Tuesday, January 28, 2020
The Perimeter Network Security System Computer Science Essay
The Perimeter Network Security System Computer Science Essay As like in the real life, securing the borders are the first level of defense to protect the internal network of an organisation. The purpose of this report is to design a perimeter network security system that will provide security enhancement on the existing network infrastructure of Napier University. Network perimeter is an important line of defence in an enterprise network and every organisation has this perimeter network. Perimeter network is where the internal network meets the border network. The main security architecture using this potential area of the network is firewalling. Here this report discusses the egress and ingress filtering of packets by the firewall in order to let the bad traffic out of the perimeter and allow only the good traffic to trusted internal network. One of the core ideas behind the securing the network from outside threat is to develop and implement multiple overlapping layers of security solutions with different security components like Firewalls, VPN, IDS/P and Proxying. Though there are no single security solutions to protect the university network, multiple layers of perimeter security solution will provide maximum available protection from both outside and internal threats. (Watkins, 2011) The design considers hardening of network devices by striping down unnecessary protocols and services and manages the security perimeter from a management network for proper monitoring and mitigation. The main challenges to design and implement a perimeter security is to determine the proper firewall design, as Perimeter firewall and border routers are key components that decide the security to internal network. Most modern day attacks are happening in the Application layer and filtering in this top layer is extremely important for a successful security design. An enhanced packet inspection with proper monitoring and reporting is required throughout the end points of the network to block the malicious traffic from in and out of the network. There are number of ways and techniques involved in designing a perimeter security and this design proposes the specific solutions to the security threats in a campus wide network than in a highly complex enterprise network. 1 CSN11111 Perimeter Network Security System 10800584 RESEARCH AND DESIGN (25/ 1000 words) Security is not a product but a process. Network security depends on multiple components, policy and procedure to enforce the best practices on systems, people and infrastructure (Michael E. Whitman, 2009). The basic idea of information security is to protect the three fundamental components of information security that are Confidentiality, Integrity and Availability. Perimeter security design follows this principle to protect these components by using various security components. The design of the perimeter security depends on what resources need to be protected and the business need. SECURITY ARCHITECTURE The main design of the security architecture consists of segregating different zones in a network. These zones have different levels of security trust levels that allow or deny traffic. This layered architecture will provide the University to keep out of attackers (the term attacker is used in this report and not hacker, as an attacker is a hacker with a malicious intent and not all hackers are malicious intent). In the enterprise network, the network is divided generally into three zones and these are Border Network, Perimeter network and internal network. The perimeter security consists of border network and perimeter network as shown in the picture. Each of these considered as single entity against potential threats. In a network perimeter has many points where an effective security policy should be established. The network perimeter is the most important points of security against 2 CSN11111 Perimeter Network Security System 10800584 external threats. Many types of security can be implemented like packet filtering, intrusion detection systems/prevention and anomaly detection etc. Border Network Border network is the Internet facing zone via a border router (Edge router) that provides an initial layer of protection against all the starting point of attacks. It is most likely an IDP (Intrusion Detection and Prevention) System to be placed to create an extra layer of security. The border router will allow the traffic as per the Ingress and Egress filtering rules set on the router. Apart from protecting the outside threats these edge router and IDP also help to reduce the network load on the perimeter firewall by filtering spoofed traffic out of reaching to the perimeter firewall. Egress filtering helps to prevent specific types of traffic going out of the University that may be some confidential information or can an attacker plant traffic from a payload. A common rules used in the border router is to filter out the ICMP traffic to avoid the probing of network infrastructure. (Dailey, 2009) Perimeter Network Perimeter network sits in between the Border network and the trusted internal network often referred as DMZ. A Perimeter Firewall is the main component to filter the traffic to DMZ and passes the traffic to internal network. This firewall allows traffic from outside the network to servers like Web server or Email Server and also allows a limited access from the internal users. 3 CSN11111 Perimeter Network Security System 10800584 Perimeter firewall allows the filtered traffic to internal firewall where traffic is further scrutinised by the set of rules according the security policies of the organisation. These firewalls are commonly uses the stateful inspection technology where the states of legitimate traffics are stored in the firewall cache. Only traffic matching the states of the connection is allowed and others are dropped. REQUIREMENT ANALYSIS When designing a secure network there are number of factors are taken into considerations. Security is not just a technical issue but a business issue. The goal is to make sure a balanced approach towards the requirements in general. The general security requiement is to provide the services according to the CIA triad of the information security. Apart from these there are also factors like budget, existing infrastructure and scalability. Other factors also constitute the decision making of a proper design are reduce cost, employee productivity, avoid business down time, comply with industry standards etc. SECURITY THREATS This section discusses the better known attacks and the reason behind using perimeter security as first line of defense. Attacks can be devided into external attacks- coming from the internet and internal attacks- coming from the internal network. Information Gathering is the first method an attacker try to get the maximum informaiton about the network architecture. 4 CSN11111 Perimeter Network Security System 10800584 The external attacks are from the simple probing of the network to DoS( Denial of Service Attacks). An insider attack considers one of the major threats to any perimeter security design. These attacks may come from a mischievous user to a disgruntled employee who wanted to grab confidential information or to steal company secrets like financial data, personal information etc. A well configured internal firewall along along with the perimeter firewall can be the good level of defense against these attacks Other types of attacks inlcude intrusion packet sniffing, IP spoofing and DoS attacks that poses a direct threat to the organisation. Application layer security is one of the important design area to be take care of. Well known attacks like SQL injection are of these types. These exploits the known or unknown vulnerability on a web server or database server in order to gain the unauthorised access to the internal network. DESIGN The design of each of the security zones for the Napier University may be different but as whole these components acts together to provide a common goals by protecting the perimeter. It is important to understand where the perimeter of the network exists and what technologies are used against the threats. Perimeter security is handled by several different technologies including border router, firewalls, intrusion detection sytems and prevention systems, VPNs. Border Router The border router sits in the border or the edge of network where there is a direct interface to Internet. It acts like a traffic policeman, directs the traffic in or out of the network and also block the traffic which are not allowed to. The border router will do a NATing to provide this feature. This will give the outside network to probe the internal network. Although these routers are do not act like a firewall, it helps to protect the very first line of defense. Firewall 5 CSN11111 Perimeter Network Security System 10800584 A firewall is an active device that job is to permit or deny the data packets as per the rules set or the states of the connection. Perimeter firewall is the center point of defense against all the threat that coming to internal network. Firewall can be software based or hardware based hardned for the filtering of packets. The proposed perimeter security can be stand alone or multiple layers that combined with other security devices like IDS, IDP and VPN. A static filter firewall is the common and simplest firewalls. These firewal allow or block traffic based on the packet header. A perfect example is blocking of Spoofed IP traffic. The main advantage of this type is that I has a very fast throughput but the down side is this firewall block already established connection which may be malicious intent. On the other hand the stateful inspection firewall is the best way of defending the maliciuos attacks. Stateful inspection firewall keeps a copy of the state of each connection so that the traffic will be allowed or denied according the states in the state cache maintained in the firewall. The disadvantage of using this firewall is slow traffic coming out of the firewall as invidiual packets need to be verified and checked with the cache table. Another firewall which is effective against the application layer attacks are the Proxy firewalls. Since the most modern day attacks are pointed against the application protocols the stateful or stateful firewalls will not block the malicious traffic coming to/out of the network. A proxy firewall acts in the middle of the internet and private hosts and the proxy by acting on behalf of the host. The filtering rules are applied in the application layer. The ruleset or signature can be created according to the latest threats. Because of the huge number of traffic these firewalls considered the lowest throughput than any other firewall but top end in droping unwanted malicous application layer traffic. A web application filter and a spam filter are the example of a proxy firewall. DMZ A DeMilitarized Zone or DMZ is the separate zone from the perimeter firewall between the external network and trusted internal network. The public internet facing servers like Web servers, email servers are placed in this area because the DMZ is considered the the most sensitive area with high security stance. The firewall restrict the traffic in this zones in order to avoid the potential threats that may come into the internal 6 CSN11111 Perimeter Network Security System 10800584 network. The network inside this zone cannot initiate a session to the outside world unlcess it is a reply to an incoming connection. Intrusion Detection Systems (IDS)/ Prevention systems (IPS) An intrusion detection system or prevention system works in sync with the firewalls by providing a coming security goal of blocking unwanted traffic and notify any event that pop up in the network or host. IDS anlayse the packets for any suspicious activity and alerts the administrator. An IPS will prevent these activity by droping apart from the detection the same way IDS does. IDS and IPS have extensive rules set or singnatures of malicious activity which matches the incoming or outdoing traffic when in operation. One disadvantages with the IPS or IDS is that it may alert an legitimate traffic which considered false positive. A proper configuration of these devices is required in order to kept the false positive minimum as some times this will be a menace to handle too many logs with many thousands of false positives. A host based IDS also provide the security administrator with alerts against he malicious activity destined against a particular server like in Database server. VPN Virtual Private Nework (VPN) establish a secure remote connection to the private network by creating a secure virtual tunnel through the public untrusted network. VPN provides perimeter security by ecrypting the data in the tunnel and establish a secure connection over the internet. VPN considered to be the potential threat when an attacker comprise the tunnel as the traffic cannot be verified by the IDS or IPS because of the encrypted pakcets it uses for communication. An SSL VPN with an end-to-end VPN can be the best possible way to stay the attacker out of the network. A perimeter security design is incomplete without a proper firewall policy and an organisation wide security practices. For example if an administrator keep a weak password for these devices or any hosts in the network can nullify the entire effort put on designing a perimeter security. These security policy should also be applied to 7 CSN11111 Perimeter Network Security System 10800584 systems, and users as there needs to be a minimum level of secure access policy with proper Authentication, Autherisation and Authentication(AAA) methods. http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00808bc994.shtml Management Network Management and logging is the most important aspects of a perimeter security. This network has the high security stance as all the administrative access are controlled in the management network. An attacker can take direct access by accessing the management network. The traffic to management network to be encrypted to avoid any possible attack on the internal network. For example to access the IDS, ISP and or routers to be through a secure shell, or SSL, or a https access. Log monitoring is another important aspect of a perimeter security like keeping the IDS and IPS logs or firewall logs. Log files can help to identify the probable attack on the internal or malicious activity originating from the internal network. Another possible thing to do to harden all the security devices destined to do only services that (Convery, 2004). IMPLEMENTATION (20/ 800 words) Building a perimeter security system consists of bringing different security technologies explained in the previous topic; together for a common goal-to protect the internal network from external or internal threats. The router and firewall separate the public untrusted network from the internal network, the IDS/IPS monitors all traffic, and the VPN provides remote access. All of these components together form a defense in depth security in a perimeter. Figure xxx shows the outline prototype of the proposed design. 8 CSN11111 Perimeter Network Security System 10800584 authentication server-dmz One of the first best practices before the implementation is to develop a firewall policy. The policy mainly defines the security trust levels of each zone in the network and the flow of the data traffic. The flow of data traffic is one of core in implementing the organisation wide security technologies. Perimeter firewall is the centre point in this prototype. This firewall is a stateful inspection firewall and manages traffic from external and internal network. This firewall is a closed security stance by blocking all traffic except those required for the University network. 9 CSN11111 Perimeter Network Security System 10800584 The figure - above shows how the data flows through different layers of security first where the first line of defense is border router. This multiple layers of security filter the bad traffic in different layers in the network. The first level of defense is border router with a backup from the NIDS. This can be implemented by enabling basic packet filtering rules and Access Control Lists. Blocking the IP Spoofing and ICMP traffic are the examples. This outline NIDS will detect the any unknown behaviour in the traffic, which will be alerted to the administrator through management network. In some cases border router may not required as the perimeter firewall it self can handle the security threats but that depends on the business decision like cost and availability. Diagram for flow of trafficà ¢Ã¢â ¬Ã ¦ As shown in the figure the data flow in the perimeter firewall. Perimeter firewalls allows or deny traffic as per the ingress and egress filter rules. Almost all the traffic coming to the internal network will be blocked by firewall and only allow as per the egress rules. The exception for this rule is for VPN clients and the VPN uses the encrypted tunnel and the VPN server is inbuilt in the Firewall itself. The Perimeter firewall also allows ingress traffic to DMZ zone but drop traffic originates from the webserver other than the reply to the already established connection. DMZ is the least trust level and this is why DMZ is isolated from other network zones. The internal network is allowed to access the Internet and Intranet through a proxy server in the DMZ zone. A web filtering software in the Proxy server can be implemented to filter out the unintended malicious URLs and links. The DMZ also has an inline NIPS in order to defend attacks against the application level threats like DoS attacks. The in line IPS behind the Perimeter firewall act like a sub-cop to check the malicious activity originating both from external and 10 CSN11111 Perimeter Network Security System 10800584 internal network. Internal threat may come from a disgruntled employee or a malicious traffic from a Trojan program or a zombie for a possible DDoS (Distributed Denial of Service) attack by a hacker (black hat off course!) harvested by using techniques like social engineering. The table explains the detailed egress and ingress rules on the Perimeter firewall. TRAFFIC TYPES INGRESS EGRESS ALLOW HTTP/S Request, DMZ Allow ICMP DMZ Deny Email (SMTP) Request DMZ Allow Email (Exchange RPC) DMZ Allow All Other Traffic DMZ Deny HTTP Reply DMZ Allow SMTP Reply DMZ Allow Exchange RPC Reply DMZ Allow All Other Traffic DMZ Deny ICMP (depends on policy) Internal Network Deny Remote VPN Connection Internal Network Allow All Other (Including from DMZ) Internal Network Deny Proxy Server (Port 8080)- Internet Internal Network Allow Email Server Access (DMZ) Internal Network Allow ICMP Internal Network Deny All Other Traffic Internal Network Deny Management network in the proposed diagram is one of the top security trust level where the management of all the security devices can be done. Log analysis, Secure tunnel access to routers, firewalls, IDS/P are all done in this network. The trusted servers in the internal network are protected with an internal packet filter firewall with only few of the protocols and ports are allowed. This will give the server farms with highest level of security. The staff and student networks are segregated with VLAN, as staffs should have access to student network but not vice versa. VLAN separate the traffic like a router and this will be important when considered in a University network. 11 CSN11111 Perimeter Network Security System 10800584 Both staffs and Students can have access to trusted servers through the internal firewalls. The NIDS is also monitor any suspicious event and alerted. The other Host based IDS and personal firewall in each of the workstations provides an extra layer of security. So the proposed design with a defense-in-depth can be implemented to enhance the existing infrastructure of the Napier. TESTING AND EVALUATION (25/ 1000 words) 12 CSN11111 Perimeter Network Security System 10800584 CONCLUSION (15/ 600 words) Unifiied threat management Appliance emerging cobbà ¢Ã¢â ¬Ã ¦. One persons good enough is another persons never! Bandwidth for authentication is trivial in any case I can think of that doesnt include downloading extremely large biological mappings of the authentication target. As far as security measurements, I dont know what yard stick youre using, but strong on-host, per-host authentication works well when you have a trusted path, everything else is a usability or management compromise, I dont think Id tout them as security features. Placement of authentication server Placement of internal firewall. http://www.sans.org/reading_room/whitepapers/firewalls/achieving-defense-in-depth-internal-firewalls_797 he single, authenticated/anonymous, and individualized DMZ designs are all secure designs that provide the best protection for various network sizes. The single DMZ is respected for its simple design which separates itself from a private network. The authenticated/anonymous DMZ classifies servers and the data they protect in order to segregate servers that need strong access controls from the ones that do not. The 13 CSN11111 Perimeter Network Security System 10800584 individualized DMZ gives the greatest security for a mature network, but also has the highest setup and maintenance costs. All of these secure DMZ designs are susceptible to a poorly configured server which can allow a criminal access to a data store or worse, the entire private network. In a nutshell, theres no such thing as absolute security. How much you invest in firewalls should be a function of how much you have to lose if an attack is successful. (reword) You probably heard a number of so called security experts claim the perimeter is dead because it is not effective at blocking attacks. Nothing cluld be further from the trust. Its true that attacks have become far more complex. The concern is no longer simple port scans. What we need to do however is enhance our posture, not scrap useful technologies. To be fair however, its not just the perimeter that is having the problems with modern attacks vectors. Tools like metasploit have reduced the time of exploit development from days to minutes. Networks are being spear targested with Malware which goes undetected by their Antivirus software, in some cases for as long as two years. Attackers have figured out that they do need to completely defeat forensics, they just need to make it difficult enough that it is no longer cost effective in a CFOs eyes to fully analyse the comprosmised system. So the true problem is attack technology is advancing and we need to keep up. Sometimes this is finding new security technologies and sometimes its by retasking the ones we are already using. To draw a parallel, think of what has happened with the common automobile. 40+ years ago a tuner could tweak more power out of an engine with a simple toolkit from sears. Many of those old times tuners will tell you that engines are now too complex t work on. T o the modern tuner however who is willing to add things like OBD-II adapters and laptops to their toolki, the payoffs are huge. Power levels that used to equire huge V8 engines can be produced in tiny four cylinders with as much displacement as half gallono fmilk. 14 CSN11111 Perimeter Network Security System 10800584 https://ondemand.sans.org/b20080814/viewer.php?mode=2lo=7652moduleid=530 7pos=0hint=1#viewer Properly configured firewalls and border routers are the cornerstone for perimeter security The Internet and mobility increase security risks VPNs have exposed a destructive, pernicious entry point for viruses and worms in many organizations Traditional packet-filtering firewalls only block network ports and computer addresses Most modern attacks occur at the application layer 15 CSN11111 Perimeter Network Security System 10800584
Sunday, January 19, 2020
Tension in Arthur Millerââ¬â¢s A View From The Bridge :: A View from the Bridge Arthur Miller Essays
Tension in Arthur Millerââ¬â¢s A View From The Bridge The whole of this play involves symbolism, on many different levels. The end scene, in which Eddie takes his own life with his own knife, is symbolic of the self-destructive nature that led to such an ending. As Arthur Miller wished to write 'a modern Greek tragedyà ´ it is likely that the symbolism of the dagger is Eddieââ¬â¢s sexuality, which drove him to his drastic actions and eventually death. During the confrontation earlier in the play Marco raised a chair like a weapon, symbolic of the fight yet to come. Rudolpho danced with Catherine when she had previously been attending to Eddie, symbolic of him taking her from Eddieââ¬â¢s life. Therefore it seems natural to reason that Miller intended the title of the play to have some significance other than the geography of the location. The most obvious interpretation is of the audience sharing with Alfieri an unbiased overview of the unfolding of events. It is like being able to see from a bridge over a river, our vision uncluttered by opinions as it would be by the side of the river, or perhaps even as part of the river. The spray and swirling of currents of a river could represent the uncertain nature of life that clouds our perceptions and the flow of water the rush of emotions that carry us from birth to death. Though, even Alfieri is not completely removed from the happenings of the play, he takes an active part in the play as well as providing the 'chorusà ´ character of the Greek format that Miller used. He is part of the American culture, but also part of the Italian culture, he also knew the family "I had represented his father in an accident case some years before, and I was acquainted with the family in a casual way." Perhaps this is why he is able to give a balanced opinion and to counsel Eddie (though his advice is unheeded). On the bridge we have time to form opinions, to judge other people, to 'settle for halfà ´. It was his American audience that Miller addressed through Alfieri: "Most of the time now we settle for half and I like it better. But the truth is holy, and even as I know how wrong he was and his death useless, I tremble for, I confess that something perversely pure calls to me from his memory--not purely good, but himself, purely, for he allowed himself to be wholly known and for that I think I will love him more than all my sensible clients." This dilutes the feeling of superiority and detachment that we are
Saturday, January 11, 2020
History of Database Technology and Data Models Essay
Imagine that you own bank and along with that, you own your bankââ¬â¢s credibility to your 100,000 clients. Just writing down each clientââ¬â¢s information in a piece of paper would not be very secure and practical nowadays. Thatââ¬â¢s how an electronic database system comes in the picture. In this fast growing world, a technology like a database system is very necessary for establishments that hold a huge amount of data. However, the development of the current database technology and database models underwent an intricate process before it comes to a full bloom. In 1964, the word ââ¬Å"databaseâ⬠technically denoted collections of data shared by end-users of time sharing computer systems and was coined by workers in a military information system. In addition, around 1960s, private companies started to own computers because of their increasing storage capabilities. Two data models were introduced: network (CODASYL) and hierarchical (IMS) model. During that time, database management systems were unsystematic. There no actual theoretical model about data organization. There was more emphasis on the processing of the records rather than the overall structure of the database system. During the 1970s, many astonishing breakthroughs on databases were witnessed. It was about the 1970 that E. F. Codd proposed a relational model for databases. The presented a system that separates the logical organization (schema) of a database from the physical storages and since that, it has been a standard in the field of computing. The term Relational Database Management System (RDBMS) was coined during this period. Theories about databases had finally made its way to the mainstream research projects. Two main prototypes for RDBMS were created: Ingres that was developed at UCB and this system used QUEL as query language and System R that was developed at IBM San Jose and this system used SEQUEL as query language. Meanwhile, in 1976, P. Chen suggested the Entity-Relationship (ER) model for database design which was proved to be vital in conceptual data models. This proposal enabled the designers to focus more on the data usage rather than its logical table structure. Commercialization of database systems for businesses began during the 1980s as demands for computers boomed. In addition, Structured Query Language (SQL) became a standard for database systems during these periods. DB2 became IBMââ¬â¢s flagship and development of IBM PC paved the way for more database companies and products like Dbase III and IV, Database Manager, OS/2 and Watcom SQL. The network and hierarchical models for database also started to disappear in the background. When the 1990s came, only a few surviving companies began to offer complex products at higher prices. Developments on database systems were more focused on client tool applications such as PowerBuilder (Sybase), Oracle Developer and VB (Microsoft). Some personal productivity tools related to database management were also created such as Microsoft Access and Excel. Some prototypes of Object Database Management System (ODBMS) also arose in the 1990s. It was also during the 1990s that the World Wide Web appeared. Large investments were made by Internet-related companies on Web and database connectors. Examples of these connectors are Active Server Pages (ASP), Java Servlets, JDBC, ColdFusion, Dream Weaver and Oracle Developer 2000. A solid growth of database applications was still observed in the early 21st century. Three companies continually dominate the database market: Oracle, IBM and Microsoft. In the near future, it is generally seen that databases management will be more sophisticated since huge systems (systems with storage measured in terabytes) are currently existing today. Most of these systems are used by most projects with science databases (genome projects, space exploration data). However, the ââ¬Å"next great thingâ⬠on is the usage of XML with Java and other emerging technologies as a way to store data.
Friday, January 3, 2020
Harvest Video Response Core Values - 1288 Words
Jacob Curti Professor Roper Sociology 101 29 January 2017 Harvest Video Response Core Values/ pg. 52: The values that are central to a group, those around which it builds a common identity. Core values were demonstrated multiple time throughout the video. They were demonstrated through the migrant works strong value on the importance of family, hard work, and the urge to try and finish schooling. Zulema, one of the young girls in the video helps her mom pick crops to help raise money for her family. She is only 13 years of age but uses one of her mom s friendââ¬â¢s names to log the number of crops she gathers because she is too young. Victor another young migrant worker of the age of 15 works hard in the field and in the classroom. Theâ⬠¦show more contentâ⬠¦70: An individual who significantly influences someone else. In the video there were many examples of significant others. The bond of family is a very strong theme found throughout the film. These family members are all significant others to each other. They care for each oth er and do as much as they can to make the significant other happy. There are a few scenes in the film that may seem like unconditional love towards each other like bringing their little ones to the field, but more than likely they have no one else to watch them. Migrant workers don t always have significant others there were a few times in the film where they were completely alone. The three main families the film focused on all showed instances where there were significant others were there and served as another form of income for the family. Peer Groups/ pg. 80: A group of individuals, often of roughly the same age, who are linked by common interests and orientations. In the video there are three main children that are focused on, all far behind their peer groups. These children also have hindrances that put them at a disadvantage in the classroom putting them even further behind their peers. This separation of peer groups causes a great deal of depression making it hard for them to catch up or even completely separating them from the others. Without a close peer group making good life choices becomes very difficult. In the video Zulema is interview and she says that she doesn t haveShow MoreRelatedCase Write-Up Apple Inc.: Taking a Bite Out of the Competition1368 Words à |à 6 Pages with the IPOD and with ITunes, and mobile devices, with the IPhone. Apple, Inc. Apple is really involved in two businesses: the computer market and the entertainment and media market. Its approach has been to integrate its new products around its core industry in an effort to construct a digital lifestyle that encompasses not only its line of computers but its new products such as the iPod, the iPhone and online services such as iTunes. Apple Inc. and its wholly-owned subsidiaries design, manufactureRead MoreAnalysis Of The Poem The Harvest 2458 Words à |à 10 Pagesa. Core Values/pg. 51: The values that are central to a group, those around which it builds a common id entity Migrant workers in the United States have to form a basis of core values in their lives in order to justify why they are doing what they do. Migrant workers are some of the poorest treated people in the country in terms of how they have to work, how they are treated in the educational system, and how they are treated in general as a human being. Forming core values causes these people toRead MoreSci 275 Couse Syllabus1980 Words à |à 8 Pagesenvironment and decisions made at local levels based on lifestyle choices, such as those regarding food, transportation, and housing. Post a 200- to 300-word response to the following: â⬠¢ â⬠¢ â⬠¢ â⬠¢ Discuss an environmental problem you feel is significant in your town or city. What are some causes? Are any of these causes related to human values and environmental ethics? Explain your answers. Day 5 30 Week Two: Politics and Environmental Risk Details Objectives 2.1 Differentiate environmentalRead MoreMarketing Trends, Strategies, and Responses at Apple Inc4319 Words à |à 17 PagesMarketing Trends, Strategies and Responses at Apple, Inc. Introduction Given its sustained growth during periods when its competitors have fallen by the wayside or struggled to survive, Apple, Inc. has become the focus of a growing amount of interest from the business community and academic researchers alike. The companys product line includes some of the current best sellers, especially Apples iPods and iPhones which are changing the way many consumers interface with the Internet and each othersRead MoreZappos2964 Words à |à 12 Pages4.0 Marketing mix strategies 5 4.1 Product Strategy 5 4.1.1 Current product/service development 5 4.1.2 Future Service Development 6 4.2 Price Strategy 7 4.2.1 Factors Affecting Pricing Decision 7 4.2.2 Tactical approach 8 4.2.1 Long-run response 9 4.3 Communication strategy 9 4.3.1 IMC objectives 9 4.3.2 Targeting and positioning of the brand 9 4.3.3 Advertising message 9 4.3.4 Marketing and communication strategy 10 5.0 Conclusion 11 6.0 Appendix 12 6.1Situational Analysis inRead MoreAbsolut Vodka Essay2412 Words à |à 10 Pagesand is sold in 126 countries. Absolutââ¬â¢s beautiful ââ¬Å"Anthemâ⬠commercial was the result of a collaborative effort by a group of artists, who created art installations in scenic locations around the world. The art pieces in the commercial spell out the core philosophy of the company, See something different in an ABSOLUT WORLD. ââ¬Å"Anthemâ⬠is a both literal and symbolic manifestation of ABSOLUT VODKAââ¬â¢s belief making it an appropriate name for the campaign itself. ââ¬ËAnthemââ¬â¢ conveys the most fundamentalRead MoreThe Effects Of Music On Deaf People3235 Words à |à 13 Pages: Ever wonder if deaf people can listen to music and enjoy it as much as hearing people do? Well the outcome is certainly surprising, as deaf people cannot listen but perceive music in much more deeper and meaningful ways because theyà canà feel the core vibrations, hence allowing them toà feel the rhythm ofà music and enjoy it just like hearing people do. The perception of the musical vibrations by theà Deafà is likely every bit as real as the equivalent sounds, since they are ultimately processed inRead MoreUnderstanding Marketing Management16709 Words à |à 67 PagesMarketing for the 21st Century Chapter 2 | Developing Marketing Strategies and Plans a Ch ter p 1 In This Chapter, We Will Address the Following Questions 1. Why is marketing important? 2. What is the scope of marketing? 3. What are some core marketing concepts? 4. How has marketing management changed in recent years? 5. What are the tasks necessary for successful marketing management? One of the key factors in Barack Obamaââ¬â¢s victory in the 2008 U.S. presidential election was a well-designedRead MoreBusiness Strategy: Sainsburyââ¬â¢s7299 Words à |à 30 Pagescurrent market trend, operations, and marketing strategies of Sainsburyââ¬â¢s Company. Different models of analysis were employed to clearly understand the current and previous state of Sainsburyââ¬â¢s. Some of these models include SWOT analysis, PEST analysis, CORE analysis, Porterââ¬â¢s Five Forces model, Key Success Factors, and Ansoffââ¬â¢s Matrix These models help in understanding all aspects that play a role for the success and the failures of the company that include its strengths, weakness, opportunities, threatsRead MoreThe Effect Of Music On Deaf Culture And How Has The Music Industry Progressed Through Providing For The Hearing Impaired3881 Words à |à 16 Pagesfindings to current practices in music education programs for hearing-impaired students historically and presently. We also look at the introduction of sign language interpreters in live vocal music performances as well pre-recorded shows and music videos and also how it is being adopted in the music industry. Secondary purposes of the study were to accumulate data of ways in which the music industry has provided for the Deaf Communities by organising concerts and raves for them. Jude Menezes
Subscribe to:
Posts (Atom)