Wednesday, May 20, 2020

Is Aeneas a Good Warrior Essays - 2896 Words

Is Aeneas a Good Warrior? I sing of arms and of the man, fated to be an exile, begins Virgil, and it is on precisely the issue of this man of arms that critical debate in recent years has tended to centre. Scholars continue to disagree on whether or not Aeneas is presented as a good soldier, although the question itself is certainly far from black and white, complicated by the culturally relative nature of terms such as conflict and courage, as well as by the rather oblique definition that good itself holds. In this essay I will attempt to resolve these complexities and ambiguities by juxtaposing Aeneas against the Roman and Homeric ideals of the warrior, exemplified by Aemilius Paullus and Odysseus respectively. I will†¦show more content†¦Plutarch, for instance, emphasises exactly this in his description of the life of the potentate Aemilius Paullus who stoically accepts the death of his son and heir as retribution for the Romans successful military campaign against the Macedonians.2 Equally, the p resentation of Aeneas in Book Four can be seen to parallel that of Odysseus in Book Nineteen of the Odyssey, where the reader is told that, in spite of his wifes tears, the heros eyes were steady.3 Aeneas, then, does conform to both the Roman and Homeric paradigms in his ability to endure the sufferings that Fate has allotted him. And yet his chief characteristic is not his endurance, as is the case with Odysseus, but rather his pietas, a quality essential for a Roman warrior. Time and time again in the Aeneid he is referred to as pius Aeneas, famous for his devotion(6, p.145), so the Sibyl extols. This devotion is threefold in that it is not only religious and extends to both his family and to his duty as Father of Rome. The latter of these has already been demonstrated by his separation from Dido, in which he subordinates his personal wishes in order to fulfil his destiny, while one can see the first two aspects of this pietas at work quite clearly in Book Five, in which the funer al games, held in honour of the divine father of Aeneas (5, p. 122), combine aShow MoreRelatedCourageous Acts by Heroes in Ancient Literature1546 Words   |  6 Pageswritten by Sophocles in 400BC. It is mainly focused on a brother sister’s relationship. At last I will talk about the epic Latin poem â€Å" The Aeneid† by Virgil is a legendary story about Aeneas travels to Italy. In Italy, Aeneas’s descendants would go on to found Rome. Aeneas, a prince and a skilled and courageous warrior, has either the option of fighting to the death to gain personal glory and fame or denying his own glorious death so that the Trojan people and civilization sustains beyond the burningRead MoreFate : Fate And Fate In Virgils Aeneid1637 Words   |  7 PagesVirgil’s Aeneid, tells the story of Aeneas, the hero and object of fate who is also well known for fitting every description of a classic epic hero. He is of noble and supernatural birth, he faces and successfully o vercomes temptations, and he acts as the vessel the gods wish him to be. Although Aeneas frequently makes his own life decisions, it can still be argued that no single aspect of his life was untouched by fate, predictions, or prophecy. Fate directs the main course of action as theRead MoreThe Aeneid By Virgil Is An Epic War Poetry1472 Words   |  6 Pagesessay will focus on the divine interventions to illustrate the irreplaceable role of the gods that has helped shape the Virgil s Aeneid. Without the gods, this epic poem would be nothing since the gods determine the fate of mortals including that of Aeneas, the son of the goddess Venus who in verse draws much attention from the gods. Jupiter father of the gods is the most powerful of the gods and has supreme control (The Internet Classics Archive | The Aeneid by Virgil, 2017). The rest of the godsRead MoreSimilarities Between The Odyssey and The Aeneid824 Words   |  3 Pageslegendary Greek king and Aeneas of Troy was known to be a beginning of the Romans. Homer and Virgil had used characters from the Trojan War as heroes. Homer used Odysseus as the protagonist, while Virgil chose Aeneas as his main character. Both these two were similar because they both symbolize a great hero for their nation. Odysseus was known as a heroic Greek king who helped defeat the Troy. His wooden horse idea was the only reason the Greeks overcame the favored Trojans. Aeneas was a hero as wellRead MoreThe Nature of Honour in Virgil and Homer1709 Words   |  7 Pagesgift to Odysseus, he is both giving honour, and getting honour back by being spared when the other less honourable servants are killed. One way that giving gifts can bring honour is when the name of the previous owner stays attached to the item. Aeneas gives Dido â€Å"a cloak stiff with / gold-embroidered figures ... [that] had / been given to Helen of Argos by her mother Leda† (Virgil 1.647–50). The object gives honour to its previous owner because of the memory of the name t hat is attached to, soRead MoreCompare And Contrast Achilles And Aeneas1263 Words   |  6 PagesPaper 1 11/01/2017 Heroes of Opposing Audiences A comparison of Homer’s Achilles and Virgil’s Aeneas brings up the question concerning what makes someone an epic hero. Although each poet lived in a dramatically different time period, with different literary integrity, Homer and Virgil each portray an epic hero using different development of the characters, but similar themes and influences. Achilles and Aeneas demonstrate that an epic hero will do whatever it takes to fulfill their duties while simultaneouslyRead MoreComparing The Underworld Of Homer And Virgil1744 Words   |  7 Pagesbeing said, although the stories of their adventures into the world of the dead are quite similar, they are also quite different. The Odyssey is story about a man named Odysseus, and his travels back to his home. The Aeneid is a story that follows Aeneas, the leader of the Trojans, and his people to Italy after the gruesome destruction of their city to the Greeks. One of these, the Odyssey, is much more focused on the travel of the h ero and the hero s relationships with other characters. The otherRead More Compare Aeneas and Odysseus in Their Role As Leaders And Prospective1301 Words   |  6 PagesCompare Aeneas and Odysseus in Their Role As Leaders And Prospective Heros? Virgils Aeneid and Homers Odyssey are two very different stories, told from opposing viewpoints: that of the Trojans in The Aeneid, and of the Greeks in The Odyssey. The two leaders, Aeneas and Odysseus, that feature are therefore very different in their approach to leadership. However, despite their differences they both rise to the challenges set to them as true leaders. In each work, the first timeRead More`` The Temple Doors ``1546 Words   |  7 Pagespopular origin myths, one filled with pro-Augustan rhetoric meant to appeal to the Roman emperor of the time, Virgil’s Aeneid provides us with a detailed retelling of the titular protagonist Aeneas’ journey from the desolate ruins of Troy to his triumphant slaying of Turnus. Throughout the epic, Virgil supplements Aeneas’ travels with very vivid, extended scenes from the past and future depicted on different works of narrative art. Called ekphrases, there are three such instances of these drawn out, visuallyRead MoreWhat Makes A Hero?1541 Words   |  7 Pagesjust simply a good person are considered a hero. But, back in ancient times to become a hero took much more. It took honesty, wisdom, and in some cases, wealth and superhuman abilities. With time new stories and beliefs are uncovered. In ancient times there were heroes that we can study today through books. Some of th e most well known heroes are: Achilles, Odysseus, Aneius, Socrates, Gilgamesh, Beowulf, and King Arthur. Achilles was a well known Greek hero. He was a warrior that faught long

Tuesday, May 19, 2020

My Name Is Moonstone, And This Is My Story - 2686 Words

My name is Moonstone, and this is my story. â€Å"Spirit, wait up!† I called, racing outside to greet my best friend. She wore purple everyday. Her shirt was purple with yellow flowers and she was wearing black pants, and of course, the blue scarf around her sightless eyes. â€Å"Hi.† She said back. I kicked some dust, bored. â€Å"Did you clean your necklace like I told you too?† She said. I sighed. â€Å"Yes, I did. The black and red almost glows, it’s so clean.† Spirit smiled, and held out hers, it was a swirl of blues and greens, shining brightly. â€Å"So, Spirit, what are we planning on doing today?† I asked. She didn’t answer. â€Å"Spirittttttt?† I repeated. She shook her head. â€Å"Great, now I’m worried. Spirit, what’s wrong?† I said, my tone as soft as possible, but to my disappointment, there was a hint of annoyance. Well, it’s not my fault everyday there s something wrong. Ugh. There was a long silence, and then; â€Å"Someone knows.† Her voice was as soft and quiet as falling leaves. I stared at her. Know about what? Who? That she ran over a ant while riding her bike? Ughhhhhhhh. â€Å"The Necklace. They know about it’s power. I can feel it, Moonstone. And it’s someone who will do anything to take it.† She keep talking. â€Å"I can tell what he looks like somehow. He has black and red hair, and a long hoodie with a eclipse on it. He wears long pants and is a thief who’s never failed. Moonstone, we’re in trouble!† She cried. I looked down at my white shoes stained with the red dust. â€Å"Does he know aboutShow MoreRelated The Moonstone Essay1288 Words   |  6 PagesWilkie Collins portrayal of a cursed diamond in The Moonstone, this Victorian era detective fiction book is still recognized globally today. Although, this novel was written in the nineteenth century Collin effortlessly distinguished the novel for viewers of all ages. The novel is not only a detective fiction but also has some elements of action and romance. Collins not only writes novels but also poetry and has been recognized internationally for all his work. Collins can with ease characterizeRead MoreUndeniably, The Foremost Element Of Mystery And Detective1529 Words   |  7 Pagesdiscovery. The most familiar and general plot found is the genre is a simple one: an unknown situation or event is presented and, through investigation or curiosity, an explanation is found. While many circumstances can be applied to this formula, the main appeal of such stories consist in finding out... the true o rder and meaning of events that have been part disclosed and part concealed (Barzun 144) Consequently, it is no surprise that the most enduring characters of these works are the detective figuresRead MoreA Comparison And Contrast Of The Story The Perfect Life 919 Words   |  4 PagesA Comparison and Contrast of the Story â€Å"The Perfect Life† by Rebecca Rodriguez Introduction This paper compares and contrasts different views The Story â€Å"The Perfect Life† by Divakaruni. Chitra Banerjee, This story was created out of a need for explanations about the meaning of real life relationships. According to Meera, â€Å"this story explores the cultural complexities facing Asian Indian Americans who maintain strong family ties with India. But the story s most intense focus is on the mother-childRead More Charles Dickens Essay1932 Words   |  8 PagesEnglish writer that ever lived. He was one of the most popular writers in the history of literature. Surely no English author is so well known and so widely read, translated and remembered as Charles Dickens. He fame is well deserved. From the pen of this great author came such characters as Oliver Twist, David Copperfield, Bob Cratchit and Tiny Tim, Mr. Pickwick, and Little Nett. Dickens was born on February 7, 1812, in Portsmouth and spent most of his childhood in London and Kent, both of whichRead MoreComparing Mormon Temple Rituals to Wicca Rituals Essay2398 Words   |  10 PagesRituals, Beliefs, Symbols Comparing Mormon with Wicca Contrasting with The Bible Is there one God or are there many gods? Is there God or are there gods and goddesses? What about the afterlife? What lies ahead for those who pass on from this world? Will they go through pearly gates, become a ruler of their own planet, or come back as a spirit guide to those left here on earth? Although the beliefs of the Mormon Church are comparative with other Christian religions, they also share several

Wednesday, May 6, 2020

Kinship and Marriage in Gurung Society - 603 Words

Gurung society would be described as a patrilineal, where property generally passes from the father to the sons and lineage and clan systems are defined thought the father. Each lineage is part of a clan and there are often intermarriages between two powerful clans of different villages, cementing friendships and creating alliances between villages that will last over the generations. The Gurung also have a wide variety of kinship terms, both real and fictitious, that are highly differentiated and exact. Kinship terms are used for almost everyone that the Grung come into contact with. There is a â€Å"deep sense of belonging† that comes with these terms, and it also provides structure, â€Å"the architecture of kinship created and recreated in each encounter throughout the day,† that familiarize a person and orient their life. Each connection made serves as a link to the larger world (McHugh 86) and strengthens the value of human connection in a person’s life. Among Gurungs, the common family unit changes over time. A household will begin as a nuclear family, with the parents and their children living under the same roof. But as sons reach adulthood and marry, their brides come into the parental home and they will raise their first few children in the house before â€Å"creating their own households,† normally close to the parent’s home (McHugh 86). Daughters will leave the home and move to their husbands’ home village and when parents die, their children usually inherit their home –Show MoreRelatedLove and Honor in the Himalayas: Coming to Know Another Clulture988 Words   |  4 Pagesinspired her to carry out this project in Nepal. Although her attempts at writing about her experience failed the first time, during her graduate schooling she was encouraged by her advisor Roy D’Andrade to continue. This book revolves around the ethnic Gurung community who live at the foothills of the Annapurna Mountain; just about thirty miles up from the famous tourist destination in Nepal called Pokhara. At the age of twenty-one, the village where the author lived was called â€Å"Tebas.† Although NepalRead MoreKinship Essay1231 Words   |  5 PagesKinship is used to describe the relationship that exists between or among entities or individuals that share a common origin in terms of culture, historical ancestry or biological relationship. Kinship refers to the relationships defined by a particular culture among or between individuals who have a common family ties. Kinship is used as a basis to classify people and to form social groups in the different societies. The patterns and rules that govern kinship differ in the various communitiesRead MoreTribes of India1484 Words   |  6 Pagesand who instructed the first Santals in sex and brewing of rice beer. Maran Burus consort is the benevolent Jaher Era (Lady of the Grove). A yearly round of rituals connected with the agricultural cycle, along with life-cycle rituals for birth, marriage and burial at death, involves petitions to the spirits and offerings that include the sacrifice of animals, usually birds. Religious leaders are male specialists in medical cures who practice divination and witchcraft. Similar beliefs are common

Comparing Socrates And King On Civil Disobedience

Comparing Socrates and King: On Civil Disobedience Socrates, amongst the most influential thinkers to emerge from Greek civilization and, perhaps the most noble and wisest Athenian to have ever lived, many centuries before Christ, is noted for not writing anything himself as all that is known about his philosophical thought is through the writings of Xenophon and Plato. By contrast, Martin Luther King Jr. lived in the nineteenth century wherein his main legacy was to secure progress on African American civil rights in the United States. Although it appears that both Socrates and King are incomparable in that their historical contexts are distinctive; Plato’s Crito, a dialogue between Socrates and Crito wherein Socrates refuses to escape†¦show more content†¦Not only that, but he argues that the offspring [who was born because the city regulates marriage] and slave of the state and has no right to destroy the state by failing to obey it after it has been so beneficial to him (Plato 39). On the other hand, King does not deem rational argument as the expert on the law; rather it stems from God as he notes that â€Å"a just law is a code that squares with the moral law or the law of God† (King 408). Although Socrates was wrongly imprisoned and waiting the death penalty, which he acknowledges, he, according to his argument, is not permitted to act unjustly in return, or break the law. Pertaining to justice, the laws to Socrates are the most important and in order to keep the city functioning as he states in the dialogue, â€Å"in comparison with [one’s] mother and father and all [one’s] forebears, [the] fatherland is more precious and venerable, more sacred and held in higher esteem among gods, as well as among human beings who have any sense† (Plato 39). Again, Martin Luther King Jr. departs from Socrates’ view in that he argues that those laws that are unjust need to be broken in a civil way, in order to direct consideration of their shortcomings. According to King, â€Å"one has not only a legal but a moral responsibility to obey just laws [and] one has aShow MoreRelatedMartin Luther King Jr.862 Words   |  4 Pagesdemonstrate selflessness by cul tivating entire societies, at any cost. Specifically, in comparing human rights activist, Martin Luther King Jr. and Greek Philosopher, Socrates, understanding the overall purpose each of their journey’s these men ultimately shared a common goal. In this proclamation, I will prove that without a doubt, Socrates would have agreed with Martin Luther King’s ideas of civil disobedience. Socrates was a man in search of wisdom, truths, and justice, who simply refused to accept theRead MoreRhetorical Analysis Of King s King 1558 Words   |  7 PagesI. Thesis: King brilliantly applies rhetorical strategies such as pathos, logos and ethos that are crucial in successfully influencing detractors of his philosophical views on civil disobedience. II. Topic Sentence: King uses logos to object the Clergymen s claim that the peaceful actions taken by the protestors precipitate violence. A. King proves that the Clergymen s assertion about his Civil Right Movements are illogical. King does it by relating their statement to the act of robbery. Read MoreThe Civil Disobedience of Antigone and the Teachings of Martin Luther King Jr.1402 Words   |  6 Pagescalled â€Å"civil disobedience†. One of the most well known activists of civil disobedience was Martin Luther King Jr. during the American civil rights movement of the 1960s. King’s theory of a non-violent approach to injustices consisted of a process that promoted dialogue of a peaceful nature in order to gain understanding while reconciling differences. Nevertheless, when the laws made by man attempted to negate the laws of God, King urged people to use creative tension in the form of civil disobedienceRead MoreCivil Disobedience By Henry David Thoreaus Letter From A Birmingham Jail1605 Words   |  7 PagesToday I will be comparing Civil Disobedience by Henry David Thoreau and The Letter from a Birmingham Jail by Dr. Martin Luther King Jr and taking a closer look at their rhetorical devices and strategy’s. In Civil disobedience by Henry David Thoreau shows us the need to prioritize some one’s wellbeing over what the law says. American laws are criticized mostly over slavery and the Mexican-A merican war. In Dr. Martin Luther King Jr.’s â€Å"Letter from a Birmingham Jail† was written in response to a letterRead MoreAnalysis Of Letter From Birmingham Jail1542 Words   |  7 Pagesyou lose focus in your haste to defend yourself? In â€Å"Letter From Birmingham Jail,† Martin Luther King, Jr. addresses fellow ministers’ criticisms on his movement by eloquently expressing his views on the fight to end segregation in an incredibly organized manner. He calmly and directly shoots back a compelling argument to those who question his authority to lead protests on the subject. Overall, King uses examples and accurate representations of history to show the need for change. MLK Jr.’s letterRead MoreThomas Hobbes And The Natural Condition Of Mankind Essay2171 Words   |  9 Pagesvisons of absolute sovereignty that Hobbes, Madison, and Plato articulated by unpacking the central premises of each argument, pitting them against each other through comparing and contrasting. Thomas Hobbes View In the Leviathan, Hobbes tries to prove why the Leviathan is necessary for preserving peace and preventing civil war. In Book I of chapter XIII, Of the Natural Condition of Mankind, as concerning their Felicity, and Misery, Hobbes talks about the three principal causesRead MoreAnalysis Of Martin Luther King Jr. s Letter From Birmingham Jail1794 Words   |  8 PagesMartin Luther King Jr. s 1963 Letter from Birmingham Jail, a rhetorical masterpiece, was written in response to eight clergymen’s statements condemning his nonviolent direct actions. He defends the Alabama Christian Movement for Human Rights nonviolent, direct action against individuals, institutions, and laws that look the other way while unjust racial prejudice against African Americans runs rampant in Birmingham. Using three main appeals, Ethos, Pathos, Logos, Dr. King communicates the struggleRead MoreDeveloping Management Skills404131 Words   |  1617 PagesConflict 375 SKILL LEARNING 376 Interpersonal Conflict Management 376 Mixed Feelings About Conflict 376 Diagnosing the Type of Interpersonal Conflict 378 Confl ict Focus 378 Conflict Source 380 Selecting the Appropriate Conflict Management Approach 383 Comparing Conflict Management and Negotiation Strategies 386 Selection Factors 386 Resolving Interpersonal Confrontations Using the Collaborative Approach A General Framework for Collaborative Problem Solving 391 The Four Phases of Collaborative Problem Solving

Security Planning - Policies and Risk Analysis

Question: Discuss about the Security Planning, Policies and Risk Analysis. Answer: Introduction Effective security planning is very important for the application of the good and protective security but is often neglected (Peltier 2016). Moreover, the security planning is implemented primarily in the organization IT environments. Therefore, it can be a proposed plan for controlling as well as protecting a plan or an information system that is within implementation. On the other hand, risk analysis is the process of analyzing and demonstrating the dangers to government agencies, businesses and individuals posed by the human-caused, natural and potential adverse events. The major aim of this research project is to discuss as well as conduct research on the importance of security policies, planning and risk analysis as well for a medium sized organization in Singapore. Apart from that, this study also incorporates how security planning, policies and risk analysis for Garena, which is a well-reputed and medium sized organization in Singapore. On the other hand, this discussion aimed to be made in this assignment incorporates how these assure the business continuity for the company and the proper policies regarding security are aimed to be implemented in this study. Therefore, this study also provides the design of an appropriate security plan for the Singapore based organization, Garena. Company Background Garena was established by Forrest Li and his friends in 2009 because they aspired for transforming their passion for entrepreneurship into a great organization (Garena 2017). Garena distributes exclusively game titles on Garena+ in several nations across Taiwan and Southeast Asia like the multiplayer online battle arena games such as Heroes of Newerth and League of Legends. Moreover, this organization has also launched the online soccer game FIFA Online 3 and the first person shooter games, Alliance of Valiant Arms and Point Blank, which were released on March 2016 (Garena 2017). Garena+ is a social and online game platform and it has the interface equivalent to the platforms of instant messaging. Research and Discussion on the Importance of Security Planning and Policies Garena provides the gaming platform such as Garena+ that is a social as well as an online game platform. On the other hand, it has the interface equivalent to the instant messaging platforms (Garena 2017). Moreover, the features of Garena+ permits gamers for developing lists of buddy, checking on game achievements and progress as well as chatting with friends online. Being a medium sized organization, Garena needs to understand the essence of risk analysis, policies and planning for security (Markmann, Darkow and von der Gracht 2013). In order to implement the security planning and policies, an organization should analyze all the risks associated with the business operation of that particular company. Risk assessment and analysis simply helps Garena to identify and analysis risks so that it would become easy for the company to mitigate the risks. Risk assessment is the very crucial component of planning of computer security. Moreover, risk assessment gives a fundamental baseline to implement the security plans for protecting assets against several threats (Sovacool and Saunders 2014). Therefore, security planning as well as policies plays significant roles for assessing and minimizing risks along with the business operations especially for the small and medium sized organizations. Thus, Garena also has to identify the threats faced by this organization as well as prioritize and analyze those threats accordingly (Haimes 2015). On the other hand, Garena has also to devise the strategies as well as plans for minimizing the likelihood of those threats occurring. This organization also needs to prepare the contingency plans in case the threats are taken place. Figure 1: Security Plan (Source: Sawik, 2013, p.157) For this organization, the security plan and policies can be the fundamental component of the effective program of cyber security. This is simply because of the fact that the security plan and policies provide a beginning edge for Garena seeking to get serious regarding securing their online social and gaming platform (Sadgrove 2016). Apart from that, the security planning and policies can help Garena in formally documenting as well as demonstrating the organizational objectives and goals about the desire and security for exercising due diligence. Besides that, security planning and policies play crucial roles in for recognizing who is responsible formally for maintaining the security purpose of the business activities of Garena (Schumacher et al. 2013). On the other side, in regards to the risk analysis and risk minimization, the security planning and policies also help Garena for properly identifying the major processes, systems, applications and the common risks or threats towards the organization. In addition, Garena can also successfully recognize the important and necessary security plan and policies in terms of supporting the business goals and objectives of this medium sized organization in Singapore (Khouzani et al. 2016). Furthermore, security planning and policies can also provide the scope to this organization for identifying as well as implementing the applicable and suitable frameworks for security control such as state level, CJIS, NG-SEC and other frameworks. Most important fact associated with it is that the security planning and policies are strategic in nature as well as the security plan is the foundation of the security program that can provide the framework for future and consistent Public Safety Answering Point (PSAP) compliance. The security planning and policies should have visibility in terms of being effective (Lincke 2015). On the other side, the security policies should provide particular guidelines for the areas of responsibility and consist of plans that can give the steps for taking and rules for following the policies. Therefore, it must be stated that the good assessment for risks would be capable of determining whether the good security controls as well as security policies are implemented. Moreover, the specification regarding the restrictive policy of account lockout enhances the potential or strength for the denial of service attacks. Risk Analysis Implementation of Appropriate Security Policies Risk assessment and analysis simply helps Garena to identify and analysis risks so that it would become easy for the company to mitigate the risks. Risk assessment is the very crucial component of planning of computer security (Stern 2014). Moreover, risk assessment gives a fundamental baseline to implement the security plans for protecting assets against several threats. there are several ways with the help of which all the risks involved within the business operations of Garena can be identified. Therefore, on way is the collection of personnel from within the company and have brainstorming session where the company enlist several assets and the risks towards those assets of the organization (Lincke 2015). Thus, it would help also fir enhancing the security awareness within the company. Figure 2: Relation between good risk assessment and Security planning (Source: Fitzgerald and Mulkey 2013, p.127) The business risks can come from three major sources such as unintentional risks, intentional risks as well as natural disaster risks. The step of assessing risk within the security strategy is very crucial (Almeshekah and Spafford 2014). The flowchart of risk assessment step within the security strategy cam be segmented into few steps. These are as follows: Recognize the assets, the organization intend to protect as well as the value of those assets Recognize the risks towards every asset Determine the category of the cause of the risk Recognize the techniques, tools or methods utilized by the treats. After the completion of these steps, it is possible for planning thee security planning as well as controlling for reducing the risk realization (Hansson and Aven 2014). Garena is a dynamic organization as well as the security plan of this organization is also dynamic. Therefore, this organization should update the assessment of the risks along with its business operations in a periodic manner. After the asset identification, it is important for determining all the risks, which can influence every asset. One approach of accomplishing it is by recognizing the different avenues through which asset can be destroyed, stolen, altered or damaged such as financial information captured on the database system (Sawik 2013). On the other hand, the risks incorporate the component failure, hardware as well as software misuse, worms, Trojan horses or virus, unauthorized modification or deletion, unauthorized information disclosure, software flaws as well as bugs and penetration. The information processed or produced at the time of the risk analysis should be categorized as per its sensitivity to disclosure or loss in terms of developing an effective policy regarding security planning by Garena. Numerous companies utilize few set of categories of information like proprietary, for internal use only or organization sensitive (Li 2014). On the other hand, the categories utilized within the security policy should be consistent with any existing categories. Therefore, the data should be broken into four classifications of sensitivity with different requirements of handling such as public, private, confidential as well as sensitive (Haimes 2015). This particular classification system of standard data sensitivity should be utilized through the company. After the indemnification of the data sensitivity and risks, the likelihood of every risk occurring should be estimated (Canto-Perello et al. 2013). Treat quantification is a hard work. Obtaining estimates from third parties, basing estimates on the company records, investigating collected statistics or published reports, basing estimates on guesses extrapolated from the previous experience are few significant ways for estimating the risk within the business operation of Garena. Security Plan for the Organization The security of an organization like Garena is comprised of several security policies. These policies provide the specific guidelines for few significant areas of responsibility and are comprised of plans those give steps for taking and protocols for following to implement the policies (Markmann, Darkow and von der Gracht 2013). Therefore, the policies should demonstrate what Garena considers valuable and should also provide the specification regarding which steps should be taken for safeguarding those assets. Moreover, the security policies within security planning can easily be drafted in several ways. Figure 3: Security Planning Process (Source: Sovacool and Saunders 2014, p.641) Apart from that, the other example is a draft policy for numerous sets of assets incorporating remote access policies, internet access policies, password policies and email policies. However, there are two common issues with the organizational policies of Garena. One of the issues is that the policy is a platitude rather than a direction or decision (Haimes 2015). Furthermore, this security policy is not really utilized by the company. Instead of that, it is the piece of paper for showing to the customers, lawyers, auditors and the other organizational components of Garena. Therefore, the policies of computer security should be implemented in such a way so that it can ensure that the unqualified support of the management of Garena is clear, in particular in the environments where the employees realize the inundated with procedures, guidelines, directives and policies (Sadgrove 2016). The security policy of Garena can be the vehicle to emphasize the commitment of the company towards t hee security and making it clear their expectations for the accountability, behavior and performance of the employees. The security policies in regards to the business operation of Garena, can be demonstrated for any area of security (Fitzgerald and Mulkey 2013). Moreover, it is up to the IT manager as well as security administrator in terms of classifying what policies have to be defined and who should make the plan for the security policies. There are few significant types of policies should be implemented by Garena such as password policies, email policies, internet policies as well as restore and backup policies. Password Policies the security provided by the password system is mainly dependent on the passwords those are being kept secret for all times. Therefore, a password can be vulnerable for compromising whether it is known, stored or utilized (Almeshekah and Spafford 2014). Passwords are vulnerable to compromise due to five necessary contexts of password system. The employees may not disclose their passwords to anyone and it would incorporate IT managers and administrators. Administrative Responsibilities the administrator has the responsibility to assign and generate the initial password for every user login. Thus, the user should be informed about the password (Hansson and Aven 2014). It may be essential for preventing exposure of the password to the administrator in some areas. User responsibilities The users should able to understand their responsibilities for keeping the privacy of password and reporting changes in their status, suspected violations of security and so forth (Canto-Perello, Curiel-Esparza and Calvo 2013). Thus, it can recommended that every user be needed for signing a statement for acknowledging the understanding these responsibilities for assuring the security awareness among the user population. Email Policies Email is very crucial to the normal conduct of business of Garena. Therefore, Garena requires the policies for email for helping the workers properly utilize email, for reducing the risk of inadvertent or intentional misuse and for assuring the official records transformed through email are managed properly (Haimes 2015). Internet Policies WWW or World Wide Web contains the body of software and a set of conventions as well as protocols utilized for traversing and finding information over the internet. The web servers can directly be attacked or utilized as jumping off points for attacking the internal networks of Garena (Li 2014). However, the web servers can be secured through few significant ways such as server scripts, web server software and other software. Moreover, proper configuration and firewall of the IP protocol and routers can help for fending off denial of service attacks. Backup and Restore policies Backups are necessary only if the information are captured over the system is of important and value (Stern 2014). These are important due to the computer hardware failure, user error, administrator error, software failure, hacking and vandalism, theft and natural disasters. Conclusion After conducting the entire study, it can be stated as the conclusion that the good assessment for risks would be capable of determining whether the good security controls as well as security policies are implemented. This study has successfully reached to its ultimate conclusion by properly discussing as well as researching the security planning, policies and risk analysis for a medium sized organization in Singapore such as Garena. Therefore, in this regard, this study has successfully portrayed the appropriate security which can help Garena by ensuting its business continuity within the gaming industry. Most importantly, this study has also successfully designed a perfect and an appropriate security plan in regards to Garena, which would ultimately shows this organization a significant way to control its security concerns and risks. References Almeshekah, M.H. and Spafford, E.H., 2014, September. Planning and integrating deception into computer security defenses. InProceedings of the 2014 workshop on New Security Paradigms Workshop(pp. 127-138). ACM. Canto-Perello, J., Curiel-Esparza, J. and Calvo, V., 2013. Criticality and threat analysis on utility tunnels for planning security policies of utilities in urban underground space.Expert Systems with Applications,40(11), pp.4707-4714. Fitzgerald, C.T. and Mulkey, J.R., 2013. Security planning, training, and monitoring.Handbook of Test Security, p.127. Garena - The Official Site. (2017). [online] Intl.garena.com. Available at: https://intl.garena.com/ [Accessed 17 Feb. 2017]. Haimes, Y.Y., 2015.Risk modeling, assessment, and management. John Wiley Sons. Haimes, Y.Y., 2015.Risk modeling, assessment, and management. John Wiley Sons. Hansson, S.O. and Aven, T., 2014. Is risk analysis scientific?.Risk Analysis,34(7), pp.1173-1183.. Khouzani, M.H.R., Malacaria, P., Hankin, C., Fielder, A. and Smeraldi, F., 2016, September. Efficient Numerical Frameworks for Multi-objective Cyber Security Planning. InEuropean Symposium on Research in Computer Security(pp. 179-197). Springer International Publishing. Li, W., 2014.Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Lincke, S., 2015. Managing Risk. InSecurity Planning(pp. 61-83). Springer International Publishing. Lincke, S., 2015. Planning for Network Security. InSecurity Planning(pp. 135-158). Springer International Publishing Markmann, C., Darkow, I.L. and von der Gracht, H., 2013. A Delphi-based risk analysisIdentifying and assessing future challenges for supply chain security in a multi-stakeholder environment.Technological Forecasting and Social Change,80(9), pp.1815-1833. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Sadgrove, K., 2016.The complete guide to business risk management. Routledge. Sawik, T., 2013. Selection of optimal countermeasure portfolio in IT security planning.Decision Support Systems,55(1), pp.156-164. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F. and Sommerlad, P., 2013.Security Patterns: Integrating security and systems engineering. John Wiley Sons. Sovacool, B.K. and Saunders, H., 2014. Competing policy packages and the complexity of energy security.Energy,67, pp.641-651. Stern, D.A., 2014. Balanced Design in Information Systems Security Planning. InThe International Conference in Information Security and Digital Forensics(pp. 110-120). The Society of Digital Information and Wireless Communication.

Nu Wa Myth Chinese Myth And Legends Essay Example For Students

Nu Wa Myth Chinese Myth And Legends Essay NuWa Myth Chinese Myth and LegendsIn every culture there is a god/goddesswho stands out above the others. In Chinese legends the deity thatstands out above the rest is the goddess Nu Wa. In all readings itis only good things that being written about this goddess. She iscredited not only with the creation of man, but also restoring order betweenthe heavens and earth. She is not only the most humble and caringof all deities but also one of the most important in Chinese mythology. Maybe the best way to describe Nu Wa isto simply call her a mother figure. What other title would be betterfor the one who took yellow clay and mud and brought them to life, bringingforth humans and all other living things. Or would it be more appropriateto call her mother Nu Wa because it was Fu Xi and her whom were the firstcouple to be wedded and later with the consent of the gods given the rightto create other people. This is why in the second month of everylunar year, thousands of people pray and offer sacrifices to her in searchof love and fertility. Nu Wa is also the goddess that young newlywedded couples go to in order to ask for a daughter or a son. Even with all her great accomplishmentsNu Wa is still a humble figure. There was a time when the four pillarshad collapsed and the Nine Regions were divided. During this period fireand water had a war; fires rushed throughout the land without cease andoceans rose and flooded everything else. Not only this, but beastsand dragons also were devouring the people of Chuan. Seeing all ofher children in such pain Nu Wa decided something had to be done. Making mortar out of rocks and pebbles she had gathered Nu Wa then wentto patch up the falling heavens. To make sure that they wouldntfall again she went and cut of the legs of a giant turtle and placed themas heavenly pillars to prop up the four corners of the sky. Withthis settled, she then went to slay the dragon and beasts who had beenterrorizing her children. Nu Wa repaired the damaged and saved theworld from extinction. Even doing all of this Nu Wa was still a humblecharacter. After she was done saving the planet, Then, without displayingher achievements, without spreading her fame, she hold the secret of theWay of the True Person and follows the eternal nature of Heaven and earth.(Huai-nan Tzu, Lan ming, SPPY 6.7b-8a)After saving the world from extinctionnot much else was ever heard about Nu Wa again. No historian is quitesure exactly what did happen to Nu Wa. Some believed that she diedand morphed into thousands of little fairies. While others say thatshe had just road off to heaven and never spoke of the earth again. Whatever did happen to Nu Wa, she will always be credited for the creationof humans and the savor of the world from extinction. This is whyin Chinese mythology She bears the emblem of the Fortune of Life and Death.(Birrell, Anne. Chinese Mythology. Pg. 71)