Monday, January 27, 2020

The Role Of Cryptography In Network Security Computer Science Essay

The Role Of Cryptography In Network Security Computer Science Essay Network security is concerned with the protection of network resources against alteration, destruction and unauthorized use, cryptography and encryption are most critical components of network security. In my assignment, as a network security manager, I will try to research explore the performance of various cryptographic schemes and evaluate web security and the security of wireless network system. Networks take all kind of sensitive data and security play a vital role of any wireless network system. Security certify level of data integrity and data confidentiality as maintain wired network, without accurately implement security measures and wireless network adapter come within range of the network adapter. Security is high lack, laziness, and lack of knowledge and employee are not aware of these things, especially in small organisation and home, every organisation need to aware and training for employees time to time. Cryptology has two components, kryptos and logos. Cryptographic methods to certify the safety and security of communication and main goal is user authentication, data authentication such as integrity and authentication, non-repudiation of origin, and confidentiality and it has two functions encryption and decryption. In my research, as a network security manager, I will analyze cryptography, web security, and security of wireless network system to implement the network security strategies for the organisation in future. 1. Explore and explain different types of cryptography and assess the role of cryptography in network security. Cryptography has different methods for taking clear, readable data, and converts into unreadable data of secure communication and also transforms it back. Cryptography is also used to authenticate identify of message source and certify integrity of it. Cipher send message and use secret code. The cipher scrambles the message so that it cannot be understood by anyone other than the sender and receiver. Only the receiver who has the secret code can decipher the original message, thus ensuring confidentiality. (Citrix-system, 2010) Type of cryptography Following three common types of cryptography as below: Secret key cryptography is identified as symmetric key cryptography. Both sender and receiver know same secret code described the key and messages are encrypted by the sender and use key, decrypted by the receiver. It use single key for both encryption and decryption. This method works healthy if you are communicating with only a limited number of people, but it becomes impractical to exchange secret keys with large numbers of people. Secret key cryptography use is such as data encryption standard, advance encryption standard, Cast-128/256, international data encryption algorithm, and rivest ciphers etc. (Citrix-system, 2010) Public key cryptography is called asymmetric encryption and use couple of keys one for encryption and another for decryption. Key work in pairs of coordination public and private keys. Public key can freely distributed the private key. If senders and receivers dont have to communicate keys openly, they can give private key to communication confidentially. Public key cryptography use for key exchange and digital signatures such as RSA, digital signature algorithm, public-key cryptography standard etc. Hash functions use a mathematical transformation to permanently encrypt information. It also called message digests and one way encryption. Hash function use to provide a digital fingerprint of file contents and it is commonly employed by many operating system to encrypt passwords and it provide measure of the integrity of a file. It is also use message digest, secure hash algorithm, RIPEMD etc. (Kessler, G,2010) The role of cryptography Many feature combine to throw network security to the top issues in the organisation and face IS professional daily. Nowadays business operation decentralization and correspondence growth of computer network is the number one driver of concern about the network security. As far as security concern, many organisation networks are accidently waiting to occur, such accident will occur is impossible to predict but security breaches will occur. When organisation network security chooses is 100% involve cryptography technology. The following five basic uses of cryptography in network security solution are: Confidentiality Cryptography gives confidentiality through changing or hiding a message and protects confidential data from unauthorized access and use cryptographic key techniques to critically protect data; Access control Only authorized users (login password) can access to protect confidential data etc. Access would be possible for those individual that had access to the correct cryptographic keys; (Mitchell, M, 1995) Integrity Cryptographic tools give integrity verify that permit a recipient to authenticate that message transformed and cannot prevent a message from being transformed but effective to identify either planned and unplanned change of the message; Authentication is the ability to verify who sent a message. It done through the control key because those with access to the key are able to encrypt a message. Cryptographic function use different methods to certify that message is not changed or altered. These hash functions, digital signatures and message authentication codes. 2. Explore encryption for network security. Encryption for network security Encryption is the most effective method to reduce data loss or theft to encrypt the data on the network security. Encryption is a process of network security to apply crypto services at the network transfer layer on top of the data link level and under the application level. Network encryption other name network layer or network level encryption. The network transfer layers are layers 2 and 4 of the open systems interconnections (OSI) is the reference model, the layers responsible for connectivity and routing between two end points. Using the existing network services and application software, network encryption is invisible to the end user and operates independently of any other encryption processes used. Data is encrypted only while in transit, existing as plaintext on the originating and receiving hosts. Encryption for network security execute through internet protocol security and set of open internet engineering task force (IETF) standard and apply in combination and build structure for confidential communication over IP networks. Internet protocol security works through the network architecture and encrypted packets show to be the same to unencrypted packets and rout through any IP network easily. Network encryption product and services provide several companies such as Cisco, Oracle etc. (Search security, 2010) http://www.cipheroptics.com/images/network-encryption-big.jpg Figure 1 Network Encrypted 3. Critically review the key and password management in terms of network system security. The key management Information become essential assets and protects it and availability is vital for business success. Encryption is the technology for doing so and become significant part of network system security. Encryption key is very helpful to secure data and information. There are two types of key public and private key use to secure the information and network. These key used in cryptographic system as below: Public Key it was invented in 1976 and refer to cypher architecture type and apply two key pairs is encrypt and decrypt. It can use to encrypt message and corresponding private key to decrypt it. Public key encryption believe extremely secure because it does not need secret shared key among the sender and receiver. It is helpful for keeping private emails and stored on mail servers for many years. It programs such as PGP has digital signature ability built message sent can digitally signed. Private Key it also called secret key and encryption/decryption key to exchange secret messages and shared by the communicators so that each can encrypt and decrypt messages. Public key uses with private key together. (Search-security 2010) Password management Password is the most important aspect to login into the system and the network. Organisation should allow only authorised users to access to the network and every user access individual login and passwords to enter the network, its result increase the security aspects. There are following necessary things to secure password in the network system as below: Long Password every user need to long password because short password can very quickly compromised and analyse the permutation based on the password length; Change password anytime employee should change password regularly, nobody assume easily and helpful for security breaches of the network; Avoid utilize similar password dont use the same password for different accounts because it would naive for administrator to think and employee should use different password for safety and security for network system; Necessity to changing password regularly employees also gradually more access their work accounts from remote location, user need to educate/awareness on the required of altering the password frequently. (Storts, J, 2010) 4. Compare symmetric and asymmetric encryption systems and their vulnerability to attack. Symmetric encryption systems and their vulnerability Symmetric encryption system use same secret key is used to encrypt and decrypt information and transform between two keys. Secret key concern to information to transform the content because both can use encrypts and decrypts traffic. Symmetric encryption system has two types are: Stream ciphers it is bits of information one at a time and operates on 1 bit of data at a time. It is faster and smaller to implement and have an important security gap. Certain types of attacks may cause the information to be revealed; Block ciphers it is encrypts information by breaking it down into blocks and encrypt data in each block and this data is fixed sized commonly 64 bit and mostly use in triple DES and AES. (Encryptionanddecryption, 2010) Symmetric encryption algorithms including Des, 3DES, AES, and RC4 etc. 3DES and AES are normally used in IP sec and other types of VPNs. RC4 is used on wireless networks and used by WEP and WPA for encryption. Symmetric encryption algorithms can be extremely fast, and their relatively low complexity allows for easy implementation in hardware. However, they require that all hosts participating in the encryption have already been configured with the secret key through some external means. (Stretch, J, 2010) Symmetric Encryption Vulnerabilities are: To break symmetric encryption system through brute force and cryptanalysis; Figure-2 Symmetric encryption system Weak password can break symmetric encryption systems; Password always keep in mind or make a backup copy of the password; Exchange secret keys in secure manner and stored properly. (Encryptionanddecryption, 2010) To leaking and spying out password. symmetric_encryption.png Asymmetric encryption systems and their vulnerability Asymmetric encryption system use two keys one for encryption use for public, anyone can encrypt a message and another for decryption use for private and only receiver can decrypt a message, normally set up a key pair within a network and involve in six main elements are: Plaintext Text message applied in algorithm; Encryption algorithm it performs mathematical operation to conduct substitutions and transform to the plaintext; Public and Private keys the keys pair where one use for encryption and other decryption; Ciphertext produce encrypt message by applying algorithm to plaintext message through using key; Decryption Algorithm generates ciphertext and match key to produce the plaintext. (Encryptionanddecryption, 2010) Most common asymmetric encryption is RSA and if compare with symmetric encryption it is much slower but its capability to establish secure channel over a non-secure medium such as internet. This is accomplished by the exchange of public keys, which can only be used to encrypt data. The complementary private key, which is never shared, is used to decrypt. (Stretch, J, 2010) asymmetric_encryption.png Asymmetric Encryption Vulnerabilities are: Figure-3 Asymmetric encryption systemPublic key can be distributed freely; It is computing intensive; It process very slowly; Weak password can easily steal; Weak encryption to break this system; Crash digital signature; Security breach at the time of key exchange. 5. Explain and critically assess web security and critically list down different type web security tools and technologies. Web security Web is very vital role in our daily life such as online searching, surfing, customers, vendors, co-staffs, email, etc but need to be web security and identity theft protection. Web security has many problems like spam, viruses, security breaches theft etc. This problem with web security is the part of network of attack computers and servers send out spam messages without knowing it and email / passwords produce and re-sale to competitor. In my research, security expert says that shows you how to do something in five minutes and conveniently neglect to mention the security implications of their advice. If it sounds too easy to be true, it probably is. A perfect example of this is PHP solutions that use a file for data storage and ask you to make it writable to the world. This is easy to implement, but it means that any spammer can write to this file. (Heilmann, 2010) Web security has many risk and attacks such as IP address identify the computer, Fixed IP address is larger security risk, share network, staff unaware security leak in the network setting, SQL injection attacks, exploits browsers and websites, remote file inclusion (RFI), phishing etc. (Heilmann, 2010) Web Security Tools and Technologies The following list down of different type of web security tools and technologies as below: Spike Proxy It is a professional grade tool for looking for application level vulnerabilities in web application and cover SQL injection and cross-site-scripting; Power fuzzer It capable of spidering website and identifying inputs and common web vulnerabilities such as XSS, SQL injection and support https. Written in python; Sec point penetrator It network security tools based, penetration testing appliance or web based service give vulnerability scan pen testing and can change IP address to scan and report; Net sparker It allows users to exploit the identified vulnerabilities and see real impact of the problem. It capable false positive free, handling of websites that rely on AJAX and JavaScript; OWASP It uses multiple techniques such as conditional errors injection, blind injection based on integers, strings/statements, MS-SQL verbose error message and identify database version and gather information Gama Sec It is automated online website vulnerability assessment delivers test to web servers, web based application and web-interfaced system and support HTTP authentication schemes, HTTP protocol, BASIC etc; NIkto Scanner Open source web server scanner and perform complete tests against web servers for multiple items, dangerous files, CGIs, and problems of the server; Perimeter check it analyze external network devices such as servers, websites, firewalls, routers and security vulnerabilities and also lead to interrupted service, data theft, system destruction and help immediately remedy security problem. (Hower, R, 2010) . 6. Identify vulnerabilities and mis-configurations in wireless networks. Vulnerability and mis-configuration describe as some event that exposes organisation and network security has ability to work efficiently its required confidentiality level and protects lack of the systems. Wireless networks vulnerabilities Some of the following common wireless networks vulnerabilities as below: No set physical boundaries wireless access points can lose signals, due to doors, walls, floors, and insulation etc; Untrained users setting up unauthorized networks and workstation untrained users who either are uninformed and therefore unaware of security measures that must be taken when deploying wireless, or whose desire to have wireless is so strong that it completely overshadows the rules set by the organization to ensure that systems are secure. (Lane, H, 2005) Rogue access points this attack consist of connecting illegal access point on the network; Lack of monitoring every organisation has some loopholes in monitoring but intrusion detection tools can use continuously monitor to secure the network system; MAC address filtering it is unique number assigned and wireless LANs allows access point to connect to network. Filtering can result in security breach as user change MAC address, it result identity theft; Insufficient encryption standards weak encryption standard say that users will not enable it and harmful to wireless LAN as weak encryption; Easy to eavesdrop wireless use airwaves to listen easy on network traffic or connect to network and it results the data is encrypted with strong encryption. If WEP encryption use, hackers can some attempt to decrypt the information; Unsecure holes in network hacker can enter wireless LAN by circumventing firewalls and allow other to come, as a result confidential data lost or may compromise on the network; Denial-of-service attacks external causes based is Denial-of-service attacks and make network unproductive and forcefully user to disconnect continually disrupting operation in the organisation such as jamming (jam a radio network), rush access (overload network with malicious connection), spoofed de-authentication frames etc. (Lane, H, 2005) Wireless network mis-configuration Mis-matched software and hardware it is problem arises for network infrastructure that is vulnerable to wide range of attacks. Sometime function work properly but awfully mis-configured; Service Set ID (SSID) SSID is a configurable identification mechanism to enables a client to communicate with the correct base-station. Configured properly with SSID otherwise attacker can exploit the SSID in attempt to access base station and change SSID password and change 802.11 security settings for authentication. (Spam-laws, 2009) 7. Demonstrate how to keep wireless network system safe. Nowadays, wireless network become more common called Wi-Fi /802.11 and allow computer to connect to another without cables and using computer easier and more convenient than ever before with fast internet connection and wireless router and surf internet, data transfer, print documents, email, download information etc but unhappily, it also make easy for outsider/hacker to do the same. Organisation should following points to keep wireless network system safe and secure as below: Keep-out undesirable wireless guests wireless network restrict access through encryption is easy through which encoding or scrambling information to receive and send, only those can access with right password or encryption key and restrict wireless network to normal office hours. Some encryption protect wireless network such as wired equivalent protection (WEP), Wi-Fi protected access (WPA), WPA2 etc; Choose strong password in my research, I found some basic guideline when create a wireless network password is Password should be longer (20 characters) it takes someone to figure it out; Use mixture lowercase and uppercase letters; Insert numbers in between letters; Change password every 3 months; Write password down and keep in safe (in case of forget). Use the firewall it is front security and secures network, computers and data from snooping eyes; (Bryan, S, 2010) Dont show the name of the network (SSID); Change default SSID, dont use name to identify the organisation; Use MAC filtering because each network card is unique code known MAC address and access points to restrict access to assured; Switch on and use built-in encryption to prevent eavesdrop; Restrict user ability (network administrators) to setup quick and dirty wireless network, even temporarily. One rogue access point can undo all the good work you do on the others; Certify all security measures are in place, it result defence against intruders; (Microsoft, 2010) Turn off the wireless network when it isnt use; Hide/keep safe place confidential files/data. Conclusion I conclude that security of wireless network system play key role in every organisation and also implement all network security strategies for the organisation in present and future and secure network resources against alteration, destruction, and unauthorized use. Cryptography tools and web security tools are also very helpful to secure the network system and protect IT assets, confidential data and information. Recommendation I recommend some of the important points as below: Better education and stronger security implementation; Wireless network awareness and training for employees timely; Update wireless network security timely; Certify to secure wireless access point with a strong password; When it need implement WEP authentication method; Make sure all users have proper key or password configured on their system; Make sure all service provide to users are protected by end to end encryption; Use SSID, MAC address filtering allows to configure wireless APs.

Sunday, January 19, 2020

The Effects of School Uniform

The Effects of School Uniforms Jeanell Greene Eng121: English composition Instructor Katie Surber April 8, 2012 There are issues that probe our schools on a daily basis. Many are very important such as student behavior and performance, lack of funding, and highly qualified staff, and some are just minor such as use of technology and extra-curricular activities. There are many that are debatable and require extensive dialogue and research. However, there are those educational issues that just need simple discussions to formulate manageable and workable solutions.One of the major and current issues is whether school age children should wear school uniforms or wear regular clothing. There are many parents and school officials who want our children to wear uniforms and there are also many parents who don’t want our children to wear them. Many people feel that the uniform issue plays a vital role in the educational development of children. They feel school uniforms have a major imp act on the educational process of how children learn. It really does not matter whether the children wear uniforms or regular clothes.Children will not learn any differently with or without the school uniforms. The debates over school uniforms are very complicated and have many points of view coming from all directions including teachers, parents, and even students. In reality, school uniforms are becoming quite popular with society, but of course very unpopular with teens and younger children. However, that is to be expected. There are many pros to the use of school uniforms. A plus to school uniforms is that it makes students visible to school personnel, students, and members of the public.School officials will know, by the uniforms, who belong on campus and who do not. Moreover, when students are adorned in school uniforms it makes it easier to identify and recognize children in public in case of an emergency. Wearing school uniforms can give students a sense of belonging. Usuall y, students will feel a sense of acceptance because all of the students are wearing the same thing. Therefore, it reduces the chances of being taunted and/or being bullied. This also helps to build self-esteem and self-assurance. When children wear chool uniforms, parents do not have to worry about being able to purchase designer clothing or expensive brands. There are more advantages of wearing school uniforms. Many people consider that a child in uniform is likely to take school more serious and not play around as much. Many also think that wearing a uniform helps to maintain discipline in schools; it also decreases the amount of discipline problems. It is said that the lack of discipline comes from home because the parents refuse to take on the discipline aspect of parenting. Students fighting at school are another challenge for educators.Some of these fights have a lot to do with fashionable clothing. Students who wear the prescribed dress code will tend to fight less because th ere is no longer the pressure of wanting or desiring the fashionable clothing that everyone else is wearing. There is also the struggle that some schools have with gangs who are identified by certain clothing, colors, and paraphernalia. If school uniforms are worn, this will probably ease some of the tensions related to gang violence. Distractions are another argument in the school uniform issue.By wearing school uniforms, the staff in schools will know that the appropriate clothing is being worn to school daily instead of fads that are considered outrageous, too revealing or displaying the wrong and/or inappropriate messages. Some students have turned school into an everyday fashion show. Therefore, taking the real and main focus off of learning and putting more attention and emphasis on what is being worn to school. School uniforms look nicer and make students look very professional. The woes of finding appropriate dress for school can be alleviated by wearing school uniforms.This will afford them more time and resources to concentrate on their school work. It also gives the students a chance to express their individuality in another more constructive and productive way. Although school uniforms are a good idea to some people, there are others who oppose it. One of the most common reasons why people oppose school uniforms is that it supposedly suppresses individuality. Some educators say that academic progress encourages a student’s pursuit for individual thought which is much more important than what he/she wears. By forcing students to wear school uniforms this inhibits creativity and self-expression.Some people say that making students conform to the school uniform denies the students the opportunity express them through what they wear. When the students are able to create their wardrobe it makes them feel the part of individual more and not feel forced to be a part of a group. It is also felt that students are going to reject rules regardless, and what would the purpose of making them wear a school uniform serve. Henceforth, by forcing students to wear uniforms will only aggravate their individuality and make them rebel by altering their school uniform.The students’ defiance of the school uniform will cause the students to choose an inappropriate size, length, and/or add color to try to individualize the uniform. This creates another problem for the teachers and school administrators. It is also believed that cliques, gangs, and groups will still be formed by the altering of the school uniform. Many feel that there is still no proof that the way our children dress for school will increase or decrease their ability to learn or curb violence in the school setting.Even if the school system does not require students to wear school uniforms, there is still a dress code that must be followed and if it is followed correctly there is no need for school uniforms. Most people feel that the school board should not spend time wor rying about school uniforms or dress codes; they should focus on a better education for children and enforce mandates by local school district and state boards of education along with national disciplines. The problem is not what the children are wearing; it is what they are and are not learning in school and at home.It has been said that some of the best students are bad dressers. Therefore, proving that dressing doesn’t improve learning, only the individual improves learning. Buying school uniforms for most people is considered cheaper than purchasing the latest and hottest trendy items. However, there of others who say it is not because it depends on where and how many school uniforms are purchased. Also, school uniforms can get ruined as well as any other clothing; therefore, the school uniforms will still need replacing just like regular clothing.With that being said, many ask the question how is it really cheaper? They feel that children will keep the clothes that they want to wear in better condition than a school uniform because in reality they don’t want to wear the school uniform anyway. Therefore, this makes the cost of school uniforms higher than the cost of regular clothes. There are also those that consider the school uniform to be ugly, unflattering, plain and boring. They feel it takes away from the individual’s appearance and makes the students not have a good self-image of themselves. The education f children must always be at the forefront of any discussion of any mandates and laws passed which effect and affect the lives of students entrusted to the care of school districts. The stakeholders must examine every avenue and exhaust all resources to enhance the academic development of these students. The school uniform has been a hot topic of discussion among educators, parents, administrators, politicians, and students for years. There are advantages and disadvantages of wearing the prescribed school uniform dress code. Ma ny people feel differently about the school uniform issue and have voiced their opinion in a myriad of ways.The discussion must continue as the data continues to reveal the benefits of school uniforms. Some of the benefits have been witnessed in the school setting in which I am employed. I feel that school uniforms should be worn for the comfort of the individual who doesn’t have what others have, so that he/ she won’t feel left out or inadequate. I really think that wearing school uniforms has helped with the self-esteem of some children because many of them are more focused on their learning and spend less time worrying about being picked on or bullied about what they are wearing.

Saturday, January 11, 2020

Ethics Handbook Essay

We chose you as an employee of Company X because we see you as a valuable person who can contribute to the same priority. As a team member of Company X, are goals are clear. Through public respect, responsiveness, and accountability as our core values, we are able to remain leaders in the industry. The success of our company is dependent on you, our stakeholders, and our customers. We take great pride in our reputation in the industry and continually monitor ourselves for ways we can improve business for our clients, stakeholders, policymakers, and the general public, both local and national. Our reliability is measured through our commitment to delivering service with integrity and through honorable conduct. Because we are at the forefront of public service, we are judged on our choices and decisions. Our reputation is based on the public’s view of our commitment to ethical business practices and our respect for society. As an organization we aim to maintain active engagement in ethical behavior that promotes social responsibility in everyday practices. This is where you come in as an employee. We encourage all employees to actively participate in community outreach and events that foster both your own growth and the growth of social values. Company X will reward this activity if accompanied with ethical decision making by increasing promotion opportunities and/or allowing this experience to be counted in your job description. If you are interested in this opportunity, see Human Resources for a list of approved community outreach opportunities. Company X Values It is the policy of Company X to embrace ethical behavior through clear communication of the laws, rules and expectations that are defined in this code of ethics. In addition, Company X values accountability for good ethical choices and socially respected behavior. We rely on every member to evaluate their own behavior and conduct respectable business through solid every day decision making. Ethics are not fixed, and subject to interpretation through each and every interaction between everyone involved. Because value s and ethical decision making can be challenging, Company X wants to take some of the pressure off the complexities of making difficult ethical decisions. Therefore, this manual provides directives used to evaluate and interpret best practices in the business environment. In addition, these policies and all regulations including administrative actions, apply to all staff  members, contractors, and volunteers and are strictly enforced (see section Member Misconduct).The manual also contains fixed principles, mandatory training, resources for questionable situations, ethics mentor, anonymous hotline, and resources for situations that may be questionable. A signed copy of this manual will be placed in all member’s personnel file and will be used as reference for future use. Please be sure you understand these policies and procedures before you sign the document. We begin by outlining and defining the standards of social and ethical conduct. In addition to standards of behavior, training is outlined. Training is mandated to all staff employed by Company X. Additional training and resources are offered throughout the year in respon se to the changing needs of the industry and social issues and will be announced semi-annually. Principles of Behavior and Conduct No member, contractor or person acting as a representative shall: Discriminate against clients, coworkers, stakeholders, Accept monetary compensation, services in trade or benefit from any interaction directly or indirectly related to the services provided by company x if the value is determined to be at or above $30. Engage in, use or create an appearance of using official capacity to influence clients stakeholders, or other members for personal or professional gain. Knowingly make statements or take action that is untruthful or can be reasonably determined to be untruthful. Engage either directly or indirectly in political campaigns, nor engage in political conversation with anyone while acting in capacity of Company X business. Retaliate against any member who comes forward with claims of ethical violations. Retaliation is mandatory termination of employment without further warning (see section Member Misconduct). All members contractors, or persons acting as a representative shall: Report all incidents of violations to the Ethics Office. Interact and promote personal integrity, honesty, fairness and confidence in compliance with all laws, rules, policies and regulations both internally and externally. Maintain confidentiality in all interactions. Written, verbal, email, phone. Avoid inappropriate associations with clients or client representatives. Engage, actively encourage and support community involvement through support and reassurance in wrap-around service delivery. Utilize efficient use of resources in such a way that minimizes the impact to the environment (energy and materials). Report suspected, potential, or clear violation of ethical misconduct. All members in the chain of command are held to the same standards. Contractors, and any individual acting in a capacity to officially represent Company X are also required to carry out all actions with an intent to promote public trust, integrity, and confidence. From team members to corporate leaders, we expect the same set of principles through a set model of best practices. Best practices is recognized by asking yourself is this decision going to cause harm to someone, is this situation going to violate law or company policy, is my action going to violate stakeholder values, or compromise my position within my job role? Best practices will help us all to remove some of the risks we might face in everyday decision making by communicating set values, social responsibility and ethical standards for all members. Because best practices is subjective, training and resources will be available to provide leadership and mentoring. We encourage open discussion when personal values and ethi cs might cause conflict or confusion. As a condition of continued employment, mandatory ethics training is provided and monitored (see monitoring ethics section below). Ethics Training Leadership teams attend annual ethics training. Training includes skills to monitor and mentor lower staff. As a result, members can be confident that management is able to provide guidance and support for most ethical decisions. In order to communicate Company X’s policies, values, and changing trends in legal and social ethical issues formal training is required. Company X models this by providing training. As a result, all staff are required to complete the following formal training: In the first month of employment, all staff will go through instructor led training targeted toward individual and group acknowledgement of legal situations, ethical dilemmas, social responsibility and reporting requirements. This interactive training will present scenarios in which employees will make decisions whether ethical violations may or may not have occurred. Independent trainers with local management will evaluate answers and offer answers to difficult scenarios. All staff will take a yearly instructor led course on the history of civil rights and one follow up interactive on line course which presents current social, business and ethical issues in industry. General managers will receive value based ethics training  tailored from annual risk assessment data. The goal is for managers to set modeled behavior and create positive influence. Company X sponsors an annual Industry Standards Town Hall meeting. We value transparency and company input from all of us and our intentions are to provide all of us the opportunity to go over changing social issues, our previous year’s successes and failures, and what can we do to support the values of Company X, our clients, and community partners. Our company will be closed on this day while each of us enjoy a paid day to come and participate in this interactive get together. Member Misconduct Company X recognizes ethical conduct is not always easy to define. We value fairness and strive to provide impartial judgment based on facts and data. All reports of violations are reviewed and judged by an independent review board who will at determination of reported violations, determine consequences and refer cases for criminal prosecution if necessary. Consequences for violation of ethical misconduct will be strictly enforced. Company X has zero tolerance for unethical behavior. Informal and formal offenses will be forwarded to the Ethics Committee for record keeping purposes. Informal counsel for misconduct not related to any act of gross misconduct. This is the preferred method for first time offenses. Formal counsel is written report placed in member file for duration of one year. Two written reports within one year that are found to be validated through investigation will result either in unpaid suspension or immediate termination. Unpaid suspension. Gross negligence results in immediate termination and will be referred for criminal prosecution. Monitoring Auditing and Reporting Video monitoring in central locations where customer interactions will be supervised by an independent contractor. This is to protect you as an employee, protect customer interactions, and protect the interest of Company X. All computer and resource use by all employees is subject to monitoring and will be strictly enforced. IT managers have unlimited access to company owned property. Due to the potential time sensitive situations that may arise, no notice will be given prior to IT management accessing company computers. Team members personnel files will be maintained and include reported violations. These files will be analyzed for trends that can be traced back to departments, leaders, hiring practices, or substandard training. The Ethics Office, and Human Resources do not require your written consent for  release of information related to ethical violations. Semi-annual audits will be conducted on all departments within Company X by the Ethics A udit committee: Anonymous hotline reports will be compiled and reported to the Ethics Audit committee. Plan for Evaluating and Improving the Ethics Program After Implementation. The final results of all data compiled by the Ethics Office will be submitted to Corporate Leadership Committee who will analyze the results in order to evaluate potential changes to Company X’s ethical inventory. Data will also be collected from hotline calls, imposed ethical violations, and employee suggestions. This data will be measured against all complaints, judgments, and lawsuits both within Company X and the industry and be used to revise program standards. Data will also be analyzed and evaluated for ethical issues that need to be integrated in to future training and resources for staff. All staff will complete annual on line â€Å"How Are We Doing?† surveys. Focus groups tailored to each department’s group dynamic will analyze the data and make formal recommendations to the Ethics Office Staff, community and stakeholder input will be collected and analyzed for social and ethical value. The Ethics Office will compile the results from all departments and present the evidence to CEOs and senior management. Middle management and supervisors will be included in the final findings. Training will be adjusted and targeted to cultural, legal, and ethical risk factors. Positive yearly ethical performance evaluations, focus group opportunities, and promotional opportunities will be tied to annual employee review. Help and Resources Here at Company X we recognize that some ethical situations may be complex or blurred. Additionally, we recognize that the difficult decision to come forward with information against coworkers may prevent reporting incidents that need investigation. Furthermore, ethical decisions are often confusing and require complex decision making. We are here to help. Furthermore, if you have questions about your own decisions, questions about an incident, or just want to ask questions, we want to support you. For this reason, we provide an anonymous phone line that allows members to report violations, present questions and trouble shoot challenging scenarios. Ethics Office 360-555-1212 staffed by trained ethics officer. Anonymous hotline 360-555-4242 State Office of Ethics 1-999-555-2323 Federal Office of Ethics  1-777-555-7878 We provide annual reports of imposed ethics violations and the penalties imposed. Here is the link to www.companyx/ethics/reports.com I have read and understand the policies and ethical standards set for Company X. I am aware a signed copy of this policy will be placed in my team member personnel file.

Friday, January 3, 2020

Mutti Burke Shows - Free Essay Example

Sample details Pages: 2 Words: 717 Downloads: 8 Date added: 2019/05/15 Category Society Essay Level High school Tags: Slavery Essay Did you like this example? At first glance, antebellum Missouri should share little in common with the steep slopes of Appalachia. Despite differences in topography, climate, agriculture, and population, however, prior to the Civil War, the two regions shared similar characteristics in their use of slave labor on small-holdings. Small-holders often worked alongside their slaves in the house or field, and typically found diverse uses for their labor or hired slaves out to neighbors. Don’t waste time! Our writers will create an original "Mutti Burke Shows" essay for you Create order While these practices have been chronicled in Appalachian historiography, small-holdings have been largely ignored in other parts of the South. In her ambitious On Slaverys Border: Missouris Small-Slaveholding Households, 1815-1865, Diane Mutti Burke helps fill this void. As Mutti Burke shows, Missouri presented an ideal place for small-holders to settle. Its close proximity to free-states kept large planters uninterested, even in absentee owning, allowing room for smaller upcountry ambitions to sprawl. Small-holders came to improve their social and economic lot, and found both easier in a region of other holdings like theirs. Owning even one slave provided social and economic capital. It was not long, Mutti Burke contends, before the thousands of westward migrating slaveholders far surpassed their original intentions of replicating the eastern small-slaveholding paradigm, and instead created a distinctive slave society in which small slaveholders reigned supreme (51). In the years immediately preceding the Civil War, she argues, it was these small-holders, and not planters, that became Missouri powerbrokers. On Slaverys Border differs from earlier works on slavery by examining the experience of both owner and enslaved, as well as the interaction between the two. As Mutti Burke explains at the outset, the intimacy of small-slaveholding household relations makes it illogical to concentrate on one race or the other (8). This welcome approach allows readers a very well-rounded window into the world of small-holdings, which Burke presents through the framework of the household. Inside the ?big house whites made decisions that they hoped would improve their lives, influenced primarily by economic reasoning. In their society, they hoped to pass their wealth to future generations and launch their children into the slaveholding class (88). While her separate examinations into the lives of owner and enslaved are revealing, even more so are her discussions of their interactions. The complicated and ambiguous relationship between master and slave is even more so on small-holdings. Despite their close proximity, blacks and whites still maintained segregated space. Mutti Burke expertly describes family life for slaves, arguing that small-holdings meant more interaction across plantation boundaries. She demonstrates that this increased contact resulted in more abroad marriages, thus influencing traditional gender roles, as abroad husbands could provide their wives and children with only limited economic assistance, physical protection, and emotional support (207). Slaves utilized their abroad connections as an information pipeline and were well informed because of their location in a border state. Segregated spaces in the home carried over into specific conduct in the community, though many slaves attended funerals, church services, and other community functions. Some authors have argued that the quality of a slaves life was closely linked to the size of his masters holding, but Mutti Burke disputes any claim that small-holdings resulted in a benign form of slavery. Certainly the proximity allowed for a broad spectrum of experiences and emotions, but these ranged from sympathy to hatred and cruelty, and in no way was Missouri slavery better than anywhere else in the South. Sources abound for recreating the Missouri small-holder perspective, and Mutti Burke has made excellent use of manuscript collections, government documents, newspapers, and church records. While some may criticize her use of the WPA narratives and Pension Claims in recreating the enslaved experience, Burke is meticulous in cross-referencing these with each other and autobiographies from former slaves such as William Wells Brown to decipher the truth. She sensibly refuses to reject either the positive or negative depictions in these sources, and readers are treated to an accurate depiction of how varied the enslaved experience could be. By focusing on the rural Little Dixie area of Missouri between the Missouri and Mississippi Rivers, Mutti Burke certainly leaves room for future scholars to explore border slavery in its urban environments. Those scholars, along with anyone studying Missouri, the political-economy of the border states, the antebellum South, or small slaveholdings, will find On Slaverys Border a welcome addition to the historiography and excellent resource.