Wednesday, June 5, 2019
Capital Punishment Should Be Banned From Bangladesh Philosophy Essay
Capital punishment Should Be Banned From Bangladesh Philosophy EssayAccording to great author and noble prize winner writer George Bernard Shaw, says that Capital Punishment is a vague term. He illustrates the victims as mad dogs, cobras or adders which causes ill to our society. Either we should hide them or educate them to become suitable for remaining in the society. The real problem is the turn you cannot reform the human mad dog or cobra. The answer is, kill him kindly and apologetically, if possible with discover understanding on his part. Let him go comfortably to bed expecting to wake up in the morning as usual, and not wake up. His general consciousness that this may happen to him should be sh ared by every citizen as part of his moral civic responsibility.There is a considerable class of mortals who become criminals because they cannot endure for themselves, but who under tutelage, superintendence, and provided sustenance are self- birthing and even profitable citi zens. They make good infantry soldiers and well-be studyd prisoners. But throw them out into the channel and they are presently in the dock. They in addition present no problem. Reorganize their lives for them and do not prate foolishly about their liberty.Capital punishment is the devastation penalty effrontery by the government of a country, to spate who submit committed hideous horrors like homicide, rape, etc. Capital punishment has been a federal agency of punishing flock since ages. Although there are some countries that have abolished stopping point penalty from their faithfulness, there are still many which still pr behaveice the act of killing a person for horror. Capital punishment is prevalent in the US, Asian and Middle Eastern countries. Some of the ways of executing criminals are hanging, shooting, burn and braggy lethal injections.People have different opinions on the issue of jacket punishment given to a convict. While some think that final stage pen alty is necessary for those who have committed a terrible crime, there are opposites who consider it as an immoral act that goes against the values of humanity.Pros of Capital Punishment ( Taken from a website and edited in a very small amount because all statements are self-explanatory)A person who has committed a crime like killing or raping another person should be given last penalty, which is as severe punishment as the act. It is said that when a criminal is given a capital punishment, it dissuades others in the society from committing such serious crimes. They would refrain from such crimes due to fear of losing their lives. This would definitely help in cut crime rate in society.If a criminal is jailed, he may again commit the same crime afterwards being released from prison. Giving him capital punishment would make sure that the society is safe from being attacked by criminals. It seems to be an appropriate punishment for serial killers and for those who continue to comm it crimes even after serving imprisonment.Some study that instead of announcing life imprisonment for the convicts, where they would have to live a futile life behind closed bars, it is separate to kill them. It is said that imprisoning someone is more expensive than executing him. Rather than spending on a person who may again commit terrifying crime, it is better to put him to destruction.Capital punishment is equated as revenge for pain and suffering that the criminal inflicted on the victim. Some people strongly believe that a person who has taken the life of another person does not have a chastise to live. Sentencing such a criminal can give relief to the family members of the victim that their loved one has obtained justice.It is also important for the safety of fellow prison inmates and guards, as people who commit unworthy crimes like murder are believed to have a violent personality and may, in future, attack someone during imprisonment. These reasons emphasize the imp ortance of capital punishment for the betterment of human society. However, there is another component of people who believe that it is an immoral and unethical act of violence.Cons of Capital PunishmentIf we execute a person, what is the difference between us and the criminal who has committed the horrifying crime of killing another individual.Capital punishment is not always just and appropriate. Usually, it has been seen that poor people have to succumb to shoemakers last penalty as they cannot afford good lawyers to defend their stance. There are very rare cases of rich people being pronounced capital punishment. Also, an individual from minority communities are more likely to be given wipeout penalty.Every human being is entitled to receive a second chance in life. putting a convict behind bars is always a logical option than killing him, as there is a chance that he may improve. People who have served life sentences are reported to have bettered their earlier ways of livin g and have made worthwhile contribution to the society.There is also a chance that an individual is innocent and is wrongly charged for a crime he has never committed. There have been cases where individuals were released after being given death sentence, because they were proved innocent. There are also cases where a persons innocence was proved after he was put to death. Hence, it is best to avoid executing a person.It is reported that there is no relation between capital punishment and crime rate i.e giving death penalty does not decrease crime rate in the society. Crimes are prevalent in countries where capital punishment exists and also where it has been abolished.Bangladesh Perspective and My OpinionBangladesh is a country where there is no right to life. By the various way this right has been violating there. The causes of violation to this right are death penalty, extra judicial killings etc. Here is a common work of death penalty and killings without justice. Every year ma ny peoples are killed by death penalty and by the extra judicial killings. How many people have killed since independence to till today we dont have this statistics. It is no doubt that, death penalty is one kind of killing.Recently five persons were killed in death penalty within a day in Bangladesh. On 28th January, 2010 Bangladesh was executed this death penalty which decision was made by the Bangladesh Supreme Court. The killed persons were self say killers of Bangabondhu Sheikh Mujibur Rahman. Bangabondhu is the father of the nation of Bangladesh. Though, question has arisen on the execution procedure of this death penalty.I want to inform some statistics on Bangladesh to the national and worldwide community. Especially it for the human rights organization and bodies which are working national and international level for the human rights. We have been seeing and reading the news on death penalty al some every week from Bangladesh which was declared by several courts for vario us charges.Only by extra judicially at least 1,600 people were killed in Bangladesh since 2004. 58 persons were killed during the Operation clean heart in 2002 led by army. We couldnt remember the horrible mass killings in so-called mutiny at BDR headquarters on 25-26 February, 2009. By that mutiny at least 74 were killed inhumanly including 57 meritorious army officers. After that mutiny at least 71 BDR members was died (Source the daily Bhorer Kagoj, 25 February, 2010). Most of the died BDR were tortured before death, it was alleged.Anyhow, execution of death penalty is very inhuman, degrading and cruel. And no where it approved. Especially it is prohibited by the record and the Universal Declaration for Human Rights. But, Bangladesh has executing the death penalty as normal.According to the Spinney Press, The UN reaffirmed and strengthened its position against the death penalty in December 2007 when the prevalent Assembly passed a resolution calling upon member states to establ ish a moratorium on executions with a view to abolishing the death penalty. Evidence from around the world has shown that the death penalty has no unique deterrent effect on crime. Many people have argued that abolishing the death penalty leads to higher crime rates, but studies in the USA and Canada, for instance, do not back this up. In November 2009 the Crimes Legislation Amendment (Torture Prohibition and Death Penalty Abolition) Bill 2009 was introduced before the House of Representatives. The legislation fulfils Australias obligations under the secant Optional Protocol to the International Covenant on Civil and Political Rights which requires Australia to take all necessary measures to abolish the death penalty. As a consequence, the death penalty will not be able to be re-introduced anywhere in Australia. Although the world is gradually moving towards abolition of capital punishment, in 2008 an estimated 1,718 people were executed in 25 countries and at least 8,864 people w ere sentenced to death in 52 countries. Three quarters of those executions took built in bed in Asia, with China carrying out more executions than the rest of the worlds nations put together. Since 1967 when the last Australian (Ronald Ryan) was hanged, the Australia has maintained a policy of opposition to the death penalty. (It was written in the book-The death penalty).According to this book, most of the executions in 2008 were carried out in Asia, where 11 countries continue to practise the death penalty Afghanistan, Bangladesh, China, Indonesia, Japan, North Korea, Malaysia, Mongolia, Pakistan, Singapore, and Viet Nam. China alone accounted for at least 1,718 executions although the figure is believed to be much higher as statistics on death sentences and executions remain state secrets. The Middle East and North Africa was the region with the second highest number of executions (508). In Iran, stoning and hanging were among the cruel and inhumane methods used, with at least 346 people put to death, including eight juvenile offenders. In Saudi Arabia, where execution is usually by open beheading, at least 102 people were executed. In the Americas, just now the USA consistently executes people, with 37 executions carried out in 2008 including more in Texas than in any other state. The release of four men from death row in the USA on grounds of innocence brings to more than 120 the number of such cases released since 1975. The only other country in the Americas to execute in 2008 was St Kitts and Nevis, the initiative Caribbean state to carry out an execution since 2003.According to the Amnesty International, 93 percents of the world death penalty has executed in China including other four countries. DW-Bengali online section writes (25-2-2010), the European magnetic north was published a declaration on an anti-death penalty. Europe is the first place which is a death penalty free. A proposal of European on anti-death penalty in the Human Rights Commi ssion of Geneva and general manufacturing of UNO in 1998, was spoiled by the contradictory of USA, China, Africa and some countries of Asia. Though, in 2007 that proposal was passed in general assembly of UNO. And the 58 percents people of China are support to death penalty. In the meanspirited time 93 countries have already abolished to death penalty by making the law. At least 141 country havent giving death penalty, now.We know the Italy has a historical background on anti-death penalty movement. So, we want to thanks and salute to the Italy as well as the countries of European Union for their dedications to the right to life and for the human rights.Our hope, Bangladesh should obey to national and international treaties and declaration for human rights. And Bangladesh government should abolish the death penalty system immediately. If they have believe a little bit on human rights.Islamic PerspectiveIf anyone kills a person unless it be for murder or for spreading mischief in the land it would be as if he killed all people. And if anyone saves a life, it would be as if he saved the life of all people ( record 532). manner is sacred, according to Islam and most other world faiths. But how can one hold life sacred, yet still support capital punishment? The Quran answers, Take not life, which God has made sacred, except by way of justice and law. Thus does He command you, so that you may learn acquaintance (6151).The key point is that one may take life only by way of justice and law. In Islam, therefore, the death penalty can be applied by a court as punishment for the most serious of crimes. Ultimately, ones eternal punishment is in Gods hands, but there is a place for punishment in this life as well. The spirit of the Islamic penal code is to save lives, promote justice, and prevent corruption and tyranny.Islamic philosophy holds that a harsh punishment serves as a deterrent to serious crimes that harm individual victims, or threaten to destabilize the foundation of society. According to Islamic law (in the first verse quoted above), the following two crimes can be punishable by deathIntentional murderFasad fil-ardh (spreading mischief in the land)Intentional carrying into actionThe Quran legislates the death penalty for murder, although forgiveness and compassion are strongly encouraged. The murder victims family is given a choice to either insist on the death penalty, or to pardon the perpetrator and accept monetary compensation for their loss (2178).Fasaad fi al-ardhThe second crime for which capital punishment can be applied is a bit more open to interpretation. Spreading mischief in the land can mean many different things, but is generally interpreted to mean those crimes that affect the community as a whole, and destabilize the society. Crimes that have fallen under this description have includedTreason / Apostacy (when one leaves the faith and joins the adversary in fighting against the Muslim community)TerrorismLand, sea , or air piracyRapeAdulteryHomosexual behaviorActual methods of capital punishment veer from place to place. In some Muslim countries, methods have included beheading, hanging, stoning, and firing squad. Executions are held publicly, to serve as warnings to would-be criminals.It is important to note that there is no place for vigilantism in Islam one must be properly convicted in an Islamic court of law before the punishment can be meted out. The bad weather of the punishment requires that very strict evidence standards must be met before a conviction is found. The court also has flexibility to order less than the ultimate punishment (for example, imposing fines or prison sentences), on a case-by-case basis.At the end I want to say that Capital Punishment is necessary, if the home is applicable. This is not unethical or immoral but it has to be seen that the griminal is passes with ease and relief.
Tuesday, June 4, 2019
Depreciation And Provision For Depreciation Accounting Essay
Depreciation And Provision For Depreciation Accounting EssayDepreciation is the cost all in allocated as expense which has the effects of reducing the abide by of a fixed summation during the cessation it is used by a business. It is a non-cash expense and need to be charged to the Profit Loss grudge course of studyly which lowers the companys profit which increasing free cash function.Fixed pluss be long life. They are bought to assist in the operation of business but non with the main purpose of resale. They are in situation revenue-generating pluss as they help to gain profit depending on their useful lives. Deprecicapable items include mechanismry, vehicles, buildings and fixturesThere are reasons why assets whitethorn depreciateObsolescence Assets are replaced because new and more efficient technology has been developed.Depletion or Exhaustion The ranges of assets such as mines, quarries and oil wells fall due to the extraction of raw materials from them.Passag e of Time Assets which have limited period of life in terms of years. Theterm amortization instead of derogation is often used to refer this.Physical Deterioration Assets become worn out after used. It becomes less cost-effective to perform and spend more to fend for and repair.The two most common methods used to calculate depreciation expense areStraight line or Fixed Installment Method cut down Balance or Diminishing Balance MethodStraight Line MethodAn equal amount of depreciation over the estimated useful life of an asset is allocated for each year.Example Original Cost $30000Estimated repose valuate $6000Estimated utilitarian Life 6 YearsAnnual Depreciation = Original Cost Residual ValueEstimated Useful Life= $ 30000 $60006 years= $4000Reducing Balance MethodDepreciation is calculated as a fixed percentage base on the book value of an asset at the beginning of the chronicle year but not the cost of the asset.Example Original Cost $20000Estimated Useful Life 4 Year sRate of Depreciation 20% per annum on the reducing equaliserDepreciation = Rate of Depreciation x Book Value at the Beginning of the Accounting YearCalculation $Cost 20000Year 1 (20% X 20000) (4000)16000Year 2 (20% X 15000) (3200)12800Year 3 (20% X 12800) (2560)10240Year 4 (20% X 10240) (2048)Net book value at end of Year 4 8192Provision for DepreciationProvision for depreciation records roll up depreciation. It is an asset contra account, hence a recognition balance as shown as a deduction from the related to fixed asset in the Balance Sheet. The balance of the provision for depreciation increases with time and the book value of the fixed asset decreases with time.Provision fordepreciationaccount is the liability of business. By making provision for depreciation account, companys balance sheet will reflect the current value of fixed assets.When asset is sold, it accumulated provision for depreciation will be transfer from the credit side of provision for depreciation account. Then, we will compare it with the sale value of asset. If sale value of asset is more than the current book value of asset after adjusting from provision for depreciation, it will be profit on sale of asset.Why do business, companies, etc. include depreciation expenses and its provision in their m matchlesstary statements?ReasonsTo match the earning revenueThe very first reason is to match the earning revenue. Depreciation is directly related to the matching concept. Matching concept is a concept that matches the expenses with related revenues. Under the matching concept, in a particular accounting period that the expenses are the cost of the assets used to earn the revenue, if there are no expenses there will be no revenues. Revenues cant generate without expenses. Therefore, when the expenses are matched with the revenues generated in the same period, the results will be the net profit or loss for that period. Example, envision ABC Woodworks Company, a woodworking business tha t purchases its own customwoodworking machinery. When ABC Woodworks Company purchases a new custom piece of machinery, this new machine is durable enough to last for several years. In accounting terms, this means that the equipment is in use over several reportingperiods, not just the nonpareil in which the machine was purchased.Technological obsolescenceBesides that, the purpose of depreciate the assets is to because of the technological obsolescence. Technological obsolescence generally occurs when a new product has been created to replace the old version. When a machine has ends its useful life, the business will need to spoil another new machine to continue in order to produce goods. For an example, if the technology has been obsolete, the value of the revenue in the market will be very low. In that moment, the business will write polish off ( i.e. fully depreciated) the technology and the needs to buy a new and advance technology arise.Wear and TearNext, the third reason of depreciation is wear and tear. What is wear and tear? It means that the asset has physically degenerated due to wear and tear in used. The more we used the assets the greater the wear and tear would be. There are many reasons of physical deteriorate of an asset example erosion, accident, friction etc. The wear and tear is general but it is also cause of depreciation.Bad DebtsBad debts are the debts that are uncollectable from the debtors / customers. This usually happens when the steadfastly sells an item on credit to the customers. A debt that is considered that wont be able to collect back by accountant only known as stinky debt.For example, the customer has declared bankrupt, and this is where the accountant write the debt as bad debt.The accounting entry for bad debt isDebitBad Debt Expense realisationAccount dueThe credit entry reduces the account receivable balance while the debit entry increases the bad debts account which is expenses.Example gobbler Ltd sells goods to Je rry Ltd for $ 1000 on credit. Tom Ltd then found out that Jerry Ltd has been owed few companies, therefore there is a very low possibility that they will pay for the goods.Tom Ltd should write off the receivable from Jerry Ltd for this situation. The double entry will be recorded as$$DebitBad Debts Expense1000CreditJerry Ltd (Account Receivable)1000The accounting dissolving agent is to make an allowance for bad debts, making the bad debts against sales when the bad debts accrued.Bad debts are needed to make appropriate adjustments to accounting data.Allowance for ambiguous Debts dubious debt is an expense to the business. It is a debt which is unlikely to be able to collect before turn to be bad debt. At the end of accounting period the budget of the business must be made on those amounts of the debtors. If we do not provide this account of doubtful debts, we may not be able to present a good productivity and profits of the business. In most circumstances it is estimated by apply ing a percentage to its debtors balance, which is likely go bad, during any one accounting period. The percentage is derived from the past experience of trend. In the first accounting period, the doubtful debt estimated will be recorded in full. In the subsequent accounting period, the variance of current and past period will be recorded.To record the increase in the doubtful debt estimationDebitProfit and Loss (Expenses)CreditAllowance for doubtful debtTo record the decrease in the doubtful debt estimationDebitAllowance for doubtful debtCreditProfit and Loss (Revenue)ExampleA business started on 1 January 2010. Its accounting period ended 31 December 2010. The total amount of debtors at the end of the accounting period was $30,000. It was estimated that 2% of the debtors would eventually go bad due to certain reasons but there was no evidence whether they were bankrupt or dead.Allowance for doubtful debt = % x sum up debtors (after deducting bad debt)SolutionAllowance for Doubtful debt = 2% x $30,000= $600DebitProfit and Loss (Expenses)$600CreditAllowance for doubtful debt$600Reasons for Computing Allowance for Doubtful DebtsHave a more accurate end of year accountNot all debts will be decent at the end of the year account. This may be due to many different causes which consist of your debtor going bankrupt, dying or refuses to pay. These causes could mean that your business does not get all the money that was anticipated. This is why computing allowance for doubtful debts are so important. When you make an estimation based off a certain percentage you are giving your account a much more accurate lookout to go off. This means at the end of the year you will not be in huge astonishment if one of your debtors has been incapable to pay you. This means all your purchases will be more advantageous to the business overall.Will be capable to budget correctlyBeing capable to budget correctly is an advantage to any business. It will allow you to control and estimate cash flow well and also make more well-versed purchase decisions. When you make allowances for doubtful debts you are having fewer of a turnover at the end of the year. Yet the gain is that you will not overspend on any stock, advertising or worker costs. Keeping your costs down is helpful to any businesses attainment. This is due to the fact overspending can put your business in a bad spot and avoid you from doing what is correct for your business. This is done to avoid over-stating the assets of the business astrade debtorsare reported net of doubtful debt.These points are the main twos that you have to deliberate when making allowances. They are not the only two, but the two that can claim how you think about allowances for doubtful debts. Even if doing credit and debit accounting is not your thing it is also completely possible to outsource the entire process. This may charge you a bit of money but at the same time it will do your business a world of good and it is two-a-penn y compared to the possible risks. By keeping tracks of the amount of allowance for doubtful debt accounts, it will also mean that the bad debt expense will be stated close-set(prenominal) to the time of sales rather than waiting for the account to be determined as uncollectable. Also, when the debtors of the company are paying well, the expense of allowance for doubtful debt may decrease. When this happens, it will be considered as revenue of the company. Thus, allowance for doubtful debt may not always be an expense to the company.
Monday, June 3, 2019
Penetration Testing Of General Hospital Information Technology Essay
Pe inter button upration Testing Of General Hospital Information Technology EssayPenetration interrogatory PeT appendage B has always been an alpha first-step in any security life cycle. By doing brainstorm examination, the Hospitals IT team asshole obtain legion(predicate) invaluable reading most the Hospitals freshly developed security dodge of rules. Basic solelyy the process of brainwave examination loll start be involved with gathering information. exploitation these information to identity and then try to exploit the security vulnerabilities.1/ Why do we need to perform penetration streamletingPenetration proveing is one of the oldest and effective order to evaluate the security of a computer system. Nowadays legion(predicate) organizations argon using penetration quizing in dress to discover and fix security weakness before the get exposed. And for General Hospital after the process of creating a new security system, it is valuable that we do penetrat ion stressing, not unaccompanied to find out about any potential picture, but also to demonstrate the effectiveness of the new system, these atomic bend 18 unspoiled a few refers on why General Hospital should do penetration interrogationThe main shoot for mute for greater understanding of the original security system and finding any gap in security. This help the Hospitals IT team to have proper action plans to minimize the threat of ack-ack gun or misuse.The penetration test pass on be documented cargonfully ( more(prenominal) information on this bellow), and these well documented dissolvers entrust help the managers in devising a strong business case to the Hospital board, explicateing, justifying all the budget had been use for creating this new security system.Security is not a one-time solution, its actually a heavy(p) process of maintaining and upgrading along the way, as new threads ar being discovered. This pen-test maybe the first that SGH have, but it ll definitely not be the last. By doing a proper pen-test, the result will act as a good foundation for future testing.2/ Quality of the testLike any big project, before we actually committed to complete the task, we have to have a truly clear picture of the final product as well as the schema, and every steps of the way, committing without planning is one way to hold to achieve failure (more information on planning in the next part). As we go on later in this document, well see that the Hospital will cooperate with a security partner in order to carry the testing, the more cause for two party to sit down and agreed on the standard quality of this test. So, what makes a good penetration testing?Scope of the test defying a clear sphere, that will be most suitable for the Hospital that will be the first and most important task, for a good ground will help to prevent wasting of resource at the same time able to cover every potential vulnerability (the scope defying will be in th e next section, the planning stage).Reliable partner after the planning, sketch out a good strategy, its the security partner job to implement, immerse the test, thats why we have to chose a skilled and experienced partner, the one who know what they ar doing, in the fourth section, we will chose a partner thatLegally capable. practicedly capableCan abide the non disclosure agreement, and this is especially important, for we a hospital, working with highly sensitive information.Choosing correct and adequate series of test, this depends heavily on the scope that we decide on. Also the executing of the test must follow strict methodological analysis, every test must be planned carefully, followed the plan, and the well documented. This is very important because if we treat the test just like a guessing game, to see where the weaknesses are, its very likely that we are expiry to miss any(prenominal)thing, and that alone make the purpose of doing penetration testing completely voi ded.Result oriented the only thing we care for its the result of the test, thats why the results should be well documented, the team should pay tending also to make the result understandable, so that the Hospital board base easily understand the problems, the consultant of the security partner company should also be ready to pre displace and explain the results.With that set of quality in mind, we are red ink to proceed to the planning and further steps accordingly. However, because we are not going to actually perform the test, so we are only going through planning, defying scope, chose a strategy, choosing the tests, and lastly defying methodology and standard for these series of test, we are going to explain what do we chose and why, as for the definition and how to execute please refer to the appendix.II/ The planning stageIn this part, we will cover the planning, defying scope, that lead to a strategy plant, which will be the back bone guide line for any further tests to fol low.The security priorities of different target are different, for a service net work it is important to have a high stability, availability, or in case of an e-business interlock, it requires high authenticity. However none of that bottomland be apply to SGH, for a hospital the utmost priority are confidentiality, data integrity, we are dealing with patients data here, there is no point in taking the Hippocratic blasphemy to keep the patients information confidential while on the another(prenominal) hand slacking off In putting effort to protect those information. Not only that we are dealing with much higher stake game here, which involve humans lives. This is no longer just protecting data for data reckon money. When I were young, I remember a movie where a patient with a broken jaw put back together by gold platting, years latter he has rout outcer, and his doctor without knowing about the platting still send him to the MRI machine (highly magnetic), and lead to his gru esome death. All of which cause by lack of dental documentation in his medical history. So in a nut shell, SGH highest priority is data Integrity and confidentiality, but in the take to be time we still have to do minimum checking on every other aspect, leave out nothing.The second as part of SGH network system is the personnel, which in this case are doctors and nurses mostly. They are among the most highly trained employees, however not in IT. Nowadays almost every hospital in Singapore has been completely digitalized, dealing with database instead of paper files, also with galore(postnominal) medical devices are being monitored by computer programs. The gang of high tech with unexperienced user leads to a very high chance of diligence misuse, data remark wrongly. That put application security testing (appendix B application security testing) priority a bit higher than normal.So as a conclusion for the strategy of this penetration test we are going to do a penetration test fo llow Blind Testing strategy (Bind testing strategy Appendix B) to stimulate the action like a real hacking start out by hacker to obtain confidential data, or to modify, deleteetc. In the same time we will combine with certain Internal testing (Internal testing strategy), mostly focus on application security, misuse..etc, and of course a few basic test a net common threat however we are not going to deep in that.After decided on a plan and testing strategy, the next step will be vulnerability assessmentIII Vulnerability assessment (VA)Why should we do VA (VA appendix B)? In fact there are some confusion mingled with VA and pen-test, onetime(prenominal) people lable them as the same. Pen-test mostly consis of VA, but then take one step futher, find out the weak spot then try it. So basically before we do pen-test, the first step would be VA.For the detail of how to do VA please refer to VA Appendix A . But basically we are going to series of techniques that can be considered as r esearch before attack.Passive research learn as much as we can about SGH, from out site point of view.Open source monitor utilizes Internet meta-searches focus on specific keywords, or sensitive information to see if there are any leaking.Network mapping and OS fingerprinting from out side view, figuring out the structure of the network, even able to draw out a network diagram from the information gatherd through different toolsSpoofing trick the targeted computer in side the Hospital, sending out piece of lands pretending that they are from trusted source.Network sniffing enamour data as it travel in and out the network, especially we have the different site between Clinics and Hospital, this can be a good check to see if our VPN is working properly.Trojan attack and yes the traditional, butter and bread Trojan attack, Even though its basic, but because its so popular, itll be a mistake to think that our fire wall can do all the job, when Trojans combine with social engineering can be devastating.Brute force attack this can be optional as we mention before the availability of the network may not be our highest priority, however if the resource allow, we can still do it, as a better safe than sorry.Vulnerability scanning finally we can use alter tools to scan the hale database looking for potential vulnerability (the how, and what tool can be found in VA appendix A)After all those test, its very likely that we may able to discover a few holes in our security system. However in order to make sure that in all those vulnerabilities weve just discover none are sour positive we will go to the next step is exploit testing, meaning actually attack to see if any got through.IV penetration testing, different subjects of testExploit testing (exploit testing appendix B) normally is the final stage in the whole process of penetration testing. There are umteen type of test, each with different level of commitment. We have to chose which test, and how far do we want to push. This decision is based on two aspects. One is the predefined scope that everybody agreed on earlier, we will conduct the test accordingly to that scope, to the strategy. The second is based on the result of VA, attack on every potential vulnerability that weve just found. In this scenario, because we have not actually performed the test, so we are going to chose based on the scope only.1/ Database IntegrityAs we discussed in the previous section, the integrity and confidentiality of SGH database is our highest priority. The fact that in the process of VA, we have done many test and checking, sniffing, mapping, Trojan, brutal force, those are not only VA testing but actually a part of testing the confidentiality and integrity level of the data base also. Thats the fine line between VA and penetration testing as many of the assessment can actually be consider as exploitive. In the same manner in this stage of exploitive testing there still are test that could be done that m ay very well have been a part of VA likeWar dialling (war dialling appendix B) by calling a immense range subjugate of telephone inside SGH, we may catch a modem, remote access devices, and maintenance connection that may leave an open on the hospital network. Why do we even consider this method? The fact that nowadays not only user, but even IT staff have very high ignorance when considering the phone network, while in fact they are the very primate assess point that possible for hacker to exploit, you dont actually need to be ignorance, just careless is enough, like leaving an open modem on a critical node of the network is enough to create an opening.There are many tools we can use for war diallingToneLoc from Minor Threat and Mucho Maas, or its alternative ModemScan , they both can be use for Microsoft window platform.TeleSweep for Microsoft also, and its free.For Macintosh use break Dialer.Unix try PAWS, THC-SCAN NG, Telescan, IWAR (intelligent war dialler), or ShokDial(from http//www.tech-faq.com).2/ Social engineering testingSocial engineering test (appendix B SE) is part of the blind strategy testing. The environment we are working on is SGH, where most of the employee dont have in-depth cooking in IT, an other point is the helpful nature, answering question is kind of comes with the job description, all in one word gullible nurses. For any cunning hacker, this is a big fat moving target for social engineering attack.For that reason, basic training in social attack is required, in the same time several test can be conduct, mainly in two formsNon face-to-face the test can be done over mail, or phone, pretending to be somebody who have authority, or who needs help to tricks the user to use account, password, or giving out sensitive information.Face-to-face this is a more advance kind of social engineering, by posting as an employee of authorized personnel , gaining physiological access to restricted areas getting information, from intercepting mail to dumpster divingetcSocial engineering maybe no as technical as other test, but it has extend to importance if not more, for the fact that there are actually no fool proof method to prevent social engineering attack other than out smart the attacker, which Is ironically we dont usually put the smartest people of the organization to the reception desk , the only thing we can do is to raise the level of sentiency of the employee (there are books on this matter like the art of deception, the art of intrusion both by Mitnick Simon ) .3/ Application security testingThe second point from the scope as we discussed earlier is Application security there are a series of test for application security (technical detail on appendix A AppT) Code view, Authorization testing, Input validation, cookie security, Lockout testing, there are also some test for the functionality of the application as well like input validation, Transaction testingetcFor why we need application testing we have discuss ed above, but then again, do we really need to do all those test? Yes, we do. The objective of doing so many test on Application alone is to fully evaluate the control we have over our application (medical application, network application). The focus of those test still focus mainly on protecting the confidentiality and integrity of information, how to authenticate user, and also on the using of cookies (appendix B cookies)4/ other testThere are some other test like vindication of service testing, resource..etc but as we mention above, these are not compulsory, not that they are not important, but there are higher priority test that need to be done. But since these are common attack and scant(p) to carry out, its recommended that if the resources allow, we should go ahead and perform the tests, even at basic level. (the detail of the test can be found at DoS testing appendix A).V Other detail of a penetration test1/ methodology and standardsMethodology actually is a very important constituent of a penetration test. A test that acts without a formal methodology has no real meaning, just poking around. But on the other hand, methodology should only acts as a framework, a discipline guideline to follow, we should not restrict the tester rather than let him/her fully explore his/her intuitions, while acting accordingly to the guideline. There are several methodology and standards, as for their technical detail, please refer to appendix A Metho2/ Security partnerThe reason why we needs to pay money for a third party to perform the test for us is Un unbiased point of view like a beta tester, sometime the programmer, or in this case the SGH IT team, cannot see ones own mistake clearly, so we need to hire trained professional to look for us. super experienced and highly trained for the member of the IT team, some may have done a penetration test before, some may not. But for a company that specialize in penetration testing. They have done it hundreds of time, even done it for some big organization, thats why with the experience and the training, its more likely that they can discover things that the IT team cannot.Certified result a Certified penetration testing company will have to satisfies certain level of standards (refer to appendix A Metho). If a test done by a Certified party, it can become a potential strong legal argument for future conflicts (for simulation Insurance conflicts).With all those reason weve decided to hire a security partner to perform the test for us. In Singapore there are many company that have the certification and standards to perform such test, most trustworthy must beCiscoIBM (with the express penetration testing service)Obtechs Certified penetration testing specialist3/ lucks in doing penetration testingWhile doing penetration testing, there are certain risks that we should consider and be careful forRisk of exposure there are many sensitive data in the hospital, sometime these data can be expose during a pen -test it can be unintentionally or intentionally, we have to have strong agreement of the conditions and responsibility of the security partner.Time delay Pen-test take time, and for Hospital environment we cannot simply lock down our data base for testing, thats why a strict time-frame. For the size of our Hospital system, the testing should not take more than a month.VI evidenceAs we all know security is continuum, no absolute. Through the penetration tests we should be able to not only find out there are flaws in the security system, but we have to go further to understand the process failures that lead to those flaws. Through the test, we can see that even a grunge new developed security system can have many vulnerability, its a reminder to us so that we never have a simulated sense of security.Appendix A1/ VA (Vulnerability assessment)As documented by SANS, Vulnerabilities are the gateways by which threats are manifested. In other words, a system compromise can occur through a weakness found in a system. A vulnerability assessment is a search for these weaknesses/exposures in order to apply a patch or fix to prevent a compromise.How do these weaknesses occur? There are two points to consider This newly developed security system for SGH were born with it, means while underdeveloping by mistake the developing team creat the weakness. Many vulnerabilities occur as a result of misconfigurations by system administrators. Misuse by user, all can lead to the result of making a hole in the security system.There are many ways to search for vulnerability, however in our scenario, it is best to do it as a out side hacker would do it, before contend a system, the hacker also have to perform a vulnerability assessment test on the system, only different would be we are going to do it on full scale, not only from outside looking in but also from the insider view. There are however certain number of technique that could effectively point out the weaknesses if the sys tem have one.Passive research As the name suggests, a passive research is a method used to gather as much information about an organizations systems configuration from public domain sources such aso DNS (domain name service)o beneficial (Rseaux IP Europens)o USENET (newsgroups)o ARIN (American Registry for Internet Numbers)Passive research is generally performed at the beginning of an external penetration test.Open source monitoring This service is an associated technique that utilizes Internet meta-searches (multiple searches of Web sites, newswires, newsgroups and other sources) targeted on keyword that are important to the organization. The data is collected and discoveries are highlighted to the organization. This helps identify whether organizations confidential information has been leaked or whether an electronic conversation involving them has taken place. This enables an organization to take necessary measures to ensure confidentiality and integrity.Network mapping and OS f ingerprinting Visualization of network configuration is an important part of penetration testing. Network mapping is used to create a picture of the configuration of the network being tested. A network diagram can be created which infers the logical locations and IP addresses of routers, firewalls, Web servers and other border devices.Additionally, this examination can assist in identifying or fingerprinting operating systems. A combination of results from passive research and tools such as ping, traceroute and nmap, can help create a reasonably accurate network map.An extension of network mapping is porthole Scanning. This technique is aimed at identifying the type of services available on the target machine. The scan result reveals important information such as function of a computer (whether it is a Web server, mail server etc) as well as revealing ports that may be serious security risks such as telnet. Port scans should include number of individual tests, includingo TCP (Trans mission Control Protocol) scano Connect scano SYN (or half open) scano RST (or Xmas-tree) scano UDP (User Datagram Protocol) and ICMP (Internet Control Message Protocol) scans. Tools such as nmap can perform this type of scan.o Dynamic ports used by RPC (Remote Procedure Call) should be scanned using tool such as RPCinfo.Spoofing Spoofing involves creation of TCP/IP packets using somebody elses Internet addresses and then sending the same to the targeted computer making it believe that it came from a trusted source. It is the act of using one machine to impersonate another. Routers use the destination IP address in order to out front packets through the Internet, but ignore the source IP address. The destination machine only uses that source IP address when it responds back to the source. This technique is used in internal and external penetration testing to access computers that have been instructed to only reply to specific computers. This can result in sensitive information be r eleased to unauthorised systems. IP spoofing is also an integral part of many network attacks that do not need to see responses (blind spoofing).Network sniffing Sniffing is technique used to capture data as it travels across a network. Sniffing is an important information gathering technique that enables capturing of specific information, such as passwords and also an entire conversation between specific computers, if required. To perform sniffing, the network card of computer needs to be put in promiscuous mode, so that it captures all data being sent across the network.Sniffing is extensively used in internal testing where the sniffer or the computer in promiscuous mode is directly attached to the network enabling capturing of a great deal of information. Sniffing can be performed by a number of commercial tools such as Ethereal, Network Associates SnifferPro and Network Instruments Observer.Trojan attack Trojans are malicious programs that are typically sent into network as e-m ail attachments or transferred via IM chat rooms. These programs run in stealth mode and get installed on the client computer without the users knowledge. Once installed, they can open remote control channels to attackers or capture information. A penetration test aims at attempting to send specially prepared Trojans into a network.Brute force attack A brute force attack involves trying a huge number of alphanumeric combinations and exhaustive trial and error methods in order find legitimate authentication credentials. The objective behind this time consuming exercise is to gain access to the target system. Brute force attacks can overload a system and can possibly halt it from responding to legitimate requests. Additionally, if account lockout is being used, brute force attacks may close the account to legitimate users.Vulnerability scanning/analysis Vulnerability scanning/analysis is an exhaustive examination of targeted areas of an organizations network radical aimed at determi ning their current state. The targets range from a single system or only critical systems to scanning the entire network. It is usually performed using automated tools that test for a multitude of potential weaknesses in a system against a database of known vulnerabilities and report potential security holes. And although they dont actively prevent attacks, many scanners provide additional tools to help fix found vulnerabilities. Some of the commonly used vulnerability scanners include the open-source Nessus Projects Nessus, ISS Internet Scanner, GFI Softwares GFI LANguard Network Security Scanner, eEye digital Securitys Retina Network Security Scanner, the BindView RMS vulnerability-management solutions and Network Associates CyberCop.2/ application testing ( AppT )For the purpose of application testing there are several test that can be done* Code review Code reviews involve analysing all the application-based code to ensure that it does not contain any sensitive information that an intruder capability use to exploit an application. For example Publicly available application code may include test comments, names or clear text passwords that will give an intruder a great deal of information about the application.* Authorization testing Involves testing the systems responsible for the initiation and maintenance of user sessions. This will require testingo Input validation of login fields high-risk characters or overlong inputs can produce unpredictable resultso Cookie security cookies can be stolen and legitimate sessions can be used by an unauthorised individual ando Lockout testing testing the timeout and intrusion lockout parameters set in the application, to ensure legitimate sessions cannot be hijacked.This is performed to discover whether the login system can be forced into permitting unauthorised access. The testing will also reveal whether the system is susceptible to denial of service attacks using the same techniques.* Functionality testing This involves testing the systems responsible for the applications functionality as presented to a user. This will require testingo Input validation bad characters, specific URLs or overlong inputs can produce unpredictable results ando Transaction testing ensuring that the application performs to specification and does not permit the user to abuse the system.3/ DoS testingDenial of service testing involves attempting to exploit specific weaknesses on a system by exhausting the targets resources that will cause it to stop responding to legitimate requests. This testing can be performed using automated tools or manually. The different types of DoS can be broadly classified into software exploits and make full attacks. Decisions regarding the extent of Denial of Service testing to be incorporated into a penetration testing exercise depend on the relative importance of ongoing, proceed availability of the information systems and related processing activities. Denial of service can take a number of formats those that are important to test for are listed beneath* Resource overload these attacks intend to overload the resources (i.e. memory) of a target so that it no longer responds.* Flood attacks this involves sending a large amount of network requests with the intention of overloading the target. This can be performed viaICMP (Internet Control Message Protocol), known as smurf attacksUDP (User Datagram Protocol), known as fraggle attacks* Half open SYN attack this involves partially opening numerous TCP connections on the target, so that legitimate connections could not be started.* Out-of-band attacks these attempt to crash targets by breaking IP header standardso Oversized packets (ping of death) the packet header indicates that there is more data in the packet than there actually is.o Fragmentation (teardrop attack) sends overlapping fragmented packets (pieces of packets) which are under length.o IP source address spoofing (land attack) causes a comput er to create a TCP connection to itself.o Malformed UDP packet header (UDP bomb) UDP headers indicate an haywire length.4/ Methodology and standards (Metho)The Open Source Security Testing Methodology Manual (OSSTMM) by Pete Herzog has become a de-facto methodology for performing penetration testing and obtaining security metrics. According to Pete Herzog, The primary goal of the OSSTMM is to provide enhancer. It provides transparency of those who have inadequate security configurations and policies. It provides transparency of those who perform inadequate security and penetration tests. It provides transparency of the unscrupulous security vendors vying to sponge up every last cent of their preys already meager security budget those who would side-step business values with over-hyped threats of legal compliancy, cyber-terrorism, and hackers. The OSSTMM covers the whole process of risk assessment involved in a penetration test, from initial requirements analysis to report generat ion. The six areas of testing methodology covered are* Information security* Process security* Internet technology security* Communications security* Wireless security* Physical securityThe OSSTMM focuses on the technical details of exactly which items need to be tested, what to do before, during, and after a security test, and how to measure the results. New tests for international best practices, laws, regulations, and ethical concerns are regularly added and updated.The National Institute of Standards and Technology (NIST) discusses penetration testing in Special Publication 800-42, Guideline on Network Security Testing. NISTs methodology is less oecumenical than the OSSTMM however it is more likely to be accepted by regulatory agencies.Standards in penetration testingLets take a look at some of the standards and guidelines availableStandards for Information Systems Auditing (ISACA) ISACA was established in 1967 and has become a pace-setting global organization for information governance, control, security and audit professionals. Its IS auditing and IS control standards are followed by practitioners global and its research pinpoints professional issues challenging its constituents. CISA, the Certified Information Systems Auditor is ISACAs cornerstone certification.CHECK The CESG IT Health Check scheme was instigated to ensure that sensitive government networks and those constituting the GSI (Government infrangible Intranet) and CNI (Critical National Infrastructure) were secured and tested to a consistent high level. The methodology aims to identify known vulnerabilities in IT systems and networks which may compromise the confidentiality, integrity or availability of information held on that IT system. CHECK consultants are only required when the assessment for HMG or related parties, and meets the requirements above. In the absence of other standards, CHECK became the de-facto standard for penetration tests and penetration testing in the UK. Companies belonging to CHECK must have employees that are security cleared and have passed the CESG Hacking Assault Course. However, open source methodologies such as the following are providing viable and comprehensive alternatives, without UK Government association.OSSTMM The aim of The Open Source Security Testing Methodology Manual is to se
Sunday, June 2, 2019
Irregularities in Othello Essay -- Othello essays
Irregularities in Othello The Shakespearean tragedy Othello contains various irregularities of time and occurrence which cause the audience to scratch their head in marvel and doubt. Let us analyze some of these shortcomings in this essay. In the Introduction to The Riverside Shakespeare Frank Kermode explains one of the difficulties in Othello Othello murders his wife on the second darkness in Cyprus. The difficulty, of which Shakespeare was clearly aware, arises from the fact that this leaves no time for her to imbibe had stoln hours of lust, certainly not to have enjoyed them repeatedly, as Iago alleges. In such allusions to frequent criminal conversation as III.iii.340-43 and V.ii.211-12, Shakespeare slides over from Short to Long Time very successfully the audience is not invited to consider that Othello is forgetting that Desdemona was not in the same ship as Cassio, and has had no chance since. We accept it as possible for her to have been unfaithful, though we know s he was not. (1199) Consider the basic plot and what a house of cards it is. Without extremum good luck, such a plot would not be possible. A. C. Bradley, in his book of literary criticism, Shakespearean Tragedy, describes the important accidents that befell the antagonist during his deception of the general The readiness of Iago was extraordinary, but so was his good fortune. Again and again a chance word from Desdemona, a chance meeting of Othello and Cassio, a question which starts to our lips and which anyone but Othello would have asked, would have destroyed Iagos plot and ended his life. In their stead, Desdemona drops her handkerchief at the moment most favourable to him, Cassio blunders into the presence of Othe... ...ally to be moving in the right direction. (329) WORKS CITED Bradley, A. C.. Shakespearean Tragedy. New York Penguin, 1991. Heilman, Robert B. Wit and Witchcraft an Approach to Othello. Shakespeare Modern Essays in Criticism. Ed. Leonard F. Dean. Rev. E d. Rpt. from The Sewanee Review, LXIV, 1 (Winter 1956), 1-4, 8-10 and Arizona Quarterly (Spring 1956), pp.5-16. Kermode, Frank. Introduction. The Riverside Shakespeare. Boston, MA Houghton Mifflin Co., 1974. Mack, Maynard. Everybodys Shakespeare Reflections Chiefly on the Tragedies. Lincoln, NB University of Nebraska Press, 1993. Muir, Kenneth. Introduction. William Shakespeare Othello. New York Penguin Books, 1968. Wilson, H. S. On the Design of Shakespearean Tragedy. Canada University of Toronto Press, 1957.
Saturday, June 1, 2019
Deception in Tartuffe, Phaedra, and The Marriage of Figaro Essay
Deception in Tartuffe, Phaedra, and The marriage of Figaro In literature, deception can provide motivation for the characters, provide comedy, play a part in the forwarding of plot or exist as a sub-theme. The works considered in our studies thus far provide prime examples of the use of deception in the same ways. This essay will focus on the act or acts of deception in Tartuffe by Molire, Phaedra by Racine, and The Marriage of Figaro by Beaumarchais. In Molires Tartuffe, the primary satisfy of the play is focused upon the deception of Orgon as performed by Tartuffe. Tartuffe is a hypocritically pious Christian much like the televangelists of the present day. His nature is best illustrated in scene two of act terce with Hang up my hair-shirt, put my scourge in place, And pray, Laurent, for Heavens perpetual grace. Im going to the prison now, to share My last a couple of(prenominal) coins with the poor wretches there. This statement, made for the benefit of Dorine, illustrates Tartuffes hypocritical nature. Tartuffes religious piety is much like his hair-s... Deception in Tartuffe, Phaedra, and The Marriage of Figaro EssayDeception in Tartuffe, Phaedra, and The Marriage of Figaro In literature, deception can provide motivation for the characters, provide comedy, play a part in the advancement of plot or exist as a sub-theme. The works considered in our studies thus far provide prime examples of the use of deception in the aforementioned ways. This essay will focus on the act or acts of deception in Tartuffe by Molire, Phaedra by Racine, and The Marriage of Figaro by Beaumarchais. In Molires Tartuffe, the primary action of the play is focused upon the deception of Orgon as performed by Tartuffe. Tartuffe is a hypocritically pious Christian much like the televangelists of the present day. His nature is best illustrated in scene two of act three with Hang up my hair-shirt, put my scourge in place, And pray, Laurent, for Heavens perpetual grac e. Im going to the prison now, to share My last few coins with the poor wretches there. This statement, made for the benefit of Dorine, illustrates Tartuffes hypocritical nature. Tartuffes religious piety is much like his hair-s...
Friday, May 31, 2019
Sorcery In Morocco :: miscellaneous
Sorcery In Morocco concord to Merriam- websters Collegiate dictionary, sorcery is defined as the utilize of power gained from the assistance or control of evil especially for divining. Sorcery is a phenomenon that has air all over the world. It mainly consists of direction of the world into a spiritual power which is mysterious and unexplainable.In Morocco, sorcery is a truly popular practice. It is undecomposed especially in the south of the country where people lay down strong beliefs in superstition. Believers in sorcery pretend that it has a great shock on the course of their lives. However, sorcery is a dangerous practice that affects the comport heed and the health of its users, in addition to the reputation of the country.At first glance, it seems to me that the most perilous impact of sorcery is its effect on the mind of those who practice it. both(prenominal) believers might argue that these practices build self confidence. For instance, when a sorcerer assigns to th em to do some rituals in order to make an operation successful, they face without fear. I tout ensemble disagree with them because as proved in many researches, those states of mind are only psychological and create a lot of mental troubles and instabilities. In Morocco, on that point is a huge population that completely believes in those practices. Therefore, the witches take profit from the ignorance of those people to stir up communicating some dumb information. In general, the information devoted by those sorcerers are common and related to the problem and the personality of the individual. Sorcerers are usually very intelligent and know exactly what the patient wants to hear. As a consequence, people become addicted to these kinds of practices and prefer it to consulting psychologists who toilette provide them with more accurate solutions. As a result, people become easily influenced, which by the federal agency affects their personalities. The practice of sorcery in Moro cco threatens the health of its users. Some sorcerers believe that their remedies are made from innate(p) plants and do not menace the health of their patients. However, what is strange is that they unendingly refuse to take their products to medical centers so that they can be Furthermore, people who have allergies can also suffer from dangerous diseases due to the fact that they take what their sorcerers give without the prescription of their doctors. Another important area that is suffering from this practice is the reputation and the burnish of the country.Sorcery In Morocco miscellaneousSorcery In MoroccoAccording to Merriam- websters Collegiate dictionary, sorcery is defined as the use of power gained from the assistance or control of evil especially for divining. Sorcery is a phenomenon that has spread all over the world. It mainly consists of direction of the world into a spiritual power which is mysterious and unexplainable.In Morocco, sorcery is a very popular practi ce. It is practiced especially in the south of the country where people have strong beliefs in superstition. Believers in sorcery pretend that it has a great impact on the course of their lives. However, sorcery is a dangerous practice that affects the mind and the health of its users, in addition to the reputation of the country.At first glance, it seems to me that the most perilous impact of sorcery is its effect on the mind of those who practice it. Some believers might argue that these practices build self confidence. For instance, when a sorcerer assigns to them to do some rituals in order to make an operation successful, they face without fear. I totally disagree with them because as proved in many researches, those states of mind are only psychological and create a lot of mental troubles and instabilities. In Morocco, there is a huge population that completely believes in those practices. Therefore, the witches take profit from the ignorance of those people to start communica ting some dumb information. In general, the information given by those sorcerers are common and related to the problem and the personality of the individual. Sorcerers are usually very intelligent and know exactly what the patient wants to hear. As a consequence, people become addicted to these kinds of practices and prefer it to consulting psychologists who can provide them with more accurate solutions. As a result, people become easily influenced, which by the way affects their personalities. The practice of sorcery in Morocco threatens the health of its users. Some sorcerers believe that their remedies are made from natural plants and do not menace the health of their patients. However, what is strange is that they always refuse to take their products to medical centers so that they can be Furthermore, people who have allergies can also suffer from dangerous diseases due to the fact that they take what their sorcerers give without the prescription of their doctors. Another import ant area that is suffering from this practice is the reputation and the culture of the country.
Thursday, May 30, 2019
Lord of the Flies :: essays papers
Lord of the FliesArtificial Restraints in Lord of the FliesGOLDING PUTS SO MANY slushy RESTRAINTS ON HIS STORY IN ORDER TO EMPHASISE HIS POINT, THAT THE WHOLE THING COMES OUT TOO NEATLY AND, IN FACT, REDUCES THE POWER OF HIS MESSAGE. I think that, date the boys experience immense bad luck due to the author, the story still proves its point. It is still possible though, that the bad luck of the boys could obtain been experienced in true(a) life. I think that with bulge out this bad luck, the point of the story wouldnt be as great, because without the restraints Golding placed on the boys, life on the island would start out been too easy for the boys. The major constraint that Golding puts on the boys is the personality clash between Jack and Ralph. From the beginning, when Ralph is elected leader, Jack hates Ralph, and towards the end of the book, the feeling becomes mutual. Without Jack and Ralphs problems, life would have been easy, and the darkness of mans heart would not have been conveyed to the reader. Jack shows the darkness and if he and Ralph had just been friends, there would n constantly have been an opportunity for Jack to show this darkness which lurked beneath the surface. Golding also uses the dead pilot conveniently against the boys - the way in which he is caught in the trees just in the right position to be caught by the wind and look like the beast and the way the wind picks up after Simon has let him down from the trees and carries him out to sea, so that the other boys cannot see that it wasnt a beast. The author uses the boys fear against them, and although this could possibly happen in the situation, Golding uses it as a apparatus against them, their morale and their companionship. I think that the boys split up and go to Jack because of the fear - he can kill the beast, he can get them meat, and if they ever get upset, he can start a dance and all will be fine.
Subscribe to:
Posts (Atom)