Tuesday, December 31, 2019

The Handmaids Tale By Margaret Atwood - 1375 Words

The Handmaids Tale by Margaret Atwood Introduction The Handmaids Tale by Margaret Atwood and I Know Why The Caged Bird Sings by Maya Angelou are both very well-known texts. They explore the characters horrible situations, retell the experiences through a variety of literary features which all link back to my main theme of freedom to, and freedom from. The Handmaids Tale is set in a not so distant future dystopia, the totalitarian Republic of Gilead. It is centred around Offred, a handmaid given to the Commander and his wife, Serena Joy, for reproductive purposes because of the dangerously low fertility. Handmaids are given to elite couples who have trouble conceiving in the hopes they can bear children. I Know Why The Caged Bird Sings†¦show more content†¦Similarly, the theme of I Know Why The Caged Bird Sings is freedom and lack thereof, confinement. The poem talks of a free bird flying through sun rays and how it â€Å"dares to claim the sky†. It also talks of a caged bird with clipped wings and tied feet hoping for freedom and how it â€Å"sings with fearful trill of things unknown and lon ged for still... for the caged bird sings of freedom†. Narration The narration style of both texts are different, but are similar in that the readers have the opportunity to interpret the texts in their own ways and gain understanding of what the characters are going through. The Handmaids Tale is written in first person narrative and we get reflections from Offred’s past before Gilead, accounts from her time in the Red Centre, where woman were taught to be subservient, and insights to her thoughts and experiences at the present. The method of first person narration gets the reader fully immersed into Offred’s story and what she is going through allowing the reader to empathise with her, but is limited by that it does not allow the reader into other characters thoughts and feelings, with this interaction, â€Å"...she (Ofglen) is looking right at me... directly, steadily... unwavering...† reader has to come their own interpretation of what Ofglen means. The narration of I Know Why The Caged Bird Sings is fairly simple third person narrative, it takes on a somewhat literal interpretation of freedom and lack thereof, â€Å"...wings areShow MoreRelatedThe Handmaid s Tale By Margaret Atwood1249 Words   |  5 PagesDystopian Research Essay: The Handmaid’s Tale by Margaret Atwood In the words of Erika Gottlieb With control of the past comes domination of the future. A dystopia reflects and discusses major tendencies in contemporary society. The Handmaid s Tale is a dystopian novel written by Margaret Atwood in 1985. The novel follows its protagonist Offred as she lives in a society focused on physical and spiritual oppression of the female identity. Within The Handmaid s Tale it is evident that through the explorationRead MoreThe Handmaid s Tale By Margaret Atwood1357 Words   |  6 Pagesdictionary). In the novel The Handmaid’s Tale, Margaret Atwood explores feminism through the themes of women’s bodies as political tools, the dynamics of rape culture and the society of complacency. Margaret Atwood was born in 1939, at the beginning of WWII, growing up in a time of fear. In the autumn of 1984, when she began writing The Handmaid’s Tale, she was living in West Berlin. The Berlin Wall had not yet fallen and in her travels â€Å"behind the Iron Curtain† (Atwood, 2017) she experienced â€Å"the warinessRead MoreThe Handmaid s Tale By Margaret Atwood1060 Words   |  5 Pagesideologies that select groups of people are to be subjugated. The Handmaid’s Tale by Margaret Atwood plays on this idea dramatically: the novel describes the oppression of women in a totalitarian theocracy. Stripped of rights, fertile women become sex objects for the politically elite. These women, called the Handmaids, are forced to cover themselves and exist for the sole purpose of providing children. The Handmaid’s Tale highlights the issue of sexism while also providing a cruel insight into theRead MoreMargaret Atwood s The Handmaid Tale Essay1318 Words   |   6 Pagesrepresented in Margaret Atwood’s The Handmaids Tale. The novel is set in the Republic of Gilead, a dictatorship, formerly known as the United States of America. The government controls all aspects of the lives’ of its citizens, with its harshest regulations directly affecting women. Gileadean women are divided into seven classes based on hierarchy and identified by the color of their clothing. However, â€Å"They are not divided into functions. They have to do everything; if they can† (Atwood 24). The commanders’Read MoreThe Handmaid s Tale By Margaret Atwood1659 Words   |  7 Pagesbook The Handmaid s Tale by Margaret Atwood, the foremost theme is identity, due to the fact that the city where the entire novel takes place in, the city known as the Republic of Gilead, often shortened to Gilead, strips fertile women of their identities. Gilead is a society that demands the women who are able to have offspring be stripped of all the identity and rights. By demeaning these women, they no longer view themselves as an individual, but rather as a group- the group of Handmaids. It isRead MoreThe Handmaid s Tale By Margaret Atwood1256 Words   |  6 Pageshappened to Jews in Germany, slaves during Christopher Columbus’s days, slaves in the early 1 900s in America, etc. When people systematically oppress one another, it leads to internal oppression of the oppressed. This is evident in Margaret Atwood’s book, The Handmaid’s Tale. This dystopian fiction book is about a young girl, Offred, who lives in Gilead, a dystopian society. Radical feminists complained about their old lifestyles, so in Gilead laws and rules are much different. For example, men cannotRead MoreThe Handmaid s Tale, By Margaret Atwood1629 Words   |  7 Pages Atwood s novel, The Handmaid s Tale depicts a not too futuristic society of Gilead, a society that overthrows the U.S. Government and institutes a totalitarian regime that seems to persecute women specifically. Told from the main character s point of view, Offred, explains the Gilead regime and its patriarchal views on some women, known as the handmaids, to a purely procreational function. The story is set the present tense in Gilead but frequently shifts to flashbacks in her time at the RedRead MoreThe Handmaid s Tale By Margaret Atwood1684 Words   |  7 Pagesensure the safety of all citizens however; women can be forced to face extremities if the laws and the government are patriarchal. The novel The Handmaid’s Tale by Margaret Atwood tells the story of a totalitarian government that consists strictly of men who dominate women based on Christian ideologies. The government uses fertile women called â€Å"handmaids† for breeding purposes because of a decrease in bir th rate. The nation of the Republic of Gilead is a dystopian society in which women have limited freedomRead MoreThe Handmaid s Tale By Margaret Atwood1548 Words   |  7 PagesIn Margaret Atwood’s The Handmaid’s Tale, The theme of gender, sexuality, and desire reigns throughout the novel as it follows the life of Offred and other characters. Attwood begins the novel with Offred, a first person narrator who feels as if she is misplaced when she is describing her sleeping scenery at the decaying school gymnasium. The narrator, Offred, explains how for her job she is assigned to a married Commander’s house where she is obligated to have sex with him on a daily basis, so thatRead MoreThe Handmaid s Tale By Margaret Atwood1237 Words   |  5 Pages The display of a dystopian society is distinctively shown in The Handmaid’s Tale, by Margaret Atwood. Featuring the Republic of Gilead, women are categorized by their differing statuses and readers get an insight into this twisted society through the lenses of the narrator; Offred. Categorized as a handmaid, Offred’s sole purpose in living is to simply and continuously play the role of a child-bearing vessel. That being the case, there is a persistent notion that is relatively brought up by those

Monday, December 23, 2019

Personal Narrative Self Personality Assessment Essay

Personal Narrative: Self Personality Assessment After completing the assessment exercise I have been able to carefully my personality. The exercise consisted of an evaluation of four areas: Locus of Control, Personality Type, Stress Reactions, and Learning Styles. Based on the test results my locus of control is external. According to our text, Individuals who fall into this category do not believe that their future is within their control. They believe that it is more influenced by external forces. I agree somewhat with this assessment of myself. Although I also feel that some portions of our lives can be influenced greatly by our own inner desires and motivations. My interests are also centered on the outside world.†¦show more content†¦They are less competitive, more patient and experience less health problems. I have taken a similar test in the past. At that time my score was very similar to the current test. I definitely agree with the description of my personality. For the most part I am very patient. I like to make the most use of my time. However, I dont mind working at a slower pace. As I mentioned earlier, I am a B+. This means that I scored higher on the Type B scale. This can be attributed to my competitive side. I enjoy competition in many areas of my life including work, home and school. I am constantly challenging myself to even outdo my own experiences. For example, I will attempt to clean the house in a fraction of the time as before. My competitive nature has very early roots in my life. I am the fifth child in a large family of six. Overall, I live a fairly low-stress lifestyle. The majority of the stressful encounters that I experience are self-imposed (e.g. Waiting until the day before to study for a test). In those instances I cant and dont get upset because I could have controlled the situation. I believe in deep breath exercises and meditation. This is especially helpful in a challenging situation. For the most part, I have a very laid back and mild-mannered temperament. I have a Converger learning style. This represents a combination of doing and thinking. Convergers prefer to learn by doing andShow MoreRelatedNostalgia As A Medical Condition1530 Words   |  7 Pagesphilosophical terms, nostalgia may enable one to discover and think about one s sense of the doing good and right. Nostalgia can be extremely valuable in helping us figure out what people want and their personal goals (Wilson, 1999, 7). These days, we think of nostalgia as a cultural phenomenon rather than a personal one. While it began as a phenomenon centered on one s longing for home, it has become more of a public experience due to media in recent years. There are two types of nostalgia: collective andRead MoreAn Attachment Theoretical Framework For Personality Disorders1532 Words   |  7 PagesLiterature Review and Analysis In the article titled An Attachment Theoretical Framework for Personality Disorders explores how John Bowlby and Mary Ainsworth’s attachment theory provides a coherent perception of â€Å"intrapsychic and interpersonal† (2013) aspects of personality disorders, such as antisocial personality disorder. Adverse attachment is often at the root of most antisocial personality disorders. This theoretical groundwork pairs breadth and parsimony to the conceptualization of BowlbyRead MoreAttitudes Of Parents Towards Teen Contraceptive Use1390 Words   |  6 PagesRESEARCH OBJECTIVES This project will investigate the differing attitudes of parents towards teen contraceptive use, based on personal beliefs. Specifically, this project will explore the (accessibility of reproductive health care and contraceptive use,) the value of contraceptive use, the stigma of contraceptive use, and the concerns parents may have regarding teen sexuality. Additionally, thoughts from parents, school officials, and young adults on Planned Parenthood funding will be explored. RecommendationsRead MoreCenter For Applied Linguistics : What Is An Assessment Portfolio? Essay898 Words   |  4 PagesLinguistics What is an assessment portfolio? An assessment portfolio is a compilation of a student s authentic work over a particular period. The assessment portfolio allows for identifying growth in a concise package. The collection of work includes grading guidelines, the rational for the evaluations chosen, and allow for self-awareness. What are the advantages of assessment portfolio systems for ELLs? The portfolio of assessment allows students to guide their personal, academic goals by composingRead MoreMajor Categories Of Direct Practice1306 Words   |  6 Pagespractice. The first of the four major categories is psychodynamic theories, which attempts to connect the current problems a client is having to past traumas from an early time in life. The focus of psychodynamic theories is to translate insights into personality changes within the client. The second category is cognitive-behavioral theories, which connects the cognitive processes and their influence on behaviors and focuses on the present with hopes to improve the future. These theories focus on the currentRead MoreAssessment And Critique : Thematic Apperception Test1394 Words   |  6 Pages Assessment and Critique: Thematic Apperception Test Brian Kees Oklahoma State University Abstract Assessment and Critique: Thematic Apperception Test General Test The Thematic Apperception Test or TAT was developed during the 1930s by the American psychologist Henry A. Murray and psychoanalyst Christiana D. Morgan at the Harvard Clinic at Harvard University. The TAT is published by Harvard University Press. The cost is $81 per test. The test takes aRead MoreAnalysis of the Performance Management System1469 Words   |  6 Pagesexplored other current performance appraisal methods for its employees. It might have been a good idea to try and test alternative and new methods of performance evaluation such as self-performance assessment and others which will be discussed at a later stage in my presentation. The former (self-performance assessment) has been used and applied successfully in my organization for which I am working and has yielded good results and enhanced employee performance as well as employee – employer goodRead MoreFamily Therapy Approaches For The Client s Diverse Needs2102 Words   |  9 Pages The object is to offer verbal and nonverbal, expressive therapies, such as Narrative, Solution-Focused and Brief Therapy, Behavioral Therapy, and Cognitive Therapy. The concept is to take into account the therapist preferences and the issues that the therapist would like to approach for the client’s best needs. Therapist can integrate different orientations to guide the client. Narrative Therapy The authors of narrative therapy are Michael White and David Epston in the 1970s and 1980s. It was createdRead MoreThe Big Five Personality Traits Essay1987 Words   |  8 PagesThe term personality refers to the various qualities an individual possesses that forge their unique character (Letzring, Wells, Funder, 2006). It is important as it distinguishes individuals from their peers through their patterns of behaviors such as individual differences in mental, social, emotional and physical aspects (Allport, 1937). An individual’s psychological characteristics such as thoughts, feelings, motivation and they perceive the world are manipulated by their personality. The BigRead MoreMy Goal As A Licensed Counselor961 Words   |  4 PagesCounseling is a relatively young profession when compared to other mental health professions. In my brief personal and professional experience with the field, I have come to define counseling as a process of engagement between two people, both of whom are bound to change through a collaborative process that involves both the therapist and the client in co-constructing solutions to concerns. Mental and emotional health can have interpersonal, and social impacts; I want to provide evidenced-based

Sunday, December 15, 2019

Prosthetic Devices Free Essays

Prosthetic Devices A prosthetic is an artificial body part that replaces a missing or non-functioning body part such as an arm, heart or breast. Humans have been making prosthetic limbs since the Ancient Egyptians to replace limbs lost during battle, work or just by mistake. Evidence has been found of Egyptians trying to replicate toes with copper ones. We will write a custom essay sample on Prosthetic Devices or any similar topic only for you Order Now Although these were very impractical as they were solid and so were mostly for aesthetic purposes. In the 1400s, prosthetics arms made out of iron were available to wealthy Knights and lords. These arms had a relatively useful function as they were made to hold shields, allow them to open their purse and/or sign their name. As well as for function, prosthetic limbs are also developed for aesthetic purposes as people want to look normal and not attract stares or whispers. Prosthetic Arms Modern prosthetic devices have advanced a great deal since ancient times. Now, some very complicated robotic limbs are available that can detect the electrical impulse that would normally move your arm and replicate this movement robotically. Robotics in prosthetic devices is seen mostly in robotic arms because of the nature of the movement of fingers and the thumb. Advancements in the processors used in myoelectric (robotic) arms has allowed for artificial limbs to make fine-tuned movements with the prosthetic. This is extremely significant as previously robotic arms had only one or two movements such as closing the thumb to the hand to hold things. Modern fine-tuned arms can have up to 7 movements and it is likely that they will advance to have even more movements than a human hand. A future advancement that is being researched and developed is the addition of a sense of touch that would be able to detect, and then relay to the brain the amount of pressure being applied. It is currently being experimented to add small pods filled with a highly compressible liquid at the end of each finger. Inside each of these pods would be a pressure sensor that would compress as force is added with the robotic finger. The pressure sensor would then sense the amount of force being applied and relay this to the central processor which would translate this to an impulse to send to the brain. An alternative to relaying it to the brain is to have a small display or other indicator that shows the amount of force being applied by each finger. Although this is easier to develop, most people wouldn’t like the indicator over each finger or on the wrist as it wouldn’t look at all natural. Although there have been many advancements in robotic arms, they are still very much a crude replacement to a real arm. They have to be replaced every 3-4 years, there function is still much slower than real arms and fingers, and the intricacy and delicacy possible by real fingers is currently far superior than the robotic replica. Bionic Eye The Bionic Eye was developed to restore the vision of people that lived in total blindness, or very low vision. The first prototypes are now developed but they are researching ways to improve them as although they are functional and can convey an image to the brain of blind patients they only send an extremely low quality image in greyscale to the brain that is only useful to avoid walking into large objects such as buildings, cars and tables. The reason for this low quality image is because there are 98 electrodes in the chip that connects to the optic nerve. This is a very small amount when you compare it to over 120 million photo-receptor cells. The chip developed has about 1 000 000 wires connecting it and is one of the most complicated neuro-stimulation chips ever designed. Although it seems as though good vision will not be possible with the bionic eye for a long time to come you can have far less receptors than that to have adequate vision to love independently. Researchers are hoping to include about 1000 electrodes in the next generation of the bionic eye and believe that this is enough to allow people to recognise faces and read large print. How to cite Prosthetic Devices, Essay examples

Saturday, December 7, 2019

IS Security and Risk Management-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Sinificance of IS Security and Risk Management. Answer: Introduction The information security is significant in organization in the areas such as the record keeping, as well as on the financial uses. The IT security could help organization in solving the requirements of the clients particularly in the management of their personal information, the data as well as the security information (Ali, 2014). These are the challenges which are encountered by the organization particularly in the management of the data so that it does not fall in the hands of the unauthorized individuals or perhaps the hackers. An effective IT security management system help in the reduction of the risk when there are crisis in the organization. The organization should understand the IT security to enable them overcome the challenges (Ali, 2014). Additionally, organization should have policies when it comes to securing of their data so that it could be safe (Ross, 2013). In this research it intends to answer the question on how the information technology security could be enforce d in the organization. Additionally, the essay will look at the main content of the IT security policy, and how it is determined (Bergstrm hlfeldt, 2014). The essay will be focused on the E-Bay organization. Other components that will be looked are the IT model for the organization, the security standards and the control, risk analysis and contingency planning. Lastly, it will focus on the analysis of the IT threats, vulnerabilities and tools. Key Terms Identification Protocols: These are often described in an industry or perhaps the international standard such as the TCP/IP protocols that uses the set rules to exchange the message with the other internet points at the data packet levels. Contingency: This is a plan which is set in place to prevent any shortcoming which may occur in the future. Standards: These are definite rules, principles or perhaps the measures which have been established to guide the organization against the risk that could occur. Overview of E-bay organization This is a multinational e-commerce corporation, which help the online consumer to consumer as well as the business to consumer sales (Chen, 2009). The organization manages eBay.com which is an online shopping portal that helps the people and the businesses to buy and sell goods and services globally (Bergstrm hlfeldt, 2014). In addition to its auction style sales, the website has expanded to Buy It Now shopping. Over the years the company has become one of the best online retail business organization. Discussion of Policy and Auditing features for E-bay The organizations requires protection against the cyber-attack which entails to document the information technology security policy (Ross, 2013). Each and every employee need to understand their obligation in order to protect the organization data (Anton, Anderson Mesic, 2004). The workers should have a clear expectation about their behavior when it comes to interaction with the information of the organization sales (Chen, 2009). There is need to have an IT security policy that should be published, understandable as well as enforceable. The following are the main components of an information technology security policy for E-bay organization; Security definition: the E-bay IT security policy have a well-defined security vision for the organization which is to safeguard on the safety of the clients and that of the business which they operate with (Axelrod, Bayuk Schutzer, 2009). This security definition is meant to make certain there is confidentiality, integrity in addition to the accessibility to the data and the resources through the use of the effective and established information technology security methods and the process. Enforcement: on this part it evidently outlines precisely how the policy could be enforced and also precisely how the security breaches might be handled sales (Chen, 2009). Additionally, the chief data officer in addition to the information system security have the responsibility of implementing on these policy and ensuringtheir compliance (Bergstrm hlfeldt, 2014). In this section it includes the procedures to request short term exception to the policy. Additionally, all the exceptions to the policy needs to be reviewed and also approved or perhaps denied by the security officers concerned. The user access to the computer resources: on their policy it outlines the functions along with the responsibilities of the customers accessing the resources of the business especially to their website (Peltier, 2013). It could include things like the passwords, guidelines for the termination of the accounts, procedure for the threat notification and the security awareness training to the clients. Security profiles: E-bay has an excellent security policy including the data which recognizes precisely how the security profiles might be utilized uniformly throughout the common devices, such as the firewalls, proxy servers and the servers (Peltier, 2013). Passwords: The passwords are very critical aspects especially in protecting the infrastructure of the organization. They have higher passwords so that they do not compromise the organization especially the website to the external threats, and also the insiders (Duncan Whittington, 2014). The passwords such as the user log in details need to be strong not to be compromised through social engineering or the password cracking procedures. Email: in the security policy of the E-bay organization there is an email usage policy which is very important. There are several viruses, malware and the Trojans which could use the email as the vehicle in order to propagate themselves through the internet (Duncan Whittington, 2014). To prevent this there are content filtering email messages. These help to filter out attachments with the extensions of exe, .scr or perhaps .inf, which would help enhance on the prevention efforts. Backup and recovery: E-bay does a comprehensive back-up as well as a recovery plan in order to mitigate any incidents. The backup acts as the key for the past. E-bay has an effective backup as well as recovery plans which are established through the comprehensive risk assessments of all their systems on the networks. Logical map of organisational structure Figure 1: The diagram shows the model for the organization E-bay organization illustrates to how information systems could help the business to compete, and the interdependence of the processes of the business, information systems, and the organization surrounding environment (Bodin, Gordon Loeb, 2008). E-bay organization has been able to take advantage of the opportunities which have been presented by the internet. The company has been able to pioneer in the online auctions where people could sell to the others. E-bay operates in very changing environment where the clients can easily switch to the other online retailers who are providing more value and the convenience (Duncan Whittington, 2014). The company has been able to revise on their IT business model through acquiring other internet businesses, and then de-emphasizing online auctions in the favor of the fixed price sales (Chen, 2009). The above diagram shows the model which has been used by the organization to remain competitive in the market and be the best than the rival organiza tions. Discussion of Models and standards There are various security standards and controls which are observed by E-bay organization (Bodin, Gordon Loeb, 2008). One of the security standards which is implemented in the organization is ISO 17799 which defines the information as an assets which could exist in many forms and has a value to the organization. The goal for the information security would be suitably protect the assets of the organization to ensure that the continuity of the business, minimize on the damage of the business, and maximize on the return of the investments (Bodin, Gordon Loeb, 2008). As defined by the ISO 17799 the information security has been characterized as the preservation of the confidentiality which ensures that the information is accessible only to the individuals who have been authorized to have access. Additionally, to ensure integrity which ensure that safeguarding the accuracy and the completeness of the information and the methods of processing (Lam, 2014). Lastly, it focus on the availab ility, which ensures that the users who are authorized have the access to the data and associated assets when they are required. The ISO 17799 has offered E-bay organization a benchmark against which to build on the organizational information security. Moreover, it provides a mechanism to manage of the processes of the information security. Another security standards that is utilized by the organization is the ISO 27001 which is a security management specification (Bergstrm hlfeldt, 2014). It is a framework which is more often procedures as well as policies that entails the physical, legal as well as the controls in the organization information risk management process (PITAS, N?mec Souek, 2014). This ISO has provided the organization the benefit of proof for the security especially the third parties for the partners, customers and the legal aspects. Moreover, there is a reduced cost through the optimization of the structures and transparency. Some of the security control which have been implemented by the organization is authentication. The staff of the organization are required to pass the multi factor authentication before they gain access to the system (Sadgrove, 2016). This helps keep the data of the organization safe from exploit of any vulnerabilities from internal access or external access (Bergstrm hlfeldt, 2014). Another control is the audit trail. The organization have a server which records the IP addresses as well as the URLs for each of the access and they are able to retain such data for a given period of time as an audit trail (Kranakis, Haroutunian Shahbazian, 2008). There is also the application of cryptography where the data is stored in encrypted on all the devices. Discussion of Risk Analysis for E-bay E-bay organization has a given protocol on how to carry the risk analysis. One thing they highlight is to identify on the hazards. This is achieved through understanding of the various difference between the hazard and the risk. The second thing is to decide on what could have caused it and how (Bodin, Gordon Loeb, 2008). When the organization identifies the risk that have affected them they evaluate them and decide on the control measures. Some of the risk analysis aspect to evaluate on the risks the focus is on security and the networks protocols, which E-bay organization has implemented. One of the network protocol is the secure sockets layer (Bodin, Gordon Loeb, 2008). This is a cryptographic protocol which has been designed in order to secure the communications over the TCP/IP networks. The SSL protocol became the Transport Layer Security which is intended to provide a secure connections between the client and the server through encrypting of the data which is passed between t hem. The E-bay network has been encrypted so that any individual who do not have an accessibility to the network would not sniff the packets, reading the user names, passwords, or maybe the credit card information as well as other confidential data which is sent across the network. The company also observes the document protocol that is accountable for the compression, the encryption in addition to the verification of the data. The data which the business transmit is split into the data. Each of the record consist of the header byte, which is accompanied by protocol version, the length to which the information is to be sent, in addition to the payload itself. Analysis of business processes The contingency plan can be done on the worst case risks which could affect the organization. An example could be on the case when the business is not in a position of supporting itself particularly on their ongoing basis. There could be issues of the security concern for the business (Lam, 2014). On the contingency plan it contains various things such as the vendor readiness plan. Each and every organization relies on the vendors in providing them with equipment, supplies, goods as well as the services. Discussion of Vendors Some of the vendors could be regarded very critical than the others. To minimize on the potential exposure to the disruption by the vendors, there are various steps which the company takes in advance (Lam, 2014). One of the step would be to avoid a single source. The organization has many vendors which provide each of our critical goods as well as the services required to support the business. Example of the vendors for E-bay are WC and the Flipkart. These groups helps the sellers to sell their goods to the shoppers all across the globe. Depth of analysis of threat, vulnerabilities and tools The vulnerabilities in the E-bay organization network security could be summed as the soft spots which are present to every information technology network. The networks could be plugged into three categories; the technology, configuration or the security policy weaknesses. The technology have intrinsic security weaknesses. Some of the vulnerabilities which have affected E-bay organization are TCP/IP protocol weaknesses, the operating and the network equipment. When you look at the TCP protocol the HTTP, ICMP could be insecure. On the operating system the OS could have security issues which needs to be addressed (Lam, 2014). The network equipment weaknesses highlights that the various kind of the networks equipments such as the routers, the firewalls have the security concerns and should be recognized in order to protect against. Some of the threats which the organization has encountered is the social engineering. This has occurred where the attackers have been able to obtain the data from the individuals accounts or the organization to use it for the malicious purpose (Lam, 2014). One kind of the social engineering that has been used by the attacker is phishing. The attackers use the email in an attempt to trick individuals into providing their sensitive data, for example the credit card numbers or perhaps the passwords. One of the tool that has been used for attack to obtain the customer information is the keylogger. This tool enables one to know everything which the user writes through the keyboard, and it can capture on the screens. The organization usually uses the integrated sales as well as the purchases system therefore the staff inputs data into the system which could pose a risk to occur. References Ali, S. M. (2014). Integration of information security essential controls into information technology infrastructure library-A proposed framework. International Journal of Applied, 4(1). Anton, P., Anderson, R., Mesic, R. (2004).Finding and Fixing Vulnerabilities in Information Systems. Santa Monica: RAND Corporation. Axelrod, C., Bayuk, J., Schutzer, D. (2009).Enterprise information security and privacy. Boston: Artech House. Bergstrm, E., hlfeldt, R. M. (2014, October). Information classification issues. In Nordic Conference on Secure IT Systems (pp. 27-41). Springer, Cham. Bodin, L. D., Gordon, L. A., Loeb, M. P. (2008). Information security and risk management.Communications of the ACM, 51(4), 64-68. Chen, T. M. (2009). Information security and risk management. In Encyclopedia of MultimediaTechnology and Networking, Second Edition (pp. 668-674). IGI Global. Duncan, B., Whittington, M. (2014, September). Compliance with standards, assurance and audit: Does this equal security?. In Proceedings of the 7th International Conference on Security of Information and Networks (p. 77). ACM. Kranakis, E., Haroutunian, E., Shahbazian, E. (2008).Aspects of Network and Information Security. Amsterdam: IOS Press. Lam, J. (2014). Enterprise risk management: from incentives to controls. John Wiley Sons. Peltier, T. R. (2013). Information security fundamentals. CRC Press. PITAS, J., N?mec, V., Souek, R. (2014). Mutual Influence of Management Processes of Stakeholders and Risk Management in Cyber Security Environment. In The 18th World Multi-Conference on Systemics, Cybernetics and Informatics. Orlando, Florida: International Institute of Informatics and Systemics (Vol. 2, pp. 94-97). Ross, R. S. (2013). Security and Privacy Controls for Federal Information Systems andOrganizations [includes updates as of 5/7/13]. Special Publication (NIST SP)-800-53 Rev 4. Sadgrove, K. (2016). The complete guide to business risk management. Routledge. Vacca, J. (2014).Network and system security. Waltham, MA: Syngress.