Wednesday, July 31, 2019

Graded Assignments Essay

The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded assignments. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions. Assignment Requirements This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat. Required Resources Worksheet: Match Risks/Threats to Solutions Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 2 Self-Assessment Checklist I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions. Unit 1 Assignment 2: Impact of a Data Classification Standard Learning Objectives and Outcomes You will learn how to determine the impact of a data classification standard on an organization’s IT infrastructure. Assignment Requirements You are a networking intern at Richman Investments, a mid-level financial investment and consulting firm. Your supervisor has asked you to draft a brief report that describes the â€Å"Internal Use Only† data classification standard of Richman Investments. Write this report addressing which IT infrastructure domains are affected by the standard and how they are affected. In your report, mention at least three IT infrastructure domains affected by the â€Å"Internal Use Only† data classification standard. Your report will become part of an executive summary to senior management. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 2 Self-Assessment Checklist I have identified at least three IT infrastructure domains affected by the â€Å"Internal Use Only† data classification standard. In my report, I have included details on how those domains are affected. Unit 2 Assignment 1: Calculate the Window of Vulnerability Learning Objectives and Outcomes You will learn how to calculate a window of vulnerability (WoV). Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows: Windows laptops: Traveling salespeople, remote suppliers, branch offices Windows desktops: Accounting group, developer group, customer service group Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server A security breach has been identified in which the SMB server was accessed by an unauthorized user due to a security hole. The hole was detected by the server software manufacturer the previous day. A patch will be available within three days. The LAN administrator needs at least one week to download, test, and install the patch. Calculate the WoV for the SMB server. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 3 Self-Assessment Checklist I have accurately calculated the WoV. Unit 2 Assignment 2: Microsoft Environment Analysis Learning Objectives and Outcomes You will learn how to analyze a mixed-version Microsoft Windows environment and to identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows: Windows laptops: Traveling salespeople, remote suppliers, branch offices Windows desktops: Accounting group, developer group, customer service group Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories on the following link: http://www. microsoft. com/technet/security/advisory/archive. mspx (accessed September 15, 2010) Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1–2 pages Due By: Unit 3 Self-Assessment Checklist I have identified at least five vulnerabilities for this workgroup LAN? I have identified privilege elevation as a high-priority issue? I have identified and documented at least three vulnerabilities related to the client configurations? Unit 3 Discussion 1: Access Control Models Learning Objectives and Outcomes You will learn about access control models for different scenarios. Assignment Requirements In this assignment, you have a handout on the access control models. Read the handout and discuss it with your classmates to collect answers for the following questions: Select an access control model that best prevents unauthorized access for each of the five scenarios given in the worksheet. Which types of logical access controls should be used in each scenario? Justify your recommendations. Respond to at least two other students’ views to engage in a meaningful debate regarding their choices or to defend your choice. Required Resources Worksheet: Access Control Models Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 3 Self-Assessment Checklist I have correctly selected an access control model that best prevents an unauthorized access for each of the five scenarios given in the worksheet. I have selected the correct types of logical access controls that should be used in each scenario. I have included justifications for my recommendations. I have responded to at least two other students’ views. Unit 3 Assignment 1: Remote Access Control Policy Definition Learning Objectives and Outcomes You will learn how to design a remote access control policy definition for an IT infrastructure. Assignment Requirements Richman Investments is an investment and consulting firm. The company wants to expand its business operations both in the U. S. and in foreign countries. It intends to eventually have 10,000 employees in 20 countries. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, California Montreal, Canada New York City, New York Washington, D. C. The North American offices have a total of 5,000 employees who use desktops, mobile computers, and wireless devices. The Phoenix office has an Internet connection to all remote offices because redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office share application information that is hosted at the corporate office. Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data access. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 4 Self-Assessment Checklist I have correctly designed a remote access control policy for the given scenario. I have correctly selected appropriate access controls for systems, applications, and data access. I have included my justification for using the selected access controls for systems, applications, and data access. Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework Learning Objectives and Outcomes You will learn how to research standards. You will learn how to write Remote Access Standard. You will learn how procedures and guidelines fit within an IT security policy framework. Assignment Requirements You will receive the worksheet entitled Enhance an Existing IT Security Policy Framework. It contains a scenario and an illustration of a portion of a company’s security policy framework. After studying the worksheet, complete the following tasks: Research Remote Access Standards on the Internet. For the given scenario, write a draft Remote Access Standard that will reduce the occurrence of risks, threats, and vulnerabilities in the Remote Access domain of the given IT infrastructure. Make sure you include the minimum remote computer configurations, the use of anti-malware software, and the secure virtual private network (VPN) access in the Remote Access Standard. Indicate the names of procedures or guidelines that you would add under the Remote Access Standard. Required Resources Worksheet: Enhance an Existing IT Security Policy Framework Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 5 Self-Assessment Checklist I have written an appropriate Remote Access Standard, which includes the minimum remote computer configurations, the use of anti-malware software, and the secure VPN access. I have included the names of at least two procedures or guidelines that would appear under the Remote Access Standard in the framework. Unit 4 Assignment 2: Acceptable Use Policy (AUP) Definition Learning Objectives and Outcomes You will learn how to research and compare AUPs enforced by other organizations. You will learn how to compose a portion of an AUP for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define â€Å"the acceptable use of Richman assets regarding Internet and e-mail access,† including the actions that are prohibited. . Then, the employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall AUP. For this assignment: Research acceptable use policies on the Internet. Find the actual policies of real companies. Compare the portions that address Internet and e-mail access of at least three different companies. Create an AUP definition for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 5 Self-Assessment Checklist I have conducted adequate research of AUPs before defining the policy. I have included the appropriate statements that address both acceptable and unacceptable use of the Internet and Web-based e-mail accounts. Unit 5 Assignment 1: Testing and Monitoring Security Controls Learning Objectives and Outcomes You will learn to recognize security events and baseline anomalies that might indicate suspicious activity. You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network. Assignment Requirements Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies. After studying the handout, answer the following questions: Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. Required Resources Worksheet: Testing and Monitoring Security Controls Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1–2 pages Due By: Unit 6 Self-Assessment Checklist I have identified at least two security events and baseline anomalies. I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list. I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities. Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Learning Objectives and Outcomes You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents. Assignment Requirements Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden: No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers No downloading executables from known software sites No unauthorized redistribution of licensed or copyrighted material No exporting internal software or technical material in violation of export control laws No introduction of malicious programs into networks or onto systems No accessing unauthorized internal resources or information from external sources No port scanning or data interception on the network No denying service or circumventing authentication to legitimate users No using programs, scripts, or commands to interfere with other network users No sending unsolicited e-mail messages or junk mail to company recipients No accessing adult content from company resources No remote connections from systems failing to meet minimum security requirements Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate activity. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 6 Self-Assessment Checklist I have defined an effective LAN-to-WAN, Internet, and Web surfing AUP. I have evaluated the implications of each policy. I have carefully considered the benefits and disadvantages of each policy enforcement control. I have proposed strong ideas for acceptable and unacceptable resource usage. Unit 6 Assignment 1: BCP, DRP, BIA, and Incident Response Plan Mix and Match Learning Objectives and Outcomes You will strengthen your understanding of details regarding a business continuity plan (BCP), disaster recovery plan (DRP), business impact analysis (BIA), and an incident response plan. Assignment Requirements In this assignment, you are provided with a handout on the major elements that are part of a BCP, DRP, BIA, and incident response plan. You must properly align the elements with their corresponding plans. Required Resources Worksheet: BCP, DRP, BIA, and Incident Response Plan Mix and Match Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 7 Self-Assessment Checklist I have correctly matched all the elements with the plans. Unit 6 Assignment 2: Quantitative and Qualitative Risk Assessment Analysis Learning Objectives and Outcomes You will be able to analyze real-world scenarios and perform a quantitative risk assessment and a qualitative risk assessment by performing proper calculations. Assignment Requirements In this assignment, you are provided with a handout on a quantitative risk assessment and a qualitative risk assessment. Go through the scenarios given in the handout and answer the questions. Required Resources Worksheet: Quantitative and Qualitative Risk Assessment Analysis Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1–2 pages Due By: Unit 7 Self-Assessment Checklist I have correctly calculated the values for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE). I have determined the effectiveness of the safeguard of buying insurance. I have determined whether or not Richman should buy the insurance. I have supported my choice with an explanation. I have correctly calculated the risk level of each of the risk given in the scenario. I have correctly prioritized the given risks. I have created an effective risk matrix for the given scenario. Unit 7 Assignment 1: Select Appropriate Encryption Algorithms Learning Objectives and Outcomes You will learn how to select the appropriate encryption methods and techniques for real-world business applications. Assignment Requirements In this assignment, you are given a handout which contains a list of the common encryption algorithms and five scenarios. Match the common encryption algorithms with real-world business applications and the requirements for given different scenarios. Give justification for your selections. Required Resources Worksheet: Select Appropriate Encryption Algorithms Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and the methods for the given scenarios. I have justified the selections I have made. Unit 7 Assignment 2: Design an Encryption Strategy Learning Objectives and Outcomes You will learn how to design an enterprise encryption strategy. Assignment Requirements In this assignment, you are given a handout that contains the scenario of Richman Investments which needs an enterprise encryption strategy—a public key infrastructure (PKI) that supports internal employees, external business partners, and clients. You need to design the enterprise encryption strategy for Richman Investments. In your design, include the following: Select appropriate encryption algorithms and methods. Identify and justify the selection of encryption solutions that support internal employees, external business partners, and clients. Required Resources Worksheet: Design an Encryption Strategy Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and methods. I have identified and justified my selection of the encryption solutions that support internal employees, external business partners, and clients. Unit 8 Assignment 1: Network Hardening Learning Objectives and Outcomes You will learn the essentials of network hardening for a given network layout. Assignment Requirements In this assignment, you are given a handout which contains four different network layouts. Your instructor will assign one of the four layouts to you. For your layout, you are required to devise at least three strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure. Support your decisions with your justification. Required Resources Worksheet: Network Hardening Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1–2 pages Due By: Unit 9 Self-Assessment Checklist I have identified at least three network hardening strategies for the given network layout. I have given the justification for my decisions. Unit 8 Assignment 2: Network Security Applications and Countermeasures Learning Objectives and Outcomes You will learn how to determine where certain security countermeasures apply across the seven domains of a typical IT infrastructure. Assignment Requirements In this assignment, you are given a worksheet that contains a list of network security applications and countermeasures. You need to identify where they belong, within the seven domains of a typical IT infrastructure and what confidentiality, integrity, and availability (CIA) function they provide. Complete the worksheet and submit to your instructor for evaluation. Required Resources Worksheet: Network Security Applications and Security Countermeasures Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1–2 pages Due By: Unit 9 Self-Assessment Checklist I have accurately placed security countermeasures within the seven domains of an IT infrastructure. I have identified the portions of the CIA triad affected by specific security countermeasures. Unit 9 Assignment 1: List Phases of a Computer Attack Learning Objectives and Outcomes You will learn how to identify the activities that occur during each phase of a computer attack. Assignment Requirements In this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack. List the general phases of a computer attack. Thinking like an attacker, you should add items to each phase that an attacker would consider when performing a successful computer attack. You can refer to the textbook for this course. Required Resources Textbook: Fundamentals of Information Systems Security Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 10 Self-Assessment Checklist I have identified at least three phases of a computer attack. In my answer, I have included the factors the attackers take into consideration when targeting computers or networks. Unit 9 Assignment 2: Summary Report on a Malicious Code Attack Learning Objectives and Outcomes You will learn how to mitigate the threat of a virus or malware attack. Assignment Requirements Select a well-known virus or malicious code attack, and write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was mitigated. Indicate how you would defend the attack from recurring on a network you control. You may use the Internet for research. Consider the following: The severity of the outbreak The propagation methods and speed The targets of the attack The success rate of the attack vector Additional complexity: self-armoring, self-updating, and so on The ways to defend infection in every domain The ways to defend intrusion at every layer Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 10 Self-Assessment Checklist I have included the following in my summary report: The type of malicious attack How it spread and attacked other devices How it was mitigated I have specified details on how to defend the attack from recurring on a network. Unit 10 Assignment 1: Examine Real-World Applications of Security Standards and Compliance Laws Learning Objectives and Outcomes You will learn to relate a well-known standard or law to real-world applications. Assignment Requirements In this assignment, you are given a handout on security standards and compliance laws. The handout contains a list of international and domestic information security standards and compliance laws. You need to select one and describe its real-world applications in both private and public sectors. Required Resources Worksheet: Examine Real-World Applications of Security Standards and Compliance Laws Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Due By: Unit 11 Self-Assessment Checklist I have correctly described real-world applications of the chosen standard or law. I have included examples in both the private and public sectors. Unit 10 Assignment 2: Small- to Medium-Sized Business Analysis Learning Objectives and Outcomes You will learn how to apply the Payment Card Industry’s Data Security Standards (PCI DSS) standard to a small- to medium-sized business. Assignment Requirements Meager Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Meager Media has stores in several cities across the U. S. and is planning to bring its inventory online. The company will need to support a credit card transaction processing and e-commerce Web site. Write a summary report detailing what Meager Media must do when setting up its Web site to maintain compliance with the PCI DSS standard. Obtain a copy of the PCI DSS standards document from the following Web site and address all 6 principles and 12 requirements in your report: https://www. pcisecuritystandards. org/security_standards/pci_dss. shtml (accessed September 14, 2010) Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 3–4 pages Due By: Unit 11 Self-Assessment Checklist I have presented a detailed plan for creating a PCI DSS-compliant Web site. I have addressed all 6 principles and 12 requirements of the PCI DSS. Project Security Domains and Strategies Purpose This project provides you an opportunity to apply the competencies gained in various units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment. Learning Objectives and Outcomes You will learn the purpose of a multi-layered security strategy. You will understand the information systems security (ISS) fundamentals including the definition of terms, concepts, elements, and goals. You will incorporate the industry standards and practices with a focus on the confidentiality, integrity, availability, and vulnerabilities of information systems. You will fulfill the role of a security professional implementing proper security controls in a specific business situation based on Systems Security Certified Practitioner (SSCP ®) Common Body of Knowledge domains. Required Source Information and Tools To complete the project, you will need the following: 1. Access to the Internet to perform research for the project 2. Course textbook 3. (ISC)2 SSCP ® Common Body of Knowledge available in the SSCP ® Candidate Information Bulletin Project Logistics The project is divided into one smaller and one major assignment as per the details below: Activity Name Assigned Due By % Grade Project Part 1. Multi-Layered Security Plan Unit 1 Unit 2 6 Project Part 2. Student SSCP ® Domain Research Paper Unit 2 Unit 11 15 Deliverables Project Part 1 Multi-Layered Security Plan Introduction The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT is in great need of proper security controls. Scenario Richman Investments is a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, California Montreal, Canada New York City, New York Washington, D. C. Tasks You are a networking intern at Richman Investments. This morning, you received an e-mail from your supervisor stating that you need to create an outline of the general security solutions planned for the safety of data and information that belongs to the organization. You are told that every month, the networking division needs to submit a report to the senior management about the security plan for the month, and this time, your outline will become a part of that report. Therefore, you need to research the elements of a multi-layered security plan and to create an outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure. For this project part, you may use the book for this course and the Internet to research the concept of a multi-layered security plan. Include several applicable layers for the plan, and describe at least one layer of security for each of the seven domains. Project Part 1 should be submitted in the following format and style: Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Self-Assessment Checklist I have included several applicable layers for the plan. I have described at least one layer of security for each of the seven domains. I have conducted adequate independent research for the report. Project Part 2 Student SSCP ® Domain Research Paper Introduction The (ISC)2 SSCP ® is frequently viewed as the first step in an information security career path, leading to the Certified Information Systems Security Professional (CISSP ®) and other advanced certifications. Scenario Continuing the Richman Investments scenario explained in Part 1 of the project, the offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office. The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and reporting purposes. All employees have Internet access. There is no policy on the use of removable media. Several of the branch offices have encountered issues with malware recently. Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners. Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs. Tasks You are a networking security intern at Richman. You have been asked to submit a proposal to Richman senior management. In the proposal, you must choose to address one of the following and relate it to the appropriate SSCP ® domains: 1. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. 2. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form. 3. Based on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code. 4. Based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently, you must research and formulate a plan to implement monitoring and analysis. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events. 5. Based on the premise that Richman hosts an intranet for employees to access information about the company and enroll in company benefits programs, and that Richman also hosts an extranet for its business partners, you must research and devise a method to secure networks and communications. This should include the network structure, transmission methods and techniques, transport formats, and security measures used to operate both private and public communication networks. 6. Based on the premise that the Phoenix office contains two proxy servers configured as an array, which provide Web cache services and Internet access control for Richman, and that the majority of applications are Web-based and hosted from the Phoenix office, you must assess risk, response, and recovery. Conduct a review of the implementation processes essential to the identification, measurement, and control of loss associated with uncertain events. 7. Based on the premise that the corporate security policy is out of date and each branch office policy differs, you must research and define security operations and administration including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. You need to write the proposal as detailed in the instructions above. Be sure that you create a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. In addition, document the vulnerabilities, methods, and controls effectively. Project Part 2 should be submitted in the following format and style: Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 4–5 pages Self-Assessment Checklist I have created a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. I have successfully identified appropriate SSCP ® domains and related them to the scenario. I have documented the vulnerabilities, methods, and controls effectively. I have conducted adequate independent research for the proposal.

Tuesday, July 30, 2019

Charles Dickens Essay

How has Charles Dickens put forward to us a sense of the hardtimes as shown in the town and education system? A main theme in the Charles Dickens book, ‘Hard times’ is the Industrial Revolution, how technology had advanced drastically, yet the standard of peoples lives were decreasing and getting ever harder. No more is this emphasised, than through the basic layout and look of the, appropriately named, ‘Coketown’. The town was supposed be evolving both technology wise and money wise, yet each building was as plain and as dirty as the next, closely resembling most of the people who work and will work in the town, those being the young machinists – the children of ‘Coketown. ‘ Although the standard of living was supposedly better through the Industrial revolution, with new communication, transportation, and manufacturing methods, it meant there was an even greater demand for workers to work the machines. The life of a worker in the Revolution was, monotonous, and could kill the spirits of even the most imaginative of people. As a result, from a fairly young age, the children were taught not to have imaginations. ‘Only facts’ were to be learnt and applied to everyday life. Thomas Gradgrind is the patron of the school in which this process is highly used and believed in. Gradgrind himself was bought up believing there was nothing more to, ‘this life’ than facts. Imagination would only get in the way of the children when they started working in the factories. We are introduced to the method of teaching immediately at the beginning of the story. ‘What I want is Facts,’ and the opinion of the Gradgrind, being that, ‘Facts alone are wanted in life. ‘ To emphasize this, ‘facts’, has a capital F. According to this theory, there is no religion, no clear identity, and only one belief and purpose. This is ironic because most of the people of the time were quite religious Christians and it shows a contradiction between their beliefs and views. The first paragraph is almost a monologue with Gradgrind, because no one interrupts him. This shows his importance, the slight fear he inflicts on people, when the children spoke to him with a, ‘trembling voice’, and the respect they have for him. With these aspects in mind, it is easy to see how he influences the children’s minds and opinions. Gradgrind’s ambition is to, ‘plant nothing else and root out everything else,’ but facts. The children are not even to, ‘fancy’ anything. So much so, the room in which the children are being taught is just a, ‘plain, bare, monotonous vault,’ of a classroom. The word vault, indicates the children are trapped in the education system. Every bit in the room is the same, boring and dull and in no way creative – so the children would get no mental stimulation from it. It leaves little to the imagination, as with Gradgrind himself. Dickens uses technical and geometric words, like ‘square,’ and, ‘plain’ to put forward to us his rigidity in his belief as though the whole education system was personified through Gradgrind. In addition, the subject of facts also helped Dickens to describe Gradgrind. Through his, ‘inflexible,’ voice. Unchangeable, like the childrens futures. Also, his necktie, wrapped around his neck, ‘like, a stubborn fact. ‘ With the inspector watching the class, this style of education was enforced on the teachers. As a result, they themselves were ready to teach the children in such a way, it would blow the children, ‘clean out of the regions of childhood. ‘ Gradgrind himself, believes that this is the right way of teaching. Consequently, he has learnt little about the complexity of human nature, causing him to believe that everything about people can be simply reduced to science, and that by training the, ‘vessels’ in the way he is, he is giving them a future and a chance in life, when really he is removing them. The metaphor, ‘vessels’ is the word Gradgrind uses for children. It shows first hand how he thinks about his children. A class comes in, he fills them with facts like a bucket, then they go to work in a factory. A new class comes in, and so on, all the time, them learning nothing about morals and principles of life. Chapter two is metaphorically named, ‘Murdering of the Innocents’. It shows what the education system is potentially doing to the children in it. It is not only killing the children’s imagination and identity, but also deprives them of a decent future. With the education currently received, the children will be both physically and mentally, ‘deformed’. The true impact on the education system to the children, is shown in chapter when two children are juxtaposed. One child, by name of Sissy has just moved to the school, and another child, Bitzer, has been taught at the school for most of his life. Our first introduction to Sissy, is by her being called, ‘number 20,’ by Gradgrind. This is because a name shows a personality, and imagination, along with nicknames. As a result, Gradgring calls herself, ‘Cecilia’. Anything in the children’s lives which requires imagination, a unique style, is removed by Gradgrind, quite easily because of the respect the children have for him. He rejects Sissy’s father belonging to, ‘the horse-riding’. He then gives the job the title of a, ‘veterinary surgeon’. This is ironic, because Sissy has dealt with horses all her life, so understands them more and probably knows more about them than Gradgrind does, yet he doesn’t want understanding, he wants facts. That is why Sissy cant give the definition of a horse.

Monday, July 29, 2019

Asserting Masculinity in the Cultural Context of Camp

Confirming masculinity in the cultural context of summer camp is an important yearly experience in the lives of many children. Some children continue to camp after the camp time and choose to become counselors. The program exists as a leadership program within the camp structure to educate on how to become an effective counselor for children between the ages of 15 and 17. Each session ends with a normally closed bonfire, and the male 's CILT is extinguished by urinating after the woman comes out. Male / Female: culture depends on male or female. In male culture, the dominant values ​​are thought to be ambitious, self-confidence, performance, and access to money and things, so-called feminists such as quality of life, maintenance of personal relationships, consideration of weak environments It is emphasized with cultural values ​​(Edward Rees, 2010). Time oriented: Finally, time oriented determines the cultural influence of every country. It was originally called a chaotic motive and is related to the time frame faced by the people of different cultures and some of them will consider concrete action plans in the coming years, 2010 Year) †¢ Masculinity and femininity mean that culture emphasizes emotional and social roles as well as work goals. Male culture reflects preferences for confidence, achievement and material success. Women's culture emphasizes relationships, cooperation, and the quality of life. I agree with the dominant value whether male or female, male or female, despite this dimension label. In addition to the work done by Hofstede, many other effects on behavior are categorized. Trompenaars and Hampden-Turner (1998) also focuses on cultural differences and their impact on business and management. They provided data from more than 30,000 training program participants and explained the seven aspects of cultural differences:

Sunday, July 28, 2019

Legal Ethical Nursing Situation Essay Example | Topics and Well Written Essays - 2000 words

Legal Ethical Nursing Situation - Essay Example (Scott, 2000) Practice sisters in GP group practices who often do the actual disease notification are not the ones to receive the statutory payment. Senior HIV/AIDS discharge co-coordinators (nurses) and research nurses have been employed with part of their job defined in terms which are normally part of the doctor's role. Needless to say, they are paid less than doctors. There is generally a lack of recognition and concern for the dilemmas nurses are faced with in this field. Although the ethical codes of both the medical and nursing professions are not at odds on these matters, the actual practice is. In fact, the nursing code in particular is quite advanced and very clear, but the conflicts and power struggles which still exist between medicine and nursing make it very difficult for nurses-advocates of the patients-to live by the letter and spirit of their code. Not only does the individual nurse suffer in this situation, but any decent nurse is forced into defending the rights of the patient in opposition to the quality of the data collected. This is not an argument against nurses entering the field of epidemiology, but rather an argument for bringing the rights of the individual patient and the public aims of epidemiology and health policy together. Nurses are often in the best position to identify these problems and should be listened to. (De Selincourt, 2000) Literature Review/ Case Study A young woman, Amanda, is pregnant. She attends the antenatal clinic, where a midwife takes her health history and runs a series of tests, such as blood, urine and blood pressure. She is counseled by the midwife on, among other things, the implications of human immuno-deficiency virus (HIV) and of being tested for it. Although the midwife has no reason to believe that Amanda has been exposed to HIV, she offers her an HIV test. Amanda declines, as there seems to be no need for one. She is also aware of the difficulties in obtaining a mortgage if she has this test. The blood sample taken by the midwife is sent to a laboratory for analysis for hemoglobin content, rubella antibodies, and syphilis. At the same time a small amount of blood from this sample is placed in an unnamed test tube which is then sent to a central laboratory to be tested for HIV. The midwife is completely unaware that this has occurred so cannot inform Amanda. The next time that Amanda visits the antenatal clinic the other blood results are returned to her and, as they are normal, she continues with her pregnancy uneventfully. Unknown to her the anonymous blood sample has been tested and found to be HIV antibody positive and this is recorded at the national surveillance centre, where data on HIV and acquired immuno-deficiency syndrome (AIDS) and other infectious diseases are collected. The information accompanying this sample includes Amanda's age range (i.e. between 35 and 40 years), her gender and the geographical origin of the sample. In this case the epidemiologist will not have information about the means by which HIV was contracted. The data will provide information about the trends of HIV among pregnant women who attend antenatal clinics over a five-year period. Amanda's pregnancy

The Taliban Research Paper Example | Topics and Well Written Essays - 1000 words

The Taliban - Research Paper Example forces from Afghanistan. (McNamara, Melissa â€Å"The Taliban in Afghanistan) It is important to note that there are two factions of the Taliban existing within countries of Afghanistan and Pakistan. With the Pakistan faction going rogue and, although identifying itself with the Taliban, it actually has a totally different mission and goal than its Afghan counterpart. But in order to understand why the differing goals exist, one must first understand the history of the group. The Taliban can be considered to be religious fanatics who are trying to advance their religious goals and beliefs across the Middle Eastern world. The leader of the Taliban was Mullah Mohammed Omar. A reclusive leader who heads the terrorist group together with 8-10 other colleagues, all of whom are survivors of the Russian war and occupation of Afghanistan in the 1970's. Their governing rules are overseen by the Ministry of Virtue and Vice, often considered to be a religious police force. (McNamara, Melissa à ¢â‚¬Å"The Taliban in Afghanistan†). The group originally emerged as one of the mujaheddin or holy warriors in the region. (Hayes, Laura, Brunner, Borgina, and Rowen Beth â€Å"Who Are The Taliban?†) This group has every intention of establishing a radical Sunni Islamic regime in Afghanistan. The Taliban as a group should not be confused with the Taliban Militia that was established in 1994. (McNamara, Melissa â€Å"The Taliban in Afghanistan†) In Pakistan however, The Taliban Group there has taken on the name â€Å"Tehrik-i-Taliban Pakistan†, a group with known links and ties to the Al Qeada. Although it shares similar ideologies with the Afghan Taliban group, the group is known as a stand alone group with different goals from the original. According to Raza Rumi, director of policy and programs at the Jinnah Institute, the primary target of the group is the Pakistan military. The goal of the group is the removal of the U.S. troops from the area and they w ould like to see the imposition of the Sharia in Pakistan. (Brumfield, Ben â€Å"Who Are The Pakistani Taliban?†). Since the group is a breakaway faction, it lacks the organized structure of the original and is instead a coordinated militia. Due to the radical religious beliefs of the Taliban, they would rather become known as religious terrorists who use the holy war or Jihad to propagate religious war over their perceived enemies. However, nothing could be further from the truth. There is nothing religious about their terrorist activities. The key to their terrorist campaign is the use of violence. (â€Å"Types of Terrorism†) However, the most common form of terrorism that the Taliban uses can be seen in the way that they need to acquire funding for their terrorist activities. The group has been known to employ the use of roadside bombings in Afghanistan and Pakistan when attacking the U.S. troops stationed there. The group is also not beyond using arson and firebomb ings in order to quash their targets. However, the group, due to the lack of funds through their bank accounts and other channels of receiving financing having been effectively cut off by the international community, has taken to kidnapping and hostage taking for ransom in order to keep their organization afloat and their terror activities

Saturday, July 27, 2019

Changes in the European Euro Essay Example | Topics and Well Written Essays - 500 words

Changes in the European Euro - Essay Example The dollar advanced 0.2 percent on 11th February 2011 to 83.43 yen. The euro declined 0.1 percent to 113.06 yen. B. Identify two or more factors that might account for the changes in the value of the U.S. dollar with respect to the Euro. The US dollar rose as against most of the currencies as Hosni Mubarak, the president of Egypt stepped down and handed power to the military, stoking demand for the safety of U.S. assets. US dollar gained third week in line against euro. Euro was weak also due to the news of President of Germany’s central bank resigned. The US jobs data are unlikely to encourage the Federal Reserve to change its loose monetary policy, which would help buttress the dollar. There was not sign of increase in interest rate of the euro-zone nations by the ECB hence that took away the support of euro as against US dollar. Referring to ‘the economics of Foreign Exchange and the Balance of International trade’ chapter, the supply of dollars offered in exch ange for a foreign currency, such as the Euro, depends on the willingness of dollar holders to purchase Euro.

Friday, July 26, 2019

Getting a New Business off the Ground Essay Example | Topics and Well Written Essays - 500 words

Getting a New Business off the Ground - Essay Example Additionally, since there is a potential for product liability for Joan in the aviation parts industry, Joan is legally responsible for any damages her defective products may cause. As a sole proprietorship, she absorbs these responsibilities personally, which could pose a large problem should a case arise where she is blamed for her product’s malfunction. For tax purposes, the tax rate imposed on Joan’s business is determined by the personal income tax rate of the owner. So, the sole proprietor of a business does not pay taxes apart from, or separate from, the owner. As such, this tax benefit forms one advantage of operating the business as a sole proprietor (Mauro, 2004). 2. To protect her client from liabilities incurred by the business, Joan’s attorney might recommend a limited liability company (or LLC). The LLC model shields Joan from any blame incurred by the business. So, if some product she manufactures malfunctions on a plane, she cannot be held personally responsible for those who suffer from the malfunction; in that case, it is just the company that is financially and legally responsible for the error. Her attorney may also suggest a corporation, which is a legal entity with its own liabilities and privileges separate from those of its members. A corporation may make more sense than a limited liability company if Joan hopes to expand her business to a larger scale, and if she can persuade investors to help grow her base of business. Like a LLC, a corporation shields Joan from the company’s liabilities and debts (Moye, 2004). 3. Her attorney may suggest liability insurance, which is an insurance system that can protect Joan from the risks of liabilities imposed by lawsuits. If Joan’s company were to be accused of negligence or error in manufacturing its aviation parts and brought to court in a civil suit, Joan’s liability insurance would

Thursday, July 25, 2019

The Most Appropriate Way of Analyzing and Representing Data Article

The Most Appropriate Way of Analyzing and Representing Data - Article Example This is meant to make a researcher come up with a simpler way of data analysis without following the rigid linear method. A major problem existed when it came to coding and five major approaches were unearthed for the purpose of data analysis as discussed below. For the purposes of chronology, the steps involved in this case is organizing data files, the creation of initial codes, description, interpretation, and presentation of this data. As such, this method can be said to be used appropriately for qualitative research. However, all aspects of the data analysis methods were not justified clearly shown by Cresswell. The accumulation of other elements such as beginning scrutiny by focusing on a distinct element. This could have also made the method more effective. The grounded theory is also known as constant equation theory whose stages are more detailed and include; organizing the data, getting to know the data, open coding, axial coding and checking the results of the analysis. This method has been effectively used to study recovery from child abuse according to the text thus it has been used appropriately for research analysis. Creswell clearly gives a step to step process before a hypothesis is made. However, the results of the analysis were not presented in the study above and thus all processes were not justified. The best way to correct this according to Miles and Huberman would be to present sub-stages in the presentation of analysis. Used successfully for analyzing personal experiences, the structured steps include; description of the experience, stating significant statements, grouping significant statements, answering the questions what and how and lastly writing a description of the phenomenon.

Wednesday, July 24, 2019

Direct Manipulation and Virtual Environments Essay

Direct Manipulation and Virtual Environments - Essay Example This is because users can see the outcomes of an action before completing the object; thus, evaluating the results and compensating for mistakes (Wang and Tsai, 2011). A command line structure on the other hand is an interaction with a computer program through which the user gives commands to the program in the form of consecutive lines of texts. A command line shell is used to implement an interface. The command line shell is a program that would accept commands as text input converting them to operating system functions. Programs are easily automated through scripting if only they have command line interfaces. The command line structure provides an access to the arguments and the name used to invoke the running program (Wang and Tsai, 2011). Direct manipulation style can be applied in pupil’s interaction with some educational software. The computer interface can encourage people to think, plan on relevant issues and learn more successfully. The direct manipulation is very effective to learning and is likely to broaden learners’ notion on task beyond their computer interaction. This style will be effective in increasing learner’s legibility in future to improve the current processes and create new

Tuesday, July 23, 2019

Portfolio Assessment and Revision Plan Essay Example | Topics and Well Written Essays - 500 words

Portfolio Assessment and Revision Plan - Essay Example One of the most immediate changes I see to my writing is an improvement in the organization. In my first essay, there was not necessarily a logical flow from one point to another. I essentially used two disconnected paragraphs that both spoke about the article in question, without actually combining together to form a cohesive argument. This can be seen very clearly by the topic sentence of my second paragraph, where I stated that â€Å"Also tackled in this article is the use of â€Å"Framing theory† as a guide in differentiating the media practices in China.† While this did describe a thing the article did, it did not actually connect that well with what I had done in my previous paragraphs. In my later essays, however, I paid much more attention to organization. I believe that one of the things that were most helpful to me was segmenting my essay into various sections, such as a â€Å"literature review†, â€Å"comparison between languages and so forth†. I did this in each of my two later essays. This forced me to structure my essay in a more cohesive way, with each particular subject having a clear relationship to the thesis or main point I was trying to make and kept each part of the paragraph clearly related to a specific aspect of that argument. I believe I will not have to use these types of headings as much in the future, but they were still certainly useful in keeping me on track in terms of organization. I believe the second major change that I made in my writing is the development of a simpler, clearer style. My first essay had some relatively vague language in it, especially in the introduction. The opening of my first essay, which stated that â€Å"with great power, comes great responsibility† worked well as a hook, but did not tell the reader anything about what I would be writing about. In my subsequent essays I became much more direct, launching immediately into my topic of discussion, and keeping my sentences short, precise, and to  the point.   

Project Implementation, Control, and Termination Essay Example for Free

Project Implementation, Control, and Termination Essay Using knowledge gained from this course Team A has demonstrated their capacity for conceptualizing the concepts and practical application of project management and life cycle phases. This paper is the compilation of three successive papers submitted and revised by Team A that includes the project proposal paper, the project planning technical paper, and the project human capital paper. In the final phase of the project lifecycle the implementation process of terminating the project will be presented in such a way that the input will be based on observations in relation to how well the triple constraints and tradeoffs were handled. The balance between timing, budget and project specifications is used as a performance measurement to guide Team As future success by determining lessons learned, what might be performed differently that must be corrected with the next project, and help determine what went right with the project that must be repeated on the next project. In addition, the steps needing to be taken to return the human resources to the organization will be provided. Background and Statement of NeedThe increasing population of Lo Ki, California has resulted in an influx of new apartments, condominiums and small homes being built with little or inadequate storage and deed restrictions limiting what can be placed in driveways and side yards of the homes. Lo Ki is a mid-sized community lacking storage facilities within proximity. This has created a need that Store -N- Lock, a California-based self-storage facility, plans to address by building a new storage facility. This facility will meet the needs and demands of the citizens of Lo Ki for storage space, in addition increasing profits for Store -N-Lock. Building a new storage facility will require a project management team that has a clear understanding of whom is responsible for what. This management team needs a clear vision of what the facility would look like, what the costs would be, what the processes and procedures would be, what the time frame is from conception to completion, what revenue would be expected from the final project and what the payback period would be. With that being said financing would be needed with a loan that allows some breathing room during lease up. In addition, in any new type of construction the management team will need to have a good relationship with the contractors, engineers, the  architects, and any stakeholders. Clearly communicating the plan and approach will be beneficial because this will provide a way for stakeholders and anyone involved in the project to have a clearly defined goal, vision and mission of what the expectations of this project are in addition to any profit and loss shari ng, equity positions, decision making and exit strategies. Once this project is up and running a permanent loan can be locked in. Project StakeholdersThe project customers include the investors and owners of the facility. These individuals have added their resources and information in order to get the project off the ground, and stand to lose the most if the project fails. The customers will hold Team A accountable for any unforeseen circumstances that might occur. These project customers have also given time and assistance to ensure that the project will succeed. Other project stakeholders include the city of Lo Ki since permits and licensing from the local municipality is required. This project will provide revenue to the city in the form of taxes. In addition, the bank providing the financing will be a stakeholder and benefit from the interest and association with the project. The project leader and team members of the project, such as upper management, the architect, the construction team, the management team (Team A) the classmates and instructor of this Project Management course including resource managers, and line managers involved in the project that stand to gain financially from this project. Each of these additional stakeholders will stand to gain either from recognition of a successful project completed or from the benefit of having a storage facility that they can use to store their belongings. Project Goals in Terms of Triple Constraint The triple constraints of timing, budget and scope are being monitored daily by the project managers and the team. This is done to make sure that everything is completed in the correct order in which the network results have suggested. At the beginning of the project Team A made sure to ask the sponsors to prioritize the triple constraints. The team wanted to ensure that what they  were doing was consistent with the sponsors expectations. Initially, the sponsors stated that all the constraints were important. However, after contemplation the sponsors were able to assign weights to the constraints when they came to the realization that they are all important but not equal. After the feasibility study, and the project was deemed suitable the sponsors decided that the project in no way could go over budget. The second most important criterion was time with scope ranking last. Timing The timing of each project phase will keep a continuous flow of work since the network was set up to flow horizontally downward following the critical path so the project will finished in the allotted timeframe. Many areas will not take as much time as others but every task has an established and set time frame of one to 17 days. This set schedule and time frame should effectively minimize and limit problems that may occur if handled efficiently and things go as planned. Resources The resource was the highest ranked constraint indicated by the sponsors. They do not want to go over the calculated project. Team A will ensure that no problems will occur with the actual budget that has been set forth in the beginning phase of the project. The budget should remain the same as long as the timing is kept on track for each task and preceding event. This will be accomplished by monitoring progress and the network in the Gannt chart. If by chance something occurs that will change the time frame of the task affecting the budget, then the budget will then need to be revisited and revised. The entire amount the project estimated to cost is approximately $2,000,000. At any time this amount could change because of changes in the project risk and risk management, project constraints with specific emphasis on the project timeline, deadlines, milestones or price increases in either labor or materials. Scope The scope that has been set forth is going to be effective if certain tasks are kept in the time frame in which they are set up to take place in. Within the scope enough space has been set aside for change control processes if warranted. At this point the network result has an outlook of completion of the project in four months and not to exceed $2,000,000. Team Selection Team A has chosen the Pure Project organizational structure. Team A gained written approval from the customer in the form of a signed charter, which became the contractual agreement and project proposal. This document will provide the directives to be established and implemented by the PM. The Pure Project Structure was chosen because this is a project driven structure and is best for construction companies (if the cost is not too vast), or a one-time, highly specific, unique tasks that requires careful control and are not appropriate for a single functional area such as the development of a new product. (Mantel, Meredith, 2006, p199). Other reasons why Team A chose this organizational structure are as follows:Communications ManagementA solid communication plan is the most vital element of achieving a successful project. A communication plan is used to keep the PM and all stakeholders involved in the ongoing progress of the project. Communication management is a tool the PM of Store-N-Lock will use to convey performance evaluations to stakeholders. Evaluations are performed regularly and consistently to ensure various project objectives are completed on time and within the project scope for successful results. The following considerations will be taken into account when meetings are scheduled:1.Project meetings communicating performance evaluations to management are somewhat flexible. 2.Management can request meetings at their discretion; however, the PM has the authority to change the requested date if needed to one that is more suitable. 3.Meetings with customers are less flexible requiring the PM to plan carefully to ensure all of the materials needed such as handouts and other literature are ready for the meeting. Poor communication can cause bottlenecks, therefore, BETCO has taken into consideration the many elements of effective communication and potential barriers and prepared accordingly. To keep information effectively clear and  concise the BETCOs project manager has used earned value management to convey project progress throughout the duration of the project. Earned value management combines measurements of scope, cost and schedule to measure project progress and can indicate to the PM impending problems. The PM can then act quickly taking the appropriate proactive and reactive measures to reduce the impact of these risks. Gantt charts will also be provided to all stakeholders for easier visualization and tracking of actual progress made. The advantages of effective communication using software are as follows:1.Prevents bottlenecks2.Prevents barriers to success3.Gantt charts provide clear views on constraints, timing, and milestones. 4.Gantt charts provide an easy way to revise plans and update progress. 5.Communication and the use of Gantt charts allow visualization and effective tracking. Scheduling face-to-face meetings can be difficult: therefore, BETCO uses conference calling, emails and text messaging to stay in contact. This will allow rapid and up to the minute changes to be communicated; since visual aids will be transmitted to the needed stakeholders for review during the conference calls. Those involved, can then walk through the progress of the project together identifying any action items needing attention. The BETCO representative, the Team A PM and staff and Store-N-Lock have decided to conduct twice weekly face to face meetings for the project team and weekly conference calls for all other stakeholders. Risk Management In planning for this project understanding the combination of uncertainty and constraints based on estimation will require selecting areas of the project with the most severe constraints and the highest uncertainty. Once that is complete the PM will do a Risk Assessment exploring each task for uncertainty. The construction industry is subject to more risk and uncertainty than many other industries. (Flanagan, Norman, 1993). This construction job will require a multitude of people requiring coordinative efforts between several interrelated activities compounded by many uncontrollable external forces. Some of the key areas that Team A will focus on in their risk management are as follows:The key will be coordination of different construction phases and adjustments or tradeoffs that will need to be made the triple constraints. This is especially important since they may impact the quality design and construction times. The following are a list of constraints:Project management, according to (Mantel, Meredith 2006, p. 179), is prone to the following problems: ·Inadequate resources ·Meeting unrealistic deadlines ·Unclear goals/direction ·Uncommitted team members ·Insufficient planning ·Breakdown of communications ·Changes in goals and resources ·Conflicts between departments or functionsProject success has four dimensions as quoted by (Mantel, Meredith, 2006 p.3) from empirical studies conducted by Shenhar, Levy, and Dvir (1997). These include: ·Project efficiency ·Impact on the customer ·The business impact on the organization ·Opening new opportunities for the futureTeam A can focus on to the following areas to decrease the impact of the above issues:Almost everything that can go wrong with project performance, cost, or schedule is theresult of uncertainty. (Meredith, Mantel, 2006, p 541). According to (Ibbs, Kwak, 2000, Project Risk Management.) The Risk managements project management maturity level was the lowest among all eight knowledge areas.The following are six areas that are impacted by risk management. (Project Management Institute, 2000, p.128). Other areas that can cause a project to require the control of performance, costs, or time were identified (Mantel, Meredith, 2006, p. 542). Timing is crucial to project success and since most all projects do not go as planned, nearly every time related category with the exception of governmental regulation would be considered lessons learned for Team A. In the previous section on performance, each of these areas would be considered areas for improvement and would most likely have affected the overall completion of the project. Most likely all cost related issues pertain to Team As project and would be considered lessons learned. Contingency PlansManaging project risk and potential problems like bottlenecks requires a contingency plan. This will help mitigate the impact of the problem. In each phase of the construction will have milestones, which indicate that the project can move forward as planned. If problems occur with the timing of tasks and phases of the construction the plans will need to be altered to reflect either the backup resources such as time, or materials and money required for successful completion. At this point the Gantt chart will need updating and each person affected by the changes will need updated schedules. (Heerkens, 2002). BudgetControl of cost is a concern that this team has for this project. The team believes this should be of concern to all involved. As stated in Project Management, a Managerial Approach, Budget plays an important role in the entire process of management (Mantel. Meredith, 2006, pp. 327). Project budgets are estimated above what is calculated to ensure that the project is covered against any unforeseen problems, mistakes and miscalculations. In order to develop a budget the team must forecast what resources the project will require, the required quantity of each, when they will be needed and how much they will cost including the effects of potential price inflation (Mantel, Meredith, 2006, pp. 327). The budget is going to cover everything that is needed including materials, equipment and salaries to be paid to the contractor, subcontractors, and the management team including the BETCO representative and the Team A PM and associates. Below in figure 1.1 are estimates of items that will be needed for the construction of the storage facility. These are estimates that will be used toward the facility construction. The figure below indicates estimates of materials; construction and other items needed items to construct the storage facility. Figure 1Item descriptionDelivery schedule(Business days)Cost(estimate)Contractors and Subcontractor FeesMonday -Friday 7am-5pm approximately 10% of all costsCost of the management teamMonday-Friday8am-5pm$65,000Building and roofing  materials$400,000Material for the walls and doors$375,000Sprinkler system$225,000Temperature Control System$150,000Security surveillance and monitoring systems $185,000Asphalt for parking and driveways$150,000Concrete Pad for Office$80,000Office Roof$185,000Office Windows$5,000Office doors $1,200Office heating and air conditioning$2,700Kitchen counters and cupboards$4,500Kitchen bathroom including sinks (2)$225Bathroom counters (2)$1,600Office computers (2)$4,000Printer and fax equipment$575Phone and answering system$1,400Office desks (2)$2,000Tile flooring for office and bathrooms$4,500Gutters$8,000As stated above these numbers are estimates. Due to unforeseen events these numbers may change but the project and upper management believe that these numbe rs are the best estimates for the beginning of the project. Desired OutputsThe desired performance criteria for building a high-quality self-storage facility allowed Team A to measure the successes and failures of the project in order to recognize areas where the project team was strong and areas where the project team could improve. This ensured that the team provided the client with a product that meets their full expectations. The project performance measures include time, budget, and quality. These measures aided in ensuring that the work completed during each phase of construction is of a quality that protects the client and their customers with safe storage of belongings without compromising quality in craftsmanship or increased costs. Quality assurance is another way to provide a low-cost facility with limited maintenance in terms of repairs, upkeep, and operation. Team A also used the initial cost estimating budget and the systems development cycle to ensure that, from conception, to initiation and feasibility, the project was clearly defined and a detailed planning analysis provided an accurate schedule. Updated Statement of Work/SMART ObjectivesDuring phase one of the construction of Store-N-Lock BETCO has made some adjustment to the statement of work. This was done with approval from the customer and added on as an addendum that can be located in Appendix A. The completion date has been delayed by eight days from the original start date set. This was because of inclement weather, resulting in equipment delivery delays and thus, causing  further delays with installation. BETCO has created a SOW that mirrors the SMART requirements to ensure full understanding of what deliverables will include, what costs will be incurred and deadlines of work activities and tasks. SMART objectives illustrate that every requirement of the project should be specific, measurable, attainable, and realistic and time bound. The Following are SMART objectives for project Construction Store-N-Lock. BETCO has been hired by Store-N-Lock to build a public storage facility with a specified start date of August 15, 2009 and a completion date of November 23, 2009. The project completion will reflect the construction of a high quality storage facility at a negotiated agreed upon cost that meets the demands of Store-N-Lock and Store-N-Locks target market. BETCO has created a WBS accompanied by a logical hierarchy of sequenced events and related tasks of the project scope to define and group the discreet tasks of the project and create the project map for clearer navigation and understanding by all stakeholders. MetricsMetrics BETCO will use are project timelines, earned value management and Gantt charts. These metrics will be reviewed in the beginning of each task, during each task and at the end of each task and phase. The will be beneficial for the PM since problems and bottlenecks and foreseeable threats can be evaluated, brainstormed and mitigated to allow for flexibility whereby better decisions could have been made. These metrics will also be used to communicate performance progress to stakeholders. Project AchievabilityProject Construction Store-N-Lock is a very achievable project for BETCO as they are experienced in this field with solid relationships established with numerous contractors and subcontractors. BETCO knows standard timelines of completion for individual processes and based upon these the complete timeline outlined in the timetables and deliverables statements is an achievable and manageable task for BETCO with this project type. The project is realistic since BETCO has substantial experience in many types of construction projects. With their expertise and relationships with subcontractors BETCO has a vast array of resources for many types of projects. To stay within the agreed upon completion date BETCO  is using a project timeline to specify completion dates for each objective to be achieved throughout the three month and one week timeframe for completion of the entire project. The SOW indicates the completion date to be August 23, 2009. Task and Performance Schedules, Responsibility and Resource Availability MatricesTime is money and time is of the essence in project management. Because of this, time is used to sequence events, ensure that each event occurs within the specified timeframe and is used to compare the completion of events with the time allocated for each task. If each phase of a project is not completed within the scheduled time frame bottlenecks can occur and the project runs the risk of going over budget. The effect on the scope of the project would compromise quality as corners are cut to get back on schedule. Constructing a storage facility required that a detailed cost estimation and budget follows the WBS. (Everett, 2007). The schedule of resource allocation required detailed cost schedules and forecasts so that the project manager was able to analyze the pattern of expenditures and permitted enough time to make adjustments to the schedule for each phase of construction. All work packages were scheduled with enough time to complete the preceding phase and to cover for any uncertainty and lack of accurate information (Everett, 2007). These unforeseen occurrences may be because of inclement weather, delivery delays, or labor issues. The PM and Team A staff have set up a task schedule to assign each task with enough time to be completed, and organized in such a way as to identify the predecessors of the tasks, when applicable. AGantt chart is attached with this paper identifying the critical path through the network. Table 1 on the next page includes the task schedule for the project. E: Execution responsibility. Stakeholder is responsible for getting the work done. Not necessarily a decision maker, but drives the group to make decisions in a timely manner. A: Approval authority. Has final approval on accepting the outcome of this activity and makes decisions. C: Must be consulted. As work is performed this stakeholder contributes information. Does not make decisions but is asked for input prior to decisions. Performance Monitoring A good communication plan is essential for appraising the project progress to various project sponsors and executives. With this communication, the project managers ensure all staff is meeting acceptable progress goals toward the final product. This is basically meant to communicate and cover important variables of the project time, cost, scope, and parameters of deliverables. Other objectives are to provide clarity of the progress with the continuation of the project, so that the management and team can engage in early corrective action when the performance of the project alters considerably from initial plans. As with the project of Store-N-Lock, set schedules of work will need to be executed by the builders. Whenever things go awry, a corrective action plan should be set in place to get the project back on schedule. To avoid this type of confusion or mishap the project manager is to set out standards that are to be followed. Project Performance Overall, the project went well. The team went one week over the projected completion date, as enough time was not allocated for every step of the project. Though the project stayed within budget, many resources that were necessary for the completion of the project were not included in the budget. However, the project budget manager allowed for enough funds at each phase of the building to cover the additional materials and resources needed. Conflict amongst the team was the most challenging aspect of the project. Learning Team A did not clearly define the roles and responsibilities of each team member until the final week of the project. As a result, communication breakdowns and personality conflicts abounded throughout, and decisions were not made quickly and effectively. Learning Team A also lost a member of the team early in the project, which nearly created bottlenecks  and tasks had to be reassigned to cover the workload. Despite these issues, Learning Team A was able to overcome these obstacles and persevere. Team members were willing to compromise as each task came due and were willing to help his or her fellow teammates with any problems or concerns. Network Results and Triple Constraint Towards the middle of the project the sponsors made a few demands as to the budget and the scope but the project manager called a meeting. This meeting was set in order for the project manager to inform the sponsors of the triple constraints and how they are supposed to be managed and how to manage them efficiently and effectively. Timing At the end of the project and after reviewing network results the team realized they had gone one week over the time that was scheduled per the Gantt chart. Not enough time was given for each portion of the project the needed to be completed within the four month timeline. Each task was done efficiently but the timelines that the team had set forth were not thought in enough detail. The problems and breakdowns that occurred within the group may have been a contributing factor to the problems in the timeline. Resources Although there was a significant amount of time that the project went over the intended time frame, the team was able to stay within the budget that was stated at the beginning of the project. At the beginning of the project the sponsors made it known that the budget was the most important of the triple constraints. In no means was the project to go over the $2,000,000 mark. The project manager and the team made certain that no matter what occurred with the time constraints they would ensure that the budget would remain the same. Scope The project manager did not want to change anything within the scope of the project. At one point towards the middle of the project the sponsors decided they wanted to change the most important constraint to the scope. This did not go over well with the project manager. The sponsors and the project manager had to sit down and have a meeting concerning what was going to occur. The sponsors believed that there could be changes made within the budget in order to make changes in the scope, and the project manager let  them know that was not going to occur. Some instances like this made it difficult to remain in the allocated time frame. Steps Taken to Return the HR to the OrganizationAn element of project termination is the return or reassignment of project team members within the organization. Construction projects are able to handle this issue with more ease than other types of projects. In this current age of increased development and BETCOs good reputation in the business, contracts for construction projects are acquired on a regular basis. This allows the company easily to reassign their project team members to other projects in their areas of expertise. Upon completion date BETCO and the Team A project manager have conducted a meeting with the project team and customer. They have discussed any future follow up needs and provided the appropriate contacts for the customer. A private internal meeting for project team members has also been conducted to discuss the strengths and weaknesses that occurred during Construction Store-N-Lock. The construction of Store-N-Lock was a success with only a slight delay in the completion date. The building met the customers expectations and because the delay in completion was minimal Store-N-Lock was satisfied with the results. After all the end details were addressed the project team members received an appreciation and recognition lunch and received much kudos. Input for Future Projects For future projects, Learning Team A will learn from the experience that this project provided. From the onset, the team will need to select project roles for each member and have clearly defined conflict resolution and change control processes in place. There will also need to be a communication plan to ensure that every member of the team understands what is expected from them and are able to communicate effectively with other members. This will aid in faster decisions to be made. Team members must understand that the team should be open to innovative ideas and use critical thinking skills. Each member of the team will also need to be committed to the project as well. Meredith and Mantel (2006, p.595 4) have outlined key factors that need to be considered when  starting the next project. These factors include: ·Identify problems earlier ·Clarify cost, performance, and time relationships ·Improve the process of risk identification and management ·Identify mistakes, correct them, and avoid them in the future ·Reconfirm the project teams interest and commitment to the project ·Improve processes for organizing and managing projects ·Provide an amiable environment where project team members can work creatively togetherLessons LearnedThe most important factor affecting this project was a need to clearly establish roles and responsibilities in the beginning charter. By firmly establishing these early, the team could have saved a many of the initial stages of storming which preceded the norming. In addition, this would have helped to identify the hierarchy of leadership and helped to prevent duplication of work, eliminate conflicts and expedite decision making. Other areas that were difficult included a few of the essential elements of construction materials that were left out in the initial estimation phase, like the insulation, and gutters. Although, this impacted the budget the additional cost did not cause the project to go too far over a normal distribution or standard deviation of price increase to be problematic. In the next project the SOW and WBS would need to be finalized before the budget and schedule were completed and finalized. The project went as planned with only minor problems and trade offs of the triple constraints, between time, budget and performance. Although, potentially there were areas where bottlenecks could have occurred if things did not run on schedule and as planned. The monitoring of the milestones and critical path in the network helped to keep the project on track. Team A will continue use performance measures, networks and Gantt charts since these contributed to the project success. Overall, the things that Team A would do differently next time is to clearly define roles and responsibilities, and to make sure that they use the same list of construction phases and supplies and add to this for the next project if need be. In addition, in the future the WBS and SOW need to be completely correct before the budget and schedule are completed, which could  help prevent having to make some tradeoffs between the triple constraints. Contingency plans or change control processes always need to be set in writing to ensure that a definite path would be taken when tradeoffs between the triple constraints are visible. Conclusion Overall, the project team (Team A) and PM accomplished the goal of opening Store-N-Lock, a self-storage facility in Lo Ki, California with the use of exceptional planning and team communication. The initial planning was systematically and carefully thought through and allowed for the project to run very efficiently. Communication is the main obstacle in a team project and without it a project may not come to fruition as initially intended. Ensuring that the proper resources are on hand and a designation of team members play an enormous part in the success of a project. With that being said, Team A has overcome all obstacles and have met each goal to make Store-N-Lock a success. With this success and experience, Team A is sure to tackle any project with confidence and extreme efficiency. References Flanagan, R., Norman, G., (1993). Risk management and construction. Wiley and Sons. Retrieved August 12, 2009 fromhttp://books.google.com/books?hl=enlr=id=CPMaX2dikTACoi=fndpg=PR11dq=inherent+risks+in+consturction+job+estimationots=oiC3hNxXB3sig=STHby74x4f-utDVhu2k3-68LUUw#v=onepageq=f=falseHeerkens, G. (2002). Project management. McGraw-Hill. New York, N.Y. Ibbs, C.W., Kwak, Y.H. (2000). The Berkeley project management process maturity model:Measuring the value of project management. Assessing project maturity model. Project management journal. 31(1), 35-42. Retrieved August 23, 2009 from home.gwu.edu/~kwak/Berkeley_Model.pdfKerzner, H. (2006). Project management: A systems approach to planning, scheduling,and controlling. 9e. Hoboken, NJ: Wiley. Retrieved August 13, 2009 from [University of Phoenix custom Edition e-text]. Retrieved from University of Phoenix Website. McKinn, R.D., Stevens.N (2000) The Project Lifecycle: The Termination phase. Retrieved onAugust 19, 2009 from AllBusiness website. http://www.allbusiness.com/management/444125-1.htmlMeredith, J. R. Mantel, S. J. (2006). Project management: A managerial approach. 6e. Hoboken,NJ: Wiley. Retrieved July 31, 2009 from [University of Phoenix custom Edition e-text]. Retrieved from University of Phoenix Website. Office of Enterprise Technology, Project Management Office. (2006). Resource plan template. State of Minnesota. Retrieved August 15, 2009 from state.mn.us//Resource Plan_030702_Resource_Plan_Template_053006.docProject Management Institute. (2000). A Guide to the project management body of knowledge,PMBOK Guide. Newtown Square, Pennsylvania, USA. Shenhar, A., Dvir, D, Levy, O. (1997). Mapping the dimensions of project success. Project management journal. 28(2), 5-13. Retrieved August 23, 2009 from business.rutgers.edu/default.aspx?id=1748Verzuh, E. (2006). Project Responsibility Matrix. LSA Global. Retrieved August 15, 2009 from http://www.lsaglobal.com/business-solutions/proj-mgmt-templatesWheelwright, S.C., Clark, K.B. (1992). Introduction to managing the innovation process: Creating Project plans to focus product development. Harvard Business Review. Retrieved August 23, 2009 from kwanghui.com/mit15351.pdf

Monday, July 22, 2019

Holy Moly Essay Example for Free

Holy Moly Essay Socrates is simply asking questions to get a straight answer from Euthyphro, which he is unable to do. When asked, â€Å"what is piety? † Euthyphro answers â€Å"Doing as I do†. He thinks he is doing the pious thing by bringing his father up on charges of impiety. In his words, he is saying prosecuting anyone guilty of murder, no matter who they are . Socrates , basically is not entertained by this response, because it is not an answer. When asked again â€Å"what is Piety? † Euthryphro responds with, â€Å" What is dear to the Gods is pious and what is not dear to them is impious†. Socrates asks† Is the pious loved by the gods because it is pious? Or is it pious because it is loved by the gods? Euthyphro is contradicting himself. That which is dear to the gods is dear to the gods because it is first loved of them, not because it is dear to them. But the pious or holy is loved by the gods because it is pious or holy. Which is the same as saying that it is loved by them because it is dear to them. His explanation is going in circles. When asked again, Euthyphro responds, â€Å"Piety is knowing how to please the Gods in word and deed, by prayers and sacrifice† Socrates responds by saying that it is a way of doing business between the gods and men. You ask the gods what you can do and they tell you what they want you to do. Euthyphro has failed to show what pious is. I believe Socrates goal in the dialogue was to change his mind about prosecuting his father and to determine whether Euthypro’s definition of piety or impiety was sufficient enough to prosecute his own father for murder and to clear himself of his indictment. The features of the dialogue that led me to believe this was when Socrates asked, â€Å"Are you able to show your father guilty of murder or that all the gods are agreed in approving of our prosecution of him. Then says to Euthyphro† If you had not certainly known the nature of piety and impiety, I am confident, you would not have charged your father with the murder† Euthyphro, then hurries away , I am thinking to save his father from being tried for murder. If Socrates knew the nature of piety and impiety he may have been able to clear himself of Meletus and his indictment.

Sunday, July 21, 2019

Poverty and Social Exclusion

Poverty and Social Exclusion Poverty Social Exclusion Is social exclusion just a new term for poverty? Discuss. This essay will begin by defining the key terminologies used within the main text, beginning with the two definitions of poverty; moving onto the definition of social exclusion, and the reasons the term was introduced, debating the different types of exclusion. The central part of this essay will conclude whether poverty still exist, or has social exclusion replaced the term, as a bid for New Labour to gain power? Furthermore it will give general facts about poverty within the U.K and the extent to which it is effecting out lifes. Levitas (1998), because it is important to get a basic idea of the type of literature that is available. Levitas (1998) combines most of the literature on social exclusion into concise three models: Redistribution Discourse (RED), Social Integration Discourse (SID) and Moral Underclass Discourse (MUD). With these models there is a brief description of the main focuses, solutions and criticisms. Finally the essay will give an analogy into the relationship be tween the social exclusion model and poverty and certain policies that have been put in place to tackle the issues, leaving way for a final conclusion that will sum up the main context of this essay. Poverty has been separated into two main definitions: Absolute, which describes a basic income that can provide a sufficient level of primary needs, such as food, water and shelter. It was coined at the end of the 19th century, he devised a basic dietary requirement in 1899, known as the ‘basket of goods’, this list of food Rowntree argued was required for a healthy lifestyle. (Rowntree, 1901). The second, relative poverty, this is a viewing poverty in comparison to the physical possession of others (Townsend, 1971). This definition helps us to measure the gap between the rich and the poor in relation to goods, services and activities considered ‘normal’ by the majority of the populations. This is primarily the dominant definition used when measuring poverty. Due to the narrowness of the two poverty definitions, it has, along side other inequalities such as race, ethnicity and gender, ‘generated the injustices’ of social exclusion: â€Å"Poverty Studies have concentrated on lack of access to material resources. The concept of social exclusion provides a framework to look at the social relations to power and control.† (Williams and Pillinger, 1996:6) The contested term social exclusion has said to adapt the inadequate definitions of poverty, realising that other factors such as ‘lack of social, cultural and physical resources’ (Howarth and Kenway, 1998: 80) also add to the components of poverty. It was mainly introduced as New Labours solution to the reluctance of using the term ‘poverty’, as they desired power they considered it necessary to move away from the negative connotation of the ‘underclass’ . This terms usage has rapidly increased with Britain, partly because of how broad the definition can be. Generally theorists take conflicting stances on the exact terminology. Some define social exclusion as a sub-group of the poor, who have not been given as many opportunities and have often been at a disadvantage, while others see it as a ‘less acute but more widely experienced condition than poverty’ (Howarth and Kenway, 1998: 80). An alternative view differentiates between pov erty and social exclusion, adding a multidimensional concept such as deprivation, highlighting the most underprivileged and disadvantages sections of society. Through statistical analysis it’s clear to see that there is links between education and poverty; the higher the education which is received is said to directly contribute to the employability of the person and give an advantage towards working in higher-paid occupations (Duffy, 1998), thus indirectly leading to better housing, status and inclusion into society. Barnes (2002) states that there are four main groups at ‘risk’ of being marginalised: youths, lone parents, sick/disabled and the retied. Sen (2000) makes a distinction between two different types of exclusion, firstly active exclusion, which consists of deliberate policy or action to the denial of social rights. Secondly, passive exclusion, that is mainly focused on social or economical circumstances such as unemployment. However after deciphering definitions of poverty and social exclusion, the next element to this essay is to answer the question; what precisely is the relationship between social exclusion and poverty? Lister (2004) stated that the relationship between ‘social isolation’ and ‘poverty’ is particularly important when considering an answer to this question, because ‘as an indicator of lack of integration into solidaristic social networks, social isolation represents the essence of social exclusion within the ‘solidarity paradigm’ (84) The relationship between social exclusion and poverty is not always clear, however it is important to emphasis that social exclusion has not replaced poverty as a concept, but rather includes poverty as part of a wider understanding of the process, and thus that social exclusion is not just a ‘new form poverty’. Social exclusion has been known to be ambivalent, sometimes is can be ‘identified as an effect of poverty, and sometimes as a cause’ (lister,:82) Poverty within the U.K is not only nasty, but also increasing; here are some interesting facts about the poverty, and the extent to which it has affected the U.K: in 2003/4 one in five of the British population live below the low income threshold, nearly two times higher that in the late 1970s. Another fact that displays the rise of poverty in the U.K is 6million adults are unable to afford essential clothing. These figures are alarming, and displays how severe and significant the persistent problem of poverty is. However an issue that needs to be addressed is; is it really possible to be poor but not socially excluded? All authors that write about social exclusion mention poverty, no one has disputed that it is not a key indicator. Levitas (1998) analyses the literature around the subject, ad provides three key social policies relating to the causes and solutions of social exclusion. She dubs these discourses; Redistribution Discourse (RED), Social Integration Discourse (SID) and Moral ‘Underclass’ Discourse (MUD). The first RED is firmly linked with to poverty, it sees social exclusion as both a consequence and cause of poverty, its aims are to tackle poverty and redistribute the wealth, and more recently power. Its solution is mainly focused creating an inclusive society, which is what Lister states, is the antonym of social exclusion. Lister was criticised by Dean and Melrose (1999) who â€Å"states that they opposite of exclusion is not inclusion but integration† (31). SID, a social integrationist discourse, again sees social exclusion as a cause of poverty, but this time through the means of unemployment. Their solution is to support the unemployed whilst encouraging them to fins work, effectively making sure everyone is economically active. This discourse was criticised for a number of reasons, firstly it did not consider other elements that could lead to social exclusion, as it is possible to be employed but still socially excluded though; low income, working long hours and employment segregation (Dean and Melrose, 1999). Secondly it does not actively consider the role of discrimination or prejudice in creating social exclusion (Gallie and Paugam, 2002). Finally MUD (right wing version), which places an increases emphasis on moral and cultural causes of poverty, and the ‘dangerous class’, the solution to social exclusion as Levitas states is full employment, with a reduction in benefits and return to traditional family values, in particular reducing the number of lone parents, and never married mothers). Criticised for blaming socially excluded for their own social exclusion, glossing over structural causes and stress the negative effect of welfare in terms of increasing ‘dependency’ (Jackson, 1999). However although Levitas has pointed out that all literature implied that social exclusion must have an element of poverty to it, she has been criticised; for it is possible to be poor and not socially excluded; students are a prime example of this (Oppenhiem, 1998). From Levitas’ analyse of discourses, it is very clear to see that has not just replaced the term poverty, but has become a complex concept in its own right; however there is a connection between the two terms. Lister (2004) explored the relationship between poverty and social exclusion via an empirical and conceptual level. Empirical link between the social exclusion and poverty is presented in the form of causal/sequential trajectory. Walker and Parker follow a sequential trajectory of moving from income poverty to social exclusion, â€Å"involving a simultaneous process of detachment from social institutions†(1998: 40). Supporting this sequential trajectory is the Council of Europe, who believes that living in rundown areas, underemployment and not supported by the welfare makes poverty sequentially move into socially exclusion. Room adopts a more qualitative difference, where he argues that primarily: â€Å"†¦social exclusion, understood in its core sense, is associated with intense ‘multidimensional’ disadvantage carrying with it the connotation of separation and permenance, and repents rupture or catastrophic discontinuity in relationships with the rest of society, which is to some considerable degree irreversible â€Å" (1999, 171: 2000) In summary of the sequential/causal poverty, it can lead to social inequality, but also as Sen (2000) points out, it can also go in the opposite direction, social inequality can, in fact, cause poverty and deprivation. Having explored the empirical view it is now move onto the conceptual level, here the issue centres around the ‘value added’ that social exclusion adds to poverty (Micklewood, 2002: 28). This exploration will begin with a bit of scepticism, Øyen criticises this model because she feels that the sicken truth of the reality of poverty is shielded by the ‘umbrella’ of social exclusion. Rights and regulation, Room (1995) argues that social exclusion requires a connection to wider society, from which they one can be excluded from. This was dismissed for being to simplistic (Bhalla and Lapeyre, 1999). Social divisions for Williams, F: â€Å"Allows us to look at issues to do with social and cultural injustices generated by inequalities of gender, race, ethnicity, sexuality, age and disability and the ways these may intersect and be compounded by issues of distribution† (1998: 15) Fact, the more unequal a society in terms of distribution resources, the more poverty there is in that society, and thus less likely that those at the top of the hierarchy will identify with those at the bottom and be sympathetic to redistributive policies designed to improve the position of the most poor. The most important issue that should be discussed in society about social exclusion and poverty is how are we going to eliminate them? As each concept is said to complement, rather than replace each other, it is able to produce more informed policies at tackling this issue. Since Labour was elected, in 1997 there has been an increasing emphasis on employment as a strategy to decrease ‘social exclusion’. Employment was encouraged, rather than having to rely on the welfare state to distribute the wealth through policies like tax and benefits (Robinson, 1998). Policies such as ‘Welfare to work’ and the enforcement of a minimum wage made employment appear more desirable. These policies were created in response to the increasing belief that our society had become too dependant on the welfare state to help supply them with their primary needs. Tony Blair, former British Prime Minister launched a ‘Social Exclusion Unit’ (SEU) in December 1997 in an effort to tackle poverty and thus social exclusion, as it created the aim â€Å"joined-up policies for joined-up problems†(SEU,2004:7) overcoming the previous ‘obstacles’ (Hamworth and Kenway, 1998) In conclusion, social exclusion has not replaced poverty but it does include poverty, however it is important to remember not all poor people are social excluded. The horrible reality is that income inequality and poverty appears as if it is here to stay. There have been many criticisms of the social exclusion as a new concept, because many feel that it will shield away the harshness of reality, and thus will create more problems in the future. However, when considering all the facts; poverty may be a cause of social exclusion, however if poverty is linked then indirectly so deprivation. In the case where we alleviate all elements combined to create poverty, then social exclusion will still exist. Due to the multi-dimensional aspect of the definition, sub-cultures are excluded based on other socially constructed issues such as age, ethnicity, race and gender. So until all issues are alleviated, some more drastically than others. Then Britain as a society will continue to exclude cert ain groups based on many different aspects of their life. (2,067) References: Duffy, K (1998) ‘Combating Social Exclusion and Promoting Social Intergration in the European Union’. In C, Oppenheim (ed) ‘An Inclusive Society: Strategies for Tackling Poverty’. London: IPPR Howarth, C and Kenway, P (1998) ‘A Multi-Dimensional Approach to Social Exclusion Indicators’. In C, Oppenheim (ed) ‘An Inclusive Society: Strategies for Tackling Poverty’. London: IPPR Mulgan, G (1998) ‘ Social Exclusion: Joined up solutions to joined up problems’. In C, Oppenheim (ed) ‘An Inclusive Society: Strategies for Tackling Poverty’. London: IPPR Robinson, P (1998) ‘Employment and Social inclusion’. In C, Oppenheim (ed) ‘An Inclusive Society: Strategies for Tackling Poverty’. London: IPPR Rowntree, S (1901) ‘Poverty: a Study of Town Life’. London: Nelson Social Exclusion Unit (1997) Social exclusion Unit: purpose, work priorities and working methods Briefing document. London: Cabinet Office Townsend, P (1979) ‘Poverty in the U.K’. London: Penguin Williams, F and Pillinger, J (1996) ‘New Thinking on Social Policies Research into Inequality, Social Exclusion and Poverty’. In J, Miller and J Bradshaw (eds) ‘Social Welfare Systems: Towards a Research Agenda’. Bath Social Policy Papers, No.24. Bath: Centre for the Analysis of Social Policy