Featured Post

Globalisation,Transnationals and Economic Development in Uk(78114003) Essay

Globalisation,Transnationals and Economic Development in Uk(78114003) - Essay Example sult of such a pattern, the globalization - as a th...

Sunday, May 24, 2020

The Colors of Othello Essay - 2171 Words

The Colors of Othello In Shakespeares Othello, color imagery consistently appears throughout the text. The colors, specifically black, white, and red, create symbolic and metaphoric meanings which contribute to larger themes such as racial prejudice, good versus evil, sexuality, and murder. The colors evoke images in the characters minds, particularly Othellos. These images, along with their corresponding idea or theme, influence the actions of the characters, culminating in the murder of Desdemona by Othello. References to black and white carry the most weight and contribute much to the actions of the characters; those colors often are used as a comment on race, on good and evil, on sexuality,†¦show more content†¦(1.2.63-70) Brabantio refers to Othello as a â€Å"sooty bosom,† following Iagos earlier racial image. He stereotypes Othello, saying that magic must be involved or Desdemona, â€Å"a fair† or white woman, never would have chosen a dark man, a â€Å"sooty bosom,† to marry. The black and white images placed in Brabantios mind influence his views on Othello, or he would not have pointed out Othellos â€Å"sooty bosom.† These images that emphasize the colors are what keep him from accepting Othello. Othello defends himself against Brabantios accusations of magic, saying, â€Å"Yet by your gracious patience,/ I will a round unvarnished tale deliver/ Of my whole course of love† (1.3.89-91). Othello will tell the truth of what happened, and the tale will be â€Å"unvarnished,† or unglossed. He recognizes that the ideas associated with his color are part of the problem, and he must defend himself against racist beliefs. By telling an â€Å"unvarnished tale,† a taleShow MoreRelatedEssay on Characters in Othello: Colors and Shapes687 Words   |  3 PagesThe color and shape I chose for Othello are silver and the indifferent shape. I thought about it for a while and this indifferent shape fits othello perfectly for many reasons. Like Othello this is the outsider of the group since it has no real shape. The shape’s physical appearance is different from the rest, just like Othello is since he’s a moor and has a different skin tone. Towar ds the end of the third act Othello starts to lose his stern confidence front and his real insecurities come out.Read MoreHow Does Othello s View On The Color Of His Skin Affect The Racial And Social Tensions Between Him830 Words   |  4 PagesCharacters Professor Berg 12/6/15 Race in Othello How does Othello’s view on the color of his skin affect the racial and social tensions between him and the other characters? What does it mean that Shakespeare uses a Moor as a protagonist? In Elizabethan society race played a prominent role in social status and the relationship between people. In William Shakespeare’s Othello, race is key in understanding the complex relationships between characters. The work Othello was based on a story by Giraldi CinthiosRead MoreOthello, By William Shakespeare1515 Words   |  7 PagesShakespeare’s Othello is seemingly about the blooming affection between a man and a woman. However, it is a love story gone wrong—or is portrayed as so by the author. In the historical context of Othello, which is set during the Turkish-Venetian war in the 16th century, it is essential to emphasize that Othello is the love story between Othello, the Moorish general, and Desdemona, the Venetian lady. This racial difference is most problematic to the eyes of the white Venetian society, allowing charactersRead MoreOthello, By William Shakespeare1140 Words   |  5 Pagesâ€Å"Othello† is a play written by William Shakespeare in 1603. In this play, Shakespeare features three major characters: Othello, Iago, and Desdemona. Othello, a black man, and Desdemona, a white venetian secretly eloped in the play. Iago shows racism and prejudice towards their relationship because of their skin colors. In the play, Iago says: â€Å"Even now, now, very now, an old black ram is tupping your white ewe. Arise, arise! Awake the snorting citizens with the bell, or else the devil will make aRead MoreThe Venetian Society in Othello by William Shakespeare746 Words   |  3 PagesOthello by William Shakespeare raises the issue of how rampant beliefs and attitudes in a society can cause a person to question their sense of self. In a society where racial equality is near non-existent, Othello, a black skinned foreigner in the Venetian society, is constantly reminded of his status as an outsider. Othello, however, is not depicted in a stereotypical manner and despite occupying a highly respected position he is often confronte d with blatant racism throughout the play. The prevailingRead MoreRacism in Othello by William Shakespeare Essay1235 Words   |  5 PagesHave you ever thought about how much Othello’s race and the racism around him affected his life? Othello struggled a lot during the play because of his dark skin color. He was called several racist names like â€Å"the Moor,† â€Å"old black ram,† â€Å"Barbary horse,† and â€Å"thick lips† (Shakespeare 1.1.40; 1.1.88; 1.1.111; 1.1.66).The term â€Å"racism† has been around for several years; it started in the twentieth century (Bartels 433). By the way the Elizabethan era viewed black people was similar to how racism isRead MoreShakespeare otherness in othello1349 Words   |  6 Pagesï » ¿Michael Grey Paper #2 11/14/13 Shakespeare’s otherness in Othello Shakespeare when writing Othello uses many different underlying themes for the reader to try and pick up on. One of the biggest is otherness. Otherness is defined as the quality or condition of being other or different, especially if exotic or strange. Shakespeare throws at the reader some interesting topics to think about race, a handkerchief, feminism, and many more. All these different topics Shakespeare wants the readerRead MoreOthello, By William Shakespeare1709 Words   |  7 Pagesassociated with color, specifically blackness, has a detrimental effect on the victims who are racially stereotyped. The character Othello is a unique character in English literature, because unlike the other members of society, Othello is an outsider in Venice. He is a black man living in a white world, married to a white woman, and a leader of white men in battle. Othello is persuaded that his wife, Desdemona, is cheating on him, leading him to murder her. Some argue that because Othello was the typicalRead MoreInsecurity In Othello Essay1026 Words   |  5 PagesOthello’s insecurity about his skin color and heritage is a tragic flaw. He is the highly-respected general of the armies of Venice. He is not a native of Venice,Which makes him more likely to harassment from the people of Venice. Othello is easy prey to insecurities because of his self-consciousness about being a racial and cultural outsider. This is a tragic flaw because it leads to death. He is insecure about himself already, and when he finds out that the one person he truly loves and trustsRead MoreIn Shakespeare’s Othello, race is a concept that is only minimally explored. Characters in the play1400 Words   |  6 PagesIn Shakespeare’s Othello, race is a concept that is only minimally explored. Characters in the play assume that, since they are English, they are superior and foreign characters (like Othello the Moor) are inferior. This is not questioned much at all, and in fact it is a ssumed outright that Othello is indeed a lesser man because of his skin color and the ways in which characters like Iago and Roderigo treat him. While an early modern audience would accept this concept without hesitation, an audience

Wednesday, May 13, 2020

Electronic Health Record Implementation ( Ehr ) - 1450 Words

Electronic Health Record Implementation Sara Morrison Ohio University Electronic Health Record Implementation Technology has come a long way over the years and continues to advance rapidly. The health care system is greatly affected by the advancements in technology. An example of this would be the use of electronic health records (EHR). In this paper I will be describing the electronic health record system. How my facility has initiated the EHR with following the six steps and describe meaningful use and how my facility is working towards this. Lastly I will discuss how to maintain patient confidentiality with use of EHR, and what my facility is doing to prevent HIPPA violations. Description of the Electronic Health Record (EHR) In 2004 president George Busch announced the goal to mandate electronic health records for every American by 2014. This would require every paper chart to be converted to electronic chart so that health care providers and the patient themselves can access their information through the internet (Simborg, 2011). The purpose of developing the EHR is to provide appropriate patient information from any location. Also to improve health care quality and the coordination of care among hospital staff. To reduce medical error, cost and advance medical care. Last to ensure patient health information is secure (DeSalvo, 2014) The Department of Health and Human Services appointed the Office of the National Coordinator for HealthShow MoreRelatedElectronic Health Record Implementation ( Ehr )1085 Words   |  5 PagesElectronic Health Record Implementation The way in which facilities access patient’s health records have changed from paper charts to electronic health records (EHR). Healthcare facilities have been mandated by the federal government to start using EHR for access and storage of health information (Department of Health and Human Services, 2008). There are six steps that assist facilities in order to prepare them to start utilizing EHR (Office of the National Coordinator for Health Information TechnologyRead MoreThe Implementation of an Electronic Health Records System: Advantages and Disadvantages1784 Words   |  7 Pagesï » ¿RUNNING HEAD: Implementation of Electronic Health Records System Implementation of Electronic Health Records System Student Name University Name Abstract The preceding paper discusses the implementation of Electronic Health Records (EHR) in detail. The advantages and disadvantages of the implementation of EHR have been highlighted in the paper. In addition to that, the paper also puts light on the five attributes of an innovation that make it acceptable, which were proposed by Rogers. ApartRead MoreChallenges And Solutions For A Successful Ehr Implementation Project1430 Words   |  6 PagesSolutions for a Successful EHR Implementation Project Abstract Despite of the benefits of electronic health records in medical practices, some healthcare providers are reluctant to implement of this project due to many barriers and limitations such as usability, technical ability, cost constraints, standardization limitations, and resistance of change. The main barriers to adoption of EHR systems for healthcare providers and strategies of the successful implementation project have been identifiedRead MoreThe Electronic Health Record ( Ehr ) Essay1367 Words   |  6 PagesThe electronic health record (EHR) is a developing idea characterized as a longitudinal accumulation of electronic health data about individual patients and family member (Gunter Terry, 2005). Fundamentally, it was a component for incorporating health care information as of now gathered in both paper and electronic therapeutic records (EMR) with the end goal of improving the quality of care. Despite the fact that the classic EHR is a different area, cross-institutional, even n ational build, theRead MoreWill The Ehr Increase Clinical Utility By Providing The Patients With Easy Data Accessibility?978 Words   |  4 Pages1. Will the EHR increase clinical utility by providing the patients with easy data accessibility? 2. Will the EHR allow users to see the course of disease in terms of activities and responsibilities? 3. Will the EHR allow users to monitor compliance in daily basis? 4. Will the EHR help in adjusting the course of chronic disease in a standardized program? These questions needs to be verified in order to establish the usefulness of the system. In short, when clinical simulation is to be carried outRead MoreBenefits And Implementation Of An Electronic Health Record1233 Words   |  5 Pages Introduction An electronic health record (EHR) is a digital version of a patient’s paper chart. Through EHRs information can be available instantly and securely to authorized users. Electronic Health Record contain the medical and treatment histories of patients, patient’s medical history, diagnoses, medications, treatment plans, immunization dates, allergies, radiology images, and laboratory and test results, it allows access to evidence-basedRead MoreThe History of Electronic Health Records (EHR): An Electronic Health Record is defined by NEHTA1500 Words   |  6 PagesHistory of Electronic Health Records (EHR): An Electronic Health Record is defined by NEHTA Acronyms, Abbreviations Glossary of Terms (p22, 2005) as â€Å"an electronic longitudinal collection of personal health information, usually based on the individual, entered or accepted by healthcare providers, which can be distributed over a number of sites or aggregated at a particular source. The information is organized primarily to support continuing, efficient and quality health care. The record is underRead MoreHealth Informatics And The Health System1717 Words   |  7 PagesWhat is health informatics in Canadian health system? Health informatics transforms health care by assessing, analyzing, integrating, and applying health communication and informational systems (Anderson, 2007). Health informatics schemes are funded federally and implemented provincially in Canada with each province creating its own dynamic programs to help improve both the population and individuals health outcomes, enhance patient’s care and t o strengthen the patients-caregiver relationshipRead MoreConversion to Electronic Health Records Essay1039 Words   |  5 Pagesexciting time to become part of the health care industry! Medical research makes new discoveries to improve the quality of patient care and save lives on a daily basis. Health care reform is gaining momentum, revolutionizing the industry and requiring many administrative changes, such as the creation of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Rules and standards evolved from this act provide a way to ensure your protected health information remains confidential. InRead MoreListening About Electronic Health Records1577 Words   |  7 Pagestalk about Electronic Health Records (EHRs). Throughout the paper, I will state the EHR mandate, who started it and when, its goals and objectives. I will explain how is the Affordable Care Act (ACA) connected to the EHR. Furthermore, I will describe my facility’s plan and meaning ful use. Finally, I will define Health Insurance Portability and Accountability Act (HIPAA) laws and what is being done by my facility to prevent HIPAA violation. Description of the Electronic Health Record EHRs are computerized

Wednesday, May 6, 2020

Forensic Science Free Essays

Forensic science Free Essays I went to JoAnn Fabrics to get a Slinky Science fingerprint science kit so I could use the powder and the feather from the box. The powder came in a bottle so it made it really hard to get prints and I actually had my boyfriend put prints on the things I listed so I could use the powder and the powder was also white and made it hard to see. When I used the feather it would smudge the print and I would have to try and use It a different direction. We will write a custom essay sample on Forensic science or any similar topic only for you Order Now If I were to side to side with the feather It would smudge the print but if I would go up and down It would SSH the powder away so I was able to see the print better but not clearly. I did not find any prints In my apartment due to my boyfriend cleaning everything. This Is why I only find the prints I did because I asked him to put the prints there. Yes I could tell the difference between the prints If I were to put my print right next to It. My finger print has loops and my boyfriend’s prints have tent arches on them. Some of the surfaces that I would think I would find prints on are door knobs, TV, the handle on a microwave, the keys to the car, the thermostat and light switches, books, cell phones ND you could also get prints off of duct tape and the door handles of a car that has metal handles and you can get prints off of garbage bags also and DVD cases. When I was doing this assignment I found that trying to get a print from surfaces that were clean was hard but you could see where It was wiped down and the smoother surfaces were harder because the powder would Just move around and would not suck to the surface all that well. I also noticed that using white powder was not all that great because you could hardly see the print and that would be why we use the lack powder to get fingerprints off of different surfaces. Juju By boosters print and I would have to try and use it a different direction. If I were to side to side with the feather it would smudge the print but if I would go up and down it would find any prints in my apartment due to my boyfriend cleaning everything. This is why the difference between the prints if I were to put my print right next to it. My finger clean was hard but you could see where it was wiped down and the smoother stick to the surface all that well. I also noticed that using white powder was not all How to cite Forensic science, Papers

Tuesday, May 5, 2020

Network Security Assessment Detect a Denial of Service

Question: Discuss about the Network Security Assessment for Detect a Denial of Service? Answer: Vulnerability Assessments Vulnerability in network security is defined as the weakness or flaw in the flow of network which minimizes the assurance of information that available in the corresponding device ie., Vulnerability is the state at which the device is not secure and open for the attackers. Most common network vulnerability [8] which pushes the device to the insecurity level are, Shellshock attacks Backdoor attacks Denial of Service(DoS) attacks SSL attacks Botnet attacks Brute force attacks Browser attacks Among the above mentioned vulnerabilities, Denial of Service attack [1] is the most common attack that occurs often, in both industry and also in domestic level. The attack that suspends the network to the device or system, the attack due to the network servers is called as Denial of Service attack. In simple words, DoS prevents the network servers to be available to the users. Most commonly these DoS attack occurs due to the flooding of network with a network. When the user types a particular website or URL into the browser, the device sends a request to the corresponding site server. The network server can acquire only few sets of requests, if the user overloads the server with too many requests, the server cant process the request, where the user cant access the corresponding site, such state of inaccessibility of users is called as DoS attack. In other words (DoS) attack is also called as Distributed Denial of Service (DDoS), in which the attacker uses the own computer to attack more than one targeted device. Due to the Distributed Denial of Service (DDoS) . Due to the attacking of the computer from the current computer, the user could take advantage of using the defected device. This attack is called as Distributed DoS, because the attacker is using multiple computers. The another form of implementing the DoS [1] is through Email messages, where the attacker can launch the similar form of attack through email account. These kinds of attacks, often occurs due to the free service of mails such as Yahoo or Hotmail. By sending bulk number of email messages to the single mail address, an attacker can get the provisions to use the corresponding mail account. Once the computer is attacked by the Denial of Service (DoS) attack, the web browser will show the message like HTTP error (Error Number), the service unavailable. How to Overcome DoS: To overcome this kind of attacks, the corresponding website should have the capacity to handle 10,000 users[1], only then the site can handle 1,00,000 users. Check the flow of the website periodically, to check whether the website is in the normal flow or in a slothful manner Periodically check the statistics of the web sites, if it is in a normal form then the site is not attacked by DoS, if the statistics has more flaw then the user can confirm that the site is attacked with DoS or DDoS. If the website is attacked with the DoS, the user can check the source of the attacker through the Unix command called netstat-an [2] , which will describes the Protocol, Local Address of the site, Foreign address (IP address of the attacker), and the State, where the state may be Listening, Established, or Time Wait. If the user is waiting for the response of the site then the state will be listening, the user is currently using the site then the state will be in Established, the user is closed the site then the state will be n Time-Wait site. Scenario Security of wireless network of small accounting firm: Wireless Network In our case we required to secure our wireless network. So this case we can do by using our NETGEAR MR814 router device security settings. Here given below are the steps to secure wireless network infrastructures: Before we get started there is a little bit of background info that you should be familiar with Wireless Name Your wireless network needs to have a name to uniquely identify it from other wireless networks. If you are not sure what this means we have a guide explaining what a wireless name is that you can read for more information. Wireless Password An important part of securing your wireless network is choosing a strong password. Wireless Channel Picking a WiFi channel is not always a simple task. Be sure to read about WiFi channels before making the choice. Encryption You should almost definitely pick WPA2 for your networks encryption. If you are unsure, be sure to read our WEP vs WPA guide first. Login to the Netgear MR814v2 To get started configuring the Netgear MR814v2 WiFi settings you need to login to your router. If you are already logged in you can skip this step. Find the WiFi Settings on the Netgear MR814v2 If we login to our router device then we should see this screen. For the Netgear MR814v2 you begin on the Router Status page. Click the Wireless Settings option in the left sidebar under the Setup heading. Change the WiFi Settings on the Netgear MR814v2 On this new page we are able to configure the Wireless options to our liking. There are four settings that really need to be changed for the best and most secure wireless experience. The first is titled Name (SSID). This is our local network's ID. Be creative but avoid personal data. The second setting is titled Channel. For the least interference our channel should not partially overlap our neighbor's channel. Completely sharing a channel is okay though. If everyone used channels 1, 6, or 11 there would be a lot less interference. Make sure our wireless network is using channel 1, 6, or 11. Read our WiFi Channels Guide for more information. Now we need to change the Wireless Encryption. This router allows for WEP security. This is a very weak form of encryption and can be cracked quickly. Do not use WEP. Use WPA2-PSK security option for more private secure network. Now we had WPA2-PSK then you would need to enter a Passphrase PASSWORD. Create a strong and memorable password to login to our internet. That's it, just don't forget to click the Apply button before you leave this page. The password we have created to log in, by only this password one can access to our internet. So we have 20 Pcs and 2 printers and 1 iPad by applying the log in password to all this devices, this devices are now accessible to use internet. Also this device create a network infrastructure to share file and folders between all this devices. Network/System Security Recommendations Generally, there are two forms of Denial of Service (DoS) attack, which are as follows, Flooding Services attack Crashing Services attack Flooding Services Attack: Flood attacks occurs when the website or the system receives too much of service requests, which causes the system to be shut down or stops the overall process, Some of the Flooding service attacks are ICMP flood SYN Flood Buffer Overflow attack (BOA) In the BOA the attacker sends bulk amount of service requests to the websites, which will be beyond the number of requests that can be handled by the site, these kind of buffer overflow attack is specific only to some of the applications such as Web applications, Internal memory of the device. The two main types of BOA are, Heap Based Overflow Stack Based Overflow Some of the common ways to handle BOA are, Use canaries or default values in the website, when the default value changes the user will get the notification that the attacker has entered ie., DoS has occurred Protections can be made to the internal memory through shell code Use of address layout randomization to prevent the attackers in the specified location. ICMP Flood: ICMP is abbreviated as Internet Control Message Protocol, ICMP [4] attackers not only attacks the single system also attacks the devices which are connected to the targeted device. This attack is also called as Smurf attack or Ping of death. The ICMP error messages are up to 1280 bytes. The IPv4 [5] protocol possess ICMP messages and IPv6 protocol possess ICMPv6 messages. Some of the ICMP messages with type numbers [5] are, Unassigned [1] Source quench [4] Echo [8] Router advertisement [9] Timestamp Reply [14] Timestamp Request [15] Echo Reply [0] Redirect [5] Timestamp [13] Destination unreachable [3] SYN Flood Attack: In the SYN flood attack [4], the attacker pools the targeted system by sending n number of SYN requests, where the targeted system fails to send the acknowledgement message or the targeted system becomes unresponsive. SYN flood attack is also called as half open attack. Crashing Services Attack (CSA): In the CSA, the attacker aims to crash the targeted device. In the crashing service attack the targeted system is attacked from the multiple attackers which makes the targeted system to shut down or affects the processes in it [4]. The another method to detect DoS is IP reputation, some Internet Protocol addresses aims to produce malevolent traffic than the other attacks. Internet Protocol reputation is referred as a system of scoring that goes through at a sites penchant to get the targeted system which is as like as DDoS attack, vulnerability scanning and web application attacks. This attack can also be used to alert filter the site traffic automatically. Internet Protocol reputation can easily be overcome by cloud security. Scenario 2 - Expanding Network by Using Network Switch: Let say accounting firm has a network which is shown as below. The router bought only got 4 Ethernet LAN ports. All 4 ports are connected to PC. Still there are 20 Pcs in office. So how to connect remaining PC to our network. You can use a network switch to solve your problem. This is a device that joins multiple computers in your network, and so those connected computers can communicate with each other. The switch is commonly used to expand wired network and the good thing is it's not expensive. There are 4-port, 8-port, 16-port, 32-ports also 50-ports switch available in the market. The Ethernet that can be supported by the switch are 10Mbps, 100Mbps or 1000Mbps. usually 100Mbps switch would be sufficient to support your network unless you run Gigabit network (1000Mbps). This is what we need to do: Buying a switch and connect Ethernet LAN port from router to one of the normal ports on network switch by using crossover cable. If there is uplink port on the switch, you can connect it to routers Ethernet LAN port using straight cable, but usually this is not available for those entry level switches. After that, you can connect computer and notebook to the switchs normal port by using straight Ethernet cable, finally they are all connected to network and able to access Internet. The LED on the switch will show you which ports are connected. This is 50-port Switch to use in network sharing system. III. Application/End-User Security Recommendations The risks that are occurs due to denial of Service(DoS) attack is affects the network bandwidth, decreases the server memory, Application exceptions, CPU usage, minimizes the hard disk space, database space, database connection pool. Attack Mitigation Systems (AMS) [3] is the most known application and recently used technique to overcome DoS attack. The attacks that are overcome through AMS are web destruction, pilfering of information, exploitation of application vulnerability. In order to prevent the attacks in network flow the Attack Mitigation System (AMS) is also called as Attack Mitigation Network (AMN) [3], AMN combines the distributed detection elements and mitigation elements to synchronize the traffic baselines and to prevent the information from the attackers. AMN increases the frequency, difficulty and brutality of information, security solutions. The another way to avoid DoS in web server is controlling the performance of the server, which adjusts the server response with respect to the server requests, Low Rate DoS (LRDoS) is the attacking of cyber physical systems in order to reduce the performance of the feedback based applications. XSD (XML Schema Definition) is the current technique which is used to avoid the DoS, which is most popularly recommended by World Wide Web Consortium (W3C), where the prevention of the user through XSD is done through XML (Extensible Markup Language) document. XSD provides the C++/Tree mapping to customize the attackers of the particular user. Step by step procedure for XSD is, Analyze the state for each user login Create a separate service request and acknowledgement for each user Analyze the number of service requests and acknowledgements provided Validate the acknowledgements The another method to detect DoS is Clogging Participation Rate(CPR), in the CPR method the user can filter and detect LDDoS attacks, also to analyze the intention to attack the site. In the CPR method the user can detect the attacker with the help of the statistics report, which peculiarly shows the attacked part. The CPR approach is more quick and better than the previous method Discrete Fourier Transform (DFT). But in CPR the user can analyze only the websites or web servers based on the Transaction Control Protocol (TCP), because only in TCP protocol the network congestion and loss of packets will not occur. The CPR analysis is based on sending of packets and receiving the acknowledgement for the same. Scenario Use of firewall in context of network system of small accounting firm Firewall A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. In our scenario we have used NETGEAR MR814 router device and it is connected to a Motorola SB3100 cable modem. So our NETGEAR MR814 router device itself acts as a hardware firewall. So we dont need to use any software firewall. If in our system, any individual or particular programs we need to stop allowing internet access to that only program or application then we can use software firewall system. Microsoft Firewall system gives this type of facilities. But in our case we did not required to do this. Bibliography Mindi McDowell , Security Tip (ST04-015) Understanding Denial-of-Service Attacks, US-CERT. Available: https://www.us-cert.gov/ncas/tips/ST04-015. [Accessed: 06- Feb- 2016]. Greg Thatcher, How to Detect a Denial of Service (DoS) attack, Thatcher Development Software, 2013. [Online]. Available: https://www.gregthatcher.com/Azure/Ch2_ Detecting Denial OfService.aspx. [Accessed: 07- Feb- 2016]. Palo Alto Networks, Denial of Service Attack - Prevent DoS Attacks with Palo Alto Networks - Overview of DoS attacks. [Online]. Available: https://www.paloaltonetworks. com/resources/learning-center/what-is-a-denial-of-service-attack-dos.html. [Accessed: 07- Feb- 2016] Gorry Fairhurst, Internet control Message Protocol [Online]. Available: https://www.erg.abdn.ac.uk/users/gorry/eg3567/inet-pages/icmp.html. [Accessed: 08-Feb- 2016] Gorry Fairhurst, ICMP Type Numbers, [Online]. Available:https://www.erg.abdn.ac.uk/users/gorry/eg3567/inet-pages/icmp-code.html.[Accessed: 08-Feb- 2016] Peter Crowcombe, Network Vulnerabilities, Infosecurity. [Online]. Available: https://www.scmagazine.com/network-vulnerabilities/article/30530/. Accessed: 08- Feb- 2016] Derek Manky, "Top 10 vulnerabilities inside the network", Network World, 2016. [Online]. Available: https://www.networkworld.com/article/2193965/tech-primers/top-10-vulnerabilities-inside-the-network.html. [Accessed: 09- Feb- 2016]. Calyptix, Top 7 Network Attack Types in 2015 so far, [Online]. Available : https://www.calyptix.com/top-threats/top-7-network-attack-types-in-2015-so-far/. [Accessed: 08-Feb- 2016]