Friday, March 13, 2020
Spooky Dry Ice Fog Halloween Jack-o-Lantern You can make spooky fog come out of your Halloween jack-o-lantern using a little dry ice. Heres how you do it plus a trick for getting the best effect. Spooky Jack-o-Lantern Materials Basically, all you need is a carved jack-o-lantern, dry ice, a container, and water. Warm water is more effective than cool or room temperature water. PumpkinTall cup or glassDry iceWater Lets Get Started! Okay, first you need to cut around the top of the pumpkin so you can scoop out the seeds and other pumpkin guts. If you are rushed for time, you can skip this step, but its easier to carve a clean pumpkin.Carve a face or design into the pumpkin. Keep in mind, carbon dioxide fog sinks, so more fog will flow out of the mouth of your jack-o-lantern than through its eyes. If you make the mouth relatively small, you usually can get fog to flow through the nose and eyes pretty well.When you are ready for the display, set a tall container full of water inside the jack-o-lantern. Try to find a can or glass that is taller than the eyes of your jack-o-lantern, since that is the trick for getting fog to flow through the whole carving.Drop a piece of dry ice into the water. Replace the top of the pumpkin. You want the lid to fit tightly so there wont be air currents dissipating the fog.You can add more dry ice over time.
Wednesday, February 26, 2020
Psychology human development - Essay Example Identify the theorist (s) associated with cognitive development? The development of cognition in infancy starts when the child becomes aware of his surroundings and begins to explore it. The process of exploration however entails the use of intellect which is a product of adaptation and organization. For the child to adjust to his environment, assimilation and accommodation has to take place. On the other hand, a child is said to have organized his thoughts when he systematically combines structural schemes that are accompanied with ideas and actions. According to the theory of Piaget, the development of the childÃ¢â¬â¢s cognition undergoes different stages to include sensorimotor, preoperational, concrete, and period of formal operations. The childÃ¢â¬â¢s cognition becomes refined in each stage thus the child has different reasoning ability as he grows older. For instance, at age two months, the child thoughts are symbolic in nature without thinking of the consequences of his ac tions, as he reaches the next stage, he can associate single and simple words with objects until he can be able to use numbers, size and can relate to time and eventually he knows to reason out. 2.
Sunday, February 9, 2020
Final exam - Assignment Example The people in power do not have to be favored by the laws in the community, but the laws should support all. A community that practices justice and instills knowledge to its citizens will prosper, unlike a community, which does not. Knowledge is the key to good and outstanding leadership because knowledge carries with it all the right virtues. Protagoras is very communitarian and anti-individual. He argues in the case of justice that to live together we must act politically, respect others, realize our compulsion to others and act justly. The harmony of all this things will only be achieved by education. Political and social skills need to be taught to uphold justice and ethics. If a city decides an issue to be just and okay, then the facts are just and fine for it, so long as it reserves the opinions. Cicero in his time focused mostly on defending the Roman Republic. Democracy is seen in a community when justice is agreed upon jointly. Protagoras responds by giving a lengthy speech about the creation of the world. He states that indeed virtue is teachable since political systems believe that all citizens can have virtue. Likewise, criminal justice systems are based on the view that citizens can be reformed or taught to be virtuous. It is hard to be good, but it is also impossible to be good all the time. This is because human beings are forced to behave badly by some circumstances in life. This situation implies to ignorance as shown by Protagoras. He states that the only evil is a lack of knowledge and behave badly while knowing what is good. Protagoras has accepted that wisdom, restraint, justice, courage and sanctity all mean virtue and morality are other names for knowledge. This means that virtue can be taught. PlatosÃ¢â¬â¢ philosophical ideas about justice were intelligible, static matter, accessible to the mind and not to the senses. His ideas provide the lone dependable standard for knowledge and good judgment. A person
Thursday, January 30, 2020
Literary Analysis of Bartleby the Scrivener Essay Bartleby the Scrivener could be described as a story about getting rid of its title character, about the narrators attempt to get rid of Bartleby, and Bartlebys tenacious capacity to be always there. It is the story of an unnamed lawyer and his employee, Bartleby, a copyist of law documents. Confronted not only with Bartlebys refusal to do work (first to read copies against the original, then to copy altogether), but also with the contagious nature of the particular words of his refusal (Bartlebys peculiar I would prefer not to), the narrator concludes that, before Bartleby turns the tongues any further of those with whom he comes into contact, he must get rid of Bartleby. At the same time Bartleby feels mobbed in his privacy (27) when the other office workers crowd him behind his screen, they in turn are invaded by his idiosyncrasy his private idiom prefer. Bartlebys presence breaks down the clear distinctions between public and private, professional and domestic, between privacy and the mob. By pinpointing Bartleby as the cause of infectious language (language turned bad), the narrator wants to stop the course of a process (the turning of tongues) already in progress. But getting rid of Bartleby is as tricky as getting rid of a chronic condition; the narrator emphasizes a phrase which appears textually in italics: he was always there (20). Bartleby is, as the narrator calls him, a nuisance (40), an intolerable incubus. As a character in the story with a body, he moves very little, but the few words he speaks break out at unexpected moments in the office. Every attempt the narrator makes to control the passive Bartleby and his infectious language fails hilariously (Schehr 97). The narrator experiences a curious tension between the impossible imperative (on the level of the story) to get rid of the subject, and the impossibility (on the level of the narration) to write his complete biography (Bartlebys history). Thus, Bartleby is also a fable about writing history or biography. In attempting to write what he thinks of as Bartlebys biography, the narrator merely misnames his writing project, or he emphasizes it from the wrong point of view. In search of Bartlebys origins, the narrator does not simply narrate (as he thinks) the history of Bartleby the Scrivener; he relates rather the story of his own anxiety vis-a-vis Bartleby. In particular, he relates his anxiety over the scriveners silence and modes of breaking that silence; for we could say that, rather than speaking very little or in particular ways, Bartleby has particular ways of occasionally breaking silence. It is this violence in speech, this unexpected eruption, which the narrator fears. The narrator, whose acquaintances describe him as an eminently safe man, who likes nothing better than the cool tranquility of a snug retreat (4), is thrown decidedly off kilter when faced with what he terms Bartlebys passive resistance (17). Bartlebys weapon is his total indifference to truth, whereas the narrator seeks a second opinion on truth from the other office mates. Bartleby could be seen as the one solid block around which the narrator writes his own story about truth rather than the truth about the Bartleby story. Bartlebys passive resistance actually generates the story confronted with it, the narrator creates theories (his doctrine of assumptions, for instance), carries on debates with himself, and seeks the counsel of others all with the opaque Bartleby as the core. In reconstructing Bartlebys story, the narrator follows an implicit logic which he never directly states. It is the logic of cause and effect. (He is not deliberately hiding this logic, but because he takes its validity for granted, he never comments on it critically. ) Believing in the possibility of finding a specific, locatable, and nameable cause to Bartlebys condition (as he is able to do with the other office workers, Nippers and Turkey, whose moods vary according to their diets and the time of day), the narrator thinks that by eradicating the cause of the problem, he can alter the effects, the effects of Bartlebys speaking condition in the office space. McCall follows the same logic as the narrator in seeking causes of Bartlebys behavior. He mentions remark that when the narrator asks Bartleby to run an errand for him at the post office, that is probably the last place, if the rumor is correct, that Bartleby would ever want to go. (McCall 129). The narrator never considers that his line of reasoning might be faulty Ã¢â¬â that Bartlebys condition may not be linked to a specific, locatable, nameable cause. We as readers may be placed in the same position as the narrator in that we never know either the origin of Bartlebys condition; we witness primarily its effects, or symptoms, in the story. These symptoms reside not only in Bartleby as individual character, but in the very way the narrator tells the story about that character. Rather than speaking about the cause of Bartlebys condition, one could more aptly speak about the ways in which its effects are spread to other characters within the text. When the narrator impatiently summons Bartleby to join and help the others in the scenario of group reading, Bartleby responds, I would prefer not to (14). Hearing this response the narrator turns into a pillar of salt (14). (Faced with Bartlebys responses and sheer presence, the narrator oftentimes evokes images of his losing, then waking to, consciousness. ) When he recovers his senses, he tries to reason with Bartleby, who in the meantime has retreated behind his screen. The narrator says: These are your own copies we are about to examine. It is labor saving to you, because one examination will answer for your four papers. It is common usage. Every copyist is bound to help examine his copy. Is it not so? Will you not speak? Answer! (15) The narrator is exasperated when Bartleby does not respond immediately to the logic behind his work ethic. These are your own copies we are about to examine. It is labor saving to you. Examining or reading copy is a money saving activity, from which every member of the office profits (four documents for the price of one reading! ). Every copyist is bound to help examine his copy. To the contract the lawyer emphatically demands from his employee, a bond based on an exchange of reading, Bartleby replies three times, gently, in a flutelike tone, I (would) prefer not to (15). By refusing to read copy, Bartleby refuses to consent to the economy of the office. It is perhaps only to another type of reading, one not based on a system of exchange and profit, which Bartleby consents. Although the narrator says he has never seen Bartleby reading Ã¢â¬â not even a newspaper (24) Ã¢â¬â he does often notice him staring outside the window of the office onto a brick wall. Staring at the dead brick wall (in what the narrator calls Bartlebys dead-wall reveries) may be Bartlebys only form of reading, taking the place of the economy-based reading demanded of him in the process of verifying copies. About halfway through the story, the lawyer/narrator visits his office on a Sunday morning and, discovering a blanket, soap and towel, a few crumbs of ginger nuts and a morsel of cheese, deduces that the scrivener never leaves the office. Realizing the full impact of Bartlebys condition, he states, What I saw that morning persuaded me that the scrivener was the victim of innate and incurable disorder. (25) The narrator clearly locates the disorder in Bartleby. Seeing himself in the role of diagnostician and healer, he himself is faced with the hopelessness of remedying excessive and organic ill (24). The narrators concern about an individual medical cure should more aptly be a concern about an obsessively private rhetorical debate or a dangerously idiomatic group contagion (Perry 409). Despite his assumption that Bartleby is incurable, or perhaps precisely because he can effect no cure, the narrator beleaguers himself throughout the story with questions or commands to do something about Bartleby (McCall 9). If the private mans disorder can be passed on to another (one) person, what happens when the condition is let loose out of close quarantine into the public space of the office? Bartleby walks a precarious tightrope between comedy and tragedy (Inge 25). The tragic dimension often resides in the narrators turning inward on himself (a sort of tragic compression), then putting himself on trial, an interior moment of accusation which eventually results in the collapse of the narrative in a single sigh or exclamation (Ah, Bartleby! Ah, humanity! 46). The comic effects are often related to the authoritarian attempt (and failure) to contain the spread of idiom as contagion (Perry 412). If Bartleby has been a figure for tragedy in the lone meditation of the narrator, he becomes a figure for comedy in his contact with his office mates Nippers and Turkey. The more the narrator tries to regulate the contact between the three, the more hilarious Ã¢â¬â and significantly out of control Ã¢â¬â is Bartlebys influence. The effort to contain or control tends actually to promote the epidemic proportions of the narrative. It is the narrator himself who uses a vocabulary of contagion in relation to Bartleby. He says he has had more than ordinary contact (3) with other scriveners he has known. Bartleby exceeds this already extraordinary contact he has been touched by handling dead letters (Schehr 99). Some critics reproduce the narrators language of contagion in talking about Bartleby. McCall, in his study on The Silence of Bartleby, describes our response, the collective readers response, to reading the tale: As we go through the story, we watch with a certain delight how Bartleby is catching. We root for the spread of the bug. (145) In a somewhat less delighted vein, Borges says, Bartlebys frank nihilism contaminates his companions and even the stolid man who tells Bartlebys story. (Borges 8) In the office scenes where the employees and boss come inevitably together, the bug word is Bartlebys prefer. Nippers uses it mockingly against the narrator as a transitive action verb when he overhears Bartlebys words of refusal to the narrators plea to be a little reasonable. Bartleby echoes, At present I would prefer not to be a little reasonable (26). If Nippers is suffering from his own peculiar and chronic condition of indigestion, he takes on the symptoms of Bartlebys condition when he exclaims to the narrator, Prefer not, eh? Ã¢â¬â Id prefer him, if I were you sir, Id prefer him; Id give him preferences, the stubborn mule! What is it, sir, pray, that he prefers not to do now? (26) Whereas later in the story the narrator totally loses his critical skill to catch himself in his speech, in this exchange he is still able to articulate the effect Bartlebys word is having on him. He notes anxiously, Somehow, of late, I had got into the way of involuntarily using the word prefer upon all sorts of not exactly suitable occasions. (27) It is this qualifier not exactly which is of particular interest. Bartlebys use of words is not exactly wrong. Prefer is so insidious because it is only slightly askew, dislocated, idiosyncratic. As McCall accurately notes about the power of Bartlebys I prefer not to, one must hear, in the little silence that follows it, how the line delivers two contradictory meanings, obstinacy and politeness. (152) The line calls just enough attention to itself so as to attract others to its profoundly mixed message (its perfect yes and no) in an imitative way (McCall 152). Prefer is as inobtrusive, as contagious, and as revolutionary as a sneeze. The narrator lets it out of his mouth involuntarily. When Turkey enters the scene and uses the bug word without realizing it (without Nippers italicized parody or the narrators critical comments), the narrator says to him, in a slightly excited tone, So you have got the word, too (27). In this pivotal sentence, the verb get implies to receive (as in to receive a word or message), but more strikingly for our discussion here, it implies the verb to catch one catches the word as one would catch a cold. The narrator attempts to monitor the contagion by naming the bug and pointing it out to the others. But the word mocks everyones will to control it prefer pops up six times in the next half a page Ã¢â¬â four times unconsciously in the speech of one of the employees, and twice consciously (modified by word) in the narration of the lawyer. Bartleby could be described as a story of the intimacy or anxiety a lawyer feels for the law-copyist he employs. The narrator arranges a screen in the corner of his office behind which Bartleby may work. Pleased with the arrangement of placing Bartleby behind the screen in near proximity to his own desk, the narrator states, Thus, in a manner, privacy and society were conjoined (12). The narrator idealizes the possibility of a perfect harmony between privacy and community in the work environment, but it is precisely the conflict between these two spatial conditions which generates the story, defining not only Bartlebys idiocy, but the narrators as well. The narrator most characteristically encounters Bartleby emerging from his retreat (13) or retiring into his hermitage (26). The screen isolates Bartleby from the view of the narrator, but not from his voice. Works Cited Borges, Jorge Luis. Prologue to Herman Melvilles Bartleby in Herman Melvilles Billy Budd, Benito Cereno, Bartleby the Scrivener, and Other Tales, ed. Harold Bloom. New York: Chelsea House Publishers, 1987 Inge, Thomas M. , ed. Bartleby the Inscrutable. Hamden, CT: Archon Books, 1979. McCall, Dan. The Silence of Bartleby. Ithaca: Cornell University Press, 1989. Melville, Herman. Billy Budd and Other Stories. New York: Penguin Books, 1986. Perry, Dennis R. Ah, Humanity: Compulsion Neuroses in Melvilles Bartleby. Studies in Short Fiction 23. 4 (fall 1987): 407-415. Schehr, Lawrence R. Dead Letters: Theories of Writing in Bartleby the Scrivener Enclitic vii. l (spring 1983): 96-103.
Wednesday, January 22, 2020
The Human Genome Project Now more than ever it is not uncommon to hear of scientific barriers being crossed. This is seen through, "a scientific research effort . . . currently under way which is unlike anything ever before attempted. International in its scope, it is enormously expensive and, if successful, could lead to our ultimate control of human disease, aging, and death. It is nothing short of a revolution against the way science has traditionally progressed"1 . This statement of Thomas Lee refers to a massive scientific undertaking known as the human genome project, an endeavor that aims to discover each and every intricacy of human genetics. This mission, which includes the collaboration of scientists world wide, hopes to find ways to improve health care and to increase the knowledge of the human race as a whole. With each discovery that is made through the conquering of this scientific frontier, a myriad of possible benefits emerge. These possible benefits range from new therapies for genetic disea ses, to the possibility of finding cures for the ailments which plague humanity. However, accompanied by these benefits is a wide array of moral dilemmas that emerge when the wonders of this newfound technology collide with religious beliefs and views. In turn, as the tradition of conflicts raging between science and religion have plagued societies throughout history, the echoing of this tradition into modern day is illustrated through the ethical and moral battles which accompany the Human Genome project. As conflicts between religion and science erupt due to great strides and achievements in genetics, the importance of evaluating these conflicts seriously is seen if the possible consequences are kept in mind. In t... ...ork: Plenum, 1991. - Murphy, Timothy. "The Genome Project and the Meaning of Difference." In Justice and the Human Genome Project, edited by Timothy Murphy and Marc Lappe. Los Angeles: University of California Press, 1994. - Murphy, Timothy, and Marc Lappe, eds. Justice and the Human Genome Project. Los Angeles: University of California Press, 1994. - Shapiro, Robert. The Human Blueprint. New York: St. Martin's, 1991. - Starr, Cecie, and Ralph Taggart. "Recombinant DNA and Genetic Engineering." In Writing and Reading Across the Curriculum, edited by Laurence Behrens and Leonard Rosen. 6th ed. New York: Longman, 1997. - Watson, James. "The Human Genome Project: A Personal View." In Writing and Reading Across the Curriculum, edited by Laurence Behrens and Leonard Rosen. 6th ed. New York: Longman, 1997.
Tuesday, January 14, 2020
The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded assignments. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Match Risks/Threats to Solutions Learning Objectives and Outcomes You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions. Assignment Requirements This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat. Required Resources Worksheet: Match Risks/Threats to Solutions Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 2 Self-Assessment Checklist I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions. Unit 1 Assignment 2: Impact of a Data Classification Standard Learning Objectives and Outcomes You will learn how to determine the impact of a data classification standard on an organizationÃ¢â¬â¢s IT infrastructure. Assignment Requirements You are a networking intern at Richman Investments, a mid-level financial investment and consulting firm. Your supervisor has asked you to draft a brief report that describes the Ã¢â¬Å"Internal Use OnlyÃ¢â¬ data classification standard of Richman Investments. Write this report addressing which IT infrastructure domains are affected by the standard and how they are affected. In your report, mention at least three IT infrastructure domains affected by the Ã¢â¬Å"Internal Use OnlyÃ¢â¬ data classification standard. Your report will become part of an executive summary to senior management. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 2 Self-Assessment Checklist I have identified at least three IT infrastructure domains affected by the Ã¢â¬Å"Internal Use OnlyÃ¢â¬ data classification standard. In my report, I have included details on how those domains are affected. Unit 2 Assignment 1: Calculate the Window of Vulnerability Learning Objectives and Outcomes You will learn how to calculate a window of vulnerability (WoV). Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows: Windows laptops: Traveling salespeople, remote suppliers, branch offices Windows desktops: Accounting group, developer group, customer service group Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server A security breach has been identified in which the SMB server was accessed by an unauthorized user due to a security hole. The hole was detected by the server software manufacturer the previous day. A patch will be available within three days. The LAN administrator needs at least one week to download, test, and install the patch. Calculate the WoV for the SMB server. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 3 Self-Assessment Checklist I have accurately calculated the WoV. Unit 2 Assignment 2: Microsoft Environment Analysis Learning Objectives and Outcomes You will learn how to analyze a mixed-version Microsoft Windows environment and to identify the issues described in Microsoft Security Advisories. Assignment Requirements You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network as determined by group memberships. The network consists of computers working on a variety of client platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment. An example of the network divisions is as follows: Windows laptops: Traveling salespeople, remote suppliers, branch offices Windows desktops: Accounting group, developer group, customer service group Windows servers: Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft Common Vulnerability and Exposures (CVEs) are addressed through security advisories with a corresponding advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft Security Advisories on the following link: http://www. microsoft. com/technet/security/advisory/archive. mspx (accessed September 15, 2010) Answer the following questions based on the advisories for the past 12 months: 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? 3. Identify and document at least three vulnerabilities and the solutions related to the client configurations. Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1Ã¢â¬â2 pages Due By: Unit 3 Self-Assessment Checklist I have identified at least five vulnerabilities for this workgroup LAN? I have identified privilege elevation as a high-priority issue? I have identified and documented at least three vulnerabilities related to the client configurations? Unit 3 Discussion 1: Access Control Models Learning Objectives and Outcomes You will learn about access control models for different scenarios. Assignment Requirements In this assignment, you have a handout on the access control models. Read the handout and discuss it with your classmates to collect answers for the following questions: Select an access control model that best prevents unauthorized access for each of the five scenarios given in the worksheet. Which types of logical access controls should be used in each scenario? Justify your recommendations. Respond to at least two other studentsÃ¢â¬â¢ views to engage in a meaningful debate regarding their choices or to defend your choice. Required Resources Worksheet: Access Control Models Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 3 Self-Assessment Checklist I have correctly selected an access control model that best prevents an unauthorized access for each of the five scenarios given in the worksheet. I have selected the correct types of logical access controls that should be used in each scenario. I have included justifications for my recommendations. I have responded to at least two other studentsÃ¢â¬â¢ views. Unit 3 Assignment 1: Remote Access Control Policy Definition Learning Objectives and Outcomes You will learn how to design a remote access control policy definition for an IT infrastructure. Assignment Requirements Richman Investments is an investment and consulting firm. The company wants to expand its business operations both in the U. S. and in foreign countries. It intends to eventually have 10,000 employees in 20 countries. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, California Montreal, Canada New York City, New York Washington, D. C. The North American offices have a total of 5,000 employees who use desktops, mobile computers, and wireless devices. The Phoenix office has an Internet connection to all remote offices because redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office share application information that is hosted at the corporate office. Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data access. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 4 Self-Assessment Checklist I have correctly designed a remote access control policy for the given scenario. I have correctly selected appropriate access controls for systems, applications, and data access. I have included my justification for using the selected access controls for systems, applications, and data access. Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework Learning Objectives and Outcomes You will learn how to research standards. You will learn how to write Remote Access Standard. You will learn how procedures and guidelines fit within an IT security policy framework. Assignment Requirements You will receive the worksheet entitled Enhance an Existing IT Security Policy Framework. It contains a scenario and an illustration of a portion of a companyÃ¢â¬â¢s security policy framework. After studying the worksheet, complete the following tasks: Research Remote Access Standards on the Internet. For the given scenario, write a draft Remote Access Standard that will reduce the occurrence of risks, threats, and vulnerabilities in the Remote Access domain of the given IT infrastructure. Make sure you include the minimum remote computer configurations, the use of anti-malware software, and the secure virtual private network (VPN) access in the Remote Access Standard. Indicate the names of procedures or guidelines that you would add under the Remote Access Standard. Required Resources Worksheet: Enhance an Existing IT Security Policy Framework Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 5 Self-Assessment Checklist I have written an appropriate Remote Access Standard, which includes the minimum remote computer configurations, the use of anti-malware software, and the secure VPN access. I have included the names of at least two procedures or guidelines that would appear under the Remote Access Standard in the framework. Unit 4 Assignment 2: Acceptable Use Policy (AUP) Definition Learning Objectives and Outcomes You will learn how to research and compare AUPs enforced by other organizations. You will learn how to compose a portion of an AUP for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define Ã¢â¬Å"the acceptable use of Richman assets regarding Internet and e-mail access,Ã¢â¬ including the actions that are prohibited. . Then, the employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall AUP. For this assignment: Research acceptable use policies on the Internet. Find the actual policies of real companies. Compare the portions that address Internet and e-mail access of at least three different companies. Create an AUP definition for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 5 Self-Assessment Checklist I have conducted adequate research of AUPs before defining the policy. I have included the appropriate statements that address both acceptable and unacceptable use of the Internet and Web-based e-mail accounts. Unit 5 Assignment 1: Testing and Monitoring Security Controls Learning Objectives and Outcomes You will learn to recognize security events and baseline anomalies that might indicate suspicious activity. You will learn to identify policy violations and security breaches and to appropriately monitor threats and control activity across the network. Assignment Requirements Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies. After studying the handout, answer the following questions: Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities. Required Resources Worksheet: Testing and Monitoring Security Controls Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1Ã¢â¬â2 pages Due By: Unit 6 Self-Assessment Checklist I have identified at least two security events and baseline anomalies. I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list. I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities. Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Learning Objectives and Outcomes You will learn to successfully identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents. Assignment Requirements Richman Investments requires the enforcement of strict ingress-egress filtering policies for network traffic. Certain traffic is expressly forbidden: No peer-to-peer file sharing or externally reachable file transfer protocol (FTP) servers No downloading executables from known software sites No unauthorized redistribution of licensed or copyrighted material No exporting internal software or technical material in violation of export control laws No introduction of malicious programs into networks or onto systems No accessing unauthorized internal resources or information from external sources No port scanning or data interception on the network No denying service or circumventing authentication to legitimate users No using programs, scripts, or commands to interfere with other network users No sending unsolicited e-mail messages or junk mail to company recipients No accessing adult content from company resources No remote connections from systems failing to meet minimum security requirements Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the companyÃ¢â¬â¢s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate activity. Required Resources None Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 6 Self-Assessment Checklist I have defined an effective LAN-to-WAN, Internet, and Web surfing AUP. I have evaluated the implications of each policy. I have carefully considered the benefits and disadvantages of each policy enforcement control. I have proposed strong ideas for acceptable and unacceptable resource usage. Unit 6 Assignment 1: BCP, DRP, BIA, and Incident Response Plan Mix and Match Learning Objectives and Outcomes You will strengthen your understanding of details regarding a business continuity plan (BCP), disaster recovery plan (DRP), business impact analysis (BIA), and an incident response plan. Assignment Requirements In this assignment, you are provided with a handout on the major elements that are part of a BCP, DRP, BIA, and incident response plan. You must properly align the elements with their corresponding plans. Required Resources Worksheet: BCP, DRP, BIA, and Incident Response Plan Mix and Match Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 7 Self-Assessment Checklist I have correctly matched all the elements with the plans. Unit 6 Assignment 2: Quantitative and Qualitative Risk Assessment Analysis Learning Objectives and Outcomes You will be able to analyze real-world scenarios and perform a quantitative risk assessment and a qualitative risk assessment by performing proper calculations. Assignment Requirements In this assignment, you are provided with a handout on a quantitative risk assessment and a qualitative risk assessment. Go through the scenarios given in the handout and answer the questions. Required Resources Worksheet: Quantitative and Qualitative Risk Assessment Analysis Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1Ã¢â¬â2 pages Due By: Unit 7 Self-Assessment Checklist I have correctly calculated the values for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE). I have determined the effectiveness of the safeguard of buying insurance. I have determined whether or not Richman should buy the insurance. I have supported my choice with an explanation. I have correctly calculated the risk level of each of the risk given in the scenario. I have correctly prioritized the given risks. I have created an effective risk matrix for the given scenario. Unit 7 Assignment 1: Select Appropriate Encryption Algorithms Learning Objectives and Outcomes You will learn how to select the appropriate encryption methods and techniques for real-world business applications. Assignment Requirements In this assignment, you are given a handout which contains a list of the common encryption algorithms and five scenarios. Match the common encryption algorithms with real-world business applications and the requirements for given different scenarios. Give justification for your selections. Required Resources Worksheet: Select Appropriate Encryption Algorithms Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1 page Due By: Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and the methods for the given scenarios. I have justified the selections I have made. Unit 7 Assignment 2: Design an Encryption Strategy Learning Objectives and Outcomes You will learn how to design an enterprise encryption strategy. Assignment Requirements In this assignment, you are given a handout that contains the scenario of Richman Investments which needs an enterprise encryption strategyÃ¢â¬âa public key infrastructure (PKI) that supports internal employees, external business partners, and clients. You need to design the enterprise encryption strategy for Richman Investments. In your design, include the following: Select appropriate encryption algorithms and methods. Identify and justify the selection of encryption solutions that support internal employees, external business partners, and clients. Required Resources Worksheet: Design an Encryption Strategy Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and methods. I have identified and justified my selection of the encryption solutions that support internal employees, external business partners, and clients. Unit 8 Assignment 1: Network Hardening Learning Objectives and Outcomes You will learn the essentials of network hardening for a given network layout. Assignment Requirements In this assignment, you are given a handout which contains four different network layouts. Your instructor will assign one of the four layouts to you. For your layout, you are required to devise at least three strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure. Support your decisions with your justification. Required Resources Worksheet: Network Hardening Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1Ã¢â¬â2 pages Due By: Unit 9 Self-Assessment Checklist I have identified at least three network hardening strategies for the given network layout. I have given the justification for my decisions. Unit 8 Assignment 2: Network Security Applications and Countermeasures Learning Objectives and Outcomes You will learn how to determine where certain security countermeasures apply across the seven domains of a typical IT infrastructure. Assignment Requirements In this assignment, you are given a worksheet that contains a list of network security applications and countermeasures. You need to identify where they belong, within the seven domains of a typical IT infrastructure and what confidentiality, integrity, and availability (CIA) function they provide. Complete the worksheet and submit to your instructor for evaluation. Required Resources Worksheet: Network Security Applications and Security Countermeasures Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Length: 1Ã¢â¬â2 pages Due By: Unit 9 Self-Assessment Checklist I have accurately placed security countermeasures within the seven domains of an IT infrastructure. I have identified the portions of the CIA triad affected by specific security countermeasures. Unit 9 Assignment 1: List Phases of a Computer Attack Learning Objectives and Outcomes You will learn how to identify the activities that occur during each phase of a computer attack. Assignment Requirements In this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack. List the general phases of a computer attack. Thinking like an attacker, you should add items to each phase that an attacker would consider when performing a successful computer attack. You can refer to the textbook for this course. Required Resources Textbook: Fundamentals of Information Systems Security Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 10 Self-Assessment Checklist I have identified at least three phases of a computer attack. In my answer, I have included the factors the attackers take into consideration when targeting computers or networks. Unit 9 Assignment 2: Summary Report on a Malicious Code Attack Learning Objectives and Outcomes You will learn how to mitigate the threat of a virus or malware attack. Assignment Requirements Select a well-known virus or malicious code attack, and write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was mitigated. Indicate how you would defend the attack from recurring on a network you control. You may use the Internet for research. Consider the following: The severity of the outbreak The propagation methods and speed The targets of the attack The success rate of the attack vector Additional complexity: self-armoring, self-updating, and so on The ways to defend infection in every domain The ways to defend intrusion at every layer Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 10 Self-Assessment Checklist I have included the following in my summary report: The type of malicious attack How it spread and attacked other devices How it was mitigated I have specified details on how to defend the attack from recurring on a network. Unit 10 Assignment 1: Examine Real-World Applications of Security Standards and Compliance Laws Learning Objectives and Outcomes You will learn to relate a well-known standard or law to real-world applications. Assignment Requirements In this assignment, you are given a handout on security standards and compliance laws. The handout contains a list of international and domestic information security standards and compliance laws. You need to select one and describe its real-world applications in both private and public sectors. Required Resources Worksheet: Examine Real-World Applications of Security Standards and Compliance Laws Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Due By: Unit 11 Self-Assessment Checklist I have correctly described real-world applications of the chosen standard or law. I have included examples in both the private and public sectors. Unit 10 Assignment 2: Small- to Medium-Sized Business Analysis Learning Objectives and Outcomes You will learn how to apply the Payment Card IndustryÃ¢â¬â¢s Data Security Standards (PCI DSS) standard to a small- to medium-sized business. Assignment Requirements Meager Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Meager Media has stores in several cities across the U. S. and is planning to bring its inventory online. The company will need to support a credit card transaction processing and e-commerce Web site. Write a summary report detailing what Meager Media must do when setting up its Web site to maintain compliance with the PCI DSS standard. Obtain a copy of the PCI DSS standards document from the following Web site and address all 6 principles and 12 requirements in your report: https://www. pcisecuritystandards. org/security_standards/pci_dss. shtml (accessed September 14, 2010) Required Resources Internet Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 3Ã¢â¬â4 pages Due By: Unit 11 Self-Assessment Checklist I have presented a detailed plan for creating a PCI DSS-compliant Web site. I have addressed all 6 principles and 12 requirements of the PCI DSS. Project Security Domains and Strategies Purpose This project provides you an opportunity to apply the competencies gained in various units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment. Learning Objectives and Outcomes You will learn the purpose of a multi-layered security strategy. You will understand the information systems security (ISS) fundamentals including the definition of terms, concepts, elements, and goals. You will incorporate the industry standards and practices with a focus on the confidentiality, integrity, availability, and vulnerabilities of information systems. You will fulfill the role of a security professional implementing proper security controls in a specific business situation based on Systems Security Certified Practitioner (SSCPÃ ®) Common Body of Knowledge domains. Required Source Information and Tools To complete the project, you will need the following: 1. Access to the Internet to perform research for the project 2. Course textbook 3. (ISC)2 SSCPÃ ® Common Body of Knowledge available in the SSCPÃ ® Candidate Information Bulletin Project Logistics The project is divided into one smaller and one major assignment as per the details below: Activity Name Assigned Due By % Grade Project Part 1. Multi-Layered Security Plan Unit 1 Unit 2 6 Project Part 2. Student SSCPÃ ® Domain Research Paper Unit 2 Unit 11 15 Deliverables Project Part 1 Multi-Layered Security Plan Introduction The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT is in great need of proper security controls. Scenario Richman Investments is a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, California Montreal, Canada New York City, New York Washington, D. C. Tasks You are a networking intern at Richman Investments. This morning, you received an e-mail from your supervisor stating that you need to create an outline of the general security solutions planned for the safety of data and information that belongs to the organization. You are told that every month, the networking division needs to submit a report to the senior management about the security plan for the month, and this time, your outline will become a part of that report. Therefore, you need to research the elements of a multi-layered security plan and to create an outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure. For this project part, you may use the book for this course and the Internet to research the concept of a multi-layered security plan. Include several applicable layers for the plan, and describe at least one layer of security for each of the seven domains. Project Part 1 should be submitted in the following format and style: Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1Ã¢â¬â2 pages Self-Assessment Checklist I have included several applicable layers for the plan. I have described at least one layer of security for each of the seven domains. I have conducted adequate independent research for the report. Project Part 2 Student SSCPÃ ® Domain Research Paper Introduction The (ISC)2 SSCPÃ ® is frequently viewed as the first step in an information security career path, leading to the Certified Information Systems Security Professional (CISSPÃ ®) and other advanced certifications. Scenario Continuing the Richman Investments scenario explained in Part 1 of the project, the offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office. The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and reporting purposes. All employees have Internet access. There is no policy on the use of removable media. Several of the branch offices have encountered issues with malware recently. Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners. Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs. Tasks You are a networking security intern at Richman. You have been asked to submit a proposal to Richman senior management. In the proposal, you must choose to address one of the following and relate it to the appropriate SSCPÃ ® domains: 1. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. 2. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form. 3. Based on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code. 4. Based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently, you must research and formulate a plan to implement monitoring and analysis. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events. 5. Based on the premise that Richman hosts an intranet for employees to access information about the company and enroll in company benefits programs, and that Richman also hosts an extranet for its business partners, you must research and devise a method to secure networks and communications. This should include the network structure, transmission methods and techniques, transport formats, and security measures used to operate both private and public communication networks. 6. Based on the premise that the Phoenix office contains two proxy servers configured as an array, which provide Web cache services and Internet access control for Richman, and that the majority of applications are Web-based and hosted from the Phoenix office, you must assess risk, response, and recovery. Conduct a review of the implementation processes essential to the identification, measurement, and control of loss associated with uncertain events. 7. Based on the premise that the corporate security policy is out of date and each branch office policy differs, you must research and define security operations and administration including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. You need to write the proposal as detailed in the instructions above. Be sure that you create a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. In addition, document the vulnerabilities, methods, and controls effectively. Project Part 2 should be submitted in the following format and style: Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 4Ã¢â¬â5 pages Self-Assessment Checklist I have created a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. I have successfully identified appropriate SSCPÃ ® domains and related them to the scenario. I have documented the vulnerabilities, methods, and controls effectively. I have conducted adequate independent research for the proposal.
Monday, January 6, 2020
Introduction Writing on Embryonic Stem Cell Research and In-Vitro Fertilization is a very difficult subject. Can it better mankind or is it an abomination against God. Religion plays a big part to the devout and their beliefs that they put in God. Science has its findings and personal beliefs on this subject that itÃ¢â¬â¢s not against God. The two have compelling arguments about the subject matter and pulls you into a spiritual and logical tug of war. It involves a political point of view and a ban that was lifted by the President of the United States. I will give you the facts on both points of view and my personal struggle on this subject (Mandal, 2016). Stem Cell Research and In-Vitro Fertilization Embryonic Stem Cell Research (ESCR) and In-Vitro Fertilization (IVF) has been under fire for quite some time and has be questioned by religious, scientific, and political leaders as to what is right or wrong and what is for or against mankind and their beliefs as scientist and religious followers (Lawton, 2001). I read from different several religious views on the subject Christians, Lutherans, and Judaism, are just a few that hold a strong disbelief and are not for stem cell research for they believe that life begins at conception, and a human has begun (Lyon, 2006). The Lutheran Church-Missouri Synod and the Southern Baptist Convention are also opposed, for the same reason. Human embryos, says the SBC, are the tiniest of human beings. They believe that it is Ã¢â¬Å"immoral,Show MoreRelatedEmbryonic Stem Cell Research - in Vitro Fertilization1051 Words Ã |Ã 5 PagesIn vitro fertilization and human embryonic stem cell research are two of the most popular and controversial topics that are being discussed today. Lee Silver, from the film defines in vitro fertilization as: [T]ak[ing] the process of reproduction out of the darkness of the womb, into the light of the laboratory. And all of the sudden you can do anything you want with these human embryos and eggs, which couldn t be done before (Holt). The real question regarding all of the varying opinions andRead MoreThe Ethics of Stem Cell Research Essay741 Words Ã |Ã 3 Pages Embryonic stem cell research can be easily defined. A stem is defined as something that is developed from. A cell is defined as a microscopic living organism. According to Dennis Hollinger, Embryonic stem cell research uses from the embryos inner cell mass that give rise to each of the human bodys many different tissue types(1). In our modern day society, stem cell research has become a controversial topic. Several people strongly oppose the idea of the research, but many are struggling forRead MoreStem Cells And The Ethics Behind Their Use1606 Words Ã |Ã 7 PagesStem Cells and the Ethics behind their Use Stem cells have the capability to become any type of cell. This process is possible because they are unspecialized and can divide to create new cells through cell division. Stem cells have the ability to become skin cells as well as organ cells (Stem Cell Information, 2015). There are two different types of stem cells which can be used in various ways. The first of the two is the embryonic stem cell which is found inside the embryo within its first few daysRead MoreThe Debate Of Embryonic Stem Cell Research931 Words Ã |Ã 4 Pages Embryonic stem cell research is the study of stem cells derived from the undifferentiated inner mass cells of a human embryo. For many years now, the ethics of embryonic stem cell research has been argued. A recent advance in this line of research is the ability to clone the embryonic stem cells, which allows for researchers to create a completely compatible embryonic stem cell to the individualÃ¢â¬â¢s tissue type. Though this new science may be very be neficial, not everyone can agree on the ethics ofRead MoreFederal Funds Should Be Used for Embryonic Stem Cell Research1401 Words Ã |Ã 6 PagesAre embryonic stem cells the cure to many of the human bodyÃ¢â¬â¢s ailments, including defective organs and crippling diseases, or is their use a blatant disregard of human rights and the value of life?Ã Thanks to the rapid advancements in this field, the potential benefits of stem cells are slowly becoming reality.Ã However, embryonic stem cell research is an extremely divisive topic in the United States thanks to the ethical issues surrounding terminating embryos to harvest the stem cells.Ã In responseRead MoreThe Ethics Of Embryonic Stem Cell Research1520 Words Ã |Ã 7 PagesGovernment 16 December 2014 The Ethics of Embryonic Stem Cell Research In the 21st century, disease is rampant and for most diseases, we have no cure because we haven t researched them long enough to find a specialized cure. One option that we have is human embryonic stem cell (HESC) research. HESC research consists of using human embryonic stem cells, which are very flexible and adaptive to create the necessary cells to develop future cell-based therapies for currently untreatable diseases, suchRead More The Controversy of Stem Cell Research Essays1410 Words Ã |Ã 6 PagesControversy of Stem Cell Research One of the most controversial topics these days is Stem Cell Research. There seems to be a split opinion among societies about the research and whether it is socially and morally acceptable. As a society, we need to open our minds to the possibility of broadening our scientific horizons with stem cell research, and take the time to learn and understand whatever we can about it. There are a lot of people who dont know exactly what Stem Cell Research is whichRead MoreThe Right of Abortion1801 Words Ã |Ã 7 Pageslab created babies. One such procedure is called in vitro fertilization. Large amount of embryos have either been destroyed or are at a risk of being destroyed because of in vitro fertilization (Templeton 2011). . These early period abortions are not morally tolerable. Regrettably, countless people with good will have no idea of the fact that how many embryos will be either be destroyed or frozen up in the process of in vitro fertilization (Templeton 2011). They simply see the end result: of havingRead MoreThe Controversy Of Embryonic Stem Cells1034 Words Ã |Ã 5 PagesFor decades, researchersÃ¢â¬â¢ use of stem cells has caused a controversy and the consideration of the ethics of research involving the development, usage, and destruction of human embryos. Most commonly, this controversy focuses on embryonic stem cells. Not all stem cell r esearch involves the creation, usage and destruction of human embryos. For example, adult stem cells, amniotic stem cells and induced pluripotent stem cells do not involve creating, using or destroying human embryos and thus areRead MoreStem Cells : Justification Of Utilization Of Stem Cell1696 Words Ã |Ã 7 PagesAnvesha Mukherjee Hong GT Biology 9-1 19 February 2016 Stem Cells: Justification of Utilization of Stem Cells in Injuries/Paralysis Habitually, the majority of significant scientific discoveries that have occurred over the course of human history have been the center of fierce debate and controversy for one reason or another. From radical perspectives such as the EarthÃ¢â¬â¢s orbital around the sun to the theory that the planet isnÃ¢â¬â¢t geographically flat, scientists are often at the focal point of ethical