Tuesday, December 31, 2019

Life And Experiences Of Law Enforcement Officers - 1832 Words

Lives and Experiences of Law Enforcement Officers The rookie/probationary period is tough for all involved. Both employer and employee are â€Å"getting used to each other† and the rookie is learning about their new job. In general, Police Officer Trainees/Recruits are evaluated by their superiors and will not be permanently hired if they are not able to do their job correctly (Stockton, California, 2015). Aside from what the new recruit may have learned from books or training, Mrs. Higa said that nothing could prepare her for all the death she witnessed. â€Å"The smells, the scene, the trauma, sometimes the lack of human contact that that poor person did not have – and no one knew they had passed away. Suicides were the hardest to understand, especially if it involved a youngster. The babies (deaths) were LIVES AND EXPERIENCES OF LAW ENFORCEMENT 3 the hardest. You just don t forget them† (personal communication, July 19, 2015). Training can only teach a recruit so much since most of the learning process is experienced on patrol. Challenges for Sergeant Chinen included learning to work with different personalities in the police department, and also dealing with the diverse citizens he encountered. He expressed that more firearms training would have been nice, whereas Mrs. Higa emphasized the importance of learning to write reports, since it was almost fifty percent of her patrol job. Hess and Orthmann (2011, p. 64) confirm this by stating that â€Å"cases can be madeShow MoreRelatedEmotional Survival for Law Enforcement1031 Words   |  5 Pagesbegins by describing the typical rookie officer. Most are energetic, idealistic, enthusiastic and very driven. Quickly this enthusiasm can change from one of positivity to one that is very cynical and emotionally charged. These behaviors and thoughts over time if not corrected become exacerbated leading to noticeable mental and physical changes. The author, Gilmartin, uses personal experiences and other real life stories effectively so that many officers can relate and identify with the topic ofRead More`` Fruitvale Station `` : The Modern Homeland Security Policy Essay955 Words   |  4 Pagesdenounced law enforcement practice (Newman). â€Å"In 1999, a Gallup poll revealed that more than 80% of Americans disapproved of the practice of racial profiling by law enforcement authorities on any level† (Newman). In Fruitvale Station there is a detachment between the community and the law enforcement because the community is aware of the racial profiling that the law enforcement uses in order to obtain suspects. As a result, Oscar Grant and his associates were not cooperative with the law enforcementRead MoreBook Review on Emotional Survival for Law Enforcement1178 Words   |  5 PagesEmotional Surviv al For Law Enforcement A Guide for Officers and Their Families By: Kevin M. Gilmartin, Ph.D. Emotional Survival for Law Enforcement by Kevin M. Gilmartin, Ph.D. is a book that seeks to inform and instruct those seeking to be in law enforcement, law enforcement professionals and their families of the realities of a career in law enforcement- professionally and personally. And how to best prepare for emotional survival of â€Å"on-duty and off-duty† life. It also compares andRead MoreThe Issues With Police Recruitment1069 Words   |  5 PagesRecruitment Police recruitment, specifically the recruitment of women and minorities, is an issue within the police organization. When it comes to gender in law enforcement, males outnumber females by a large margin. When looking at race in law enforcement Whites outnumber any other race. By leveling the fields of gender and race in law enforcement, this will prove to be beneficial to police organizations across the board. According to U.S. Census Bureau of 2005, women make up approximately 51% ofRead MorePost Traumatic Stress Disorder ( Ptsd )965 Words   |  4 PagesDisorder in Law Enforcement Post-traumatic stress disorder, also known as PTSD, is a mental challenge faced in law enforcement today. A lot of people will or would say when they hear the acronym, PTSD, they associate it with military members. This is false information and an accusation. PTSD is very prevalent in law enforcement and civilians across the United States. PTSD is usually caused after a highly traumatic moment or incident. PTSD is a large concern because it is a major cause for law enforcementRead MoreThe Ethics Of Police Ethics Essay1631 Words   |  7 PagesWith the past and current issues our country is having with law enforcement officials the ethical deliberations about corruptions is constantly examining the foundations of police ethics. The reasoning following public corruption indicates an underlying social institutional structure that our country has created. In 2006, Louis Eppolito and Stephen Caracappa were convicted of racketeering, extortion, obstruction of justice, conspiracy, and murder charges. Louis and Stephen worked in the NYPD policeRead MoreLaw Enforcement Officers Face Incredible Dangers Essay1630 Words   |  7 PagesLaw enforcement officers have encountered some very deadly days. The life of a law enforcement officer is one of constantly being aware of your surroundings, dealing with the uncertainty of not knowing the individuals you have to approach, and being able to cope with the visual images seen after vicious crimes. The life of a law enforcement officer, who protects and serves, is both challenging and rewarding. The first law enforcement system was established in Boston, Massachusetts over 350 yearsRead MoreEmotional Survival For Law Enforcement935 Words   |  4 Pagesa cop? Or what cop’s families go through on a day to day basis? This book Emotional Survival for Law Enforcement written by Kevin M. Gilmartin, Ph.D. gives us an outline on the difficulty and stress that law enforcement officer and their families face on daily basis. Dr. Gilmartin discusses the stages of hypervigilance. And the long-term effects of hypervigilance and the toll it takes on the officer and his or her family. Author Dr. Kevin M. Gilmartin is retired from the Pima County Sheriff’s OfficeRead MoreThe Criminal Justice System For A Long Time Now855 Words   |  4 PagesShamshak started off as a police officer and he dedicated a lot of his time to the department. Through hard work and dedication he was able to rise through the ranks becoming Captain, Lieutenant, Sergeant and Chief. Shamshak states that his career has been very rewarding from an officer to chief he has met a lot of people and learned countless things. Also a law enforcement career provides great benefits. Such benefits include Health and Medical Insurance, Dental Insurance, Life Insurance and a great retirementRead More Police Trauma and Addictions Essay1116 Words   |  5 Pages A study of 852 police officers found that nearly 50 percent of male and 40 percent of female officers consumed excessive amounts of alcohol. Excessive amounts of alcohol is defined as more than 8 drinks per week at least twice a month or over 28 drinks a month for males and more than 6 drinks per week at least twice a month or 14 drinks a month for females and that nearly 90 percent of all officers consumed alcohol to some degree. Law enforcement officers face traumatic incidents daily.

Monday, December 23, 2019

The Scarlet Letter By Nathaniel Hawthorne - 1852 Words

All of the major characters in The Scarlet Letter by Nathaniel Hawthorne are dynamic and go through some form of character development. Hester Prynne and Arthur Dimmesdale, who are at the forefront of the central conflict in the plot of the novel, are no exception. While their respective evolutions in character were noticeably different, each was emphasized by the three scaffold scenes. The differences of Hester and Dimmesdale’s respective character developments are highlighted and emphasized by the three scaffold scenes in the novel. The central character of the novel, Hester Prynne, undergoes a significant change in character, mainly due to the shame stemming from being forced to bare the scarlet letter. During the first scaffold scene in which she is undergoing trial, Hester is described as: â€Å"lady-like . . . characterized by a certain state of dignity . . . her beauty shone out, and made a halo of the misfortune and ignominy in which she was enveloped† (Hawth orne 103). Despite the presence of a multitude of women sneering at her as she makes the seemingly endless walk to the place of her trial, Hester maintains her cold, almost pompous facade. It is a testament to her initial immense amount of resilience of character and mental strength to keep from breaking down into tears while on the scaffold. This idea of Hester desiring to and succeeding in maintaining a proud and aloof air is further evidenced by the ornateness and intricacy of the scarlet letter itself.Show MoreRelatedThe Scarlet Letter By Nathaniel Hawthorne1242 Words   |  5 PagesLYS PAUL Modern Literature Ms. Gordon The Scarlet Letter The scarlet letter is book written by Nathaniel Hawthorne who is known as one the most studied writers because of his use of allegory and symbolism. He was born on July 4, 1804 in the family of Nathaniel, his father, and Elizabeth Clark Hathorne his mother. Nathaniel added â€Å"W† to his name to distance himself from the side of the family. His father Nathaniel, was a sea captain, and died in 1808 with a yellow fever while at sea. That was aRead MoreThe Scarlet Letter By Nathaniel Hawthorne960 Words   |  4 Pages3H 13 August 2014 The novel, The Scarlet Letter, was written by the author Nathaniel Hawthorne and was published in 1850 (1). It is a story about the Puritan settlers of the Massachusetts Bay Colony, set around 1650 (2). The story is written in the third person with the narrator being the author. The common thread that runs through this novel is Hawthorne’s apparent understanding of the beliefs and culture of the Puritans in America at that time. But Hawthorne is writing about events in a societyRead MoreThe Scarlet Letter, By Nathaniel Hawthorne919 Words   |  4 Pagessymbolism in Nathaniel Hawthorne’s â€Å"The Scarlet Letter†. Symbolism is when an object is used in place of a different object. Nathaniel Hawthorne is one of the most symbolic writers in all of American history. In â€Å"The Scarlet Letter†, the letter â€Å"A† is used to symbolize a variety of different concepts. The three major symbolistic ideas that the letter â€Å"A† represents in Nathaniel Hawthorne’s â€Å"The Scarlet Letter† are; shame, guilt, and ability. In Nathaniel Hawthorne’s â€Å"The Scarlet Letter†, the firstRead MoreThe Scarlet Letter By Nathaniel Hawthorne1397 Words   |  6 PagesFebruary 2016 The Scarlet Letter was written by Nathaniel Hawthorne in 1850 which is based on the time frame of the Puritans, a religious group who arrived in Massachusetts in the 1630’s. The Puritans were in a religious period that was known for the strict social norms in which lead to the intolerance of different lifestyles. Nathaniel Hawthorne uses the puritan’s strict lifestyles to relate to the universal issues among us. The time frame of the puritans resulted in Hawthorne eventually thinkingRead MoreThe Scarlet Letter By Nathaniel Hawthorne999 Words   |  4 Pages Nathaniel Hawthorne is the author of the prodigious book entitled The Scarlet Letter. In The Scarlet Letter, Hester Prynne commits adultery with Reverend Arthur Dimmesdale. Her husband, Roger Chillingworth, soon finds out about the incident after it becomes clear that she is pregnant. The whole town finds out and Hester is tried and punished. Meanwhile, Roger Chillingworth goes out then on a mission to get revenge by becoming a doctor and misprescribing Dimmesdale. He does this to torture DimmesdaleRead MoreThe Scarlet Letter, by Nathaniel Hawthorne1037 Words   |  5 Pagesthat human nature knows right from wrong, but is naturally evil and that no man is entirely â€Å"good†. Nathaniel Hawthorne, author of the classic novel The Scarlet Letter, believes that every man is innately good and Hawthorne shows that everyone has a natural good side by Hester’s complex character, Chillingworth’s actions and Dimmesdale’s selfless personality. At the beginning of the Scarlet Letter Hester Prynne is labeled as the â€Å"bad guy†. The townspeople demand the other adulterer’s name, butRead MoreThe Scarlet Letter By Nathaniel Hawthorne1517 Words   |  7 PagesNathaniel Hawthorne composes Pearl as a powerful character even though she is not the main one. Her actions not only represent what she is as a person, but what other characters are and what their actions are. Hawthorne makes Pearl the character that helps readers understand what the other characters are. She fits perfectly into every scene she is mentioned in because of the way her identity and personality is. Pearl grows throughout the book, which in the end, help the readers better understandRead MoreThe Scarlet Letter, By Nathaniel Hawthorne1488 Words   |  6 Pages In Nathaniel Hawthorne’s novel The Scarlet Letter, the main character, Hester Prynne, is a true contemporary of the modern era, being cast into 17th century Puritan Boston, Massachusetts. The Scarlet Letter is a revolutionary novel by Nathaniel Hawthorne examining the ugliness, complexity, and strength of the human spirit and character that shares new ideas about independence and the struggles women faced in 17th century America. Throughout the novel, Hester’s refusal to remove the scarlet letterRead MoreThe Scarlet Letter By Nathaniel Hawthorne1319 Words   |  6 PagesPrynne and Arthur Dimmesdale are subject to this very notion in Nathaniel Hawthorne s The Scarlet Letter. Hester simply accepted that what she had done was wrong, whereas Dimmesdale, being a man of high regard, did not want to accept the reality of what he did. Similar to Hester and Dimmesdale, Roger Chillingworth allows his emotions to influence his life; however, his influence came as the result of hi s anger. Throughout the book, Hawthorne documents how Dimmesdale and Hester s different ways of dealingRead MoreThe Scarlet Letter By Nathaniel Hawthorne1714 Words   |  7 PagesSome two hundred years following the course of events in the infamous and rigid Puritan Massachusetts Colony in the 1600s, Nathaniel Hawthorne, descendant of a Puritan magistrate, in the 19th century, published The Scarlet Letter. Wherein such work, Hawthorne offered a social critique against 17th Massachusetts through the use of complex and dynamic characters and literary Romanticism to shed light on said society’s inherent contradiction to natural order and natural law. In his conclusive statements

Sunday, December 15, 2019

“Money and Media dominate modern day politics” †how far do you agree Free Essays

It is widely claimed that the media, and the money available to dominate it, has a much wider grasp over the voting public than manifesto or policy. The majority of the worlds media sources hold some sort of partisan alignment, and its hold on the public means this bias is passed on to the electorate. How much it influences the electorate however, is different amongst many theories. We will write a custom essay sample on â€Å"Money and Media dominate modern day politics† – how far do you agree? or any similar topic only for you Order Now The manipulative theory suggests that the media submerges real news in meaningless trivia in order to benefit itself. An example of this is Rupert Murdoch’s support of Labour only once they’d dropped clause 4 of the constitution. The Hegemonic theory agrees with the accusation of the biased nature of the media but argues that it is less calculating. Any political stance it holds is the genuine opinion of the papers or broadcasters, and its publicising of these views is not in an attempt to manipulate the electorate. The pluralist theory argues that the customers choose the media, not the other way around, and their political views are reflected by their choice of newspaper or broadcaster, not changed by it. Though these theories have different ideas on the motives of the media, they all essentially say the same thing, the hard truth that the media is biased, and that its opinions are carried by its consumers. Another undeniable fact is that the political groups with the most money have the greatest chance of gaining the favourability of the media. Television has led the nature of elections, but more so in America than Britain due to the differing regulations relating to media, and the different motives that broadcasters have across the Atlantic. Firstly, the US doesn’t have a publicly funded broadcaster, and all broadcasting channels have a profit-driven business plan. They will therefore only show the most popular candidates in bite size chunks, not allowing for in depth and democratic coverage. Reports suggest that in the 2008 campaign, Barac Obama’s images were larger, more colourful, and positive than the ones of John McCain. This also provokes voting behaviour based on personality as opposed to policy. Secondly, there are no rules governing the democratic spread of coverage regarding candidates. Campaigns can therefore spend extortionate amounts to gain press time, such as the record setting 30 minute political commercial by Barac Obama in 2008. Britain however, has regulations on airtime, sharing it out proportionally to however many people that party has standing at the election. This is made possible through the publicly funded broadcaster, BBC, which is said to have neutral politics stance, though it has been accused of holding a liberal position. There is however, a much heavier influence coming from the press sector of the media in Britain. America’s heterogeneous nature means that local press are the standard newspaper to read and these already reflect the views of that state, which unlike Britain votes united in an electoral college. In the 1992 general election, with Kinnock and Labour the favourites, the sun released the headline, â€Å"Will the last person to leave the country turn out the lights†. A few days later, after a shock conservative victory, they released a follow up headline, â€Å"It was the sun what won it†. Just 3 years later they switched allegiance, with â€Å"Sun backs Blair†, something pointed out as one of the factors in Labours landslide 1997 election victory. This, along with the fact the paper has backed the winner in all but 3 elections in the last 50 years, implies that Britain’s biggest newspaper holds immense influence over the electorate. However, it can also be argued that with only 3 million papers in circulation, the Sun doesn’t have enough readers to change the result of an election. Not only has this but it faced opposition from big papers such as the mail and the telegraph as well. It is not just television and newspapers however, with recent elections being dominated by the internet. Access to watch the debates at any time anywhere around the world and the use of social networking filled the electorate with images and stories of the candidates in every corner of their lives. This also meant however, that the already low levels of genuine political news stories were being drowned out by an obsession with image and personality. Barac Obama spent an unprecedented 300 million on his campaign for election, spending about $10 per vote he gained. This was almost twice the amount his rival spent, and is likely to have been a factor in the outcome. The system in America requires any candidate to gain 5% of the national vote to receive national funding, so minor parties or independents stand a very poor chance of breaking into the system. If they do manage to, they then have to have the ability of raising large sums of money. Billionaires such as Ross Perot (independent 1992) could combat this, but even the third party in 2000 (Ralph Nader – Greens) claimed that he simply could not keep up with the spending of the two major parties and would never be in with a chance. There have been some limitations however, in the form of the Federal Election Campaign Act (1974) limiting individual contributions to $1000 and corporate contributions (from PACs) to $5000. This seems less of a ceiling to expenditures and more of a skyline, considering the spending patterns of the last election. It is a little different in the UK, with a maximum of i7000 allowed to be spent in any one constituency, and candidates that tend to spend less than three quarters of this. The heterogeneous nature of the USA would obviously require more expenditure in a campaign, but the 5, 6, and sometimes 7 figure expenditures in senate races seem slightly out of proportion. In Japan the electoral system was making candidates of the same party campaign against each other, which gradually pushed the price of campaigns up and up until reform was enforced. The influence money was having on elections had created a rift amongst parties as well as losing a sense of democracy. It is clear that money and the media have a huge influence on voting behaviour, but not in the way it may first have been perceived. Where the theories generally carried the view that money could drive the media, and the media in turn influence the electorate, I believe it is changing voting behaviour in a different sense. Money and the media have glorified politics, and particularly in America have given it a Hollywood effect. The public are reacting to this by voting not based the manifesto and ideologies of candidates, but voting for the greatest ‘celebrity’. Money and the media do play too great a role in modern day politics, and have replaced the electorate’s voting on policy with its voting on personality. How to cite â€Å"Money and Media dominate modern day politics† – how far do you agree?, Papers

Saturday, December 7, 2019

Risk Management Cyber Artificial Security - MyAssignmenthelp.com

Question: Discuss about the Risk Management Cyber Artificial Security. Answer: Introduction: There are a number of risk that is associated with the use of the various information technology software. There should be proper security to the threats posed by the usage of information technology. There are a number of ways by which the It security risks can be overcome. The various methods are cyber security, cloud security, internet of things and many such technologies. With the risks updating with the passage of time, the risk management has to advance to cope with the risks (Rid Buchanan, 2015). Maintaining, updating and monitoring of the risks regularly is of prime importance in order to get rid of the risks. The risks of IT reduce the productivity of the company and puts on a negative impact. Such risks are responsible for the destruction of a well-established business. The report discusses about the use of cyber security in order to protect the data from breach. Cyber security is one of the advanced technologies that is developed in the recent years to protect the data of an organization. Cyber security not only puts forward any particular technology but it is a group of technologies that are brought together to provide a solution (Genge, Haller Kiss, 2017). The cyber security is not only responsible for the management of data risk but also it handles network errors and is also responsible for protection of the hardware. Cyber security protects the programs that are executed. The software is the integral part of the work of all the sectors and the chance of threat is the most in this area. There are various forms of threats that are managed by the help of cyber security. The various risks may arise in the field of applications, or information. Operation security and network security are the other major sectors where there is major use of cyber security. Discussion: Threats And Solutions To The Threats By Use Of Cyber Security: Application Security: The first threat that is present and may be overcome by cyber security is the application threat. Applications are used more frequently nowadays. Applications are accessed over the networks and the use of applications have increased in the previous years. Hence, the hackers look forward to attack the application to get into the host server. This will allow the unauthorized access to data. The important data may be modified or may be deleted. Often, these data are important for the organization. It may so happen that the unauthorized user may get access to the other sensitive files (He, Tian Shen, 2015). These sensitive files may involve the planning of the company, the deals it is looking to conduct in the coming years. Often, the rival companies gets access of the important quotes that the company is looking to set in its next order. Such continuous attacks may be conducted without even the knowledge of the organization. Such attacks may result in the closing down of the organizati on. The threat of application software can be overcome by the use of cyber security. The primary purpose of the cyber security may be the use of application firewall (Gol Shah, 2015). Setting up an application firewall limits the information or the data that a person can view. The use of an application firewall does not allow a person to access any of the confidential information by any means (Giffin, 2017). The application does not show information beyond the allowed limit. For instance, in the website of Gigantic Corporation or the application only those information of the company is available that should be available. Many of the business stakeholders before dealing with the organization use the application as a medium to fetch information about the organization. It is only after confirmation of the deal that the business firms dealing with Gigantic Corporations are provided with further information. There should also be an appropriate alert, which would convey a message if any intruder has tried to access the data. This is also possible with the help of cyber security technology. The use of various encryption programs and the use of spyware detection programs may be used to provide the alert. There can be a number of biometric authentication systems as well to recognize the intruder. The security of applications can be enhanced by regular monitoring of the application and how these applications affect the enterprise. Information Security: The valuable information about the organization should be preserved in a proper manner and prevented from outside threat. The threat may be digital information or non- digital information. The unauthorized parties often seek to obtain the information about the organization to gain profit. The information security process is responsible for the protection of the information by the help of the various business processes. The information security consist of a set of approach or tools and policies that are useful in the protection of data or prevent unauthorized access (Peltier, 2016). The application threat is a way of the information breach. Direct information breach may also take place in a non digital form by the casual attitude of employees who fall prey to the unauthorized parties while communicating and give away important information. At Gigantic Corporation, rigorous training is provided to the professionals who are responsible for communicating directly with the client. With th e help of cyber security alerts are set for the client dealing with the organization (Karyda Mitrou, 2016). Therefore, even if the passwords of the organization portal is passed on to any of the client it would not be possible for them to access the portal. The Gigantic Corporation follows the CIA approach to protect the information of the organization. The CIA approach corresponds Confidentiality, integrity and availability of the IT systems. This approach ensured that the sensitive information is only accessible by the authorized users and it is prevented from the unauthorized parties. The threats to the sensitive information comes in various forms which may include malware attacks and the phishing attacks (Gupta, 2017). The effect of information security in an organization is that the whole structure of the organization is saved when the sensitive information is protected. It has been evident from various number of organizations that the company was forced to shut down because i t failed to save its information. Therefore, all the organizations should look to protect the information for the smooth running of the organization. Network Security: The other major issue of risk lies in the manipulation of the network risks. Network security is the adoption of the various processes and policies that are adopted in order to protect the misuse of the networks of the computer of the organization (Khan Hasan, 2017). It may so happen that the unauthorized parties get access of the organization sensitive information or data by entering the network system of the organization. All the important data is sent over the network. There are a number of important business transactions that are made over network. Many of the unauthorized users as a result chose the network as a medium to carry out illegal activities. The malicious activity may be carried out by intruding illegally into the network while the transaction takes place. During the time of transaction intruding into the network would mean the organizations involved in the transactions would lose not only the money being transacted but also all the important data of both the organiza tions. Therefore, network threat is more dangerous from the point of view that both the organization would lose all the important information. In all the other cases, only one organization is involved in losing all the information but in network security both the ends will end up losing the important data. Network attacks can be of two types- the first being active where the intruder sends commands in order to disrupt the normal operation of the network. The second type of attack is passive where the intruder gets hold of the data that is being transferred through the network directly. The Gigantic Corporation in order to protect its network from being attacked has set up a firewall which only allows the registered user to join the network while blocking any other user who wish to join (Knapp Langill, 2014). A notification has to be approved by the organization if any user wants to join the network. The firewall is active even when transaction is not taking place over the network. At the same time Gigantic Corporation installs the same firewall in the network of all its clients, thus disallowing the entry of any unauthorized user from the other end as well. The use of cyber security has thus been helpful even in protecting the most dangerous form of cyber security threat. Operation Security: The operational security analyses a particular process and determines the areas which need to be controlled. The operational security also takes care of the information database. The management of the information and its protection has become an important aspect for the success of a private sector organization. Professionals are hired just to handle the security of the organization(Mancuso et al., 2014). The operation security is a five step process. The first process is the Identity critical information. The identity critical information is used to determine the data which would be harmful for the organization. The files which may be harmful for the organization has to be avoided. The data which may harm the organization include the personal files uploaded by the employees or the customers. The financial statements uploaded by the various partner organizations may affect the company. The next step to ensure proper operation security is to identify the sources, which have a possibility to harm the organization. The determination of these threats is the most important process in order to protect the same. Gigantic Corporation considers its rivals and the most common hackers are also taken into consideration and special protection is taken against these most probable attackers. The next step involves the analysis of the weak point of the security of the organization and improving it. The analysis of the areas which is open to attack. The organization ranks the risk of the various tasks and assess them accordingly. The more critical the threat the more important for the organization to assess it and provide some preventive measure as soon as possible. After identification of the risks and all the related information the appropriate measures need to be taken to safeguard the valuable information of the company. With the help of cyber security, the tasks of operation s ecurity can be carried out with ease. The operation security needs trained professionals for the purpose of handling operation security. In case an unsuitable person is allotted the job then the organization may face major drawbacks. The Gigantic Corporation makes the use of all the above strategies in order to get rid of the security issues. Only trained personnel are hired by the organization for the position of monitoring of the security issues. The organization spend ample amount of time to analyze any particular issue and follows all the five steps that are involved in the operational security. The Gigantic Corporation uses Cyber security as the tool to avoid the IT risk issues. Till date the organization has not faced any major issues with regards to security. All necessary firewalls and network systems have been set up by the organization. Literature Review: The report reviews the risk management is important in three sectors namely in the DNS servers, in the edge servers and the overlay networks. To protect the DNS it is most important first of all to deploy a huge number of name servers in a particular location. Otherwise the most common attack that takes place is the Denial of server attack(Dos attack)( Adi, Baig Hingston, 2017). In Dos the hacker floods the server with a number of request as a result of which the network cannot handle such a huge number of requests. As a result the new request from authorized users cannot be accessed. The unauthorized party may get hold of the network in such a case and the organizations may end up losing valuable information to the intruder (Gillman et al., 2015). The installation of large number of name servers will get rid of this issue. Not only there should be a good number of name servers available but also the processing speed should be quite high so that the processing of multiple request is possible. The numerous number of switches available due to the installation of the large number of ports balance the huge traffic by hashing source port. There should be firewalls present in the confidential applications of each organization in order to protect the DNS request of unauthorized users. The firewalls help to identify the unauthorized users and block the requests of these parties. The common strategy followed by the users is that the attackers keep coming back a number of times to attack. The attackers look for an idle time, when there is no watch on the particular website to carry out the attack. The attackers follow different strategies each time for carrying out the attack. The organizations should set up a proper system to identify the attackers. This can be done by keeping a track of the clients and only give access to its client. The other strategy is that the company can keep track of the previous visitors. The IP address can be checked and based on the behavior on the behavior in the past visits the user is either enabled access or denied. For instance, the CAPTCHA ensures that a person trying to access the data is not a robot (Gafni Nagar, 2016). Hence, it is sure that no program is being run to get hold of the access of the data or information. The organization should keep a secondary network that is the trusted network system through which a request should be passed. The origin server or the original server only interacts with the users which pass through the previous network system. The origin server may deny the users which are directly trying to communicate with it without passing the request through the primary network system. The primary servers act as an defense mechanism to protect the actual source from attack. The primary network system only allows those IP addresses to access the actual source which had no malicious activity in the past or are registered as legal. The advancement of cyber security technology is also necessary to tackle the new advancement in the threats. If update is not implemented on the previous technology then the hackers will easily be able to find a solution to attack the data of the organization. Implementation of cloud computing can be helpful in advancing the cyber security technology. The cloud computing technology provides a much more secure method for the prevention of data and information breach (Xu et al., 2015). Artificial intelligence is another method, which will make the securities stronger (Kasprick et al., 2016). Conclusion: Thus from the above report it can be concluded that there are various IT risks that is faced by the various organizations. There are various kinds of security management processes such as network management, operation management, information management. Out of these the network security is most important. The solutions of handling these risks is provided by cyber security. The various approaches of avoiding the risk of cyber security is provided in the report. The article that is referred to, shows the ways in which cyber security can be overcome. The various scenario of how Gigantic Corporation overcome the risk of data and information breach by the use of cyber security is also given. Recommendations: The number of IT threats can be reduced if not completely eliminated. The fight has been unending and the risks continue to advance with the passage of time. As a result the advancement of the technologies is also necessary. The advancement of the cyber security technology can be done. The Gigantic Corporation has planned to make use of the cloud services for the process of cyber security. With the help of cloud services and providing the private keys to the authorized customers the cyber security can reach a new level. The creation of snapshots, which also falls under the strategy of Gigantic Corporation is also very helpful in cyber security. The basic processes of cyber security involve the usage of trained personnel to handle the database of the company efficiently. Besides that, the organization can make proper use of the cyber security technology in identification of the possible sources of threats and rectifying them. Cyber security brings together a number of processes that m ay be used to block the potential threats and safeguard the hardware and the software components of the systems of the organization. The introduction of the firewalls of all the application of the system through which the attack may take place is a preventive measure. Another firewall should be introduced on both ends of in case a business transaction is conducted over a network. Artificial intelligence is another emerging area and introduction of the same in the field of cyber security can give a new perspective to the security field. It may post a blow to the hackers. The use of artificial intelligence will present an advantage of carrying out the security task faster as compared to when it is conducted manually. The same kind of threat may not require to perform the same rigorous task for numerous times. The same set of security program can be executed automatically to counter the attack. The automation security will not require someone to be present in person for monitoring the applications or the system for the occurrence of threat. The threat can be overcome as soon as the threat occurs. The Gigantic Corporation is eyeing the use of artificial intelligence to provide security to the applications that occur at frequent intervals. References: Adi, E., Baig, Z., Hingston, P. (2017). Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services.Journal of Network and Computer Applications,91, 1-13. Gafni, R., Nagar, I. (2016). CAPTCHASecurity affecting User Experience.Issues in Informing Science and Information Technology,13. Genge, B., Haller, P., Kiss, I. (2017). Cyber-security-aware network design of industrial control systems.IEEE Systems Journal,11(3), 1373-1384. Giffin, D., Levy, A., Stefan, D., Terei, D., Mazires, D., Mitchell, J., Russo, A. (2017). Hails: Protecting data privacy in untrusted web applications.Journal of Computer Security,25(4-5), 427-461. Gillman, D., Lin, Y., Maggs, B., Sitaraman, R. K. (2015). Protecting websites from attack with secure delivery networks.Computer,48(4), 26-34. Gol, D., Shah, N. (2015). Web Application security tool to identify the different Vulnerabilities using RUP model.International Journal of Emerging Trends in Electrical and Electronics (IJETEE),11(2). Gupta, B. B., Tewari, A., Jain, A. K., Agrawal, D. P. (2017). Fighting against phishing attacks: state of the art and future challenges.Neural Computing and Applications,28(12), 3629-3654. He, W., Tian, X., Shen, J. (2015). Examining Security Risks of Mobile Banking Applications through Blog Mining. InMAICS(pp. 103-108). Karyda, M., Mitrou, L. (2016). Data Breach Notification: Issues and Challenges for Security Management. InMCIS(p. 60). Kasprick, R., Hoffman, J., Straub, J., Kim, E. (2016). Cyber Security Artificial Intelligence Expert System. Khan, R., Hasan, M. (2017). Network threats, attacks and security measures: a review.International Journal,8(8). Knapp, E. D., Langill, J. T. (2014).Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Mancuso, V. F., Strang, A. J., Funke, G. J., Finomore, V. S. (2014, September). Human factors of cyber attacks: a framework for human-centered research. InProceedings of the Human Factors and Ergonomics Society Annual Meeting(Vol. 58, No. 1, pp. 437-441). Sage CA: Los Angeles, CA: SAGE Publications. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rid, T., Buchanan, B. (2015). Attributing cyber attacks.Journal of Strategic Studies,38(1-2), 4-37. Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., Lu, C. (2015). A cloud computing based system for cyber security management.International Journal of Parallel, Emergent and Distributed Systems,30(1), 29-45.