Featured Post

Importance of patient confidentiality Essay

Medicinal services experts have an obligation to keep up secrecy for their patients. Wellbeing experts may not uncover any patient data unco...

Sunday, January 26, 2020

Wireless Network Security

Wireless Network Security There is a growing need to find lasting solutions on how to deal with security issues involving with wireless networks, in order to make them as secure as possible. The growth of the Internet has been an explosive since inception, and this has lead to a great increase in the number of portable/mobile computing and communication devices such as notebook computers and mobile phones, in recent years. As manufacturers constantly improve on the features, and general capabilities of mobile devices, the Internet also continues to get bigger and to improve, even at a faster rate than these mobile devices. In fact, the market for mobile computing and telecommunications is likely to overtake the market for fixed (conventional) computing and telecommunications, in the near future. This is because there has been a consistent growth in the demand for mobile devices for computing and telecommunications. [1] Without a doubt, wireless technology was has been a very relevant and vital breakthrough in the computer and telecommunications world, and the Wireless third generation (3G) network is proving to be increasingly beneficial to many users of various networks. The main advantages of the 3G networks are that they provide a lot more interconnectivity and, a better and wider reach. Wireless Local Area Network (WLAN) has also been advantageous. Some of the advantages of WLAN include the use of Broadband service with low costs and wide-reaching technology. Therefore, integrating 3G wireless networks with wireless local area network was invented, naturally, so as to get the best of both words of3G wireless network and WLAN. [1] http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf Background. WLAN and 3G are two key mobile/wireless technologies, which have been identified to have great potential in terms of value to the customer. While 3G is a standard that defines technology that can provide high bandwidth wireless access over a large area and supports various services such as roaming, WLAN is a disruptive technology that provides higher bandwidth within small areas. With WLAN getting integrated to 3G networks, there are several security threats that need to be considered. These are threats that are unique to such an integrated network as well as threats due to the vulnerabilities inherent in each network. The 3rd Generation Partnership Program (3GPP) has defined the standards for the integrated WLAN-3G network. The organisation takes into consideration several security issues, as part of its standardisation efforts. However, there are still some gaps in the security that can adversely affect service delivery and vulnerability. From the security point of view, the network architectures are defined for both Roaming and Non-Roaming inter-working scenario. Additional components are specified to the 3GPP network architecture to facilitate inter-working such as Packet Data Gateway (PDG) and WLAN Access Gateway (WAG). The inter-working is based on UMTS Authentication and Key Agreement (AKA) authentication method. This requires a user equipment to run the USIM application. This means that WLAN user equipment is equipped with capability to use UICC smart cards. The inter-working mechanism enables a 3G mobile network subscriber to access WLAN networks operated by different service providers. This also supports roaming scenarios. Wireless local area network (WLAN) and 3-G devices enable users to carry their computers and communication devices around within their offices and homes, without having to handle any wires and without having to disconnect from the network when moving around. There is greater flexibility with these devices, due to less wiring, thereby increasing overall efficiency, and also reduced wiring costs. For instance, networks that use Bluetooth technology can be used for synchronization of data with network systems, and enable the sharing between of computer applications between devices. With Bluetooth functionality, there is no need for printer cables and some other connection equipment for peripheral devices. 3G network based security threats. The key threats for 3G networks in perspective of integration of networks are: Wireless LAN customer who does not have access to 3G networks get access to 3G services without subscription. WLAN user gains access to 3G network and creates issues such as Denial of Service WLAN user gains access to 3G network and uses impersonation for using the service but charging other customers. Manipulation of charging when services like calls are transferred from one network to another. Application and Data related threats. Collection of login details and personal details that are transmitted over the network by using sniffing tools and mechanisms, especially when sufficient transport security is not set. Manipulation of information used for user authentication or service access to gain access to unauthorised services or manipulation of billing. Extracts personal information that are used at other places such as credit card information. Obtain information about user such as permanent identity in the network. Virus attacks from WLAN devices to other devices in the network Trojans and malicious software passed from one end-device to another. For volume based charging model, a rogue partner can flood the user with garbage packets to increase the invoiced amount. Malicious programs on the user terminal that increases the traffic to certain sites or content to illegally increase the traffic. Security Considerations for 3G-WLAN Integrated Networks. The security framework for 3G-WLAN integrated networks consists of various layers. Each security layer is independent of the other layers. However, there needs to be an overall security scheme that connects all the security requirements together. Also, since some of the vulnerabilities can happen at multiple layers, a holistic approach and framework is required to address all the risks of the special network. Authentication security at the user terminal. The authentication scheme in the case of 3G-WLAN should be based on a challenge response protocol similar to the existing mobile communication authentication scheme. This requires that the authentication details in the user terminal to be stored securely on UICC or SIM card. This should support mutual authentication and security mechanisms such EAP. Signalling and User Data Security. The subscriber needs to have the same level of security as the mobile access that is specified for the 3G networks. This means that the WLAN authentication and re-authentication mechanisms must be at the same levels as for 3G USIM based access. It needs to support the maintaining session key verification and maintenance. Also the 3G systems should provide the required keys with sufficient length and levels of entropy that are required by the WLAN subsystem. WLAN key agreement, distribution and authentication mechanism should be secure against any attacks by middlemen. The WLAN access technology between the user equipment and the access point/ network should be able to utilise the generated session keying material to ensure the integrity of the connection for authentication. Privacy of User Identity. The keys used by 3G AAA function that are used for the generation of temporary identities that is used for the communication between the network element and the user terminal should not be possible to recover. If it is possible to retrieve the keys, the permanent identity can be derived from any of the temporary identities. Also it should be possible to mask the different temporary identities corresponding to the permanent identity. Security of the access interface. The access interface between the user equipment and the network element should be protected against eavesdropping and all attacks on the security-relevant information. Sufficient cryptographic mechanisms should be employed to ensure adequate security, and at least 128 bit encryption keys should be used for the security system. The interaction between the different endpoints of the local interface should be properly authenticated and authorised. Also the keys used for the security should not be shared across the local interface links and each interface should use unique keys. Access of the user terminal and SIM remotely should be monitored such that the user can choose to allow or disallow the connection. Displaying of the information should be provided to the user to enable the user to take the decision. Further, the USIM information should be secured when it is transferred across different networks such as 3G core network, WLAN network or any other networks involved. Link Level Security. Wireless link can be classified as the most vulnerable interface among all the interfaces in the 3G-WLAN integrated network. The link layer security provided by the WLAN network should be used for ensuring security at this layer. At this layer, the confidentiality and integrity of user data should be protected. In addition, any signalling information between the user equipment and the access point should also be secured. Another area of vulnerability is the key distribution, key validation, key freshness and key ageing. Security of any Tunnelling. UE can tunnel information to other devices in the Visited PLMN or the Home PLMN. When such tunnelling is employed, the data origin should be authenticated and integrity checks should be supported. Also the confidentiality mechanisms should be in place between the systems. As the 3G systems have defined security roles in tunnelling, the decision on allowing tunnelling is a function of the 3G network. It is essential to implement the right decision parameters such as level of trust in the WLAN access network or the Visited PLMN involved, capabilities supported in the WLAN user equipment in terms of security in tunnelling and whether the user is authorised for such services. Privacy of User Identity. User identity privacy ensures that none of the permanent subscriber identification information is send across the network in clear. This is based on temporary identities such as pseudonyms or re-authentication identities. Sufficient security procedures should be followed in generating, distributing, using and updating these identities. Also the period of maintaining a temporary identity is also important to prevent tracing of the identity. Various scenarios need to be considered for design of such a system such as: WLAN UE receiving more than one temporary identity from the AAA server Tunnel establishment If the identity privacy support is not activated by the home network Confidentiality Protection. The confidentiality protection should consider different scenarios and network access options. The key scenarios are: In WLAN direct IP access: Here the function is implemented using the WLAN access network link layer. In WLAN 3GPP IP access: Here the integrity of IP packets that is sent through the tunnel between the user equipment and the network should be protected. Research Points. Authentication, Authorisation and Accounting are the most important factors in ensuring network security. There are various techniques available in various types of network available for AAA. One example is UMTS-AKA in 3G network and EPA in wireless networks. Each of these techniques are suitable for the respective types of networks and considering the security requirements. With the integration of networks, the characteristics expected of the integrated network are a combination of both networks. The integrated network is expected to work with the same simplicity and efficiency as a WLAN network but with the security implementations of a 3G network. However a 3G-network security introduces overhead on the network resources that are not desirable in the integrated network. Also when there is an access from one network to another, the overall security profile of the integrated network is that of the weaker part of the network, in this case, the WLAN network. There is a need for the use of the AAA method, which is simple in operation in terms of the message handshakes required and delay introduced and at the same time secure enough to match the 3G network security requirements. The objective of this research is to: Evaluate the current AAA mechanisms available in terms of its capability, Recommend the best option for WLAN-3G network in terms of the efficiency and the security effectiveness. Methodology The methodology for identification of suitable AAA function involves the following: Evaluation of the currently selected methodologies used UMTA-AKA, WLAN-EAP These protocols are evaluated in terms of the overhead required to handle the mechanism and strength of the method infrastructure required to support the system in terms of network elements. Identification of other methodologies used in other technologies and networks Profiling of the different technologies in terms of the capabilities, limitations and characteristics Establishment of minimum requirements of 3G-WLAN network Comparison of profile to the minimum requirements established and selection of methodologies Recommendation of modifications required in the methodologies to suit to WLAN-3G environment. Research Tools. Various tools and resources will be employed during the course of this research, including: Reference implementations of AAA functions. Simulation software for evaluation of the robustness and strength of the AAA functions. Standardisation documents that provide evaluation of the AAA methodologies. Commercial products that employ AAA functions; such as WLAN access points and WLAN user equipments. Software protocol analysers for checking the message flow and function. Expected Results. This research will aim at providing guidance to operators and vendors, on the use of AAA functions for 3G-WLAN networks. Specifically, the following results expected at the end of this research: Identification of suitable AAA function for use in integrated WLAN-3G networks Recommendations of modifications required for the current implementation of the AAA function. References. A Guide to Wireless Network Security: White Paper. http://techlibrary.networkcomputing.com/rlist/920045790_12/sort_by/doc_type/IP- Networks.html Wireless Networks Evolution, Vijay Garg, 2002, Prentice Hall. http://www.cs.columbia.edu/~charles/publication/ft-concept.pdf http://fiddle.visc.vt.edu/courses/ecpe6504-wireless/projects_spring2000/report_sathyamoorthy.pdf http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm http://www.pcstats.com/articleview.cfm?articleID=1489 http://www.practicallynetworked.com/support/wireless_secure.htm http://www.windowsecurity.com/articles/Wireless-Network-Security-Home.html http://computer.howstuffworks.com/wireless-network.htm http://netsecurity.about.com/od/hackertools/a/aa072004b.htm http://netsecurity.about.com/cs/wireless/a/aa112203_2.htm http://www.networkworld.com/topics/wireless-security.html Home 3GPP TSG Services and System Aspects, 3G Security: Wireless Local Area Network (WLAN) Interworking Security (release 6), Technical Report, 3GPP TS 33.234 V6.5.1, (2005-6), December 2005. 3GPP TSG Services and System Aspects, 3G Security: Security Architecture (release 6), Technical Report, 3GPP TS 33.102 V7.0.0, December 2005. 3G and WLAN Interworking Security: Current Status and Key Issues, International Journal of Network Security, Jan 20063GPP TSG Service and System Aspects, Feasibility Study on 3GPP System to Wireless Local Area (WLAN) Interworking (release 6), Technical Report, 3G TS 22.934 v. 6.2.0 (2003-09), Sept. 2003.

Saturday, January 18, 2020

Quakers Case Essay

This research paper will argue that the evangelicals were embraced mostly by blacks not only because it’s the nearest imitation of their African nature rituals but because they have given support to the abolition of slavery in the United States. Quakers were known to be the most vocal concerning their opposition to slavery; there were also other denominations that did not favor slavery. George Fox, founder of the Quaker group â€Å"Society of Friends†, preached against slavery in the late 16oo’s, but never really took action against it. Even though Fox, a major Quaker leader, was opposed to slavery, other Quaker leaders owned slaves. This was because they interpreted the doctrines of their religion to exclude slaves. The institution of slavery became a divided issue among Quakers in the Society. Benjamin Lay, for example, was against slavery. Methodists, Baptists, and Presbyterians were very vocal concerning their dissatisfaction with slavery. (1) However, the main concern was that large amounts of the population were not being exposed to God. They had to resolve whether the larger concern was to end slavery and thus allow many â€Å"unchristian† people to go to hell after death, or to evangelize the slaves while letting the issue of slavery slide under the carpet. Subsequently, Methodists and Baptists also became the two denominations to achieve the earliest successes in proselytizing slaves (Lane 184). The first third of the nineteenth century was a significant time for antislavery. Haitian slaves had risen up and freed themselves from French rule in 1803. In England, decades of antislavery agitation led Parliament to abolish slavery in the British Empire by 1834 In the United States, sectional friction related to slavery began in earnest with the Missouri crisis of 1820. Nor were black voices silent. Free African American ministers sermonized against slavery’s cruelties. Periodic fears of slave violence came to a head in 1822 with the discovery of Denmark Vesey’s planned slave uprising (2). As the conflict over slavery heated up, and as news of the Vesey conspiracy broke in 1822, and word spread about the rebellion of Nat Turner in 1831, a great fear enveloped whites (5).   All these factors caused a few whites to begin to renew the spiritual struggle against slavery. The Reverend George Bourne, an Englishman who headed a Presbyterian congregation in Virginia, refused communion to slaveholders and excoriated slaveholding ministers. Way back 1784 Methodists were so bold as to say that they â€Å"promised to excommunicate all Methodists not freeing their slaves within two years† (5). Opposing racism is definitely amongst the strongest reasons for the abolition of slavery. This argument seems quite feasible, considering the fact that only Negroes were slaves. That is to say, skin color was the most deciding factor in whether somebody was a slave or a slaveholder (1). Catherine Meeks, professor of African American studies at Mercer University in Macon, Georgia, says, â€Å"It was the white control of the worship [on slave-holding plantations], the inability to accept blacks as equals, and the negation of black personhood that led to the separation of the black church from the white church and to the emergence of a black religious community.† (4) Independent black churches—most of them Baptist or Methodist—†were not separating themselves from whites because they held a different doctrinal view of Christianity,† notes James H. Cone of Union Theological Seminary. â€Å"Without exception, blacks used the same articles of faith and polity for their churches as the white denominations from which they separated. Separation, for blacks, meant that, they were rejecting racism that was based on the assumption that God created blacks inferior to whites.† (5) Even though white Protestant denominations in the 1840s split over the issue of slavery, the congregations of northern Protestants remained just as closed to blacks who moved north. Given the increasing racial proscription in the mid-1800’s, (9) Many Black preachers developed a significant following across the South among both whites and blacks. John Jasper of Virginia was one such man. Slaves would defer funeral ceremonies for as long as necessary to bring him to the plantation for the service. And Jasper was equally popular among whites. During the Civil War, Jasper won a warm response from the Confederate wounded to whom he preached and offered solace (9). A long history of antislavery and political activity among Northern black Protestants had convinced them that they could play a major role in the adjustment of the four million freed slaves to American life. In a massive missionary effort, Northern black leaders such as Daniel A. Payne and Theophilus Gould Steward established missions to their Southern counterparts, resulting in the dynamic growth of independent black churches in the Southern states between 1865 and 1900 (10). Predominantly white denominations, such as the Presbyterian, Congregational, and Episcopal churches, also sponsored missions, opened schools for freed slaves, and aided the general welfare of Southern blacks, but the majority of African-Americans chose to join the independent black denominations founded in the Northern states during the antebellum era. Within a decade the African Methodist Episcopal (AME) and the African Methodist Episcopal Zion (AMEZ) churches claimed Southern membership in the hundreds of thousands, far outstripping that of any other organizations. They were quickly joined in 1870 by a new Southern-based denomination, the Colored (now â€Å"Christian†) Methodist Episcopal Church, founded by indigenous Southern black leaders (11). The relentless evangelist figures were catalysts of the constitutional abolision of the slaves. They fought for the freedom through the exposure to God’s theoretical equality. Emancipation from slavery in 1863 posed distinctive religious challenges for African Americans in the South. When the Civil War finally brought freedom to previously enslaved peoples, the task of organizing religious communities was only one element of the larger need to create new lives–to reunite families, to find jobs, and to figure out what it would mean to live in the United States as citizens rather than property. Melville J. Herskovits has advanced the thesis that the success of Baptists in attracting blacks was rooted in the appeal of immersion which suggests a connection in the slaves’ mind with the river spirits in West African religions. Others have attacked this position including, the black scholar E. Franklin Frazier who argues that enslavement largely destroyed the social basis of religion among blacks, and that the appeal of Baptists to blacks concerns the emotional content of their worship. Stanley Elkins (whose views were heavily influenced by what took place in the concentration camps of World War II Europe), has argued–like Frazier–that slavery was so demeaning that blacks (like the Jews in the camps) were eventually stripped of every shred of dignity and humanity, including their faith. John Blassingame, on the other hand, has provided a significant body of evidence that blacks hung on to their religion as a form of resistance (11). African-American religion dealt with life as blacks lived it. It was about pain and sorrow, sin and shortcoming, pardon and joy, praise and thanksgiving, grace and hope. This version of Evangelicalism provided a wonderful benefit; it was able to accomplish great things in their lives that were frequently shouted about. This transition coincided with the period of intense religious revivalism known as â€Å"awakenings.† In the Southern states beginning in the 1770s, increasing numbers of slaves converted to evangelical religions such as the Methodist and Baptist faiths. Many clergy within these denominations actively promoted the idea that all Christians were equal in the sight of God, a message that provided hope and sustenance to the slaves (12). Slave Spirituals became the creative group expression of these aspirations. The Ring Shout was the most distinctive expression of religious worship in the praise service, with African-derived dancing and body movement emphasized. The invisible religion of the slave quarters also included conjure, a system of spiritual influence that combined herbal medicine with magic and sometimes gave surprising authority to slave practitioners who believed they could affect whites as well as blacks (6). They also encouraged worship in ways that many Africans found to be similar, or at least adaptable, to African worship patterns, with enthusiastic singing, clapping, dancing, and even spirit-possession. It was here that the spirituals, with their double meanings of religious salvation and freedom from slavery, developed and flourished; and here, too, that black preachers, those who believed that God had called them to speak his Word, polished their â€Å"chanted sermons,† or rhythmic, intoned style of extemporaneous preaching. The closest replication of their religious belief was the evangelicals’ approach. African Americans, often termed as ‘blacks’, was so closely intertwined with their total life experience that the starting point in understanding the meaning of that religious life must be the total life experience. For them, before they were forced to become unwilling participants in one of the most oppressive systems of slavery that the world had witnessed, the ancestors of the African Americans in Africa were very much a religious people. In their native land the totality of their lives was informed by what in western Europe was defined as â€Å"religion,† but what, to them meant as a basic and integral part of life (Jones 1991).Thus, they brought that â€Å"religion† with them. Blacks responded to the evangelical message, though, for different reasons than those advanced by slave owner-sanctioned preachers. The potential for spiritual equality, and even the hope for earthly liberty, could be taken from evangelicalism, and that was a powerful appeal to slaves. (8) Evangelicalism’s informal, spirit-driven style of worship could evoke remembrances of the religious ecstasies of African dance religions, another reason to embrace the faith. Nowhere else in southern society did African Americans find the status that they could achieve as in churches. Some African Americans worshipped in separate black churches, but black Baptists and Methodists had shaped evolving Evangelicalism in general since the earliest revivals. Most slave worship was in biracial churches. Evangelicalism took root among African-Americans. Large numbers underwent conversion, baptism, instruction, worship, and lived the life of Christian even in face of oppression. Although, the development of their own religious institutions would await Emancipation and the war’s end, there were many thousands of Negro Baptists and Methodists by 1850. Emancipation brought many tangible rewards. Among the most obvious was a significant increase in personal freedom that came with no longer being someone else’s property: whatever hardships they faced, free blacks could not be forcibly sold away from their loved ones. But emancipation did not bring full equality, and many of the most striking gains of Reconstruction — including the substantial political power that African Americans were briefly able to exercise — were soon lost. In the decades after Reconstruction African Americans experienced continued poverty and exploitation and a rising tide of violence at the hands of whites determined to re-impose black subordination. They also experienced new forms of discrimination, spearheaded by a variety of state laws that instituted rigid racial segregation in virtually all areas of life and that (in violation of the 14th and 15th Amendments) effectively disfranchised black voters. The struggle to overcome the bitter legacy of slavery would be long and arduous. Many abolitionists belonged to the African Methodist Episcopal Zion (AMEZ). AMEZ became a platform for preaching against slavery. â€Å"The ministry was by far the most common occupation of the black leaders in the abolitionist movement† (Sorin 101). AMEZ enabled people like Denmark Vesey to plan revolts. Pennington traveled as far as Europe to preach against slavery. He wrote, â€Å"If the New Testament sanctions slavery, it authorizes the enslavement of whites as well as us† (Voices of Triumph 127). Ward was born into a slave family that escaped in 1820. He lived in upstate New York and was an agent for the American Anti-slavery Society. Ward actively protested the Fugitive Slave Law of 1850. He was also an assistant to fugitive slaves (Voices of Triumph 145) (9). Over one hundred and thirty years after Nat Turner was hanged, black theology emerged as a formal discipline. Beginning with the â€Å"black power† movement in 1966, black clergy in many major denominations began to reassess the relationship of the Christian church to the black community. Black caucuses developed in the Catholic, Presbyterian, and Episcopal churches. The central thrust of these new groups was to redefine the meaning and role of the church and religion in the lives of black people. Out of this reexamination has come what some have called a ‘Black Theology’. (10) The secret meetings of â€Å"praise† of the former slaves was later institutionalized and these assemblies gave rise to independent churches. The first religious institution primarily controlled and administered by blacks was established at Silver Bluff, South Carolina in the 1770s.The Free African Society of Philadelphia, established in 1778 by two former slaves, Richard Allen and Absalom Jones was an example of one of the earliest formal organizational activity- more frequent among the free blacks in the urban North (Woodson 1922). Most of such groups were quasi-religious bodies and churches frequently came into existence from the membership of these societies. The Free African Society of Philadelphia, that newly created independent body, was the mother of two African Amertican churches- St. Thomas African Episcopal Church (later named the St. Thomas Protestant Episcopal Church) established in 1794, and the Bethel African Church (later becoming an independent organization known as the African Methodist Episcopal Church), which was the first black congregation in the Philadelphia Methodist Conference. In 1894 black Baptists formed the National Baptist Convention, an organization that is currently the largest black religious organization in the United States. There may be several reasons that evangelist were able to convert slaves, some would argue that this may be attributed to the verity that the slaves saw religion as the nearest observable fact to freedom. Still, it is quite notable that the evangelist were able to gather members not only because the African- Americans see their way of teaching as the nearest to their old rituals but also because of the evangelists’ unerring efforts to abolish slavery in the United States.

Friday, January 10, 2020

Elizabeth Film Questions Essay

Elizabeth’s time was very complicated, especially for a lady ruler. Her’s was a time when the women were regarded to be inferior to the men. Monarchy was always about the King, and the Queen was only regarded as the bearer of the son. Elizabeth was able to shine above the rest by telling them that women also had the capabilities that men had. As a ruler, the intellectual capabilities and will to lead are needed. Being a man or a woman is only a facade that may be given by people all throughout. Elizabeth’s unique way somewhat gave me the idea that life is indeed based on the perception of people. All should be regarded equally, and that chances should be given to others who have not tasted success. Furthermore, Elizabeth never showed any sign of weakness during her reign, and I believe that this is something that others should learn to follow. Decisions in the work force are not always based on the emotions of people, but on what is right and appropriate. I also believe that is just proper for all to live an open mind so that disappointments may be avoided. 9. Elizabeth decided to become married to her job. What are the pros and cons of such a choice? Committing entirely to a specific job is something that people should learn to take seriously. At a young age, Elizabeth decided to become married to her job as Queen of England. For this, she had to leave her personal life behind, and had to prioritize the welfare of her people above anyone else. Unlike other women, Elizabeth executed a fiery heart that was far different from other women her age. As the queen, she led her army during the Golden Age, while the women stayed home to cater to the needs of the children. The pride and honor that would come with such action is irreplaceable with any sum of money; however, going home alone is another unfair effect. Since she opted not to marry, she was left alone with no one to turn to in times of heartaches. She had to resolve her queries alone, and had to be strong when she was feeling lowly. 12. If you were queen or king of your organization what would you do? Do you think it’s easy to be a monarch or a CEO? Why or why not? If I were King, I would opt for a government where freedom exists. I do not want my people to be afraid by my mere presence, nor would they be hindered from airing their sentiments to me and my government. In addition to this, I also want to rein a country where love and peace exists, and where others would be happy by the simple things in life. However, I also want to put a limit on the kind of openness that may exist between the government and the people. I deem it necessary so that the people would learn to practice an honest and simple life. Personally, I believe that both positions are quite difficult to accomplish in their own little ways. However, I would opt to be a CEO than be a King of a land. Work as a CEO is only isolated to the problems that may be experienced by a company, as compared to the numerous problems that may be placed on the head of the King. Each decision that is made by the CEO is geared towards the success and improvement of the company alone, but may turn the other way around when placed in the wrong set of hands. Regardless of such impediments, I believe that people should learn to keep an open mind for change in order to accomplish everything in a more positive note. May it be a King or a CEO, what is important is the fact that as ruler, I may be able to fulfill my duties geared towards the upheaval of life.

Thursday, January 2, 2020

Madoff, A Powerful And Revered Man By Wall Street

Bernie Madoff, a once powerful and revered man by Wall Street experts pled guilty on March 12th, 2009 to the largest Ponzi scheme in history. Bernie Madoff was a very intelligent man who correctly predicted that the buying and selling of stock would be computerized. He was able to generate a unique system that provided better prices that attracted new clientele. Madoff was known as a major player and earned a great reputation from Wall Street executives as a financial wizard. The reputation of his engagement and involvement in industry organizations eventually lead him in becoming a nonexecutive chairman of the NASDAQ stock market in the early 1990’s. His success and reputation enabled his company, Bernard L. Madoff Investment Securities, to prosper and grow. Madoff targeted specific elite groups of investors, creating a prestigious reputation and making investors believe that they were members of an exclusive club. The reputation of his prestigious firm continued to grow by d eclining many requests to accepting new investors. His marketing strategy worked and attracted many more new investors. Although his account statements were pure fiction, his prominence and strategically cultivated image kept investors from questioning his success and methods. Madoff’s Ponzi scheme was very complex and operated on major scale. Typically scam artist would take money from new â€Å"investors† and use it to pay off existing investors. Eventually the scheme ends when there are no newShow MoreRelatedEssay on White Collar Crimes in America3039 Words   |  13 PagesLehman Brothers and Madoff, we find how the culprits started there deception, the aftermath of the scandal and what our country has done to prevent future scandals. In the 1920’s, Wall Street was a very different place than it is today. There was a great lack of disclosure and a great amount of stock manipulation. It was common knowledge to Wall Street professionals, and even some of the general public, that Wall Street was a rigged system that was run by large and powerful investment pools. ThereRead MoreSAT Top 30 Essay Evidence18536 Words   |  75 Pages.. 39 Inventors and Innovators: The Wright Brothers (Pioneers of human flight) ...................................................................................... 41 P age |3 Leaders, Politicians, and Businesspeople: Bernard â€Å"Bernie† Madoff (The greatest con artist in history) .................................................................. 43 Henry Ford (Kind-hearted industrialist and automobile innovator) ......................................................... 45 Malcolm X (Militant