Friday, February 21, 2020
Personal Ethical Standards Essay Example | Topics and Well Written Essays - 250 words
Personal Ethical Standards - Essay Example I will talk to him to make sure he promises to change his trouble making habits in order to get back his mail rights. I will not promise him anything fruitful until I have talked to my chief officer if I am a junior officer. I will need to approach my chief officer and be able to convince him positively if I feel the inmate really deserves the favor. The chief officer with a good experience is able to make decisions on matters, which are not so crucial and harmful (Pollock, 2004). Since this may be a matter involving urgent home issues for the inmate, I would try to convince the chief officer and make sure he gets the favor done for him, only with a promise to improve his behavior in the prison. After that, I will ensure the inmate works tirelessly to improve his conduct, in order to prove himself and to gain positive attitude from other officers. The major ethical system that my response relates closely is ââ¬Å"Acting impartiallyâ⬠this is because, as long as I am convinced, the request is genuine and I have informed a more senior person (Pollock, 2004). I am not acting against the rules, and I am not being
Wednesday, February 5, 2020
Network monitoring and analysis Assignment Example | Topics and Well Written Essays - 250 words
Network monitoring and analysis - Assignment Example 214). Indiscriminate requests for entry into the network at such a rate that the servers fail to respond in a timely manner leading to congestion formation is one of the characteristic features of Denial of Service action. Tear Dropping and peer to peer attacks are commonly known actions and activities that are entailed in the domain of DoS attacks on the networks. Different actions may be undertaken as counter measures against DoS. The installation of an effective firewall is one possible solution against this menace. Firewall allows sequential entry of traffic and requests and subsequently prevents the system from overflow and flooding of requests. Other possible options of security include techniques such as Black holding, or simply use of switches as an alternate. The technique of Internet Based Prevention System is also an option against the DoS activity which allows running a smooth operational
Subscribe to:
Posts (Atom)