Saturday, February 15, 2020

The Free-Trade Area of the Americas Essay Example | Topics and Well Written Essays - 1000 words

The Free-Trade Area of the Americas - Essay Example For the past few years, diplomats from 34 nations have been working hard to push for the establishment of a free trade area. The following are reasons why governments across the Americas are pushing for the free trade area. First, a country will only specialize in selling goods and services which it can do be and trade with other nations for its wants. This is a representation of actual supply and demand of free trade market. This is because when a certain country concentrates the products that it can do best, such a country takes economy of scale advantage and manufactures their products at reduced production costs. Secondly, these governments argue that free trade area will lead to increased imports and exports, thus increasing the availability of products in the involved nations, therefore, bringing healthier competition. Another reason why governments across the Americas are pushing for a free trade area is that it will reduce living costs, thus increasing economic growth. This i s because it will do away with governmental interventions such as taxes and tariffs thus enabling consumers to purchase products at reduced costs. This will also bring good bond between the involved countries leading to healthier governance and diplomatic global ties. Anti-FTAA group claims that free trade agreement extends treaties that were already adopted (NAFTA and FTA) from the acute North of Tierra del Fuego, Canada, and NAFTA had noxious outcomes with Mexico and the impacts negatively workers in the United States and in Canada. Therefore, the protests argue that from this example, it is evident that the FTAA will bring disastrous effects on Latin America. From the protests point of view, the accords of Free Trade are Globalization masterpieces and thus they will allow deregulation as well as the opening of new markets through the elimination of trade barriers such as worker rights and environmental protection. Additionally, these accords will contribute to commodification and privatization of things such as education and healthcare services and due to globalization, Free Trade aims at enriching â€Å"world masters† called big capitalists and financiers.

Sunday, February 2, 2020

Network Security Research Paper Example | Topics and Well Written Essays - 3750 words

Network Security - Research Paper Example Secondly, internal and physical security will discuss human threats, physical access to server rooms and servers, sensors and sprinklers etc. Moreover, protecting accidently shutting down system will also be discussed. After evaluating vulnerabilities associated with these three domains, controls will be proposed and justified accordingly. Furthermore, incorporation of Scilly University network architecture will also be utilized for better insights. 2 Research Methodology and Literature Review We will utilize Scilly University in our research as a basis of our discussions. Moreover, we will focus on qualitative research on information security, tools, assessments and statistical data in some cases. It has been concluded by some experts that the year 2012 is considered to be the worst year in terms of computer network security breaches (Schirick, 2012). Likewise, the year that has not even passed the half year mark, some of the foremost companies were sufferers of network security bre aches resulting in massive losses (Schirick, 2012). However, the news buzz only highlights Sony and Citibank to be victims of network security breaches, as these companies are popular among the public. The other sides of the picture highlights organizations of all sizes are affected by the consequences of network security breaches. Likewise, it can be concluded that network security risks are continuously evolving, modifying and growing at a rapid pace. Organizations normally install a firewall and even intrusion detection systems that triggers alerts of any suspicious activity, as these two components only covers the technical domain and not the human and physical domain. The current network scenario is utilizing a Virtual Private Connection that is connecting one or more sites. However, the VPN connection is also entitled to allow internet traffic on the same dedicated line from the Internet Service Provider. Moreover, the current network only utilizes a single firewall that is lo cated at the main campus of the university. It concludes that the rest of the two remote sites are only protected via a simple Network address translation function that is incorporated in a DSL modem. Moreover, there are no advanced security appliances such as Intrusion detection systems for analyzing and monitoring any suspicious activity that may possibly become a threat to the University’s computer network. Moreover, there is no patch management for updating security patches in the workstations connected to the network. There are no indications of hardening servers for instance, email server, application server, centralized server and database server must be hardened and needs physical protection as well. The network security vulnerabilities will be accessed in three categories i.e. logical security, internal security and external security. As far as logical security is concerned, we can see that the fig 1.1 demonstrates a firewall, Microsoft Internet Security and Accelera tion (ISA) server and a domain controller with Microsoft Active Directory. The three categories for network vulnerabilities are categorized as below: 2.1 Logical Vulnerabilities The current logical controls for protecting information assets within the network are Microsoft Active directory, ISA server and a Firewall. The Microsoft active directory is not primarily a security control, as