Saturday, January 25, 2020

Compare And Contrast Tcsec And Cc Information Technology Essay

Compare And Contrast Tcsec And Cc Information Technology Essay To evaluate a computer system or product to see it meets the security requirements based on the information security evaluation standards. Trusted Computer System Evaluation Criteria (TCSEC) was the first computer security evaluation standard which was published by the U.S. defense department in1985. TCSEC influenced other European countries and very soon some countries based on TCSEC to develop their own security evaluation standards. In 1996, America combined with 5 European countries (UK, France, Germany, Netherlands and Canada) and NSA (National Security Agency) and NIST (National Institute of Standards and Technology) developed a new criterion which was called Common Criteria (CC). In 1999 Common Criteria (CC) was recognized by ISO and named ISO/IEC 15408-1999. In this essay TCSEC and CC will be discussed, compared and contrasted to find out the similarities and differences and the strength of CC will be indicated. The answers for the topic are based on research on relevant articles and journals and most of the resources are from the internet. The materials are then analyzed and discussed. The outline of the report is as follows: Introduction- brief description of the topic. Background- explanation of TCSEC and CC. Compare and contrast the two standards Describe the similarities and differences between the two standards and state the advantages of CC. Some journals, articles and books are used in this report which can be found in the references. Background This session discusses TCSEC with the evaluation class of TCSEC. And also describes the CC and evaluation of assurance level of CC and the evaluation process. TCSEC Evaluation Class CC- Assurances Levels D Lowest protections EAL1 Functionally tested C1 Discretionary Protection EAL2 Structurally tested C2 Controlled Access Protection EAL3 Methodically tested checked B1 Labeled Security Protection EAL4 Methodically designed, tested, reviewed B2 Structured Protection EAL5 Semi-formally designed and tested B3 Security Domains EAL6 Semi-formally verified design and tested A1 Verified Protection EAL7 Formally verified design and tested Table 1- Evaluation Class of TCSEC and Evaluation Assurances Level CC TCSEC is commonly called the Orange Book (the cover of book is orange). TCSEC has 4 divisions and 7 evaluation classes. Each class contains security requirements and it is used to determine the level of trust of a computing system. The divisions of TCSEC are A, B, C, D and the seven evaluation classes are: D (lowest), C1, C2, B1, B2, B3 and A1 (highest). A is more secure than D, and 2 is more secure than 1. (See Table 1) Level D: non-secure system Level D only contains D1 evaluation class. D1 is the lowest protections and only provides security protection for file and user. Level D can be applied to any system which has been evaluated but did not meet the higher evaluation class requirements. Level C: Discretionary protection Level C provides audit trial protection and Level C includes C1 and C2.C1 is discretionary security protection and its class is lower in Level C. C1 provides discretionary access control and it has the responsibility for Identification and authentication. C2 has all the security features of C1 and has the function of audit trail and access protection. C2 requires single- user log-in with password and an audit trail system. C2 works through log-in process, security event and source isolation to increase access. Level B: Mandatory Control. There are 3 classes in Level B and they are B1, B2 and B3.B1 has all the requirements of C2 and it also has some new requirements: each object has a label which is under system control. It uses sensitivity labels as a basis of all the access control and labels the object which will import to the system. When the system administrator adds a new communication channel or I/O mechanism, he has to manually assign security level to the channel and mechanism. The system uses user password to determine the user access level and it also uses audit to record any unauthorized access [13]. B2 has all the requirements of B1. Besides that, the B2 administrator must have clear and documentation style of security policy for trusted computing base. B2 has some new security requirements: system must immediately inform any changes between user and associated network, only user is able to do initial communication in the trusted path and the trusted computer base supports inde pendent administrator and operator. B3 has all the requirements of B2. But B3 has stronger ability to monitor access and anti-interference. B3 system has to set the security of the administrator. The new security requirements for B3 are: provide a readable security list, some objects are not allowed for certain users to access, the system has to provide a description of the users and to identify user before any operation and the trusted computing base establishes security audit trail for each labeled object [13]. Level A has the highest security. Level A only has A1 class. A1 is similar to B3. A1has the obvious features a developer of system must adopt for a formal design specification to analyze a system. After analysis, the developer has to use verification technology to ensure that the system meets the design specifications. The entire installation operation must be done by the system administrator and each step has to provide formal documentation. In TCSEC, to identify the security and to give some assurance to the system, it has to meet the security requirements [14]. The TCSEC was replaced by CC. CC is a framework of mutually recognized evaluation criteria and it contains 3 parts: security model, security functional requirements and security assurance requirements. Security assurance components are the basis for the security assurance requirements and it expresses in Protection Profile (PP) or Security Target (ST) [15]. A Protection Profile is the security requirements of customers and a company of users for a class of Targets of Evaluation (TOE) [15]. A PP uses a template independently to express security requirement. This is useful when implementing a product line or a family of related products [7]. Protection Profile copy TCSEC security requirements of C2 and B1. Protection Profile include: a template of commercial security profile, Firewall profiles which use for packet filters and application gateways, Smart card profiles, Database profile and a role which is based on control profile [16]. A Security Target consists of a collection of security requirements and used to evaluate computer system or product [7]. Figure 1 The PP/ST specification framework [7] Evaluation is that use defined criteria to evaluate a computer system or IT product [16]. Figure 1 shows specification framework to the Targets of Evaluation. The Common Criteria evaluation process starts from identifying a TOE (Target of Evaluation), and then input an ST which describes the security functions of the TOE [16], the example of TOE is computer system or product, To see if the result of the system is secure, it should meet a set of security requirements or protection profile [7]. Common Criteria provides a set of Evaluation Assurance Levels (EAL) from EAL1 (lowest) to EAL7 (highest) and it will be awarded to products and system upon successful completion of evaluation (see Table 1). The Common Criteria is absorbed by ISO (NO. 15408) EAL1- Functionally tested. For the correct operation of EAL1, it requires a certain confidence of occasion. This situation is of the view that the security threats are not serious [7]. EAL1 provide the evidence of testing and its documentation. EAL2- Structurally tested. In the delivery of the design information and test results, EAL2 requires the developer collaboration. But do not spend too much energy beyond the good commercial operation of consistency. EAL3- Methodically tested checked. Without a lot of changes on the premise of reasonable development practices, it allows a conscientious developer to obtain maximum assurance during the design phase from the correct security engineering. EAL4- Methodically designed, tested, reviewed. It allows the developers to obtain maximum guarantee from the correct security engineering, the security engineering is based on good and strict commercial development practice. This development practice does not need much professional knowledge, skills or other resources. In the rational economic conditions, and to renovate an existing production line, EAL can achieve the highest level of result [7]. EAL5- Semi-formally designed and tested. It enables the developers to obtain maximum security from the security engineering. The security engineering is based on a strictly commercial development practice. It relies on the appropriate application of professional safety engineering technology for support. EAL6- Semi-formally verified design and tested. It enables the developers to gain a high level of certification through the application of safety engineering technology and strict development environment, and. This is to produce a costly TOE to protect high-value assets against major risks [16]. EAL7- Formally verified design and tested. It is applicable to safe TOE development and it applies to places where the risk is very high, or high value assets that worth higher expenses. In this session discussed TCSEC and CC, an explained evaluation class of TCSEC, evaluation assurance level of CC and the evaluation process. Those discussions are very important that helps to find out the similarities and difference of TCSEC and CC. Next session, TCSEC and CC will be compared and contrasted based on the above discussion. Compare and contrast TCSEC and CC This session will discuss the similarities and differences between the security standards based on the above description on TCSEC and CC. It will also state the strength of CC and to explain why CC is a relatively successful security evaluation standard. Similarities Even though TCSEC has been replaced by CC, they still have some similarities. Both of them are security evaluation standard and evaluate computer system by security level classification and each level has security requirements. Both of them provide confidentiality security functionality and evaluate Computer Operation System. Differences Although CC has some similarities as TCSEC, but both of them are different. TSCEC is only used in U.S. In the beginning, it was proposed that TCSEC was to focus on independent computer system and it suited evaluation of military operating system. TCSEC does not involve security criteria for open system and it is the criteria for static model. TSCEC just considered protecting system owner and operator but did not cover user security area especially for the security of telecommunication system user. And also only considered confidentiality for documents of system owner and it did not address integrity and availability. From Table 1 we see that the evaluation of TCSEC is mix security and functionality. So if any hardware of software is changed, it will start to evaluate the system again. But CC is recognized by ISO organization and it applies to nations. Compared CC with TCSEC, CC is more complete. Common Criteria is not only focus on operating system but also for Network and Database. Common Criteria involve security criteria for open system and the criteria for dynamic model. CC keeps system confidentiality, availability and integrity through TOEs security specifications. CC has distinguished security and functionality, any change does not affect the evaluation. The evaluation process of both also is different. TCSEC checks system to see if it is secure by using the security requirements which is classified by evaluation class. In a Common Criteria evaluation, use Common Criteria to evaluate the product or computer system. The evaluation stages are: Protection Profile evaluation, Security Targets evaluation, TOE evaluation and Assurance maintenance.CC evaluates system starting from identifying a TOE, and then developing a set of criteria to the TOE for evaluation. For each step, detailed information will be added. To get to know if the system is secure, it should meet a set of security criteria or protection profile. Finally TCSEC has been substituted by CC. That means TCSEC was abandoned but CC is still the ongoing security evaluation standard. The advantages of CC Form the above comparison of the differences between TCSEC and CC, we can point out that CC is a relatively successful security evaluation standard because CC has some advantages. CC is an international security standard and many countries acknowledge the testing result. CC is absorbed in security objectives and the related threats and the evaluation process help to enhance confidentiality, availability and integrity of the system. CC provides a set of security criteria in detail and the criteria details are easily understood by customer and supplier. Customer can use them to determine the security level of the products and also to find out their own security requirements. So that supplier can design product for them and also use them to identify their product or system security features. Customer can trust the evaluation because the testing is done independently and not by the supplier. In this session, the similarities and differences between TCSEC and CC have been discussed and after comparison, the advantages of CC have been indicated. Conclusion To sum up, through the discussion of the evaluation process and assurance level of TCSEC and CC, we found out the similarities and differences between the two standards and also the advantages of CC. TCSEC is firstly a security standard and it develops 4 levels and 7 evaluation classes. Each evaluation class contains security requirements and using the requirements it will help to identify the security level of the system or product. TCSEC has provided identification and authentication for user to access the system document and also to provide audit trial and access protection. TCSEC evaluates system or products by checking security requirements to see if the system meets them. TCSEC has been replaced by CC and CC is an international security evaluation standard. CC provides Protection Profiles and Security Targets which are documents for specifying security requirements. [2] CC has 7 Evaluation assurance levels. Because CC came from TCSEC, they have some similarities but actually they are quite different. TCSEC only applies to operation system and it focuses on the demand of confidentiality. CC has full description of security mode, security concepts and security functionality. Compared with TCSEC, CC has some advantages. The testing result is accepted by nations, supplier can design product for customer based on their requirements. CC keeps system confidentiality, availability and integrity. After comparison we can say that CC is relatively a successful security evaluation standard.

Friday, January 17, 2020

The Role Of The Learner In His Development Education Essay

In this essay I will be comparing two different theories and looking at how they contrast against each other when studied and applied towards the function of the scholar. The country we will be looking at in peculiar is development, and how these theories create two opposing political orientations that suggest separate waies the scholar takes. The first theory I will discourse is Behaviourism which views the function of the scholar as a inactive and ductile signifier that is the consequence of the environments input ( Bee, H. & A ; Boyd, D. , 2010 ) . Behaviourism classifies most actions as behavior, such as feeling or thought, therefore opening them up to observation of alteration. Behaviorists believe we learn through a rewarding procedure that emphasises our behavior and whether or non it was right ( Bee, H. & A ; Boyd, D. , 2010 ) . Not needfully opposing the first theory but my 2nd theory of Constructivism takes a different stance on how it perceives the scholar. Alternatively o f being a inactive being, constructivists feel the scholar plays an active function in his/her ‘s development. This is possible, as the theory suggests that we create different systems to get the better of day-to-day experiences and thenceforth an understanding upon contemplation ( Woolfolk, A. , Hughes, M. , 2008 ) . It is besides implied that we learn through a more synergistic attack, which includes job resolution ( Woolfolk, A. , Hughes, M. , 2008 ) . From both of these theories I will pull out the thoughts that form either a inactive or active attack and use those properties to compare the two. Within Behaviourism there are two immediate different types of conditioning. There is Classical conditioning and Operant conditioning. Classical conditioning believes larning takes topographic point between a stimulation and a response. This is a automatic response which in bend topographic points the environment in control – rendering the scholar as inactive, whereas operant conditioning expressions at behavior specifically and its links between different results. This means that through variable behaviors the scholar can derive different results – leting the scholar a grade of pick, but still inactive to the fact that the scholar can merely move upon an event driven by his/her ‘s environment ( Bee, H. & A ; Boyd, D. , 2010 ) . This is non a split within the theory, but instead it is two different signifiers of behaviorism. Even though we have these two separate thoughts, we can still see a big similarity that bonds them together, due to the environment itself st ill keeping a certain sum of control in the scholar ‘s development. This theory utilises the thought that human existences are an 'empty vas ‘ or in the words of John Locke â€Å" Tabula Rasa † ( A Blank Slate ) that is waiting to be filled by experience and cognition ( Woolfolk, A. , Hughes, M. , 2008 ) . Although, behaviorism does non concentrate on cognition as being the key to the scholar ‘s development, it observes alteration of behavior as the true key ( Doherty, J. & A ; Hughes, M. , 2009 ) . This is interesting as it therefore can merely analyze discernible events – including those that are unwilled. By unwilled I refer to the thought of being incognizant during the procedure of development and attainment of cognition or experience. This brings me onto another factor in the scholar ‘s function as inactive. Due to how random these events can happen, the scholar has little or no clip to be after in front and hence, as Classical conditioning suggests, has to move instinctively ( Doherty, J. & A ; Hughes, M. , 2009 ) . The lone clip contemplation occurs is when the scholar realises they have been developing. This can be a slow procedure and is the ground it is referred to every bit conditioning as it is physically and mentally exciting the physiological reaction system to be able to run better with the input and end product. Operant conditioning uses several different supports to distinguish between the acquisition processes. The three conspicuously used results can be ; positive support, negative support and penalty ( Doherty, J. & A ; Hughes, M. , 2009 ) . Using these, it is observed and so ready to be broken down into events on a simple flow chart to see the input, procedure, behavior and end product. This peculiar thought can be seen in the experiment ‘The Skinner Box ‘ ( Doherty, J. & A ; Hughes, M. , 2009 ) . Merely as the carnal receives positive support in the signifier of nutrient for executing the right action, such as pressing a button to let go of it, or finishing a ma ze – as does the scholar in a similar manner through footings of working within their environment. If the scholar carries out an action and receives a enjoyable result, the scholar is most likely traveling to execute the same action once more, in hopes of the same consequence. This once more adds to the inactive function of the scholar as he is still at the clemency of the environments boundaries and restrictions. Now that I have outlined the rudimentss of Behaviourism, I shall travel onto constructivism which believes the scholar is born with basic, natural and cardinal accomplishments. Therefore through geographic expedition of the environment and by manner of different phases in each person ‘s development, the scholar begins to get the better of the challenges that present themselves by utilizing experience and cognition ( Schaffer, H. R. , 2008 ) . It is through this that the scholar begins to besides understand his/her function as active, and acts suitably. A term used here is Adaptation – this refers to the ability that worlds have to alter and accommodate harmonizing to the environment through use of it ( Schaffer, H. R. , 2008 ) . By this I mean the scholar is able to use what it has around him and do it better. This is a large phenomenon as it challenges the behaviorists ‘ thought of the scholar being inactive to the environment, and alternatively the environment is the ductile signifier used by the active function of the scholar. Through ripening the scholar is able to develop through different phases that are set out in the constructivist theory – this is based on the cognitive theory that was designed by Piadget. It is really elaborate and distinguishes between different ages and different abilities. Sensory-motor ( 0-2 ) , Pre-Operational ( 2-7 ) , Concrete operational ( 7-12 ) and Formal operations ( 12+ ) ( Schaffer, H. R. , 2008 ) . Harmonizing to Piadget, merely like a design at birth, this is all preset and we can non travel frontward to another phase until we are at the right age and have completed the anterior phase. For illustration we can non get down to run before we begin to walk. This may look like a restriction, but in existent fact it ‘s still analogous to our input to the environment and how we choose to research our universe through sing it. To further reflect the thought that the function of the scholar is act ive, we can get down to look at how constructivism breaks down larning into scheme ( which is an internal representation of actions we can execute ) and utilize it to explicate assimilation. Schemas are either a group or individual action that compile together to execute an overall action, and the scheme refers to them as a whole ( Doherty, J. & A ; Hughes, M. , 2009 ) . The thought of assimilation is that with scheme that we already possess we are able to research different objects and obtain different experiences. The scholar is invariably constructing upon what we know and seting together a different method for each possible state of affairs ( Doherty, J. & A ; Hughes, M. , 2009 ) . An illustration of this is the sucking action performed when suckling. This scheme can subsequently be adapted to a bottle as the kid needs to imbibe. The possibilities are infinite and we develop more complex scheme as we grow and develop through life. This once more puts the scholar in a function th at is active and invariably moving upon his/her environment. Aside from Piadget ‘s theory of constructivism is Vygotsky ‘s theory of Social Constructivism. This takes into history the societal context of the development. The scholar is non merely challenged by his environment physically but besides intellectually in society. He viewed civilization as a major portion in the scholar ‘s development such as the linguistic communication they use, the history and societal context ( Doherty, J. & A ; Hughes, M. , 2009 ) . A construct that relates to the function of the scholar that once more shows how active they are is the construct of the Zone of Proximal Development. This concept positions instructors as the accelerator in the development of the kid. If the kid is in their comfort zone and is pushed farther than usual – the result is eventual scheme building to get the better of the challenge ( Doherty, J. & A ; Hughes, M. , 2009 ) . This construct causes the sc holar to be seen as far more dimensional character other than an object at the clemency of his/her environment. I will now get down to contrast between the two theories get downing with their differences and traveling onto the little similarities. As we saw, the two chief differences are that both take a strong side with the function of the scholar. In Behaviourism the scholar can merely be inactive ( albeit with little pick operant conditioning ) , and Constructivism views the scholar as an active participant in his pursuit for cognition. This spread is non merely caused by the function of the scholar, but merely as important is how the theory places the environment. It seems that the environment is the key to understanding the function of the scholar. In behaviorism the environment is seen as the active member that through doing different events forces the scholar to have and react through physiological reactions. In constructivism it is close plenty opposite with its theory on the function of the environment. Alternatively the environment is seen as a governable variable that the scholar us es to their advantage. It besides ties in with the construct of ripening and that as we develop we obtain several different schemes that we use to get the better of challenges in life. This can be every bit simple as larning the alphabet to every bit hard as larning a new linguistic communication. The chief function of the scheme that we develop is to help us in sing and researching our universe exhaustively. On the other manus, Behaviourism takes a different attack. The theory suggests that we use our physiological reactions to cover with state of affairss we meet twenty-four hours to twenty-four hours. This can alter with clip and finally operant conditioning takes topographic point where we use our experience to derive preferred results. This may look to suggest that the function of the scholar is slightly active, but in existent fact it is still dependable on the environment to derive the experience and even put the scholar in a state of affairs that requires them to construct upon what they already know. Both theories are at either side of the spectrum and go on to stand as cardinal constructs for looking at the function of the scholar and their development. As we discussed, Behaviourism is more interested in detecting events that can be seen. The alteration in behavior is seen as the lone variable that is utile when analyzing development of the scholar. This may look like an uneven attack as human existences are believing animals, but we are besides natural. It is these physiological reactions that we unconsciously condition suitably to our environment. However on the other side is the theory of constructivism which looks at the ability of version and ripening. Through these two thoughts there is a platform created for analyzing development non merely physically but mentally. Using scheme it brings out an even more active function, as it shows us that we ever researching and larning to get the better of anything we face. I believe by utilizing a in-between land there could be infini te to larn more about natural physiological reactions alongside those that are constructed. Furthermore I would besides wish to raise a inquiry as to the importance of cognition and behavior between the two. It seems behaviorism is far excessively focused on detecting what can be seen, and yet most of our development, aside from obvious alterations in behavior, happens internally. Can it genuinely observe every alteration internally as an discernible event? Constructivism ‘s return on cognition and assimilation besides leaves a batch left to be desired. Schemas are one manner of depicting things, but I believe there should besides be consideration for anomalousnesss and that some people wo n't follow the same ripening form. Is this still natural, even though it goes against the cognitive attack adopted within constructivism? Both these theories are every bit of import in the perusal of what function the scholar takes and should be treated as such, side by side.

Thursday, January 9, 2020

The Battle of the Java Sea in World War II

The Battle of the Java Sea occurred on February 27, 1942, and was an early naval engagement of World War II (1939-1945) in the Pacific. With the beginning of fighting in the Dutch East Indies, Allied forces attempted to unite to slow the Japanese advance south towards Australia. This saw a combined American, British, Dutch, and Australian fleet formed to protect Java. In late February, this fleets Eastern Strike Force, led by Rear Admiral Karel Doorman, engaged the approaching Japanese in the Java Sea. In the resulting engagement, Doorman doggedly attacked the Japanese but proved unable to halt their advance. The battle concluded with the loss of the light cruisers HNLMS De Ruyter and Java as well as Doormans death. In the wake of the fighting, the remaining Allied ships fled though most were destroyed in separate actions a short time later. Background In early 1942, with the Japanese rapidly advancing south through the Dutch East Indies, the Allies attempted to mount a defense of Java in an effort to hold the Malay Barrier. Concentrating under the unified command known as American-British-Dutch-Australian (ABDA) Command, Allied naval units were divided between bases at Tandjong Priok (Batavia) in the west and Surabaya in the east. Overseen by Dutch Vice Admiral Conrad Helfrich, ABDA forces were badly outnumbered and in poor condition for the approaching fight. To take the island, the Japanese formed two major invasion fleets. Japanese Attacks Along the Malay Barrier. US Army Center for Military History Japanese Sighted Sailing from Jolo in the Philippines, the Japanese Eastern Invasion Fleet was spotted by ABDA aircraft on February 25. This led Helfrich to reinforce Rear Admiral Karel Doormans Eastern Strike Force at Surabaya the next day with several ships from the Royal Navy. Upon their arrival, Doorman held a meeting with his captains to discuss the upcoming campaign. Departing that evening, Doormans force consisted of two heavy cruisers (USS Houston HMS Exeter), three light cruisers (HNLMS De Ruyter, HNLMS Java, HMAS Perth), as well as three British, two Dutch, and four American (Destroyer Division 58) destroyers. Sweeping the north coast of Java and Madura, Doormans ships failed to locate the Japanese and turned for Surabaya. A short distance to the north, the Japanese invasion force, protected by two heavy cruisers (Nachi Haguro), two light cruisers (Naka Jintsu), and fourteen destroyers, under Rear Admiral Takeo Takagi, slowly moved towards Surabaya. At 1:57 PM on February 27, a Dutch scout plane located the Japanese approximately 50 miles north of the port. Receiving this report, the Dutch admiral, whose ships were beginning to enter the harbor, reversed course to seek battle. ABDA Commander Rear Admiral Karel Doorman2 heavy cruisers, 3 light cruisers, nine destroyers Japanese Commanders Rear Admiral  Takeo TakagiRear Admiral Shoji Nishimura2 heavy cruisers, 2 light cruisers, fourteen destroyers The Battle Begins Sailing north, Doormans exhausted crews prepared to meet the Japanese. Flying his flag from De Ruyter, Doorman deployed his ships in three columns with his destroyers flanking the cruisers. At 3:30 PM, a Japanese air raid forced the ABDA fleet to disperse. Around 4:00 PM, Jintsu spotted the re-formed ABDA ships to the south. Turning with four destroyers to engage, Jintsus column opened the battle at 4:16 PM as the Japanese heavy cruisers and additional destroyers came up in support. As both sides exchanged fire, Rear Admiral Shoji Nishimuras Destroyer Division 4 closed and launched a torpedo attack. Exeter Disabled Around 5:00 PM, Allied aircraft struck the Japanese transports but scored no hits. At the same time, Takagi, feeling the battle was drifting too close to the transports, ordered his ships to close with the enemy. Doorman issued a similar order and the range between the fleets narrowed. As the fighting intensified, Nachi struck Exeter with an 8 shell that disabled most of the ships boilers and created confusion in the ABDA line. Badly damaged, Doorman ordered Exeter to return to Surabaya with the destroyer HNLMS Witte de With as an escort. The Sides Close Shortly thereafter, the destroyer HNLMS Kortenaer was sunk by a Japanese Type 93 Long Lance torpedo. His fleet in disarray, Doorman broke off the battle to reorganize. Takagi, believing the battle was won, ordered his transports to turn south towards Surabaya. Around 5:45 PM, the action was renewed as Doormans fleet turned back towards the Japanese. Finding that Takagi was crossing his T, Doorman ordered his destroyers forward to attack the approaching Japanese light cruisers and destroyers. In the resulting action, the destroyer Asagumo was crippled and HMS Electra sunk. Repeated Attacks At 5:50, Doorman swung his column around to a southeast heading and ordered the American destroyers to cover his withdrawal. In response to this attack and concerns about mines, Takagi turned his force north shortly before sunset. Unwilling to give in, Doorman steamed away into the darkness before planning another strike on the Japanese. Turning northeast then northwest, Doorman hoped to swing around Takagis ships to reach the transports. Anticipating this, and confirmed by sightings from spotter planes, the Japanese were in position to meet the ABDA ships when they reappeared at 7:20 PM. After a brief exchange of fire and torpedoes, the two fleets separated again, with Doorman taking his ships inshore along the Java coast in another attempt to circle around the Japanese. At approximately 9:00 PM, the four American destroyers, out of torpedoes and low on fuel, detached and returned to Surabaya. Over the next hour, Doorman lost his last two destroyers when HMS Jupiter was sunk by a Dutch mine and HMS Encounter was detached to pick up survivors from Kortenaer. A Final Clash Sailing on with his four remaining cruisers, Doorman moved north and was spotted by lookouts aboard Nachi at 11:02 PM. As the ships began to exchange fire, Nachi and Haguro fired spreads of torpedoes. One from Haguro fatally struck De Ruyter at 11:32 PM exploding one of its magazines and killing Doorman. Java was hit by one of Nachis torpedoes two minutes later and sank. Obeying Doormans final orders, Houston and Perth fled the scene without stopping to pick up survivors. Aftermath The Battle of the Java Sea was a resounding victory for the Japanese and effectively ended meaningful naval resistance by ABDA forces. On February 28, Takagis invasion force began landing troops forty miles to the west of Surabaya at Kragan. In the fighting, Doorman lost two light cruisers and three destroyers, as well as one heavy cruiser badly damaged and around 2,300 killed. Japanese losses numbered one destroyer badly damaged and another with moderate damage. HMS Exeter sinks during the Second Battle of the Java Sea, March 1, 1942. US Naval History Heritage Command Though soundly defeated, that the Battle of the Java Sea lasted seven hours is a testament to Doormans determination to defend the island at all costs. Many of the remaining units of his fleet were subsequently destroyed at the Battle of the Sunda Strait (February 28/March 1) and the Second Battle of the Java Sea (March 1). Many of the wrecks of those ships lost at the Battle of the Java Sea and the subsequent actions have been destroyed by illegal salvage operations.

Wednesday, January 1, 2020

Ideas and Facts for Overpopulation Cause and Effect Essay

Overpopulation is what everyone is babbling about all the time. One can easily add up this topic to such themes as the global warming, abortions and euthanasia. People worry about it and what we are concerned about the most is the best foundation for a professional piece of writing. Let’s start our essay with a little bit of statistics. The world population has already hit 6.5 billion. Try to think and write on whether the world will be able to continue sustaining these terrifying numbers and suggest several ways on how to solve the global problem. Problem 1. Make sure to mention the rapid increase of the number of the Earth’s inhabitants. The point is that if the population of the world continues to grow, our home planet won’t be able to sustain it and, as the result, the number of people will start decreasing. Problem 2. The resources shortage is one of the factors that can end up life here, on the Earth. For example, if we run out of crops and water the apocalypse will be not long in coming! Problem 3. High cost of living is what makes a lot of people suffer. The rules are simple: if you happen to have no money, you won’t be able to survive in the jungles of a big city. It’s recommended to give examples of several poor countries, where people die because they’ve got no basic resources (health care, food, water)! Solution 1. Provide several reasonable suggestions to solve the overpopulation problem. Start with the increasing of the awareness of an average human being. The point is that every person living on the Earth is supposed to be fully aware of the fact that the lower population is, the higher living standards (such as education, food and health) are. Solution 2. Mention the birth rate. When people realistically control the birth rate they will get an opportunity to be 100% certain that overpopulation problem won’t be that disastrous and will be solved. To sum up what is mentioned above, do not forget to say that rapid increase in population is hanging over the world like the sword of Damocles and there is no one but us to deal with this problem.

Tuesday, December 24, 2019

The Effects Of Music Therapy On Patients With Dementia

Music has long been an interest of mine, it was always used as an escape from reality and can be very therapeutic; with that information I wanted to see if and how music therapy could be used to aide in patients who suffered from dementia. When conducting my own research I ran across an article titled â€Å"Connecting through music: A study of a spousal caregiver-directed music intervention designed to prolong fulfilling relationships in couples where one person has dementia†, this article caught my attention because it examined the relationship of couples where one of the spouses’ suffered from dementia and the other spouse was the primary caregiver. Music therapy is recognized to reduce agitation in patients with dementia (Dileo Bradt, 2005; Helmes Wiancko, 2006; Holmes et al., 2006; Ledger Baker, 2007) and also leads to the sharing of meaningful experiences between caregivers and dementia patients in residential care settings. (Brotons, Marti, 2003; Clair Ebbert s, 1997) Music is known to be a social phenomenon that stimulates people who have dementia, it is also helpful with memory and when the caregivers listen to music it enhances their mood to suggest that music addresses the needs of both the spousal caregiver and patient. In this particular study one of the research questions is â€Å"does ‘music sharing’ experiences or home based music interaction that occurs between the spouse and caregiver affect the spousal relationship, caregiver well-being, or satisfactionShow MoreRelatedThe Effects Of Music Therapy On Dementia Patients With General Recreational Daily Activities2032 Words   |  9 PagesIn this qualitative randomized clinical study, Vink, Zuidersma, Boersma, de Jonge, Zuidema, and Slaets (2013) illustrate the effects of music therapy on dementia patients with general recreational daily activities. Subjects have chosen dementia patients for this study (n = 94) and they classified into two groups in which one group was specific for music therapy (n = 47), another group allocated from recreational activities (n = 34). Some of the subjects are excluded from the study because subjectRead MoreDrug Therapy And Its Effects On The Health Of Individuals Essay1587 Words   |  7 Pagesdrug treatments that have or almost eradicated these diseases. Without the use of drug therapy, the population would be a lot smaller and the life expectancy of people would be much shorter. Individuals are able to live more at peace, knowing that most illnesses can be cured or treated by simply getting a prescription from a doctor or receiving some other type of therapy related to drugs. Undoubtedly, drug therapy has helped the United States evolve and worry about other issues. It has saved an abundanceRead MoreMy First Clinical Rotation As A Nursing Student1314 Words   |  6 Pagesstudent, I was assigned to care for several older adults suffering from dementia. Although all of my patients ranged in severity from mild to severe progression of dementia, they all experienced moments of agitation, anxiety, or disturbed behaviors related to their disease. It occurred to me after careful review of several patient charts that despite often being prescribed pharmaceutical regimes for other comorbidities, these patients were rarely prescribed medications, besides those to control anxietyRead MoreDementia And The Power Of Music Therapy By Steve Matthews1011 Words   |  5 Pages In the article â€Å"Dementia and the Power of Music Therapy† by Steve Matthews, argues that music therapy has positive effects on dementia, in terms of non-pharmacological treatment, inexpensive in health budgets, and neurocognitive benefits for patients. Matthews starts off the article by describing current tendency of dementia in western nation. He mentions that dementia is one of fast increasing disease in United States, Canada, UK, Europe, and Australia. Additionally, Australian government’s investmentRead MoreThe American Music Therapy Association1043 Words   |  5 PagesThe American Music Therapy Association (AMTA) defines music therapy as an â€Å"established health profession in which music is used within a therapeutic relationship to address physical, emotional, cognitive, and social needs of individuals†. Studies have shown that there are clear benefits from listening to or playing music, but research over the last decade proves music can be used to heal in the medical field. Dementia and other neurological disorders have no cure, only treatments to lessen the symptomsRead MoreThe Effects Of Music Therapy On People With Dementia1147 Words   |  5 PagesJ. J. (2013). The effect of music therapy compared with general recreational activities in reducing agitation in people with dementia: A randomised controlled trial. International Journal Of Geriatric Psychiatry, 28(10), 1031-1038. doi:10.1002/gps.3924 First in-text citation: Vink et al. (2013)†¦ Subsequent in-text citations: (Vink et al., 2013) The purpose of this study was to determine if there was any significant difference between the effects and usefulness of music therapy compared to generalRead MoreThe National Institute Of Neurological Disorders And Stroke Defines Dementia1563 Words   |  7 PagesStroke defines dementia as:â€Å" word for a group of symptoms caused by disorders that affect the brain. It is not a specific disease. People with dementia may not be able to think well enough to do normal activities, such as getting dressed or eating. They may lose their ability to solve problems or control their emotions. Their personalities may change. They may become agitated or see things that are not there. (Health, 2014).This essay is going to discuss and explore what dementia is and the fourRead MoreSensory Interventions Of Dementia Patients820 Words   |  4 Pagesin Dementia Patients Morgan Shippy (Students Name) Northwest Arkansas Community College NURS9108: Fundamentals of Nursing Summer 2016 (Term Year) 2 Research Summary Table: Sensory Interventions in Dementia Patients Author, Year of Publication Purpose Sample/ Number of Participants Design/Level of Evidence Findings Limitations A. C. Vink et al. (2012) To compare the effects of music therapyRead MoreThe Healing Power Of Music1612 Words   |  7 PagesThe Healing Power of Music The Alzheimer’s Foundation of America, defines Alzheimer’s as being the most common form of dementia, occurring in 60% to 80% of people suffering from symptoms of dementia (Clair Tomaino, 2016). The foundation also states that it is an irreversible disease that progresses over time, destroying cognitive functions such as: memory, learning, and language skills. Furthermore it may alter behaviors and mood, cause disorientation, as well as agitation (Clair TomainoRead MoreMusic Therapy And Dementi1763 Words   |  8 Pages Music Therapy and Dementia Debora Moran Norwalk Community College MUSIC THERAPY AND DEMENTIA 2 Music is powerful. It arouses feelings and memories of specific past events and such a wide array of emotions. Music is associated with emotion and events in people’s lives that can be remembered long after the event occurred. Therapists can use music therapy to improve the overall physical and mental

Sunday, December 15, 2019

Knocking on Heaven’s Door Free Essays

The movie tells us the story of two men who have heard bad news: they have to live a little, just a week and hardly one day more. For them, this is certainly a shock as they are still so young, but it is already the time for them to go to heaven. Of course they want to continue their lives, but unfortunately it is too late to change things. We will write a custom essay sample on Knocking on Heaven’s Door or any similar topic only for you Order Now Trying to drown the sorrow with tequila, one of the main characters, demure Rudy realized that he has never been at the sea. On what second man lad Martin replies with a grin that on heaven all talks are about the sea as it the most remarkable and surprising phenomenon in the world. That’s how it all begins †¦ It would be wrong to say that the story is only about the thirst for life and the man’s fear of not having enough time to do something important. Partly it is, but this film examines many valuable things and events in our lives that we perceive as a given, but still they are no less valuable. For example, the love of parents, real friendship, a desire to help and bring to the world something good. Every shot means something and teaches something, inspires and makes you think of. For example there is a scene in which Martin gives a Cuban cigar to a little girl who accidentally met him on the road from the bank. He wants to make random people happy, but what to give to a child? Candy? He hasn’t got any. Money? Children don’t really need them. There is only remaining a cigar, which he gave to her as an ice cream on a stick. The scene is funny and very touching. Generally, the film is about life with all its oddities, fortunate events, disappointments and of course loves. In some ways, the film looks like a zebra. White band, then black and white again and again the black. Everything goes well with the disappointing events, the opportunity to live in grand style at least slightly overlaps with the pursuit and arrest †¦ Everything is exactly how it is happens in the world †¦ This movie consists of small particular things. Martin calls the stolen car sky blue colored Mercedes, not blue, it was heavenly blue. How Rudy complains about the cheap suit for 2000 dollars. Of course because they have found a million of dollars in the trunk of stolen car. And many other significant moments from which the content of this film constructed. The duet of main actors is incomparable. Their heroes are complete opposites of each other. Perhaps in real life they would not even said hello, they are so diverse – desperate daredevil Martin and calm and quiet Rudy. But facing a total disaster, they rallied and become friends. Even for such a short period. They affect each other. Rudy gets Martins quality – lack of fear and a desire to taste more and more freedom. And Martin gets Rudy’s – caring for loved ones and the thought of the generous assistance. And yet they managed to do this, give their selves and their loved ones a little bit, but true happiness †¦ All this happened only because they had a goal. One goal! To do in one week everything that they failed to do in whole life! How to cite Knocking on Heaven’s Door, Essay examples

Saturday, December 7, 2019

Research and Academic Skills for PHP Programming- myassignmenthelp

Question: Discuss about theResearch and Academic Skills for PHP Programming. Answer: What is the purpose of the website? This website hosts the courses and lessons which are created to the public and it can help the students to learn languages, scientific principles as well as the PHP programming. Who is the audience? The audience of the website are the students. It shows various course which the student can learn from computer science, social science, technology, as well as the general studies. What type of information is provided on the website? The website provide information relating to different course such as computer science, mathematics and statistics, philosophy, social science, language, as well as the general studies. Each category has its own lessons. Would the information on the site be considered academically reliable? Why/whynot? This website is academically reliable since it can offer free lessons to students who have been struggling in their academic work. The student can choose the subject they are learning and get lessons for it. Why might you choose to access this site? I would choose to access the site because it offers free lessons on different subject matter. As a learner I get these lessons for free. This is a good website as one can learn various ranges in subject that are free to the public. Would you recommend this site to your peers? Why/why not? Definitely yes I could recommend them to use the site. One may be struggling with their academics and they can use the website to ask question in regards to a given questions, or a concept they did not understand in class. References ureddit.com, (2013).University of Reddit. {Online} Available at: https://ureddit.com/ {Accessed 5 Oct.2017}