Monday, December 30, 2019

The Death Of The Street - 701 Words

It was nine o’clock although it could have been midnight. The main street was deserted except for a man pulling his bull terrier away from the base of a lamp post. An ambulance siren wailed in the distance. Occasionally, a car hissed past spitting up spray. Persistent winter rain permeated my fur coat, saturated my hair and drooled down my face into my scarf. I was cold wet and eager to get indoors. Long dark and menacing. Though dark, the alley lured me in with the promise of a speedy arrival home. Momentarily I hesitated at its entrance. A hundred yards away stood a single street lamp that offered a dim amber light at the alleyway’s turning. The pole of the street light had been defaced with rude drawings of body parts and derogatory words. My gut feeling told me to leave this unfamiliar alley - and quickly. but down the alley, past the turning and another 20 yards and I would be home. 120 yards and 3 minutes rather than 300 yards and 10 minutes. Although I was hesita nt I took the first step into the alley as warmth and dry clothes beckoned. I walked on in fear. As I proceeded into the alley the weeping trees poked at my neck and snagged at my hair. Sounds of the unknown rustled through the overgrown bushes that had become infested with sweet wrappers and empty beer cans. The wind blew hard carrying an old crisp packet from one overgrown bush to the next. Embedded in the bushes was a long piece of white and blue tape that blew in the violent wind. It had been impaled by aShow MoreRelatedThe Death Of The Manhattan Street Apartment914 Words   |  4 PagesOn september 9th 2015, at or about 0635 hours at the location of 2522 lincoln street apartment #336(crime location) which is located within the jurisdictional limits of the city of hollywood, within broward county and the state of florida the above named defendant did commit a battery upon the victim herein identified as antoinette reynolds. Reginald newsome did intentionally touch or strike antoinette reynolds against her will to wit; striking antoinette reynolds with an open hand, which madeRead MoreThe Death Of The Cold Streets Of Manhattan1553 Words   |  7 Pages Happily ever after Scars on his face and bruises on his body. He continues to walk the cold streets of Manhattan. Little does he know, the pain and suffering will not stop anytime soon. Around the corner is a man who is looking for somebody to rob. This man was fired from his job, and was tragically sexually assaulted all in a single week. Some people might say these two men s lives are equally miserable. I happen to be one of those people. But to be able to make a decision like that, one wouldRead MoreThe Death Of Wyoming And Its Effects On The Street Today1862 Words   |  8 PagesWhen you hear the word â€Å"war† you think of a battlefield overseas. In your head, you see guns being fired and bombs blowing up but you don’t see the small towns of Wyoming. Heroin is becoming one of the deadliest and fastest growing drugs on the street today. We the people of Wyoming would never of thought that we would have a drug problem such as heroin but we do. It has claimed the lives of many people every day by just trying it once or the drug taking their life this includes one of my close friendsRead MoreThe Death Of The Notorious Pyro Street Gang881 Words   |  4 Pagesdrugs, and gangs. The reality of my situation is, that six incredibly short years ago, I was on the fast track to destruction. As a young black teen surrounded by perturbed peers, I felt safer identifying with the streets. More specifically, those affiliated with the notorious Pyro Street Gang. It was almost mandatory to surround yourself with contemptible groups in Newark, the nation’s most gang populated city. To do the opposite was risky and extremely irrational; protection was imperative for survivalRead MoreThe Pros And Cons Of Death In Leece Street1058 Words   |  5 PagesIn Leece Street part of the club district of Liverpool, a large crowd had gathered outside bar thirty-six an argument between three men and two others had broken out every now and then a glimmer of moonlight shined of a knife held by one of the two men in the argument. It was the early hours of the morning the temperature in Liverpool was just above freezing, but with a biting chilly wind of its coast, making its way into Liverpool on the river Mersey it made it feel below zero. â€Å"How the fuck didRead MoreEssay on Death of a Salesman and Street Car Named Desire4007 Words   |  17 PagesBiff: â€Å"will you take that phony dream and burn it before something happens† Compare how the authors of Death of a salesman and â€Å"street car named desire explore the conflict between truth and illusion Truth and illusion are utilized in Tennessee Williams â€Å"Streetcar Named Desire† and Arthur Millers â€Å"Death of a salesman† through the use of the character; to lead the reader to a possible conclusion on the beliefs that went into the American dream that prompted people to work hard was that americaRead MoreShort Story Report747 Words   |  3 PagesFriday, June 17th, 2018 at 2:53 pm on Winston Street, a truck of his company would cause his certain death. â€Å"Jameson, I would like you to be the manager of our new project- repair the old community centre across Winston Street.† My manager had announced the leader of the final project in 2017. Considering how crappy the building was, a successful repair before the deadline would get me thousands of dollars. The rest of my co-workers clapped, but I was reluctant to accept the job. My co-workers andRead MoreThe Epidemic Of John Snow And Henry Whitehead1261 Words   |  6 Pagesemptying the waste, merely discarding it into gutters in the streets. These gutters were typically emptied at night, however the task became especially difficult as the population grew, and keeping up with the amount of waste became similarly problematic. Often these drains would overflow and eventually the decision was made to dump the excess waste into the nearby river, the Thames . Combined, these factors led up to the Broad Street outbreak of cholera in 1854 London. This epidemic was massiveRead MoreEs say about Brent Staples A Brothers Murder741 Words   |  3 Pagesaccount of murder within the streets caused by social placement to illustrate the problem within the lower class. After reading this article, I questioned the stability of our society, and the overall severity of this problem of murder in the streets. nbsp;nbsp;nbsp;nbsp;nbsp;The inner streets of our nations cities have, over the years, proven to be war zones. Gangs are roaming the streets to protect their territory, making gunplay an everyday task. The smell of fear, death, and misguided souls reekRead More Montags Influences in Farenheit 451 Essay1280 Words   |  6 PagesThe strongest influences in Montag’s life are Clarisse, the burning on 11 Elm Street and Captain Beatty. Firstly, Montag is influenced by Clarisse McClellan because she is the first person he has met that is not like the rest of the society. Clarisse is a young 17 year old girl that Montag quickly becomes very fond of. Clarisse influences Montag by the way she questioned Montag, the way she admires nature, and her death. Clarisse first influenced Montag by the way she began questioning him often

Sunday, December 22, 2019

Impacts of Technology Dependency on the Academic...

CHAPTER 1 INTRODUCTION Technology is a gift of God. After the gift of life it is perhaps the greatest of Gods gifts. It is the mother of civilizations, of arts and of sciences. - Freeman Dyson Technology plays an important role in every sphere of life. It has certainly changed the way we live in different aspects of life and redefined living. Several sectors like medicine, warfare, transportation and navigation, business, economy, and even in education particularly in science and mathematics. Manual tasks can be automated, complex and critical processes can be carried out with ease and efficiency with the help of modern technology. Each fields have undergone a major change and sure, they have changed for the better. High†¦show more content†¦2. Through the thorough assessment and evaluation of the survey results, the school departments may then improve program and services which appear ineffective, strengthen areas which have significantly contributed to the academic development of the students in the university, and impose to the students the information sent and the proper use of this technology. 3. By carefully considering the opinions and suggestions of the targeted students solicited through the survey, the departments may consider implementing the use of these technologies on their teaching strategies, learning environment and the interaction between the teacher and the students. 4. Moreover, this survey and the action undertaken as a result of the assessment and evaluation of the survey will promote a deeper understanding of the negative and positive impacts of technology dependency of the students on their academic development and the relationship of technology and education of college students to the development of their behavior, social awareness, lifestyle and most especially on their academic performance which the study focuses to. Definition of Terms This section aims to define or explain some ambiguous terms used in the report. These terms are listed below with their corresponding definitions. Technology is the making, usage and knowledge of tools, techniques, crafts, systems or methods of organization in orderShow MoreRelatedQuality Improvement328284 Words   |  1314 PagesProfessor of Engineering. He received his B.S., M.S., and Ph.D. degrees from Virginia Polytechnic Institute, all in engineering. From 1969 to 1984 he was a faculty member of the School of Industrial Systems Engineering at the Georgia Institute of Technology; from 1984 to 1988 he was at the University of Washington, where he held the John M. Fluke Distinguished Chair of Manufacturing Engineering, was Professor of Mechanical Engineering, and was Director of the Program in Industrial Engineering. Dr.Read MoreIntroduction to Materials Management169665 Words   |  679 PagesA. de C.V. Pearson Education Malaysia Pte. Ltd. 10 9 8 7 6 5 4 3 2 1 ISBN-13: 978-0-13-233761-8 ISBN-10: 0-13-233761-4 From the Library of Girro@qq.com PREFACE Introduction to Materials Management is an introductory text written for students in community colleges and universities. It is used in technical programs, such as industrial engineering and manufacturing engineering; in business programs; and by those already in industry, whether or not they are working in materials management

Saturday, December 14, 2019

Information Literacy †What does it mean Free Essays

The 21st century has been defined as the â€Å"Information Age† due to the fact that there has been an overwhelming amount of â€Å"information output and information sources.†Ã‚   (ACRL, 2006, p. 1)   In a report released in 1989 by the American Library Association’s Presidential Committee on Information Literacy stated that, â€Å"No other change in American society has offered greater challenges than the emergence of the Information Age. We will write a custom essay sample on Information Literacy – What does it mean? or any similar topic only for you Order Now † (Association of College Research Libraries, 1989, n.a).   In order to combat the growing need for students to adapt to this age of information, professionals began working towards providing an educational environment that focuses on information literacy. To define Information literacy and narrow it down to one specific interpretation would be impossible, as it has been defined in a variety of ways since 1970.   To offer a broad definition, the American College of Research Libraries defines it as, â€Å"the set of skills needed to find, retrieve, analyze and use information.   (ACRL, 2006, p. 1) Christina Bruce, has also defined information literacy as â€Å"the overarching literacy essential for 21st century living.†Ã‚   (Bruce, 2004, p. 2) A number of professionals continue to develop strategies and policies that will enhance the area of information literacy and enable educators to assist students as they take advantage of the information and communication avenues available to them.   (Bruce, 2004, p. 2) Christina Doyle was the first to introduce the Delphi technique into the realm of information literacy, in her 1992 study where a national panel of experts from the National Forum of Information Literacy conducted a study that took a deeper look into the National Education Goals.   (Doyle, 1994, p. 21) This technique was used to reach an agreement among professionals that â€Å"information Literacy is the ability to access, evaluate and use information from a variety of sources.†Ã‚   (Doyle 1992).   The outcome of this study defined the framework to show the critical nature of information literacy and the importance of working to create an information society. (Doyle, 1994, p. 21) The goals established by this committee lead to â€Å"successful education and employment for all Americans.†Ã‚   (Doyle, 1994, p. 21) Since 1980, a variety of information literacy skill models have been developed by educators, national and state organizations and national associations dedicated to information literacy.   These models are designed to support student educators as they attempt to integrate information into their classrooms, assist school librarians as they attempt to provide leadership in the school system, and to assist professionals as they attempt to stay in tune with technology advancements.   (Stripling, 1999, p. 54)   These models provide educators the means to teach students a series of processes and steps to follow as they evaluate and process information.   (Bruce, 2004, p. 3) Perhaps one of the most popular models is the Eisenberg and Berkowitz Big6 model.   Eisenberg and Berkowitz define their approach as, â€Å"a systematic approach to information and problem solving.†Ã‚   (Eisenberg Berkowitz, 1990, p. 1)   They also believe that through the model’s evolution that it has developed two additional definitions – â€Å"2) six broad skill areas are necessary for successful information problem solving. Students need to develop a range of competencies within each skill area. 3) a complete library and information skills curriculum are necessary.   Often referred to as a scope and sequence the Big Six Skills offers a systematic alternative to traditional K-12 frameworks that focus on location and access skills.†Ã‚   (Eisenberg Berkowitz, 1990, p. 1)     Ã‚  Ã‚  This approach has been widely accepted and implemented by many schools. Another model used to shape the way that students obtain and evaluate information is the Stripling and Potts Research Process Model.   It was originally developed in 1988 and was widely accepted â€Å"because it provided a guide through each state of creating a research paper.†Ã‚   (Reidling Eisenberg, 2002, p. 7)   Stripling and Pitts suggest that students follow a 10 step research process within a outline that shows the student how information literacy skills build upon each other.  Ã‚   (Reidling Eisenberg, 2002, p. 7) Research continues to progress in the area of information literacy, as information and technology continue to advance.   Education requires a learning model that is based upon the foundation of the real world – a model that is active and incorporated with reality, rather than separated.   (Association of College Research Libraries, 1989, n.a).   For this reason, information literacy is a means of personal empowerment. It allows people to verify or refute expert opinion, and to become independent seekers of truth. (Association of College Research Libraries, 1989). But how much information is too much? In business, Herbert E. Meyer, who has served as an editor for Fortune magazine and as vice-chairman of the National Intelligence Council, describes in his 1988 book, Real World Intelligence (2), the astonishment and growing distress of executives who `are discovering that the only thing as difficult and dangerous as managing a large enterprise with too little information is managing one with too much` (Meyer, 1987 p.29).   Meyer does, however, go on to stress that companies should focus and rely on public sources that are available to them for a great deal of their information.   (Meyer, 1987 p.36). It is important that a focus is placed upon differentiating between information literacy and information technology.   Information technology skills â€Å"enable an individual to use computers, software applications, databases, and other technologies to achieve a wide variety of academic, work-related, and personal goals.†Ã‚   (American Library Association, 2000, p. 3) Information literacy is, â€Å"a set of abilities requiring people to ‘recognize when information is needed and have the ability to locate, evaluate and use effectively the needed information.†Ã‚   (American Library Association, 2000, p. 2)   Information literacy consists of more than searching through library reference materials – it’s a goal for learners and does not consist of just one technique or method.   (Gilton, 1994) The traditional way of library research is being abandoned as our society turns to the Internet for electronic resources.   Ã¢â‚¬Å"Increased access to technology has altered the way that students study, while the variety of electronic information resources has widened the potential resource base for all students.† (Orr, Appleton, Wallin, 2001, p. 457) Approximately 75% of schools today have internet access and it is quickly becoming an important teaching tool in the educational classroom. (German Bartolo, 2001, p. 1)   Multiple studies have been done showing the impact that the Internet is having on students.   It has been shown that 20 % of the college students do not make any judgment about the quality or reliability of the information that they obtain from the Internet or other sources. (Zabel, 2004, p. na) With the onset of the Internet and the challenge it has posed on the information literacy curriculum, professional organizations are partnering with educators to work with students in educational systems of all levels.   Austin Peay State University’s Woodward Library was one of 23 universities that created a program to assist students to â€Å"evaluate information available on the World Wide Web.†Ã‚   (Austin Peay State University Quick News, 2001, p. na) This venture supporting the tactics of Information Literacy was supported by the Association of College and Research Libraries and funded through the federal Institute of Museum and Library Services National Leadership Grant.   (Austin Peay State University Quick News, 2001, p. na) In an effort to support the importance of Information Literacy, efforts are being made to create evaluation tools for both students and educators to enable both to use the internet as an effective resource.  Ã‚   Project 2061, a project sponsored by the American Association for the Advancement of Science, has been created to reinforce the methods of information literacy in the area of science and mathematics.   (German Bartolo, 2001, p. 1) Information literacy is challenged by the constantly changing environment of the Information Age.   The challenge of education is to continue to develop â€Å"creative and rational thinkers who can solve problems and who can be reflective.†Ã‚   (Doyle, 1994, p. 44)   The Big6 approach to information problem solving is still the most widely used model to reinforce and teach information literacy, as approximately 84,000 teachers have been trained in the program. (Serim, 2002, p. na) Both national and international organizations are reacting to the digital age and the implications on education by designing effective intervention programs and methods.   (Serim, 2002, p. na) Though there is a great deal of work yet to be done, the foundation and practices of information literacy provide an environment where students can strive to meet the challenge. References Acrl. (2006, August 28). Association of College and Research Libraries. Retrieved from http://www.ala.org/ala/acrl/acrlissues/acrlinfolit/infolitoverview/introtoinfolit/introinfolit.htm#what Ala. (2000). Information Literacy Competency Standards (Publication). Chicago, IL: Association of College and Research Libraries. American Library Association. (2000). Information Literacy Competency Standards (Publication). Chicago, IL: Association of College and Research Libraries. Austin Peay State University Quick News. (2001, July 30). APSU works on information literacy. Austin Peay State University Quick News. Retrieved from http://www.apsu.edu/quicknews/2001/0730/literacy.htm Bruce, C. S. (2004). Information Literacy as a Catalyst for Educational Change (Rep.). Yeppoon, Queensland: Queensland University of Technology. Chisholm, M. (1989). Presidential Committee on Information Literacy: Final Report (Rep.). Washington, D.C.: Association of College and Research Libraries American Library Association. Doyle, C. S. (1994). Information Literacy in an Information Society: A Concept for the Information Age. Syracuse, New York: ERIC Clearinghouse on Information Technology. Eisenberg, M. B., Berkowitz, R. E. (1990). Information problem-solving: the big six skills approach to library information skills instruction. Norwood, New Jersey: Alex Publishing Corporation. German, L., Bartolo, L. M. (2001). Science and Information Literacy on the Internet: Using the Standards Created by the Association of College and Research Libraries and Project 2061 to Create a Science Web Page Evaluation Tool (Rep.). Denver, Colorado: Association of College and Research Libraries. Gilton, D. L. (1994). A World of Difference: Preparing for Information Literacy Instruction for Diverse Groups. MultiCultural Review, 3, 54-62. Orr, D., Appleton, M.,   Wallin, M. (2001). Information literacy and flexible delivery: Creating a conceptual framework and model. Journal of Academic Librarianship, 27, 457-463. Reidling, A. M., Eisenberg, M. (2002). Learning to Learn: A Guide to Becoming Information Literate (Teens the Library Series). New York, New York: Neal-Schuman Publishers, Inc. Serim, F. (2002, May/June 10). The Importance of Contemporary Literacy in the Digital Age: A Response to Digital Transformation: A Framework for Information Communication Technologies (ICT) Literacy. The Big6: Information Skills for Student Achievement. Retrieved from http://www.big6.com/showarticle.php?id=157 Stripling, B. K. (1999). Learning and Libraries in an Information Age: principles and practice. Englewood, Colorado: Libraries Unlimited. Zabel, D. (2004). A Reaction to †Information Literacy and Higher Education. Journal of Academic Librarianship, 30, 17-21.       How to cite Information Literacy – What does it mean?, Essay examples

Friday, December 6, 2019

National Committee and Root Analytics †MyAssignmenthelp.com

Question: Discuss about the National Committee and Root Analytics. Answer: Introduction: The data security breaches have advanced at such a arte that it seems to be almost impossible for the data to be kept unprotected for a single moment also as the hackers are always on the look about for such a situation wherein they can enter the system of companies and steal crucial information which would hamper them. In the year 2016, the Republican National Committee hired Deep Root Analytics , a data analytics company to collect crucial political data with regards the voters in the USA (Daitch, 2017). Chris Vickery who was working as a cyber risk analyst found out that the crucial and critical data that was gathered by Deep Root Analytics i.e. basically comprised of private information for nothing less than 200 million citizens of America was stored on an Amazon Cloud server and that too without any protection such as passwords or any such authentication for over a fortnight in the month of June 2017. The examination of the situation has confirmed that the data that has been leaked comprises of names, addresses, phone numbers, date of birth and Voter registration numbers that were mentioned in the Voter Ids of the voters(Newman,2017). On doing a complete examination of the said case, it is understood that the main reason behind the attack was Deep Root Analytics themselves and he negligence act conducted by them of storing data on the cloud without protecting the same. The researcher, Chris Vickery had found out that there was a flawed database which comprised data of almost all the voters who were registered and which was gathered by the said analyst. The main issue here was absence of any password which would help protect it from access from unwanted people. However since the same was missing thereby anyone with an internet connection could gain access of the information and thereby tamper it. Around a terabyte of data was breached due to negligence (Bertrand, 2017). The issue here was also that various files that were exposed had not originated from Deep Root. They are the total of outside data entities and organizations and Republican super PACs , which basically puts the attention onto the ever increasing dat a network and that had supposedly lent a helping hand to the current president of US, slender limits in key swing rates. Even though the data possessed by Deep Root contained facts and figures typical of any political campaign, yet the fact that it is crucial for immoral and malicious individuals and groups cannot be ignored (Cameron Conger, 2017). The said issue propelled when the firm had updated their security settings early in the month of June 2017. Thus the main issue that can be understood from this kind of a data breach is that the analyst firm had obtained data from various other companies which contained data such as the type of campaigning that would help the President win the elections, the cost attached with the same, the kind of voters available etc. the files exposed were critical as they were data on the Democratic Senatorial Campaign Committee, Planned Parenthood and the American Civil Liberties Union (Walsh, 2017). The data breached also comprised of the preferences of the voters such as stem cell research and gun control. Thereby it can be rightly said that the carelessness on the part of the company made many people pay a price for it and that too the information was sensitive enough from the political perspective as well (Matthews, 2017). Solutions to Prevent Such Hacks Solutions are many which would help protection of such carelessness again in future. One of the most important was to ensure that if any updates have to be run on any previous data stored, then it is a necessity to ensure that adequate safeguards are installed. Even though Deep Root Analytics have assumed full responsibility for the occurrence of the breach, they have immediately on being aware of the same, have updated their security settings so that no further loss occurs. However, there should also be a system wherein after any updates being done, the system should by itself prompt about the lack of passwords or weak passcode. This would help protection as well as dealing with such a negligence in future as well (Lapdwsky, I2017). This is basically human error which can occur anytime, but such an error can be very disastrous for the whole country as it may lead to development of terrorism to a greater scale, hence these data analytics companies should either destroy off the data a fter the work is over or ensure security is not lacked at any moment whatsoever. There on a concluding note, it is understood that the staff of Deep Root Analytics were very careless and had a negligent attitude which led them to forgetting of checking the security settings once the system was duly updated. Storing any data in cloud definitely provides more space to the organizations, but at the same time they end up exposing the same to a huge arena of hackers who are always on the verge of stealing data and tampering them or playing unwanted games with the information. Deep Root Analytics although has presently taken care of the same and also confirmed that as per them not much of tampering have been done, yet they should ensure that the person behind the same should be thoroughly trained again. A world-wide ransomware attack with the help of attacking equipments extensively alleged by researchers to have been formulated by the US National Security Agency impacted the NHS in a negative sense, strike worldwide transporter FedEx and tainted PCs and laptops in nearly about more than a hundred countries. The number of computers being infected by the attack has crossed 300,000 and Russia, Taiwan, Ukraine and India being the top most amongst them whose computers were the most infected by the WannaCry as per the data released by Czech security firm Avast (Graham, 2017). The main issue that can be understood with regards this particular attack was the fact that it was not an attack on any particular company or country but the same was on a much larger scale wherein more than a hundred were infected. The ransomware was named as WannaCry also popularly known as WanaCrypt0 or 2.0, WannaCry and WCry. The main trick used by the attacker was that of phishing wherein the virus is sent to various computers with the help of emails and it contains such data that misleads the recipient and he or she ends up opening the given attachments, which thereby further attacks the systems as the attachments basically contains malicious files. Another very crucial issue here was that once the system gets infected, a payment is asked for cleaning the same up and giving the access back to the users but at the same time there is no conformity to the access even after payment. The attack had spread like a fire and one of the biggest in history which made it difficult for the defenders to safeguard the computers of lakhs across the globe at a faster pace. It was not only restricted to only one country or continent (Hern, Gibbs, 2017). The visibility of the attack was so widespread that there has been a lot of hue and cry. The worst impact of this attack has been seen in Britains NHS. Hospitals and GP surgeries in England and Scotland were among at least 16 health service organizations hit by a ransomware attack. The malware that was used here was named as Wanna Decryptor. The employees and the workers were asked to switch over from the systems to manual way of working i.e by using pen and paper and also increased the usage of ones own cell phones since the attack has had an impact on various main systems which included landlines as well. Unfortunately the suffering and the ailing patients were forcibly sent back who were ready for major surgeries in the hospitals in various parts of England. Various appointments were also cancelled after such a horrendous attack which ended up messing and scuttling of information stored on various systems. Unfortunately, health facilities being one of the most crucial for any country, there people were asked to demand and look for a medical help only in case of emerge ncy due to the attack and the impact of it being so deep (BBC News 2017). Till present day, the most infected countries by the said malicious software is Russia, where the Interior Ministry was attacked and three more countries as per Czech Security i.e. Taiwan, India and Ukraine. Another very major company which was infected was FedEx Corp, whereas a telecommunication entity named Telefonica in Spain was also infected although it was confirmed by them that the attack had not infected all the systems and only a few were impacted and none of its clients or any of the services being provided to them were affected in any manner. Further two more companies in the same segment, Portugal Telecom and Telefonica Argentina also said that they were also amongst the ones who were infected by the attack (Wong, Solon, 2017). Surprising the said attack was not carried out in any special manner, but to the surprise of all, it used one of the most common methods i.e. phishing. A cyber-gang named Shadow Brokers are being blamed for the particular hack. As per the confessions made by the gang, they said that they had stolen a cyber weapon from the most powerful military intelligence unit in the world i.e. National Security Agency (NSA), USA. The said hacking weapon Eternal Blue provides an unparalleled access to various systems which use MS Office. The said weapon was developed by NSA so that they could enter the systems of the various terrorists and such other foes (Perlroth et.al. 2017). However, it is being thought by all that the gang had put the said bug on an incomprehensible site and which in turn was further stolen by another gang who used it to infect systems worldwide. One of the biggest ways that would have enabled protection of this attack would have been regularly updating Windows and running the anti-virus as well. The weakness of the government is one of the main reasons behind the same and thereby they should be more vigilant and stringent in protecting their database and such critical software programs as well. Further the users should not open all the spam mails and the attachments found. Downloading of software and apps from unknown places should be prevented. Last but not the least, a pro-active way of thinking is a must specially in segments which are very crucial such as the health care segment. References: Bertrand,N. (2017). GOP data firm that exposed millions of Americans personal information is facing its first class-action lawsuit. Retrieved from https://www.businessinsider.in/GOP-data-firm-that-exposed-millions-of-Americans-personal-information-is-facing-its-first-class-action-lawsuit/articleshow/59261439.cms Cameron,D. Conger,K. (2017). GOP Data Firm Accidentally Leaks Personal Details of Nearly 200 Million American Voters. Retrieved from https://gizmodo.com/gop-data-firm-accidentally-leaks-personal-details-of-ne-1796211612 Daitch,H. (2017). 2017 Data Breaches The Worst So far. Retrieved from https://www.identityforce.com/blog/2017-data-breaches Lapdwsky, I. (2017). What Should (And Shouldnt) Worry You In That Voter Data Breach. Retrieved from https://www.wired.com/story/voter-data-breach-impact/ Matthews,K. (2017). Deep Root Analytics Is In Deep Trouble With Voter Data Breach. Retrieved from https://www.itsecurityguru.org/2017/06/29/deep-root-analytics-deep-trouble-voter-data-breach/ Newman,L.H. (2017). The Biggest Cyber Security Disasters of 2017 so far. Retrieved from https://www.wired.com/story/2017-biggest-hacks-so-far/ Walsh,A. (2017). Deep Root Analytics behind data breach on 198 million US voters : security firm. Retrieved from https://www.dw.com/en/deep-root-analytics-behind-data-breach-on-198-million-us-voters-security-firm/a-39318788 BBC News. (2017). Massive ransomware infection hits computers in 99 countries. Retrieved from https://www.bbc.com/news/technology-39901382 Graham,C. (2017). NHS cyber attack: Everything you need to know about biggest ransomware offensive in history. Retrieved from https://www.telegraph.co.uk/news/2017/05/13/nhs-cyber-attack-everything-need-know-biggest-ransomware-offensive/ Hern,A. Gibbs, S. (2017). What is WannaCry ransomware and why is it attacking global computers. Retrieved from https://www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20 Perlroth,N., Scott,M. Frenkel, S. (2017). Cyberattack hits Ukraine Then Spreads Internationally. Retrieved from https://www.nytimes.com/2017/06/27/technology/ransomware-hackers.html?mcubz=3 Wong,J.C. Solon,O. (2017). Massive ransomware cyber-attack hits nearly 100 countries around the world. Retrieved from https://www.theguardian.com/technology/2017/may/12/global-cyber-attack-ransomware-nsa-uk-nhs