal. However, for psychoacoustic studies which are focused on the study of human response to sound, noise is deemed as an unwanted form of sound (American Speech-Language-Hearing Association [ASHA], 2008). According to K. D. Kryter (1996), noise is an enhanced form of sound signals that post a negative effect in the physiological and psychological aspect of an individual (Kryter, 1996 cited in ASHA, 2008). For the most part, noise is something that could be identified as an unwanted sound which is a pollutant and a hazard to the health of human beings (ASHA, 2008). Noise can be derived from a variety of contributors, and such noises have their own levels that are detrimental to the hearing of an individual. Noise levels are measured in decibels. Sounds that are louder than 80 decibels are considered to be hazardous. One of the leading sources of potentially hazardous noise is the airport. Noises from airports could come from constructions and operating machines. However, the major contributor for airport noise is caused by the aircrafts. There are two ways on how aircraft noises are generated. First, airframe noise appears whenever air passes through the fuselage or body and wings of the plane. The activity causes friction and turbulence which often result in the production of unwanted sound. Gliders which are planes without engines produce noise during its flights. Second, engine noise is derived from the action of the moving parts of the aircraft’s engine. Such noise is also produced whenever the sound of air passes through the engines during high speed. Engine noise mainly comes from the plane’s exhaust or the jet situated behind the engine whenever the air sound from the engine combines with the air surrounding it (Wellington Airport, 2008). Based from the study carried out by Daniel Nunez (1998), airplane noise poses disturbance in the human sleep more than any other forms of noises. It was also indicated that more than 50% of the people residing near airports are awakened by airplane noise (Holland-Wegman, 1967 cited in Nunez, 1998). The onset of aircraft noise as a major problem began during the time when there is an upsurge in the need of air transportation after World War Two. By the end of 1950’s, the introduction of jet planes became widely known which later on catapulted the â€Å"aviation revolution† where commercial air passengers were also introduced (Nunez, 1998). The augmentation in the aircraft use also resulted in the increase in the noise level produced by air transportations. Because of the outstanding length of service and success of aircraft operations, airports gradually become larger and noisier. The attractive activities of airports also began to grab the attention of people, wherein surrounding communities started to spread all throughout the nearby areas. The more airports become bigger and nosier, the more residential structures, churches, and schools come closer to the area. Eventually, conflicting issues arise. Aside from the land expansion of airports which often cause nearby residents to act defensively, noise is also regarded as an issue that is very much integrated with airport operations (Bachman, 2003). As such, the painful sound from aircraft take offs and landings were viewed as the primary reasons of annoyance by the residents living near the area. From then on, airport noise has become a complex psychophysiological and economic issue (Nunez, 1998). The issues regarding aircraft noise are said to be complicated because of the aviation industry’s significance in the economy of developing countries. Without the presence of the aviation industry various economic industries would be gravely affected, some of which include the tourism business and mail transportation (Nunez, 1998). Many airports have spent large amounts of money in order to provide sound insulation for residential buildings and community owned structures to reduce aircraft noise (Bachman, 2003). One of the airports that have reached an agreement regarding their noise issue with the people in the surrounding community is the Wellington International Airport Limited (WIAL) situated in New Zealand. WIAL was constituted as a legal corporation on October 16, 1990. The aviation company is partly owned by the Wellington City Council which shares 34% of the total stocks, while the other 66% are owned by Infratil Limited. Wellington International Airport is known as the third largest airport in New Zealand and is classified as a regional hub that extends its international flight service not only in New Zealand but also to the Eastern part of Australia and the neighboring island countries in the south-west Pacific. Almost 90% of the passengers of WIAL travel domestically and majority of whom are business people (Ministry of Economic Development [MED], 2005). As it was said, no other cities in the world have an airport location that could be compared to Wellington International Airport. WIAL is situated on a narrow strip of land in the center of the residential areas. The airport is just minutes away towards the capital’s centre. It is also accessible through a short coastal scenic drive or passing through the tunnel at Mount Victoria. Although the location of the airport is said to be unique, the airport is faced with substantial challenges in terms of its environmental impact, specifically the aircraft noise. The location of Wellington International Airport which is close to the residential area became a ground for the residents to organize the Residents Airport Noise Action Group, the noise abatement requirement, as well as different actions from the internal operations of the airport in order to decrease the noise pollution (Wellington Airport, 2008). Residents Airport Noise Action Group In 1963, Maxine Harris first moved into her home at Strathmore which is near Wellington International Airport. Five years after, Harris reported that the jet noise began. According to documents, Harris and her neighbors were not at all bothered by the jet noise. However by 1980’s, Harris and her neighbors started hearing the night-time acceleration of the airplane engines of National Airways. Harris even noted that they heard the revving of the airplane engines that sounded like a high-pitched whining that would wake her up in the middle of the night and would not allow her to get back to sleep. Harris complained about the noise issue, but an airport official told her that no other individual complained about the noise. Harris talked to her other neighbor about the issue and her neighbor told her that he had also complained, yet the airport official also told him that no other person called the airport to complain. Both Harris and her neighbor responded to the issue by putting leaflets in the mailboxes of their neighbors. The leaflet called for the other residents to phone the airport whenever they were disturbed by the aircraft noise (Samson, 1997a). Because of this, the neighbors responded well, and in 1986, the Residents Airport Noise Action Group was established. The group was focused on performing two tasks: to halt the engine testing at night and to lessen the noise produced by the 737’s. It was in 1986 when the group had their first meeting with the city council. During that time, they have voiced their complaints regarding the noise issue. Their first attempt became successful after the city passed the first by-law which is focused on the engine-testing. The by-law limits the testing times of the National Airways Friendship fleet. However, subsequent efforts of the group were not as successful as their first attempt. The noise problem of the Boeing 737’s still remains (Samson, 1997a). In 1987, the Ansett Airlines became a part of the internal air service market. In return, Air New Zealand has to expand their operations. It was stated that the residents regarded 1987 as the year of â€Å"big explosion† because of the noise produced by the aircrafts. In response to the growing issue of the airport noise, the residents put forward a proposal, stating that all the 737’s should be phased out in 1997. Three months after the proposal was passed, Ansett acknowledged the residents’ plea by replacing the fleets with whisper jets that are much quieter compared to the 737’s. On the other hand, the city council framed a proposed by-law that would have ordered the Air New Zealand to reduce its fleet on a stage by stage process. However, the propose by-law did not take in effect (Samson, 1997a). By 1992, Air New Zealand promised that by the following year seven of their Boeing 737-200’s would have devices that would reduce noise known as hush kits and other fleets would be phased out and will be replaced by 737-300’s. However, the residents did not agree with this. Arguments were once again raised that have even reached the select committees of the parliament, yet the resolutions were unidentifiable (Samson, 1997, p. 19a). As a response to the noise issue that has been gaining public interest, the city council put forth a proposed district plan, but the residents opposed to it. However, in order to resolve the issue, environment court judge Shonagh Kenderdine ruled out in August of 1997 that the airport and the airlines should adhere to the strict rules as proposed by the district plan regarding the air noise boundary wherein a specific maximum noise level will be set. Furthermore, the noise boundary would later on be dissolved if there is an improvement with the airport and airlines noise management. Other regulations that were included in the ruling involve the night curfew, engine-testing, ground noise control, and land-use. The first three issues being disputed were already progressive after the issues were ruled out. The last dispute which was focused on the land use was not settled until November of 1997 (Samson, 1997a). As a follow up to the court ruling done on August of 1997, in order to end the ten-year fight regarding the acceptable noise level in Wellington area, and to finally conclude the last remaining area of dispute which was focused on the land use, Judge Shonagh Kenderdine ended the noise issue on November 20, 1997. The major players during the court case involved the Residents airport noise action group, the board of airline representatives, the Wellington city council, and the Wellington international airport. It was stipulated in the ruling that: â€Å"All new housing developments within the airport’s air-noise boundary would be deemed unrestricted discretionary activity† (Samson, 1997b, p. 3). Under the said ruling, any individuals who are interested to build residential structures within the surrounding airport area and all the application permits have to be approved by the Wellington City Council. Therefore, the council has the right to refuse or consent the details of the application depending on the criteria that are still to be set by the district plan (Samson, 1997b). Despite the criteria being on the process of completion, the interested party should be governed by the assessments set in the ruling wherein new homes that will be built within the airports air-noise boundary should use construction materials that could pass the standards of noise reductions. Such materials include: thicker gib boarding, double or thicker window glazing, and the installation of noise insulations. The ruling also required the city council to implement stricter rules regarding the development of new housings compared to the original proposition of the district plan (Samson, 1997b).

Thursday, October 3, 2019

Components Of A Good Password Computer Science Essay

Components Of A Good Password Computer Science Essay Computer manufacturer and OS developers often build and deliver systems in default modes to secure the system from external attacks. From developers view this is the most efficient mode of product delivery. As per the organisation or a user, they require more protected and secured system before it is placed into service. Security baselines are standards which defines a minimum set of security controls for organisations. Security baselines typically address both technical issues such as software configuration and operational issues such as keeping applications up to date with vendor patches. In the security baselines, if hardware, OS, network and application followed the recommended minimum set of security settings then it will significantly decrease its vulnerability to security threats. The process of securing and preparing the system against the internal and external threats and system vulnerabilities is called hardening. Reduce the main reasons of attack that includes the removal of unnecessary services, software and unnecessary usernames or logins. It makes the system more secure, reliable, efficient and gives optimised performance. 12.2 Password Selection Password selection is one of the critical activities that often get neglected as part of a good security baseline. Currently most systems are protected by a user ID and password. If an attacker discovers the correct user ID and password by guessing or by using freely available password cracker tools, then they can gain access to the system. By following basic guidelines and principles in choosing passwords, the passwords used on the system will protect the assets. 12.2.1 Selecting a Password Users should consider a few basic requirements while choosing the password. Set a minimum number of characters and never accept shorter password. Do not use dictionary words and mix of lowercase and uppercase letters with usually one or two numbers. Randomly created passwords are strong passwords and they are difficult to guess and will defeat most password-cracking utilities. However, randomly generated passwords are difficult to remember and users often write down these passwords usually in a location close to the machine. Thus it defeats the purpose of the password. 12.2.2 Components of a Good Password User should create their own easy to remember passwords. Password is meant to protect access and resources from hackers. It should not be easy for them to guess or crack through password cracking tools. Common guidelines to make the password more difficult to guess or obtain are as follows: It should be at least eight characters long. It should include uppercase and lowercase letters, numbers, special characters or punctuation marks. It should not contain dictionary words. It should not contain the users personal information such as their name, family members name, birth date, pet name, phone number or any other detail that can easily be identified. It should not be the same as the users login name. It should not be the default passwords as supplied by the system vendor such as password, guest, admin and so on. 12.2.3 Password Aging Password aging is technique used by system administrators and it forces the user to change their passwords after specified period of time. If it is not changed within a specific period of time, it expires and must be reset. Password aging can also force a user to keep a password for a certain number of weeks before changing it. Changing passwords periodically will protect against brute-force attacks because when password is changed the attacker must restart the attack from the beginning. If password is changed periodically, an attacker will never be able to cycle through all the possible combinations before the password is changed again. Most operating systems have options that allow system administrators to apply password aging and prevent password reuse. Common guidelines are as follows: User must change their passwords in every 60 to 90 days. A very secured service requires to change passwords every 30 to 45 days. System must remember each users last five to ten passwords and should not allow the user to reuse those passwords. 12.3 Hardening Most computers provide network security features to control outside access to the system. All nonessential softwares such as spyware blockers and antivirus programs prevent malicious software to run on the system. Even with all these security measures, systems are still vulnerable to outside access. System hardening is a step by step process of securely configuring a system to protect it against unauthorised access. It also helps to minimise the security vulnerabilities. The three basic areas of hardening are as follows: Operating system-based hardening It includes information about securing and hardening various operating system. It also includes methods to secure file systems. Network-based hardening It examines the methods and procedures of hardening network devices, services and protocols. Application-based hardening It includes security of client-side user applications and services such as Domain Name Service (DNS), Dynamic Host Configuration Protocol (DHCP) and Web servers. 12.3.1 Operating System-Based Hardening Operating system hardening is the first step towards safeguarding systems from intrusion. Systems received from the vendors have preinstalled development tools and utilities which are beneficial to the new user as well as it also provide back-door access to an organisations systems. Operating system hardening includes the removal of all non essential tools, utilities and other systems administration options through which hackers can easily access the system. Hardening process will ensure that all security features are activated and configured correctly. This process makes the system secure, efficient, reliable and gives optimised performance. Some of the security tips to harden the OS include the following: Disable all unnecessary protocols. Disable all unnecessary services. Disable all unnecessary programs and processes. Verify and then install all vendor patches. Install all product updates. Use vulnerability scanner to identify potential security weaknesses. Configure file system security according to the least privilege rule. Note: Least privilege rule states that, allow access to those individuals who require it and allow only as much access required to complete the task. File System Controlling access to the resources is an important factor in maintaining system security. The most secure environment follows the rule of least privilege. The network administrator receives more complaints from users after following this rule as they are unable to access resources. However, receiving complaints from unauthorised users is more beneficial than suffering access violations that damage the organisations capability to conduct business. The least privileged environment can use the user groups to assign the same access to the resources instead of assigning individual access controls. However, in some cases individual users need more or less access than other group members. To maintain security, network administrator provides greater control over what each user can and cannot access. Updates OS updates are provided by the manufacturer of the specific component. Updates contain improvements to the OS and hence, will make the product more secure, efficient and stable to the users. For example, Microsoft updates are labelled with security updates. These updates address security concerns recognised by Microsoft and install them if required. In addition, updates enhance the capability of a specific function that was underdeveloped at the time the system or application was released. Updates should be thoroughly tested in non-production environments before implementation. Since this new and improved function has more security breaches than the original components, it requires complete testing. Hotfixes, security packs and patches are product updates to resolve a known issue. Hotfixes Hotfixes are components that are designed to fix a particular critical system fault. Hotfixes are created by the vendor when a number of client systems indicate that there is compatibility or functional problem with a manufacturers products used on a particular platform. These are fixes for reported or known problems. Hence, hotfixes should only be installed to correct a specific problem. Service Packs Service packs are collection of updates or hotfixes. It correct known issues and provide drivers, updates and system administration tools that extends product functionality that include enhancements developed after the product is released. Service packs are tested on different hardware and applications to ensure compatibility of existing patches and updates. Service packs must be thoroughly tested and verified in non-production environment before it installed on working systems. Patches Patches are used to prevent hackers from invading the system with virus and other malware that exploits the operating systems vulnerabilities. This improves the usability and performance of the system. OS patches are available on the vendor Website that supplies the product. Since patches are issued at unpredictable intervals, it is important to configure the system to automatically connect with the latest security patch updates. When the new update is released, the OS will prompt to install. While preparing clean installation it is advisable to download and install all known patches before introducing the system to the network. 12.3.2 Network-Based Hardening The tremendous growth of the Internet allows to openly access any system on a network. Hence, proper control over network access must be established on systems by controlling the services that are running and the ports that are opened for network access. In addition to the systems, network devices such as hub, routers, switches and modems must be examined for any security vulnerability. Any flaws in the coding of the OS can be exploited to gain access to the network components. These components should be configured with very strict parameters to maintain network security. The softwares of these components require to be updated regularly. By taking necessary steps, network administrator should limit or reduce attacks, accidental damage through their networks. In addition, network hardening also recommend the correct configuration of network devices and the requirement to enable and disable the services and protocols within a network. Firmware Updates Updating the firmware of the hardware device is provided by the manufacturers. These updates fix incompatibility problems or device operation problems. These updates should be applied if the update includes fixes for an existing condition or if it will make the device more secure and more functional or extends its operational life. It is recommended to install and test the firmware updates in a non-production environment to verify if the update contains the necessary fixes and benefits that are required. Device Configuration Network devices such as routers and switches configured with default installation settings. These default settings leave a system extremely vulnerable as it is set for convenience and not for security. Choosing a good password and limiting access to any open ports is very important in maintaining security of the devices. Good passwords are one of the most effective security tools because a good password can be resistant to several forms of attack. Determining the minimum set of services that the devices are running and good passwords is important for maintaining security of those devices. Apply patches and updates that are released by the product vendor in a regular interval. Enabling and Disabling Services and Protocols It is important to measure the current requirements and conditions of the network and infrastructure and then disable the unnecessary services and protocols. This leads to network infrastructure that is less vulnerable to attack. Access Control Lists Configure access list at the network devices to control access to a network. Access list can prevent certain traffic from entering and exiting a network. Access control lists are controlled by an administrator. 12.3.3 Application-Based Hardening Application hardening is the process to prevent exploitation of various types of vulnerabilities in software application by implementing the latest updates. Applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, File Transfer Protocol (FTP), DNS servers and DHCP servers on a network require regular updates to provide protection against newly developed threats. Web Servers At present most of the organisations have a Web presence on the Internet for numerous business advantages. Due to Internet popularity, Web servers have become extremely popular targets for attackers. Original content on the Websites are replaced with hackers data. E-commerce sites are attacked and users personal account information is stolen. Microsofts Internet Information Server (IIS) or Apache server are most popular Web servers applications in use today. To secure Web servers from hackers, administrator must apply updates and patches, remove unnecessary protocols and services and properly configured all native controls. It is also recommended to place the Web server behind a firewall or a reverse proxy. Microsoft has developed URLScan and IIS Lockdown tools which are designed to secure IIS servers from attacks and exploits. URLScan is a monitoring utility that examines all incoming URLs and rejects any requests for files, directories or services outside the intended scope of the Website. The IIS Lockdown tool turns off unnecessary functions which reduces the attack surface available to an attacker. E-mail Servers E-mail servers and clients are vulnerable to different attacks such as Denial of Service (DoS) attacks, virus attacks, relay and spoofing attacks. There are numerous deficiencies in the different versions of e-mail server software such as Sendmail for Linux and UNIX and the Exchange or Outlook for Microsoft. E-mail servers are constant potential sources of virus attacks and therefore must have the strongest possible protection for scanning incoming and outgoing messages. E-mail servers should not have non-essential services and applications installed. Administrative and system access should also be securely controlled to block installation or execution of unauthorised programs and trojans. The following attack points should be considered while hardening an e-mail server: Open mail relay allows unauthorised users to send e-mail through an e-mail server. Storage limitation, to limit DoS attacks based on message size. Spamming includes identical messages sent to numerous clients by e-mail. Virus propagation, ensure the anti-virus programs and applications are performing correctly. FTP Servers FTP allows number of users to access and download remotely stored data. It distributes application updates, device drivers and free software to users. Users access this data anonymously. This anonymous access to FTP servers becomes a problem as administrator does not provide anonymous access or does not properly secure the FTP service. This involves setting the appropriate permissions, not allowing the FTP process to be run by an unprivileged user and not allowing users to upload or modify files. Some FTP servers allow upload and download service for authorised users and hence, in that case anonymous access should be completely removed. To overcome buffer overflow problem ensure that FTP server software is up to date and patched. DNS Servers DNS server converts systems host names into IP addresses so that the communication can be correctly routed through the network. Client systems use DNS to locate Web servers, e-mail servers, FTP servers and number of other servers and network services. DNS can be major target for an attacker. The DNS server can be exploited by the following ways: Stealing zone transfers DNS servers are configured to provide information such as list of hosts and routers with IP addresses to other secondary DNS servers. This secondary DNS server is used to maintain a backup copy of the DNS database and to provide name resolution services for client systems. An attacker can receive a zone transfer and use it to track victims network and search for potential targets. Zone update spoofing An attacker can spoof the address of the primary DNS server and send a bogus update to a secondary DNS server. Client systems receive incorrect information and network communication from this bogus server and redirects users to a location controlled by the attacker. DNS cache poisoning Some DNS servers allow attackers to insert bogus information into a DNS cache. To secure and harden the DNS server from various types of exploits, actions to be taken are as follows: Do not place any information on publicly accessible DNS server to avoid snooping around the DNS server. Do not provide additional host information in Host Information (HINFO) records of DNS. HINFO record contains descriptive information about the OS and features of particular system and attacker could use this information to gain access. Configure the DNS servers to only allow zone transfers to specific secondary servers. Berkeley Internet Name Domain (BIND) allows zone transfer to be signed. Zone transfer signing allows secondary servers to verify the credentials of the primary server before accepting data. Ensure that DNS software is patched and up to date to avoid DNS cache poisoning. NNTP Servers Network News Transfer Protocol (NNTP) servers allow news clients to connect to news servers to share information privately or to post articles to a public NNTP server. NNTP servers are vulnerable to DoS attacks, buffer overflows. To exploit server, attackers connect to a private NNTP server to gain any information to compromise network. Sometimes users post accurate diagrams of their network to ask a technical question and attacker can use this information to find ways to exploit a network. They can even offer bogus advice to create a hole in the networks defences. To protect the organisation from NNTP server exploits, block the NNTP port at the firewall to make NNTP server inaccessible to external users. To protect posted private information, authenticate user to prevent anonymous logins to the NNTP server. Also encrypt communications using SSL/TLS to prevent packet sniffing of confidential data. Do not allow users to post confidential information to the public which will compromise their network. File and Print Servers Files and print servers in a network are used to share resources but it is a common way in which hackers can gain information and unauthorised access. When sharing is enabled to share the resources with a trusted internal network over a NIC, the system is also sharing those resources with the entire untrusted external network over the external interface connection. Attackers attempt to make unauthenticated connections to shared resources on the network. If sharing permissions are configured incorrectly for an easily exploited user account, attackers can gain access to resources and alter them. To secure the file and printer shares block access to shares and related information at the firewall. Use the rule of least privilege to secure shares from external attacker. Virtual Private Network (VPN) is also used to encrypt communications between clients and servers to secure data transmission. Data Repositories Data repositories are locations that hold information about networks, applications and users. Attackers can use the information stored in data repositories to formulate attacks against organisation. Hence, ensure that this information is limited and restricted for external users. As well as authentication and encryption of the data is necessary to protect them from external attacks. Directory Services A directory service is used to store, organise and provide access to information in a directory. The information in a directory services can include system accounts, user accounts, mail accounts, service locations and shared resource information. The Lightweight Directory Access Protocol (LDAP) is a common directory service that organises data in a hierarchical manner. The top entry in a LDAP directory information tree is called root and this LDAP root server creates the hierarchy. The directory service hierarchy and the information it stores provide a good map of network infrastructure. This is convenient for authorised users in a network as well as for attacker. Attacker can use numerous ways to compromise LDAP servers such as attacker can use network resources information stored at directory service to examine network structure, resources and potential targets. Attacker can gain victims network information that is transferred over LDAP through eavesdropping. Some of the ways to protect LDAP hierarchy are as follows: Protect LDAP hierarchy by configuring the strongest authentication to the different versions of LDAP. Both LADP v2 and LDAP v3 support anonymous and simple authentication which are not very secure. Anonymous authentication does not require password and simple authentication uses a password in unencrypted format which attacker can easily hack. Strong authentication over LDAP v2 and LDAP v3 is provided through Kerberos version 4 authentication and Simple Authentication and Security Layer (SASL) communications respectively. Use Secure LDAP (LDAPS) that allows encrypting communications using SSL/TLS. Block access to LDAP ports from the Internet so that attackers cannot make connections using these ports. Databases Database servers are used to store data. Both the data and the database server can be target for an attacker. An attacker can steal the data or take over the database server to exploit it. Some of the ways that the database servers can be exploited are as follows: Unexpected data queries or commands Numerous database servers use Structured Query Language (SQL) which allows for the querying and posting of data. An attacker can use SQL commands to do unexpected things is called SQL injection. Unauthenticated access If unauthenticated access to database server is allowed then the attackers can easily connect and exploit the database server. To secure database servers consider the following points: Test the database by running irrelevant queries and attempt to access unauthorised information. Do not allow unauthenticated connections to the database server. While transferring confidential data to and from database server, use SSL/TLS or VPN connection to protect data. To avoid database server to be queried by external users, block access to it at the firewall. 12.4 Chapter Review Questions 1. How an individual should secure a password? (A) Selecting a password with at least eight characters, at least one change in case and at least one number or special character (C) Storing the password in wallet or purse (B) Using the same password on every system (D) Changing passwords at least once a year Ans: A 2. Which of the following steps is part of the hardening process for OS? (A) Remove unnecessary programs and processes (C) Setting appropriate permissions on files (B) Disable unnecessary services (D) All of these Ans: D 3. Which amongst the following is the correct step to overcome buffer overflow problems? (A) Select strong passwords (C) Install the latest patches (B) Remove sample files (D) Set appropriate permissions on files Ans: C 4. Which of the following requires software up to date and patched? (A) Operating systems (C) Applications (B) Network devices (D) All of these Ans: D 5. Rule of least privilege states that ____. (A) allow access to users who requires it (C) allow limited access (B) allow access to everyone (D) allow full access Ans: A and C 6. Which of the following is designed to fix a particular critical system fault? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: A 7. Which of the following extends product functionality after the release of product? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: B 8. Which of the following fixes incompatibility problems or device operation problems? (A) Hotfixes (C) Firmware update (B) Service packs (D) None of these Ans: C 9. Which of the following steps are used to secure Web servers? (A) Apply patches and updates (C) Place the web server behind a firewall (B) Remove unnecessary protocols and services (D) All of these Ans: D 10. BIND stands for _______. (A) Berkeley Internet Network Domain (C) Berkeley Intranet Name Domain (B) Berkeley Internet Name Domain (D) Business Internet Network Domain Ans: B 12.4.1 Answers 1. A 2. D 3. C 4. D 5. A and C 6. A 7. B 8. C 9. D 10. B Summary In the chapter, Security Baselines, you learnt about: Components of a good password and password aging. Different ways to harden the OS. Different ways to harden the network and its devices. Different ways to harden applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, E-mail servers, FTP servers, DNS servers, NNTP servers, file and print servers, directory services and databases.

Wednesday, October 2, 2019

Carvers Cathedral Essays -- Essays Papers

Carvers Cathedral Plato’s â€Å"Myth of the Cave† and Carver’s Cathedral provide insight into parallel words. The protagonists in each story are trapped in a world of ignorance because each is comfortable in the dark, and fearful of what knowledge a light might bring. They are reluctant to venture into unfamiliar territory. Fortunately the narrator in the Cathedral is forced by circumstances to take a risk. This risk leads him into new world of insight and understanding. The narrator in â€Å"The Cathedral† begins the story with the issue of hesitation in seeing the light. The light in this story just like the light in Plato’s â€Å"Myth of the Cave† represents reality. The narrator expresses the fear of expressing reality when he said â€Å" I wasn’t enthusiastic about his visit. He was no one I knew. And his being blind bothered me. My idea of blindness came from the movies. In the movies, the blind moved slowly and never laughed. Sometimes they were led by seeing eye-dogs. A blind man in my house was not something I look forward to†. (Page 98). The narrator felt that being blind was like being in a type of prison and the preconceived notion of self-imprisonment was frightening to him. He felt that blindness was exactly like being a prisoner in Plato’s Cave, a scary world where no light ever penetrated. Unfortunately, the husband is imprisoned in his own ignorance. His view of blindness had come from Holly wood’s portrayal of blind people. As far as he is concerned, his situation is completely normal. He knows there are lots of people just like him. In â€Å"The Cathedral† the extent of the husband’s ignorance or naivetà © is extremely irritating. When his wife tells him the beautiful story of the blind man’s romantic relationship with his wife Beulah, all he could think of is â€Å" What a pitiful life this woman must have led. Imagine a woman who could never see herself as she was seen in the eyes of her loved one. A woman who could on day after day and never see the smallest compliment from her beloved. A woman whose husband could never read the expression on her face, be it misery or something better†. (Page 100). But the blind man had sight in the form of intuitiveness. This sight gave him greater vision than the sighted man. The blind man had a sense of and source of reality in the truth and strength of the relationship. This man was unlike the prisoners in the cav... ... when he closes his eyes in order to imagine and draw the cathedral. †Close your eyes now, the blind man said to me. I did it. I closed them just like he said. Are they closed? He said. Don’t fudge. They are closed, I said. Keep them that way, he said. He said, don’t stop now. Draw. So we kept on with it. His fingers rode my fingers as my hand went over the paper. It was nothing else in my life up to now. Then he said, I think that’s it. I think you got it, he said. Take a look. What do you think? But I had my eyes closed. I thought I would keep them that way for a little longer. I thought it was something I ought to do. Well, he said. Are you looking? My eyes were still closed. I was in my house. I knew that. But, I didn’t feel like I was inside anything. It’s really something I said†. (Page 108). By becoming blind he sees clearly how the blind man’s world really is. Being temporarily blind opens his eyes to the world around him. He can understand the handicap, with understanding comes compassion, and the compassion has caused him to develop new insight into the world around him. Interaction with the blind man has allowed him to see, and has removed him from his own personal cave.

The Electoral Systems of Britain and Sweden Essay -- comparative polit

The Electoral Systems of Britain and Sweden The quality of a democracy is regulated by the electoral system that awards seats in democratic assemblies to those seeking office. This paper will compare the electoral systems of the parliaments of the United Kingdom (herein called Britain) and Sweden in order to determine which country has the preferred electoral system. The quality to be measured is the fairness of democratic representation, which is to say, how properly the various public interests are represented and how much control voters have over their government. The first part of the paper will study each electoral system separately, looking at the mechanics of how the members of parliament are elected, what kind of political party system can participate in the parliament, and how the parties go about setting up the executive branch of government. The second part will compare and contrast the two parliaments, and afterwards it will be shown how one of the parliaments represents its electorate more fairly and democraticall y. These two countries have been chosen because Britain?s electoral system is characterized as a system of single-member districts, and Sweden?s system is considered to provide proportional representation, which strives to elect members of political parties in the proportions in which votes were cast. The Electoral System in Britain Voters in Britain elect members of the House of Commons, the more powerful lower house of the Westminster Parliament, for maximum terms of five years. Each one of the 659 electoral districts sends one member to the House of Commons after being chosen on the basis of plurality. Candidates obtain their places on the ballot by being nominated by their party. Frequently the w... ...). "The Election of the Swedish Riksdag, September 2002," Representation. 39(2): 146-156. Kavanagh, Dennis (2000). British Politics: Continuity and Change. New York: Oxford University Press. Mattila, Mikko and Tapio Raunio (2002). "Government Formation in the Nordic Countries: The Electoral Connection," Scandinavian Political Studies. 25(3): 259-280. Metcalf, Michael F (1987). The Riksdag: A History of the Swedish Parliament. New York: St. Martin?s Press. Nation Master (2003). "British House of Commons." St. Petersburg, Florida: WikiMedia. . Nation Master (2003). "Elections in Sweden." St. Petersburg, Florida: WikiMedia. . Petersson, Olof et al. (1997). Report from the Democratic Audit of Sweden 1996. Stockholm: SNS Fï ¿ ½rlag.

Tuesday, October 1, 2019

Hospitality Story Assignment Essay

This paper discusses strategic opportunities for a unique non-profit venture. The equine industry is one among the major animal industry in the world. This is because horses – the layman’s term for equine – are one of the most expensive animals to buy and to take care of. Equines can be considered as a pet for animal lovers, a practical means of transport within the farm or to country-side areas, and also a good form of business in a way of breeding and racing quality horses. But what happens to the race horses that can no longer race? Introduction The equine industry is one among the major animal industries in the world. This is because horses – the layman’s term for equine – are one of the most expensive animals to buy and to take care of. Horses can be considered as a pet for animal lovers, a practical means of transport within the farm or to country-side areas, and also a good form of business in a way of breeding and racing horses. Indeed, there are a number of uses that can be applied for the horses. This is the very reason why the equine industry has been receiving great attention both from the government sector and the private animal-related organizations. There are a series of laws and regulations made to facilitate the smooth flow of equine industry, both in the business and health perspectives. Background Racing Industry History Horses, one of the most fascinating animals in the history of mankind, have been an integral part of society since the beginning of civilization. In the days of primitive culture, man looked towards the horse as a source of food. Since that time however, he has relied on the horse for warfare, work, transportation and sport. After God, said the Spanish conquistadors, we owed the victory to the horse. With equal truth it can be asserted that much of our human progress has been dependent upon the use man has made of the horse (Edwards, 1985). Edward’s affirmation is further proven throughout history. From the migration of primitive nomads to the conquering of entire civilizations, there is no aspect of life that the horse has not affected. The horses’ history began millions of years before humans even evolved. Horses were so important to ancient society, that such evidence is depicted through many works of art and literature. Through these remnants one can see exactly how horses were eaten, sacrificed, worshiped and ridden in battle since pre-historic times. Often times, especially in mythology, certain ideas about horses came about from an explanation of actual events. What is known today as the modern horse took many years to evolve into what it has become. â€Å"One of the earliest records of man riding a horse is an engraving on bone, found at Susa from the third millennium BC† (Edwards, 1985). As they became more popular, horses soon replaced reindeer, and were used to draw sleds in Northern Europe. Likewise, horses also began to replace other animals as a vehicle. A mounted man on these fast-moving creatures could certainly hunt with greater efficiency. â€Å"The first time man employed some means other than human power was an immense step in world history† (Roberts, 1987). â€Å"Man’s domestication of the horse throughout the centuries has been so thorough and comprehensive that there are really no truly wild horses left in existence† (Roberts, 1987). Although horses do run free in the world, they are all decedents of some form of domesticated animal. The Breeders Breeders of Thoroughbred racehorses have a motto: â€Å"Breed the best to the best, and hope for the best. † Farms from California to New York, Florida to Maryland, are all trying to emulate what breeders in the state of Kentucky have done for centuries — produce champions. For breeders, the study of bloodlines is a way of life. The art of matching a dam (the horse’s mother) with a sire (the father) to produce a top foal is part art form, part science, and a great deal of luck. For instance, Alydar, who finished second to Affirmed in all the 1978 Triple Crown races, sired a pair of Kentucky Derby winners in Alysheba (1987) and Strike the Gold (1991); Affirmed has yet to sire a Derby winner. The breeder will contribute to the race horse shelter every time a thoroughbred race horse is registered with the Jockey Association. This fee, of $200. 00 is collected by The Jockey Association and sent directly to the shelter to help with the costs of providing food, shelter and medical care for the horses. The fee will also provide the necessary salaries to the members of the team. The Horses The Thoroughbred breed originates from the Middle East, where centuries ago Arab rulers bred their great stallions to select mares in the hopes of producing faster and stronger horses. The lineage, or family history, of a horse is known as its pedigree. Soon after a horse’s birth, the owner and/or breeder registers it with The Jockey Club, the official racing record keeping organization for the breed. After the colt (male) or filly (female) is born, the breeder puts in countless hours of hard work to get the horse ready for the races. While most thoroughbreds are born between January and June, they have a universal birthday of January 1. This standard was set up to simplify the process of creating races for horses of a certain age. (For example, the Kentucky Derby is restricted to three year olds). During the young horse’s first autumn, they are separated from the mother and grouped together with other â€Å"weanlings†; continuing to grow and learn. The following spring, the developing horses, now known as â€Å"yearlings† will begin to be taught the ways of the racetrack. Beginning with the first days of placing a saddle on their back, they are being trained for a career at the races. The young horses begin training at on their â€Å"home† farm or shipped to a training facility to be â€Å"broken† for riding and eventually racing. Developing a good racehorse takes considerable time and patience. Training begins slowly, with light jogs and gallops around the track; developing a routine to get the horse accustomed to track life. Later, serious training begins; they start to put in longer gallops to build stamina, and work their way up to a â€Å"two-minute lick†, meaning a robust mile gallop in two minutes. As it gets closer to their second birthday, the casual farm life has been left behind. Horses at this age now begin workouts, usually starting with 1/8 of a mile, called their first â€Å"blowout†, and working their way up as the day of moving from training center to racetrack nears. The Thoroughbred on the Track Today, Thoroughbreds generally begin their racing career at age two (Remember, all racehorses have a universal birthday of January 1), and remain racing as long as they are main competitive or until retirement for breeding purposes. A Thoroughbred is not considered an adult horse until it is five years of age, so when they begin their career at age two or three, they are really just developing children and teenagers. Horses go through a lot of growing pains and changes during this time. Often you will see precocious two-year-olds that are touted as next year’s Kentucky Derby favorite that end up no where to be seen come that first Saturday in May. Most everyone in racing will tell you that their dream is to see their horse in the Derby winner’s circle, but with some 35,000 foals born in the United States each year, and only 20 maximum make it to the race, reality sets in quickly. So even if a horse doesn’t make the Derby, there are plenty of opportunities for a horse to be successful on the track. As a horse develops, it usually acquires a certain racing style; whether it is a front-runner or off-the-pace type, or maybe it prefers racing on turf rather than dirt. There is the rare animal that is comfortable no matter how the race develops or on any type of track, able to adapt to every situation. Whatever their style, the bettor needs to compare it to the rest of the horses in the field and see how the race might unfold. The Trainers While the jockey is usually the person that the racing fans most identify with, the single most important player in a racehorse’s life is the trainer. Trainers generally earn their money in two ways: through a â€Å"day rate† they charge the owner(s) for day-to-day training; and â€Å"stakes† they earn when their owner’s horse wins a race, usually 10% of the owners winnings. The trainer is comparable to a team’s coach – continually trying to produce winners with a constantly changing barnful of talent. For every horse in the barn, the trainer teaches them how to race, hones their speed, builds their endurance, sees to their care, and calls in help to heal their injuries. All horses possess a certain amount of class; ultimately telling in the level of race at which they will be successful. As a trainer begins to work with a horse, they assess that class and train accordingly. For the fans, training is like practicing. Horses are trained almost every morning, when they are taken to the racetrack to walk, jog, gallop or workout, depending on their schedule. Workouts are the most noteworthy part of the training regimen. Shorter workouts (those a half mile or under) are designed to increase speed, while longer ones build stamina. As with any athlete, horses experience physical problems. This is where the keen eye of an experienced trainer can significantly affect a horse’s career. Racehorses are by nature delicate, and by closely watching for and treating injuries before they become serious, the trainer will save his horse, owner and himself a lot of problems. For medical problems, trainers call in their veterinarian. At all racetracks, there are a group of vets who, usually working out of their vehicle instead of an office, travel through the barn area taking care of their clients’ horses day to day needs. After all of this, the trainer still has to select the races in which the horses will compete. Trainers use the condition book, created by the Racing Secretary, to select the type of race for each horse in the stable. For example, if the horse has yet to win, it would be entered in a â€Å"maiden† race against other non-winners. An old horsemen’s adage is to, â€Å"keep myself in the best company and my horses in the worst†. Easier said than done, but some trainers have the knack. For the bettor, it is essential to watch the trainers and see which ones are the most successful. The track program has a stats page for trainers, with all the information needed evaluate when they are most successful. Knowing the trainers and being able to pick up on their hot and cold spells is a top priority in making winning selections at the track. The trainer will contribute to the race horse shelter every time a thoroughbred race horse is registered as a racing horse. This fee, of $100. 00 is collected by the race track and sent directly to the shelter to help with the costs of providing food, shelter and medical care for the horses. The fee will also provide the necessary salaries to the members of the team. The Jockeys Jockeys generally get their mounts in races when the horses are training each morning. A jockey employs an agent, who, working for a percentage of their rider’s winnings, tries to secure the best horse for them in each race. The tricky part for the agent comes when several trainers want their rider for the same race. Now the jockey’s agent is like any bettor – they are handicapping the horses and putting their rider on the most likely winner. Riding atop a Thoroughbred at speeds up to 40 miles per hour for a mile or more requires tremendous athletic ability and concentration. The best jockeys are skillful strategists and superior gamesmen. They are experts at bringing out the best qualities of their mounts. Top riders are also familiar with the characteristics of many other horses in the race. In addition to the athletic demands of racing, a jockey must maintain a certain weight for riding, normally between 100 and 115 pounds. Strict dieting and conditioning programs are a constant concern for most riders. The jockeys will be desired as caregivers and exercisers for the horses residing at the race horse shelter. The jockeys will be a salaried employee of the team. Many jockeys have a hard time finding employment after their racing careers are over. The race horse shelter will provide employment for these retire jockeys. Racehorse Industry The racehorse industry has been demonstrating positive levels of success and has had a considerable impact on the market overall. A 2003 summary report provided by the Louisiana State University summarized the successes and contributions of the horse industry as follow: â€Å"The race horse industry is composed of 1,178 breeders who own 10,161 mares that produced 5,971 foals that were sold in 2003 for $35. 8 million. These breeders own 1,977 stallions that were bred to 5,313 mares, generating income from stud fees of $13. 3 million. The total income generated from racehorse production was $49. 1 million. An additional 2,229 racehorse owners owned 10,903 racehorses in training or on the track at a value of $109 million. The impact of racehorse owners and breeders’ activities in 2003 was $158. 1 million. The show and competition horse industry (horse shows, barrel racing, cutting, roping, team penning, etc. ) is composed of 2,600 breeders who own 7,847 mares that produced 4,901 foals that were sold for $14. 7 million. These breeders own 718 stallions that bred 8,351 mares, generating $12. 5 million in income from stud fees. The total income generated from show and competition horse production was $27. 2 million. Another 4,634 owners compete on their 14,901 horses valued at $59. 6 million. The total impact of the show and competition horse industry is $86. 8 million. A large portion of the horse industry is recreational. The horse is used for comfort, exercise and enjoyment. About 20% or 8,570 of the recreational horse owners bred 21,554 mares and sold 11,392 foals in 2003 for $17. 1 million. These horsemen own 933 stallions that were bred to 5,924 mares, generating income from stud fees of $592,400. The total income from production in the recreational horse industry was $17. 6 million in 2003. Another 25,453 recreational horse owners have 61,366 horses valued at $61 million. There are 129,022 registered horses in Louisiana, owned by 45,331 horsemen. These horses are valued at $324 million. An additional 70,000 grade and other equines are owned by 25,000 people who have a $210 million impact on the economy. In addition to the value of horses produced and maintained in Louisiana, the activities of the horse industry generate a tremendous cash flow. The four racetracks employ 3,000 people and generate expenditures of about $1 billion per year. The show and competition industry conducts an estimated 500 activities per year and generates $12. 5 million in expenditures. With the value of horses, expenditures on horses and the activities in which they engage, the impact of the horse industry is estimated at $1. 6 billion per year. † (LSU, 2003). Apparently, the industry is heading in a positive direction. However, there needs to be better regulation of the industry, particularly in the development of appropriate business ethics to govern those involved in the industry. Sensible business ethics are one of the keys to organizational success. As a corporate strategy businesses involved with horses should lobby for effective legislation to protect the consumer, the business owner and the horse. In the U. K. , for example, all horses are required to possess a passport according to a legislation that came into effect on 31 December 2003. Other European countries have similar requirements. Even though horse owners previously registered horses this was on a voluntary basis for horses born after 1 January 1998. The new requirement ensures that all horses, particularly those specifically reared for the purposes of slaughtering and consumption, have a passport containing a history of veterinary medicines so that certain medicines do not pass along the food chain to humans. This requirement is also a more effective way of controlling over breeding in certain areas (Defra, 2002). Policies such as these are useful guidelines for conducting business so that managers adopt correct strategies in all aspects of the industry. Organizations must provide these business ethics and rights to employees (as well as to the livestock of the agriculture or farm industry) to safeguard their needs, to maintain friendly working environment, and to provide boost to a certain industry. Managers cannot anticipate that there will not be challenges in implementing certain principles that will contribute to eventual organizational success. Jonash (2005) warns that business owners need to be willing to face the challenges that go along with difficult business decisions and strategies. He holds that achieving short, medium and long-term success is not easy. He suggests that managers accept the reality that there are no quick fixes to organizational problems and thus should be willing to follow through with tested and proven strategies even if the implementation process seems difficult. The above-mentioned statistics show clearly that this system is working very well in the US and can even improve if the overall racehorse industry follows proper policies and procedures. Slaughter Industry History Slaughterhouses slaughter, for consumption, horses which have outlived their usefulness, or are in poor health condition. The history of horse slaughter houses can be trace back from the 8th century when Pope Gregorio III declared that the consumption of horse meat for food is an abominable act (Martuzzi et. al. , n. d. ). He also declared the people eating it as unclean people. However, until today, the use of horse meat is rampant. Customers who use horsemeat in their diet purchase the slaughtered meat in large quantities (House of Commons Hansard, 2002). Horses are slaughtered for meat and sold in France, Belgium, Holland, Japan and Italy. This mainly originates from the horse slaughtering houses that are widely distributed in Europe and in America. It was in 1928 when the selling of horse meat was strictly prohibited. However, the eventual abolition of this law may be the caused of the emanating horse slaughtering houses. During 1995-2000, the number of horse slaughtering houses along with horse consumption increased. It was only in 1999 when a decrease in the trend was observed and this was mainly caused by BSE, a disease that can be obtained from eating animal meat. More recently (2005), â€Å"around 100,000 horses are slaughtered each year in the United States alone †¦ to be slaughtered† (Meszoly, 2006). Among this large number of horses, 20,000 were exported alive to their countries. These countries include Japan, Mexico, and Canada (Reeves, n. d). In line with the rampant case of horse slaughtering houses, the American Horse Slaughter Prevention Act was established. Its primary goal is to end the slaughter of horses for human consumption. Most recently, it was on August 2, 2007 when an amendment to the 2008 Agriculture Appropriations bill was approved. This is another move to stop the act done by horse slaughtering horses, to remove its history, present deeds and future acts. Humane Society History The word humane means merciful, sympathetic and benevolent. (HSI Europe, 2008). The humane society is a collective effort of an association to ensure that feelings of mercy and benevolence spread among the local people not only towards their fellow humans but also towards all the â€Å"living beings† around them. These living beings include a whole range of animals, birds and at times even plants. Most recently altering the gene of animals through genetic engineering for the purpose of mere experimentation are also taken into serious consideration by the modern humane societies. Humane societies aim to prohibit in-humane and brutal behavior towards other humans and animals. Today humane societies for animal protection are specifically called â€Å"societies for the prevention of cruelty to animals (SPCA’s)† (HSI Europe, 2008). Brief Aims and Purposes of Humane Societies The basic aim of most humane societies and SPCA’s, remains to be the prevention of cruelty against animals. If animals cannot voice their own demands and cannot speak up against the brutalities being committed on them, it does not mean that humans should take advantage of them and justify their cruel acts to be correct. Other major purposes include dealing with the problem of shelter, adoption and euthanasia. Euthanasia (bringing about an easy death) is carried out in order to deal with the problems of unwanted animals in a community and prevent conditions of overcrowding in animal shelters. However, some SPCA’s have a no kill policy. This nevertheless does not mean that euthanasia is completely avoided; it means that it is used only very rarely in serious situations. On the international and national front many organizations fight for the rights of wildlife and work animals which face extremely harsh treatment from poachers, smugglers, hunters and other people who kill or use animals merely for economic gain and people who employ animals to work for them. History of Humane Societies United States of America: Though England was possibly the first known country to have set up a humane society, other countries like USA, Canada, Australia and New Zealand were quick to follow. Henry Burgh founded the first humane society of USA in 1866 in New York, known as the â€Å"American Society for Prevention of Cruelty to Animals (ASPCA)† The Humane Society of the United States, American Humane which was founded in 1877 as a network of local organizations to prevent cruelty to children and animals (HSI Europe, 2008). Many other local organizations were set up and worked with similar objectives such as, animal safety, providing sanctuaries and possibilities of adoption for animals and dealing with the problems of unwanted animals through the controversial process of euthanasia or otherwise through a â€Å"no kill† policy (HSI Europe, 2008). No kill actually means minimizing euthanasia so that it is only used under certain circumstances. United Kingdom: The first ever humane society was set up in England, known as the Royal Humane society founded in 1774 A. D. (HSI Europe, 2008). It was a charitable organization which awarded people for acts of saving human lives or restoring human lives by resuscitation. Following the steps of Royal Humane society, the Glasgow Humane Society was founded in Glasgow, Scotland in 1790. Since then it has been acting as an organization for the† prevention, rescue and recovery group set up for Greater Glasgow, Scotland (HSI Europe, 2008). An organization especially for animal rights was founded in 1824, known as the â€Å"Royal Society for Prevention of Cruelty to animals (RSPCA) followed by Scottish Society for Prevention of Cruelty to animals (SSCPA) and Ulster Society for Prevention of Cruelty to animals (USCPA). An organization for treating animal illnesses and injuries of wildlife and the pets and working animals of the local poor people, known as the People’s Dispensary for Sick animals was founded in 1917 (HSI Europe, 2008). Canada: The Canadian Federation of Humane Societies is a federation which represents as whole around 123 humane societies all over Canada. However, in 1869 in Montreal the first ever humane society of Canada was set up, known as the Canadian SPCA (HSI Europe, 2008). Australia: The first Australian SPCA was founded in 1871 in Victoria based on British RSPCA. Later, other such organizations were built in other states like in Tasmania in 1872, New South Wales in 1873, Queensland in 1883 and Western Australia in 1892. Though they were warranted the Royal Warrant in 1956, they had no connection with the RSPCA in the UK. For the purpose of voicing their desires in the federal government regarding animal issues, Australian RSPCA was founded in 1981 (HSI Europe, 2008). New Zealand: In 1882, in Dunedin, the first SPCA of New Zealand was set up. Other such organizations were formed in quick succession. Later they all combined into a union known as the Royal New Zealand Society for the Prevention of Cruelty to Animals, to work for unified goals and objectives (HSI Europe, 2008). International: Many SPCA’s are also running successfully on an international scale, mostly in European countries. Humane Society International HSI is one such example of an eminent US based SPCA working successfully in Europe since 1990 (HSI Europe, 2008). Non Profit Horse Rescue History At present, there are many non profit organizations for horse rescue and all of them share the same goals and objectives. These organizations’ main goal and mission is to provide rescue, rehabilitation, foster care, and have a positive environment for those horses and equines that have either been abandoned, abused, unwanted, mistreated, neglected, tortured, retired, or are at risk of going to slaughter. Each non profit organization for horse rescue has its own history. Long ago, horses and equines were used for transportation. In 1950’s when motorized vehicles were becoming more practical and affordable, horses were replaced as means of transportation by these lower maintenance and faster vehicles. Because of this, many horses were abandoned and neglected and were being sent to slaughter. Thus in 1952, a non profit horse rescue organization called HorseWorld was established to take care of the many working horses whose jobs were taken away and replaced by the motorized vehicles (HorseWorld, 2008). Many wild horses or mustangs or more accurately termed as feral horses freely roam on public lands in several states of America like Arizona, California, Idaho, Nevada, and Wyoming. However, the numbers of mustangs were declining as time passes. Mustangs are horses whose ancestors were domestic horses that first arrived in America with Christopher Columbus on his voyage in 1493 (Lifesavers Inc. , 1997). Many of these domestic horses were freed or escaped from early explorers, native tribes, etc. to become free-roaming horses all across America. In order to protect and rescue these horses, the Wild Free-roaming Horse and Burro Act was passed by Congress in 1971 and many non profit horse rescue organizations have come out to protect, manage, and control wild free-roaming horses on public lands. One of these organizations is the Lifesavers Wild Horse Rescue. There are many other non profit organizations that protect and rescue not only horses but also dogs and cats from dangerous situations. The important thing is that these organizations give a chance for these animals to have a better life. This reflects how these animal rescue organizations give value to the rights of animals to safety and just treatment. The equine rescue also provides a better option rather than horse slaughter. The fact that most of the rescue facilities are privately owned and mainly rely on donations may pose a challenge the implementation regulations lay down. This means that horses should not just be sent to slaughter just because they have lost their usefulness. The termination of these horses may be termed as a better option instead of heaping the animals in a rescue facility. Problem Statement This study is designed to assess the need to provide an alternative to sending race horse to slaughter, if the horse can be rehabilitated and have a successful purpose in life. The study includes a survey to the population of, breeders, trainers, jockeys, and race track owners. The survey consists of both qualitative and quantitative questions. The primary objective of the survey is to determine the need for optional resources for the race horse that can still have a viable life outside if the racetrack. Horseracing and the slaughtering of horses are two key industry areas involving the use of horses and both private and public sector corporations have some amount of share in either industry area. As with any other animal group it is no surprise that there is a continuing debate on the ethics of both horseracing and horse slaughtering for consumption. These twin industry areas have been the targets of concerns raised on the ethic of slaughtering horses, particularly those that would have previously been used in the horseracing industry but which are no longer of further use to their owners for a variety of reasons. These horses may be diseased, injured or ill and have little prospect for future recovery. To ensure that they do not suffer a complete loss, owners of racehorses sell these unwanted horses to slaughterers. Some people are totally against the slaughtering of horses. In America and European countries, horsemeat is comparable to the meat of other large animals such as the buffalo, goat, sheep, pig and others. Since people throughout the United States and Europe desire to have horsemeat as a part of their diet then naturally, the slaughter industry too has its own place. Thus, while persons object to the slaughtering of horses, there are those who have little or no objection to the consumption of horsemeat. Similarly, there are objections to the use of horses for racing because of the reported cruel treatment of these animals and their injection with dangerous substances and steroids to enhance performance. This is a very sore issue in the horse industry. Even sorer is the slaughtering of these horses when they are no longer profitable in the horseracing industry. This debate is challenging the viability of the equine industry, putting industry shareholders in an uncomfortable position. Both the racehorse and the slaughtering industries are producing at their full capacities in the US and the rest of the world. Like any other business these industries whether private or public need to adopt sound business management strategies through appropriate training so as to be good in business and to provide the best service to buyers and consumers. The care and the right use of horses is also the matter of concern. The primary use of horses is for racing. However, one cannot avoid the fact that the slaughterhouse, rather than the racecourse, becomes the home for horses unfit for racing. Every year, the number of unfit horses increases thus the number of slaughterhouses also increases. Slaughter industries in the public and private sectors purchase the unwanted horses. Traditionally, the hunter-jumper market has acquired most former racehorses that have no signs of muscular-skeletal abnormalities, and some use previous standard-bred racehorses for driving carriages. Horses that obtain career-ending injuries are not useful anymore for the owners and fall into the category of unwanted horses. Figures produced by the U. S. department of agriculture reveal, however, that the majority of horses slaughtered (92. 3%) are quite healthy and not, in fact, neglected. An overwhelming majority of Americans and members of Congress oppose slaughtering horses for human consumption (HSUS, 2007). One of the options in dealing with these unwanted horses is for slaughtering and distribution for consumption. The precise number of horses that make up this category of unwanted is unknown. However, some research reveals that 100,000 horses fall to slaughterhouses each year in the USA. The real number of unwanted horses is much higher than that reported. Horses used on farms are costly to owners, specifically maintenance costs for food, wastage disposal and land use. The slaughter industry appears to be the most attractive option in dealing with these horses.