Friday, February 21, 2020

How the media communications impacted public perception on marijuana Research Paper

How the media communications impacted public perception on marijuana - Research Paper Example Marijuana in most nations around the world is categorized as an illegal drug and its use is outlawed. However, there are alternative uses of marijuana ranging from the production of animal feeds, plastic products among other use. In the U.S.A, the use of marijuana has been prohibited to both the living and those who are dying. The most tragic of the prohibition of its use has been the denial of medicinal cannabis to millions of patients who could benefit from its therapeutic use. The use of Marijuana for medical purposes has numerous examples that cannabis is invaluable in the treatment of a wide range of diseases. It has numerous clinical applications as well. The most important of these is perhaps being used as a pain reliever especially pain suffered because of nerve damage otherwise known as neuropathic pain. It is also known to deal with movement disorders, glaucoma and nausea. Apart from medical use, there are a number of reasons given for the legalization of marijuana. One of them is that marijuana is no more harmful than alcohol or cigarettes, which are legal and widely use in the US already. The other argument is that decriminalization will result in reduced criminal and gang activities that are related to the sale of Marijuana. The process of legalizing marijuana for medicinal use and other purposes has been a long one and the role played by the media cannot be ignored. It served an important role in the education of the masses as to this alternativ e method of treatment.

Wednesday, February 5, 2020

Insider threat and Physical vulnerability Research Paper

Insider threat and Physical vulnerability - Research Paper Example Physical security of the database The growing technological advancements are posing a threat to the new requirements of the iTrust database. Cloud storage, a method of data storage that allows users to share information online is one of the basis on which the iTrust database is prone to attackers. Cloud computing can be misused to attack the database through dishonest activities. Cloud computing at the database, just like in other systems, deal with privacy and have a rather easy registration system. Although the easy registration system gets geared to make the software user friendly, criminals usually use advanced technologies to access the software. This poses the highest threat to businesses and consumers that use the system (Shaw et al, 2013). There have been cases of use of Botnets to attack a public cloud network and spread viruses. The Zeus Botnet has on several occasions attacked the Amazon cloud. The Zeus Botnet attacked Amazon’s EC2 cloud computing service managing t o install a virus. The Botnet further took control of a cloud platform. The malware remained hidden for a long time while transferring millions of dollars (Shaw et al, 2013).Two ways have been proposed to deal with such malware. The security threat posed by the malware can be addressed through implementing cloud analytics. The threat can also be addressed through employing more personnel to monitor the database. Another threat that comes with cloud computing is the difficulty with which consumers get to understand the security implications associated with usage of software like itrust database. Whereas most consumers would prefer a relatively easy set of application programming interfaces, this seems to deter efforts to safeguard the database from any threats. Ensuring that the database gets adequately safeguarded may call for complex application programming interfaces. Such interfaces are able to detect any unpermitted intrusion into the system and swiftly counter-attack the attemp t (Shaw et al, 2013) The issue of account service and traffic hijacking remains a legitimate threat to most of the iTrust users. Traffic hijacking has a wide range. It may involve spamming or use of stolen user credentials. Considering the sensitivity of the data stored in the iTrust database, hackers can in many ways put to risk the lives of the users. This can be done by just gaining a simple entrance. In a situation where the attack occurs on the urgent care, the attacker can manage to follow up on transactions, edit data stored on the database as well as steal users’ personal information .To curb this, preventive measures must be taken. Such preventive measures may include effecting password policies, use of tracking software and providing internet usage education to all employees (Researchomatic, 2012). The insider threat Insider threat can be defined as any threat that comes from people within the organization and who have the organization’s inside information re garding how the organization stores its information. The insider threat faced at the iTrust database is quite challenging. A lack of separation of duties seems to pose the greatest insider threat at the moment. Separation of duties ensures that an insider with too much power or authority is not able to attack the database using the power or authority that they have (SafeNet, 2013). Example of an incident of an insider threat is when a head of department