Monday, December 30, 2019

The Genius of Alexander the Great Book Review Essay

The Genius of Alexander the Great Alexander III of Macedon, widely known as Alexander the Great, is opinioned by some people to have been a ruthless man who only had a thirst for conquest , but according to others he was a man of intellect and â€Å"statesmanlike vision† (Hammond Preface). In N.G.L. Hammond’s book The Genius of Alexander the Great, as stated in the preface, he tries to refrain from writing based on his own opinion of Alexander, and instead analyzes the few surviving narratives on Alexander’s achievements in an unbiased manner. He portrays the conquests, struggles, and greatest achievements of Alexander’s career, such as the building of his empire that stretched from the eastern Mediterranean coast through Asia Minor and the†¦show more content†¦He was liked by many people due to his great gift of friendship (Hammond 5), allowing him to become admired and respected as a leader. There were many events that lead to the death of Alexander, one including the passing of his best friend Hephaestion, which caused Alexander to fast and lay in grief for two days (Hammond 196). Before he died, he believed that if he gave thanks to the gods and prayed, they would hear his thoughts and grant him salvation. Because of this, he did not arrange a transition of power (Hammond 200). However, Alexander did not have the gods on his side as much as he thought he did because on June 10th, 323 B.C.E. he died at the age of thirty-two (Hammond 198). He had obtained a fever and later lost his power of speech (Hammond 197). Soldiers came into his room and â€Å"as the men filed past he was unable to speak but greeted them with his eyes† (Hammond 198). It was suggested that he died of malaria tropica, and other reports said he died of poisoning or alcoholism (Hammond 198). Nicolas Geoffrey Lemprià ¨re Hammond, otherwise known as N.G.L. Hammond, was a professor of Greek University of Cambridge (N.G.L. Hammond: Professor†¦). He was born on November 15th, 1907 and died March 21st, 2001 (N.G.L. Hammond Bio†¦). He has written multiple books including his first book A History of Greece to 322 B.C.E., Alexander the Great: King, Commander, and Statesman and a three-volume collection titledShow MoreRelatedRacism And Incarceration Rates Among African Americans And Hispanics Essay1581 Words   |  7 Pagesthe reason, there is a need to review the history of the United States. Through the review, it is clear that the past arrest patterns is more an indicator of institutional racism still exists in this country. The New Jim Crow: Mass Incarceration in the Age of Colorblindness is a book by Michelle Alexander, who is a civil rights litigator and legal scholar. The book discusses racial issues related to African-Americans and mass incarceration in the Uni ted States. Alexander describes a set of practicesRead MoreThe Effects Of American Criminal Justice System Created By Public Perceptions Essay1565 Words   |  7 Pagespatterns is more an indicator of institutional racism that exists in this country. The New Jim Crow: Mass Incarceration in the Age of Colorblindness is a book by Michelle Alexander, a civil rights litigator and legal scholar. The book discusses race-related issues specific to African-American males and mass incarceration in the United States. Alexander describes a set of practices and social discourses that serve to maintain African American people controlled by institutions. She also argues that â€Å"TheRead MoreEssay on Alexander The Great1620 Words   |  7 Pages Few historical figures stand out in the same degree as that of Alexander the Great. He was a warrior by 16, a commander at age 18, and was crowned King of Macedon by the time he was 20 years old. He did things in his lifetime that others could only dream about. Alexander single-handedly changed the nature of the ancient world in just over a decade. There were many attributes that made Alexander â€Å"Great.† He was a brilliant strategist and an inspired leader; he led by example and was a conquerorRead MoreHarlem Renaissance: W.E.B. Du Bois.1617 Words   |  7 Pagesmagazine, he actively sought and presented the literary genius of black writers for the entire world to acknowledge and honor (Gale schools, 2004). Du Bois was born on February 23, 1868 in great Barrington Massachusetts. His father was a former civil war soldier who left the family for was when his son Do bois was still a toddler. His mother, Mary Silvina Burghardt Du Bois, died in 1884, shortly after her son graduated at the top of his class from Great Barrington High school. Although du bois had beenRead MoreThe Fallacy Of Public Education1580 Words   |  7 PagesFallacy of Public Education â€Å"Do not train a child to learn by force or harshness; but direct them to it by what amuses their minds, so that you may be better able to discover with accuracy the peculiar bent of the genius of each.† -Plato For the last several decades, there has been a great return to homeschooling. Many families have seen the need to remove their children from the public education system for a variety of reasons: for religious grounds, because of a decline of morals in the public systemRead MoreHow Has The Wearable Sculpture Of Alexander Mcqueen, Iris Van Herpen And Lucy Mcrae Influenced Contemporary Everyday Fashion2174 Words   |  9 Pages Module: ADHCOREI001AE2015/6. Date of Submission: 15/03/2016. Tutor: Katherine Wagner. Special Study Proposal: How has the wearable sculpture of Alexander McQueen, Iris Van Herpen and Lucy McRae influenced contemporary everyday fashion? Introduction: The Special Study topic I plan to construct, concentrates on the relationships between that of the art form ‘wearable sculpture’ and contemporary, everyday fashions. I will delve into each of their distinctive unique worlds and discoverRead MoreThe Red Badge Of Courage1553 Words   |  7 Pagescourage that transitions to courage that radiates. Crane rights a compelling piece that presents four central themes to the reader, that develop the main character and stick to the paradigms of the Civil War era. Crane has 4 main themes throughout his great piece of literature â€Å"The Red Badge of Courage.† Just like the title suggests one of the main themes of the novel is courage. The story is more about Henry’s conflicting ideas about courage though. Crane says â€Å"Whatever he had learned of himself wasRead MoreThe Story of My Life2883 Words   |  12 Pagesnamed John Albert Macy, who later married her first teacher and lifelong companion, Anne Sullivan. In the book Helen recounts the first twenty-two years of her life, from the events of the illness in her early childhood that left her blind and deaf through her second year at Radcliffe College. Prominent historical figures wander among the pages of The Story of My Life: She meets Alexander Graham Bell when she is only six and remains friends with him for years; she visits the acclaimed American poetRead MoreThe Epistolary Form Of Writing1926 Words   |  8 Pageswell recognised in literature and prose with many of the â€Å"Greats† of the time adopting the Epistle for their own works. Famous examples of the use of the Epistle can be found in the works of Ovid with the â€Å"Heroides†, â€Å"Trista† and â€Å"Ex Ponto† each being an individual collection of epistolary poems. An important figure in regards to the epistle is of course Horace, who published two books of epistles in 20 BCE and 14 BCE. In the first book â€Å"Epistularum liber primus† Horace includes a collection ofRead MoreThe Eras of PC Advancement1455 Words   |  6 Pagesof parallel digit plan of 0 and 1 can give to a great degree careful impacts. At any rate the issue is that they are exorbitantly direct and unequipped for broad scale numerical operation. In the cream sorts of workstations the Digital accomplices change over the straightforward signs to perform Robotics and Process control. The Mainframe Computer : These are Pcs used by immeasurable acquaintanceships like meteorological reviews and measurable foundations for performing mass numerical

Sunday, December 22, 2019

Childhood Education, Delinquency, and Life - 2845 Words

Childhood Education, Delinquency, and Life If we are to teach real peace in this world, and if we are to carry on a real war against war, we shall have to begin with the children,† Mahatma Gandhi. This is very important as we look into the life of a child. The events that are put in place for a child in its early stages, can effect who they will be years to come. The years between 6 and 14—middle childhood and early adolescence—are a time of important developmental advances that establish children’s sense of identity (Eccles). During these times the children are trying to find themselves in school, and in the home, but the three things that are stunting a great childhood are; childhood deliquesce, the care taking and education in the school system, and the child’s home life. Childhood deliquesce has been around for many years, and has grown. The arrest rate of child delinquency change between 1988 and; arrests for violent crimes increased by 45 percent (United States. U.S. Department of Justice). Many times these children don’t just start causing trouble, but they have grown into role, most often young can see this at an early age, though language, temperamental characteristics, and be disconnected to the caregivers (United States. U.S. Department of Justice). These early signs can predict the child’s later actions in life. Also, signs of a delinquent are; aggressive behavior and impulse behavior. Today, there are many aids that prevent and help children from causing harmShow MoreRelatedDangerous Classes of New York Essays1074 Words   |  5 Pagesof juvenile delinquency to the considerable range of social issues the show discusses. The Wire almost flawlessly represents the factors which cause a young person to â€Å"defect†Ã¢â‚¬â€ from the failings of the city school district, a difficult home life, or the struggle of homelessness, to the surrounding environmental influences that arise from life in the city of Baltimore. However, while The Wire and its examination of causalities does many things for the discussion of Juvenile Delinquency on the whole—takingRead MoreThe Theory And Social Control Theory1106 Words   |  5 PagesHirschi Travis Hirschi is an American criminologist who is famous for developing the self-control perspective on crime and social control perspective on juvenile delinquency. In his groundbreaking work, Causes of Delinquency, he argued out that an explanation for delinquency can be achieved by absence of social bonds. He also stated that delinquency could be prevented by social attachments, acceptance of social norms, recognizing the moral validity of law and involvement in conventional activities. In hisRead MoreThe Issue Of The Juvenile Justice System Essay1539 Words   |  7 Pagesnot been so. Despite the Constitutional vision of a healthy and happy child protected against abuse and exploitation, and a National Policy for Children, the majority of children in India continue to live without a cared, protected and meaningful childhood. The juvenile justice system as conceived by legislation aims at providing care, protection, treatment, development, and rehabilitation of delinquent and neg lected juvenile. India is a signatory to UN Declaration on The Rights of the Child, 1959Read MoreThe First National Child Protection Legislation1434 Words   |  6 PagesNeslon 2013). The express purpose was to help states implement programs to deal with the problem of child abuse (Trost 1998). Through raising awareness, there are high hopes of lowering juvenile delinquency with at-risk individuals. Children who are physically abused tend to become offenders later in life (Welsh and Farrington 2007). Child abuse was not formally identified as a medical condition until 1962, when medical professionals were eventually involved and diagnosed children with the BatteredRead MoreThe Effects Of Self Regulation On Children s Behavior1497 Words   |  6 PagesEarly negative emotionality is considered a vulnerability factor for future behavior problems, including self-regulation deficits. Temperament is progressively taken under control by self-regulatory that emerges towards the end of the first year of li fe and can be reliably measured by 18 months of age. On the opposite end of things, high levels of positive affect during infancy were associated with high effortful control in toddlers. However, this relation was inversed from toddlerhood to preschoolRead MoreThe Effects Of Delinquency On Children s Life1657 Words   |  7 Pagesmore crimes than adults, and that if we can reduce the amount of delinquency that occurs in the United States, then we will also reduce the amount of crime. To understand how to prevent delinquency, we must first understand what causes it. Delinquency can be caused by a number of factors involving the child s family, socialization, economic background and drug use. Of course, the earliest contributor to delinquency in a child s life is the family. (1) Early family dysfunction can lead to emotionalRead MoreThe Youth Through Prevention And Detection, Rehabilitation, And Establishing A Future For Juvenile Justice System Essay1428 Words   |  6 Pagesfor a given individual, make it more likely that this individual, rather than someone selected from the general population, will develop a disorder† (Mrazek and Haggerty, 1994:127) As a result of studies conducted on the juveniles impacted by delinquency, it has been determined that the factors can be placed into six bulk categories: physical factors, mental factors, home conditions, school conditions, neighborhood conditions and occupational conditions. (Bridges, 1927) Physical factors are knownRead MoreIs There A Strong Relationship Between Poverty And Juvenile Delinquency?1655 Words   |  7 PagesMandy Feldbauer Is There a Strong Relationship Between Poverty and Juvenile Delinquency? There is a lot of research in the world on whether or not poverty and juvenile delinquency are correlated. Of what I’ve seen, the studies suggest that there is, in fact, a relationship between them. Poverty is a serious issue, and it not only affects the people living in poverty, but it also affects the people around poverty-ridden neighborhoods. This study will address the issue of poverty on juveniles.Read MoreSocial Outcasts and Juvenile Deliquency Essay909 Words   |  4 Pagesoutcasts as they are simply referred to may develop a low self esteem and have a low social status. Social outcast are also hated, discriminated and persecuted by the society and as a result they may result into being depressed and lonely. Juvenile Delinquency refers some illegal and antisocial behaviors by persons who are under the age of 18 thus are minors. This means behaviors that would be regarded as crime if done by an adult. Juvenile delinquent refers to those children or adolescent who behaveRead MoreJuvenile Delinquency Is A Great Issue Essay1462 Words   |  6 PagesJuvenile delinquency has become a great issue in this country. The reasons for delinquency are many, yet the fixes to the delinquency problem are few. Not enough is being done for the youth of this country to rehabilitate, deter, or change the way the youth acts. There isn’t enough communication or interaction between the key stakeholders that can help prevent juvenile delinquency. For the longest time juvenile delinquency has been increasing despite any efforts put forth by lawmakers to deter this

Saturday, December 14, 2019

Analysis of the Modernist Design Style Free Essays

Modernism is appear in 20Thursdaycentury. And Modernism is including simple and no ornament design manner. Although this manner was appear early 20Thursdaycentury and have different interior decorators or designer have many spread. We will write a custom essay sample on Analysis of the Modernist Design Style or any similar topic only for you Order Now But still hold excessively small modern architecture physique in early 20Thursdaycentury. After World War II, they become many company and bureau. And do this manner be the top. Here have some designer is more celebrated. Walter Gropius, Ludwig Mies van der Rohe, Le Corbusier and Frank Lloyd Wright. Frank Lloyd Wright is one of the celebrated designer in early 20Thursdaycentury. He is a American Institute of Architects, interior interior decorator, Writer and Educators. His design undertaking is over 1000 and complete about five 100s. And he believes that design should accomplish harmoniousness between worlds and the environment. And it become Organic architecture. For illustration, Fallingwater is the celebrated on the universe. This design can turn out his thought. Besides this design is one of the best designer on the American. More than 70 old ages of his calling at Architects. He design different architecture. It including Office, Church, Skyscrapers, Hotel and Museum. Besides he design some furniture and stained glass. In his life he write over 20 book and article. And he is the celebrated talkers. In 1991, American Institute of Architects name Wright â€Å"The best Architect† . He designed different architecture. And his design was celebrated. For illustration, Robie House, Imerial Hotel, Fallingwater, Taliesin West, The Solomon R. Guggenheim Museum, Price Tower and Jonson Wax Headquarters. Besides his thought was affected many interior decorator. Person said how Wright work alteration American architecture, but person said â€Å"How did n’t Frank Lloyd Wright alteration architecture in America I think is truly the manner to state it because it is difficult to conceive of what American architecture would be like or even likely universe architecture without Frank Lloyd Wright. About the Organic architecture, he has a celebrated plant. It called Fallingwater. Fallingwater physique in 1934-1937. In 1991, members of the American institute of Architects named the house the â€Å" best all-time work of American architecture† and in 2007, it was ranked 29th on the list of Amercian’s Favorite Architecture harmonizing to the AIA. About the design, the form of the edifice expression natural, insouciant, stretch. Besides The chief room of the edifice with an out-of-door patio, platforms and roads, intertwined, besides obtained with the environing natural landscape with the consequence of merger. About the stuff, White concrete and rock Lashkar-e-Taiba this design expression merge in the environment. And this design is really particular. Because the platform is above the waterfall, this design in that clip is intensely. And this design was influence many designer. Besides it cause the new design manner. About the Taliesin West design, he thinks it has b een linked with the desert. So he utilize local rock and concrete. Besides the natural lighting is the chief function. Because he believes the natural lighting can allow inside the edifice connect to the exterior. His thought has affected some designer. For illustration Neville Gruzman, Kendrick Bangs Kellogg, Alvar Aalto, Nari Gandhi and Bruce Goff. All of them have build Organic architecture. Such as Neville Gruzman. Hills House and Gruzman House is the celebrated organic architecture. Besides Hills House is the work is thought of as a two 20Thursdaycentury houses: â€Å"Fallingwater† and â€Å"Farnsworth House† . And Gruzman House is use stuffs such as dark stained lumbers and natural brick. His designer is conform Wright method. About Bruce Goff, he said that his hero is Wright and Sullivan. Then he started to reach the original design. Bavinger House is important illustration of organic architecture. The house has no interior wall ; alternatively there are a series of platforms at different tallness, with drapes that can be drawn for privateness. The design usage many natural dark, make the inside country connect to the exterior. Kendrick Bangs Kellogg is an pioneer of organic architecture. In 1955, he met Wright and the brief meeting provided an inspiration. His design is non fit neatly into the same with Wright, Bruce Goff or other organic designers. His edifice are surveies of superimposed, segmented and unfolding infinite. And he design Onion house. It is a landmark of organic architecture. The design usage employs semitransparent curving roof panels. Since with no outside walls, the division between interior and exterior consists of screen or stained glass. But person possibly doesn’t cognize what organic designer is. So Wright explains that, it is term meant from nature, organic architecture was so a natural architecture. And now we eventually understand what organic designer is. And he believe good edifice is non one that hurts the landscape, but one which makes the landscape more beautiful than it was before the edifice was built. So he wants clean lines and simpleness. And disliked intricate item and irritability of the architectural manners. In add-on to organic designer, Wright steel has affected other designer. For illustration John S. Van Bergen. And his manner is Prairie manner places. About the Prairie manner. In 1909, Wright developed what known as the Prairie Style. Typical Prairie manner place is distinguished by horizontal lines on the outside, emphasized by a low-pitched hipped roof. But Wright use different colour, and allow the ceiling highs and hallway breadths to alternately compress and spread out the sense of infinite. His design went beyond the edifice to the finest inside informations of the interior infinite, include furniture, art glass and other interior design. And the celebrated prairie manner designer is Robie House. It was designed in 1908. Frank Lloyd Wright’s designs of place and edifice have inspired coevalss of designers, including most of what is called â€Å"modern architecture.† His influence is international—many other states have considered Frank Lloyd Wright’s designs as a major templet of their modern-day manners. More than 30 provinces in the United States possess Frank Lloyd Wright constructions and most architectural critics agree with that every province in the state has edifices that reflect Wright’s manner. Presents, when human want to develop something else, and they will destruct the natural. So they must retrieve that Wright has said the human existences and nature can conexist. And it is of import, even he is gone, but his architectural theory still affected other interior decorator. But person think he was chesty adult male. Because he want to allow his ain considerable on his clients. For illustration, Fallingwater. The design is particular and advanced. But despite there may be dangers he still carry out his out his design. I think his behaviour is right. Because if one’s creativeness is easy affected by the others, so that one is non a qualified interior decorator. Plagiarism:24 % hypertext transfer protocol: //encyclopedia.jrank.org/articles/pages/6404/Wright-Frank-Lloyd.html hypertext transfer protocol: //freshome.com/2012/09/03/10-great-architectural-lessons-from-frank-lloyd-wright/ hypertext transfer protocol: //translate.google.com.hk/translate? hl=zh-TW A ; sl=en A ; u=http: //en.wikipedia.org/wiki/Frank_Lloyd_Wright A ; prev=/search % 3Fq % 3Dfrank % 2Blloyd % 2Bwright % 2Binfluences % 2Bon % 2Barchitecture % 26sa % 3DN % 26biw % 3D1367 % 26bih % 3D840 hypertext transfer protocol: //en.wikipedia.org/wiki/Bruce_Goff hypertext transfer protocol: //en.wikipedia.org/wiki/Neville_Gruzman hypertext transfer protocol: //en.wikipedia.org/wiki/Kendrick_Bangs_Kellogg hypertext transfer protocol: //www.distinctbuild.ca/neville_gruzman_architect.php How to cite Analysis of the Modernist Design Style, Essay examples

Friday, December 6, 2019

European Union Agency for Network and Information Security

Question: Discuss about theEuropean Union Agency for Network and Information Security. Answer: Introduction Overview of Case Study ENISA stands for European Union Agency for Network and Information Security and is a centre of network and information security expertise. The case study on current threats and ENISA Technology Landscape (ETL) was published in the year 2014. This landscape was first published by ENISA and due to this reason there were a lot many impressive changes that were seen in association with the top threats that were involved. Controlled security architecture was presented along with an amalgamation of stronger law enforcement operations. However, in spite of the ETL, there were a number of occurrences of security threats and attacks. Secure Socket Layer (SSL) and Transport Layer Security (TSL) faced a lot of stress due to the demand and the requirement of the security mechanisms to be installed. There was also a massive increase in the cases of data breach and physical violations that were seen commonly. The case study covers the top threats that were seen in the year 2014 and the detailed de scription of each of the threat such as malicious codes, botnets, span, phishing, data breaches, insider threats and many others. There are a number of threat agents that are involved with all of these threats and the same have also been discussed in the report. Attack vectors and the emerging threat landscape in association with the emerging technologies such as mobile computing, cloud computing, big data and many others has also been highlighted in the case study. Internet of Things (IoT) and network virtualization are the two emerging technologies that are on a rapid rise and the landscape that is required to be designed to control the security threats associated with these concepts has also been covered in the case study of ENISA (Enisa, 2016). Enisa Security Infrastructure Diagram There are a number of threats that are associated with ENISA and these threats are brought to the component through a number of different agents. The security infrastructure that is necessary to be implemented in ENISA must take care of all the levels that are involved in terms of the varied threat agents in terms of nation states, social hackers, employees, cyber criminals, cyber terrorists and many others. The security infrastructure diagram that is depicted below for ENISA deals with all of these agents and the threats that are present and provides a mechanism to deal with them. ENISA Security Infrastructure Diagram Strategies to Combat Insider Threats There are a number of insider threats that are included in the top threats for ENISA in the year 2014. These threats are of significant concern for the technical experts as well as the executives. The following strategies can be applied to control and prevent the insider threats. Technological solutions that are designed for fighting with the security threats must be bundled up together with the policies associated with the resources and the projects going on in a particular organization. The behavior of the people must be tracked and recorded and a dedicated team must be employed for the same. Patterns and specific activities of dissatisfaction or rage must be given due attention. These threats are mainly executed due to the user error. It is therefore necessary to organize and conduct user trainings to allow the people to understand the system in a better manner so that there are no mistakes and errors performed from their end. Security awareness training, system trainings and likewise must be provided to the people (Musthaler, 2016). Logging, monitoring and auditing are the activities that must be executed at frequent intervals to make sure that there are no deviations internally. There are also occurrences wherein the access is not deactivated even after the termination of the employees. Such incidents should never occur and it must be ensured by the security team to deactivate the access as soon as the employee leaves the organization (Cert, 2016). Most Significant Threat Out of the top threats that have been listed, data breaches are the most significant out of all. It is because of the reason that these attacks for a major part of the entire number of attacks that took place in the year 2014 and also they have the potential and capability to cause a significant impact on the victim. There are a number of organizations and agencies that are looked upon by ENISA and the data and information that is present with each of the entity can be classified in a number of types (Ko Dorantes, 2016). The data and information that is associated with these entities can be public, private, confidential or sensitive in nature and data breach of any kind and strength violates the confidentiality, integrity and availability of the same. As per the data that has been recorded in the case study, most number of data breaches have took place in the field of health care. Health information of an individual is considered to be private and violation to the privacy of the sam e can result in legal punishments and policies. The impact of these data breaches is huge and includes a wide variety of penalties and punishments in terms of the legal and regulatory laws that govern a particular piece of information (Amato, 2016). Threat Agents and Steps to Minimize their Impact There are a number of threat agents that are involved in the execution of the top threats that have been listed in the case study. These threat agents are: Cyber Criminals: these are the agents that perform malicious activities in the cyber space and have a malicious intent to gain profits through unauthorized and illegal activities. These agents are highly skilled and capable to execute the threats. Online social hackers: These are the agents that execute the social engineering attacks and their capabilities can be classified as low to medium as far as technology is concerned. Hacktivists: These are the agents that execute the threats due to political motivation that is involved with them. Nation States: A number of nation states have developed the cyber intelligence capabilities to give rise to a number of top threats. Employees: An Insider threat that occurs and forms a significant part of the top threats is performed by these threat agents who may be internal employees, ex employees or external employees for a particular organization. Cyber Fighters and Cyber Terrorists: These are the threat agents that give base to some of the severe damage causing cyber attacks and threats (Casey, Koeberl, Vishik, 2010). The impact that is caused by these threat agents can be controlled by specific security mechanisms that must be designed to put a stop to the activities of the agents. These security mechanisms can include basic methods such as incident management, access management, physical security, firewalls, anti-malware software to advanced security measures such as cryptography, encryption, law enforcements and many others. Social Hacking Issues Social hacking is a form of security attack that is executed by the social hackers as the agents of the threats and includes the attempt to alter the social behavior of a user through a number of different means and techniques. The present era is the era of social media and the presence on this platform is almost a mandate for every single individual. The social hackers gain advantage through this phenomenon by performing dumpster diving in which the discarded user profiles and data is accessed to retrieve important information and patterns such as user name, contact information, email address and likewise. Role-playing is also a common form of the social hacking issue that includes the impersonation of a particular user or organization on a social platform to gain information. Social hacking has come up an easy way to breach the internet and network security as the presence of the users on the platform is massive and it becomes easier for the hackers to retrieve significant informat ion through a number of mechanisms. The impact of these social hacking issues can be moderate to extremely severe as these have the potential to gain sensitive and confidential information through the medium. Such unauthorized mechanism of gaining the information can then be misused by the social hackers (Wood, 2016). Trends in Threat Probability Table 2 displays the comparison between the threat landscape in the year 2013 and the year 2014. Threats such as malicious codes, web based attacks, injection attacks, denial of service, phishing, data breaches, theft, information leakage, and fraud and cyber espionage are on a rise. There has been a decrease in the threats such as spams, botnets, ransomware and explore kits as compared to the year 2013. The threat probability can thus be defined on the basis of the threats that are on a rise and are on an ever increasing pace. The increase in probability of such threats is due to the advance measures that have been devised by the attackers in association of these threats. Web based attacks can be easily executed as there is such huge amount of information and data that is present on the web based platforms. Also, malicious codes have existed since a lot many years and it has become easier for the attackers to inject the same through network as a medium that gets downloaded on the ma chine of the victim. Denial of service is also a common attack that is executed by flooding a network with huge amount of unnecessary traffic so that the service becomes unavailable as a result. It can therefore be devised that the probability of the threats is maximum in terms of web based, data breaches and physical security threats (Nichols, 2016). Improvements in ETL Processes ETL process could have been improved by including the advanced security mechanisms in the security infrastructure. There are a huge number of components and applications that are involved with ENISA and in spite of the security architecture and structure that is followed; there are frequent threats and attacks that are seen. It is prescribed to incorporate the propelled security countermeasures in the ETL procedures. Encryption is one of the key measures that ought to be embraced to maintain a strategic distance from and keep all the security dangers that are connected with the frameworks. Encryption of information very still, information in-movement and the information of the applications is a must. Sharing of information on the interpersonal interaction applications or by means of Bluetooth is a typical system that is taken after. Utilization of un-secured applications ought to be ceased from the client's end to keep away from the dangers that happen amid data sharing. Utilization of gadget passwords, for example, swipe design, pin lock or watchword to ensure the gadget ought to be empowered at all times. Passwords can likewise be put on the applications. Auto-wipe is another measure that ought to be empowered which wipes off the information after a specific number of fizzled endeavors. Testament based character and utilization of bio-measurements likewise empower appropriate realness and approval. It is also necessary to include the review, scans and monitoring of the processes and components that are involved to make sure that the security threats do not occur. There must be a set of processes in the order as basic, standardized, rationalized and dynamic that must be included (Microsoft, 2016). Challenging Threats for ENISA There are a number of security threats and challenges that are seen in the current era and there is a big list of threats that will come up as serious concerns for ENISA to battle with. These threats are classified in three broad categories as confidentiality threats, availability threats and integrity threats. Availability threats are the ones that have the potential to negatively impact the availability of a particular service such as denial of service, account hijacking, theft and fraud. Integrity threats include the unauthorized modification or alteration of the information that is associated with a particular service or application. Malicious codes, message alteration and media alteration are the integrity threats that can be difficult to battle with as these can be introduced in the system through a number of different sources. Confidentiality threats such as data breaches, information leakage, insider threats and phishing can also be difficult to deal with as they have expande d to a huge number of systems and applications (Panetta, 2016). IT Security State of ENISA ENISA should not be satisfied with its current state of IT security. There are a number of reasons that support the statement. The first and foremost in the increase in the number of threats that has been seen in the year 2014 in spite of a number of security control and prevention measures that have been taken. Also, there are a number of new threats and attacks that are being developed on a frequent basis. There are still no countermeasures that are available with ENISA to deal with them that emerges as a huge security loophole in the present state of IT security. There are also a number of threat agents that have been discussed and described in the case study. These threat agents have the ability to impact the security architecture and the information that is present with the applications, components and systems associated with ENISA. There are a huge number of different entities that are associated with ENISA and it is necessary to design security measures and policies that go ha nd in hand with the requirement of each of the system (Aws, 2016). There must be advanced security measures and mechanisms that must be adopted in addition with the security processes to develop the state of IT security in the entire infrastructure. References Amato, N. (2016). The hidden costs of a data breach. Journal of Accountancy. Retrieved 20 September 2016, from https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html Aws,. (2016). Overview of Security Processes. Retrieved 20 September 2016, from https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf Casey, T., Koeberl, P., Vishik, C. (2010). Threat agents. Proceedings Of The Sixth Annual Workshop On Cyber Security And Information Intelligence Research - CSIIRW '10. https://dx.doi.org/10.1145/1852666.1852728 Cert,. (2016). Insider Threat Best Practices. Retrieved 20 September 2016, from https://www.cert.org/insider-threat/best-practices/ Enisa,. (2016). ENISA draws the Cyber Threat Landscape 2014: 15 top cyber threats, cyber threat agents, cyber-attack methods and threat trends for emerging technology areas ENISA. Enisa.europa.eu. Retrieved 20 September 2016, from https://www.enisa.europa.eu/news/enisa-news/enisa-draws-the-cyber-threat-landscape-2014 Ko, M. Dorantes, C. (2016). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. Retrieved 20 September 2016, from https://jitm.ubalt.edu/XVII-2/article2.pdf Microsoft,. (2016). Microsoft Core Infrastructure Optimization: IT Security Processes - Best Practices for Business IT. Microsoft.com. Retrieved 20 September 2016, from https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx Musthaler, L. (2016). 13 best practices for preventing and detecting insider threats. Network World. Retrieved 20 September 2016, from https://www.networkworld.com/article/2280365/lan-wan/13-best-practices-for-preventing-and-detecting-insider-threats.html Nichols, A. (2016). A Perspective on Threats in the Risk Analysis Process. Sans.org. Retrieved 20 September 2016, from https://www.sans.org/reading-room/whitepapers/auditing/perspective-threats-risk-analysis-process-63 Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. Smarter With Gartner. Retrieved 20 September 2016, from https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/ Wood, P. (2016). Social hacking: The easy way to breach network security. ComputerWeekly. Retrieved 20 September 2016, from https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security