Tuesday, February 25, 2020

Nelson Mandela Research Paper Example | Topics and Well Written Essays - 1250 words

Nelson Mandela - Research Paper Example ‘Long walk to freedom† is his autobiography in which he explains the hard facts of his life. Tenure of his imprisonment and his personal life style is clear to understand in his book. Hardships and finally the victory and attainment of his aim became known to the world through his autobiography. Mandela’s father was a councilor to tribal chiefs in Transkei. Due to shortage of resources and non-availability of basic facilities, Mandela played games of young boys made of natural materials. He was the first one in his family to attend school. His life was dramatically changed after the death of his father from a disease when he was only 9 (Mandela 37). His circumcision ceremony was held when he was 16 years old. It was a tradition in South Africa as a symbol of manhood. According to rules, a boy cannot have his father’s wealth unless the individual is converted to manhood. Even than the land of his father was in the custody of white people (Bezdrob 78). Mandela joined the university college after completion of basic studies. This was the only institutes for black people to seek higher education. Finally, he was expelled from college for protesting against food and lack of power in student representative council (SRC) (Villa 45). Mandela entered in politics by joining the African national congress in 1942. Mandela joined the group of young Africans during Second World War that was finally converted to African national congress youth league (ANCYL). His dedication and work for racial rights earned him the secretary ship of council in 1947. This movement aimed at complete citizen rights and parliamentary representation of all Africans. ANCYL launched its campaign against unjust laws of 1952 under the directions of Mandela as volunteer in chief. Mandela was trailed for mass involvement in anti government campaigns. After the trails, he was prohibited to attend any gathering and was

Saturday, February 8, 2020

Ethical Hacking Research Paper Example | Topics and Well Written Essays - 1250 words

Ethical Hacking - Research Paper Example An ethical hacker will attempt to hack his way through a company’s internet security system so that any weaknesses within it can be found. Companies, which use ethical hackers, do so in order to boost their security against individuals whose aim might be to bypass its security system for malicious purposes. There are, however, rules, which should be strictly followed in order for this hacking procedure to be considered ethical. The first of these is that the hacker must only conduct the hacking if he has been given permission to do so by the company’s management and this requires that he be given a written consent, in case of any issues that may arise later. Secondly, the ethical hacker must be able to ensure that he does not violate the privacy of the individuals or the company for who he is working, and should instead only deal with the security issues that are encountered. The hacker must ensure that all the security vulnerabilities that the company has are reported to its administration so that the necessary steps can be taken to secure the company’s network from malicious hackers. ... It is a situation where the ethical values concerning hacking are judged not by the normal definitions of the actions but through its positive aspects. Using this definition, it can be stated that the morals are no longer absolute when dealing with matters concerning hacking, because it is no longer necessarily a matter of its being malicious, but also of its being used for the enhancement of network security (Langley, 2005). A good number of the proponents of this theory believe that morality can now be used to describe hacking, since there are those who might do it for good as well as malicious purposes. The fact that ethical hacking has now become a part of the normal corporate life should not be underestimated since ethical hackers have now become an integral part of the fight against illegal and malicious hacking. The realization of this fact is one of the reasons why many companies are increasingly employing ethical hackers in order to protect their systems (Palmer, 2001). One of the advantages of ethical hacking is the fact that a broad range of threats are realized early and steps are taken to repair them. Since there are a wide variety of network threats from hackers, it is easier for a company, through ethical hacking, to deal with these threats before they become unmanageable, or before any damage to the network is done. Moreover, ethical hacking promotes the fact that not all hackers are malicious and that in fact, there are those hackers out there who can be used as a force of good through their helping to protect vulnerable network systems from malicious hackers (O'Boyle, 2002). Since it is the society which judges what is right or wrong, the it is therefore easier to categorize hackers in such a way that there