Monday, May 25, 2020

Bending The Cost Curve Of The United States - 1696 Words

Bending the cost curve. The Triple Aim is part of health care delivery reform, as part of the ACA, all derived with the ultimate goal of reducing healthcare spending in the United States. The government and organizations are still waiting for evidence on the effectiveness of Triple Aim models in improving population health, controlling costs, and improving patients’ experience of care. As of 2010, concerns regarding balanced attention to the three overarching aims, indicate that healthcare organizations may increase quality at the expense of cost, or alternatively, they may decrease cost while creating a dissatisfying experience for patients (McCarthy and Klein, 2010, p. 1). All the while, healthcare spending costs in the United States†¦show more content†¦Ã¢â‚¬Å"Attention should be given to assessing the impact of new methods of organizing the delivery of health care services, adoption of electronic information systems, and health reform provisions that will test and reward health care organizations that are accountable for achieving better outcomes, higher quality, and lower costs† (Davis, 2012). Only collaboration between payers and physicians, with a focus on improving the health outcomes of patients will bend the projected cost curve set forth. Organization success. The IHI’s Triple Aim initiative has been deployed internationally, and began yielding successful results soon after its’ initiation in 2010. McCarthy and Klein (2010) indicate: Exemplary results at the study sites have included enhanced access to care, high or improving satisfaction with care, and increases in preventive care, chronic disease management, and healthy behaviors. These improvements have contributed to lower use of resources such as the hospital and emergency department, and to lower overall costs of care for defined populations (p. 7). After 7 years of various organizations attempting, and in most cases successfully implementing the Triple Aim, it has become evident to the IHI that there are particular components that must be closely adhered to in order to reach the desired results. These components, which enhance the program theory for achieving the Triple Aim and form a basis for future testing,

Tuesday, May 19, 2020

Why Community Service Is Important - 960 Words

Do you feel community service is important to a community? Why or why not? Explain your answer in two or three paragraphs. Community Service is important for many reasons. Taking part and volunteering teaches compassion and understanding. One of my favorite things about community service is that there are opportunities and choices everywhere! You can volunteer for something you really believe and have an interest in, and can volunteer as much or as little as you d like or have time for. Since I was young I have always volunteered for my Catholic Youth Group. At first I didn t know many people there and wasn t very enthusiastic. Later, as I got to know the other kids and starting pushing myself to join in the activities, I learned to†¦show more content†¦After working all day, when I am hot, sweaty, tired, and sunburnt, if I can see that I did a good job and people are pleased with my work then I know I succeeded and that is what I want in life. As my dad preaches, you don’t appreciate things in life if they are handed to you. This is a statement I truly believe in and plan to apply it in my life. Where do you see yourself in five years? I see myself in five years being graduated from college with my bachelor’s degree. I plan on graduating at the top of my class and working hard to excel my way to the top at my job. I hope to be employed in either Montana or Wyoming as the head nurse in a facility. Where do you see yourself in ten years? In ten years I hope to be firmly established in my job and on the way of raising a family. By then, I want to own my own house and have a stable income to provide for myself and family. Also, in ten years I plan on being at the top of my careerShow MoreRelatedThe PEACE Domestic Violence Agency1090 Words   |  4 PagesWithin the field of human services there are so many details that cannot be overlooked, there are many variables that should not be ignored. There are also expectations from stakeholders that most definitely must be entertained by all participants and staff that are involved with the program. Typically all human service programs depend on a source or sources of funding to provide services to countless individuals within a community. So many variables are present and necessary to ensure that theRead MoreWhy Social Workers Can Not Be Overstated1301 Words   |  6 Pages 1. The importance of understanding the community cannot be overstated. Most people access resources at the community level, regardless of whether the program funding originates at the local, state, or national level. It is at the community level that government is potentially most responsive to individual citizens. Quality-of-life issues are most profoundly confronted at the local level. 2. While the work of all human-service practitioners overlaps in numerous ways, the field of social work isRead MoreCustomer Community : An Important Tool For Businesses1282 Words   |  6 Pagesimprove your products or services. But rarely do all of these functions fall under a single platform – until you consider setting up a customer community. In this guide, we’ll explore what customer communities are all about and the reasons they’ve become an important tool for businesses. You’ll be able to understand why your organisation should start and utilise a customer community. Finally, we’ll examine the keys to starting a customer community. What is a customer community? Before we venture deeperRead MoreThe Introductory Video Of Module One1177 Words   |  5 PagesIntroduction The introductory video of module one provides an overview of the course of what is to be expected for the assignments and the service-learning practicum. Professor Zinga introduces the online course giving a basics outline discussing the online course work and placement. She provides a second video as a walk through of module one covering the main component of the class by giving a detailed step-by-step instructions for the module one. The videos were a useful guide to following alongRead MoreVolunteering At An Agency Where I May Interact With People1284 Words   |  6 Pagesstate government allocate and spend tax dollars to fund professional social agencies that would, in turn, meet the needs of their communities? Secondly, the burden for social agencies would be placed on individual citizens and agencies that choose to serve those in need by giving of personal time, money, and skills. Those two considerations have major effects on my service site. Funding for social agenices has been a topic for many years where libraries are the focus point from what I have gatheredRead MoreReligion, Religion And Religion879 Words   |  4 Pagesgods.†1 and this is simply incorrect. A religion is a community of people who believe in on set of beliefs, have established rituals, have faith in some sort of set principle/higher power, and have symbols and signs that they hold to be of a higher nature than other objects. A very important aspect to many religions is community, this is especially true in Christianity. In Christianity many of the rituals that take place, happen in a community environment. This is true for other religions as wellRead MoreReasons For Mergers And How They Are Reshaping And Impacting Health Delivery Essay1427 Words   |  6 Pagesstruggling to survive in this competitive market. It is important to understand why there is a strong movement towards hospital consolidation and why we should be concerned from a patient and future health administrator standpoint. Health administrators who create these mergers feel that consolidations appear to be a positive trend that will continually offer benefits to their consumers. They tend to trust that hospital consolidations play an important part in the iron triangle of healthcare. In our healthRead MoreMental Illness And The Black Community Essay1180 Words   |  5 Pagesalways been taken as serious in the black community. From my re search, scholars and medical professionals in the field of mental health spoke on the fact that mental illness is a stigma in the black community and the conversation of this is not happening. There are many factors that contributed to this. Factors such as the distrust of medical professionals, mis-diagnosis, socio-economical factors and so much more contribute to the reason the black community is missed when it comes to mental healthRead MoreEvaluate the impact of discipline on the uniformed public services883 Words   |  4 Pagesgoing to be comparing the different public services and evaluating them by saying why discipline is needed and why it is so important within the public services, I will be backing my work up by showing evidence from real life case studies Discipline is very important for anyone who is part of the Uniformed Public Services. Discipline is put in place to maintain order and to make sure that everyone works to the best of their abilities. All the services are organised in a similar way with a clearRead MoreTraditionl Healers in Latin America Essay1472 Words   |  6 PagesIntroduction Traditional healers also known as curanderismo are important part of Latin American culture, society and a way of life. Traditional healers have been a part of Latin American culture for thousands of years and even today are considered as important as the traditional health care professionals (Avila, 1999). The services of these healers are used extensively and they are well respected and admired members of the community. Not anyone can be a healer and in order to become one a special

Friday, May 15, 2020

The Impact Of Organizational Politics On Decision Making...

In order to succeed, one does not only have to obtain the knowledge in their field, but one must have the organizational and political skills (Pfeffer, J., 2010). Organizational politics focuses on the use of power to affect decision making and organizational behaviors. The political behaviors are activities that are not required of someone in their formal role, but that influence, or can attempt to influence pros and cons within a company (Robbins Judge, 2012). Unfortunately, these politics can have its downsides. Since a company is made up of different people, with different values, goals, and interests, conflicts may arise from one individual’s gain being an expense for someone else. Money may be able to give you power over things, but it is not the only thing that is able to help you obtain something. Other ways to obtain power is having access to information or by being an influential person. By gaining knowledge, you can obtain the upper hand because you are the one able find the resources and use information that might not be readily available to others. Your knowledge creates a dependence for others because you have something they might not have. This dependence for others because power for the individual only if your knowledge creates an importance to others, is scarce, and is non-substitutable (Robbins Judge, 2012). Having political skills also contributes to obtaining power because it influences others to better their own objectives (Robbins Judge,Show MoreRelatedThe Course Managerial Decision Making For Health Care Organizations952 Words   |  4 PagesIntroduction In the course Managerial Decision Making in Health Care Organizations, students present critical incidents that have happened in healthcare facilities. They also examine the decisions that were made by the leadership of these facilities to resolve the incident. Each incident had different dynamic events than the other. Because of that, the diversity of decisions which were made by the leaders of these facilities was unique and professional. Although there were guides and policies inRead MoreCulture, Power Politics1527 Words   |  7 PagesPower Politics As far back as history can be told mankind has struggled between balancing culture, power and politics. Many wars have been fought and many people have placed their lives on the line in order to stand up for what they believe in. The combinations of culture, power and politics have spilled over into the workplace. In today’s business environment individuals have much more to worry about than just completing their assigned tasks. Organizational culture, power and office politics influenceRead MoreEssay on Organizational behavior809 Words   |  4 Pagesin day-to-day organizational relationships. If we accept that power relations exist in organizations, then politics and politicking are an essential part of organizational life. Politics is a means of recognizing and, ultimately, reconciling competing interests within the organization. Competing interests can be reconciled by any number of means. For example, resorting to quot;rule by the managerquot; might be seen as an example of totalitarian rule. On the other hand, politics may be a meansRead MorePersonal Self Reflection Paper1734 Words   |  7 PagesOrganizational behavior studies human behavior in organizational settings and the influence and impact individual behavior has on the workplace. To provide a personal perspective of personality characteristics, the International Personality Item Pool (IPIP) assessment was used to measure aspects of my personality and how these traits relate to working with others and life within an organization. Key observations provide specific insight into how these are applied to workplace behavior and interactionsRead MoreOrganizational Behavior Is The Study Of Conduct And Attitude1656 Words   |  7 PagesOrganizat ional behavior is the study of conduct and attitude of people within an organization. According to Robbins Judge (2015), the behavior of individuals working in an organization contributes to its level of performance. A systematic approach has been used in this paper to interpret the relationship among individuals working together in an organization for the purpose of achieving a common goal. There are a number of factors that influences the operations of an organization such as conflictRead MorePersonality Profile Reflection Paper1743 Words   |  7 PagesOrganizational behavior studies human behavior and the impact individual attitudes and actions have on performance in the workplace. To provide a personal perspective of personality characteristics, the International Personality Item Pool (IPIP) assessment was used to measure aspects of my personality and how these traits relate to working with others and life within an organization. Key observations provide specific insight in to how these are applied to workplace behavior and interactions withRead Moreorganizational behaviour1261 Words   |  6 Pages Organizational Behavior MG6013 The exploration of the theories, research and practices that allow a better understanding of human behavior in organizations. Topics include motivation and job satisfaction; decision making; group dynamics; work teams; leadership; communication; power, politics and conflict; organization culture, structure and design; impact of technology; management of work stress; organizational change andRead MorePower And Its Impact On The Organization1407 Words   |  6 Pagesorganization are determined by power. The balance of power encourages or diminishes the ability of teams to perform. Given the role of power in determining organizational outcomes, it has attracted the attention of scholars. At the very basic, power is the organizing force at societal, industrial, intergroup level, individual, and organizational level. Power involves numerous area and, therefore, there is a tendency for power researchers to ignore some aspects of power. Power is not always well understoodRead MoreAnalyzing How Internal And External Forces Affect Organizational Effectiveness1593 Words   |  7 Pagesutilize management instruments to make rational decisions linearly. Contrastingly, college administrator will often encounter issues of shared governance, unclear mission, dynamic organizational culture, and loosely coupled structure, which make the decision making process challenging and time-consuming (Birnbaum, 1988). Due to the unique nature of college administration, Birnbaum suggests that college leaders should identify various organizational models that function in problem solving, and thenRead MoreMGT 312 Entire Course1103 Words   |  5 PagesWEEK 1 Organizational Behavior Paper       Write  a 700- to 1,050-word paper explaining the role and purpose of organizational behavior. Explain the main components of organizational behavior.  MGT 312 WEEK 1 Organizational Behavior Paper Provide examples of how these organizational behavior components relate to your workplace. How will knowledge of organizational behavior benefit you as a manager? Include  at least two scholarly citations from the library.  MGT 312 WEEK 1 Organizational Behavior Paper

Wednesday, May 6, 2020

College Athletes The Masters Of Multitasking - 1305 Words

College athletes with out a doubt are the masters of multitasking. Not only being able to play there individual sports at a high level but also finding the time to dedicate to there academics and achieve relatively decent grades. The amount of time that they dedicate to there university out on the game field and in the classroom should be deserving of a reward. Some argue that the problem would be that not every school can afford to give college athletes a decent compensation in every sport; for instance teams that do not bring in a lot of revenue such as tennis, lacrosse, track field, and wrestling. The NCAA however with their large revenues has the ability of format such a business flow. So with this information in mind it should be settled that the NCAA with the assistance of the individual colleges should enact a sports law that guarantees that the athletes of every sport are given a decent compensation for there individual use. Since officially being created in 1906 the NCAA has grown into one of the top non profit organizations in the world. Back then although the NCAA was young its policies were strict and its punishments were harsh. For the NCAA paying college athletes was and still is a huge violation of there college athletic law. They believe that paying college athletes takes the amateur feel out of the collagen sport and turns it essentially Minor league professional sport. There strong opinion on this topic the harshest punishment that the NCAA has everShow MoreRelatedWhy Do Entreprenuers Need Public Relations?5111 Words   |  21 Pagesaudience would be interested in buying a product of popularity; the messages in commercials are some type of inspiration to have customers to buy and create products. Entrepreneurs with business companies (e.g. Lil Wayne, Jay-Z, Steve Jobs, Percy Master P Miller, Sean P. Diddy Combs, Earvin Magic Johnson, Michael Jordan and Oprah Winfrey) are common because each of them has their own products. In addition, the Public Relation strategies they used for exposure are similar. Such strategies includeRead MoreMastering Graduate Studies 1e32499 Words   |  130 Pagesit is about endurance and faithfulness with a specific goal in focus. accomplishes little if you were looking for career advancement with a master’s degree. A person can claim to want to play in the NBA, but until that person can prove that he can master the game, he is just talk. Keep the goal in mind, watch the summit, and stay on your route. There will be times when life crashes in on you, and you tell yourself you can just drop this class and take it later. There are some ramifications to a decisionRead MoreInformation Technology Project Management,31215 Words   |  125 PagesIf you cannot think of a good information technology project, use your personal experience in deciding where to attend college to apply this framework. Write a one- to two-page paper describing key issues related to the structural, human resources, political, and symbolic frames. Which frame seemed to be the most important and why? For example, did you decide where to attend college primarily because of the curriculum and structure of the program? Did you follow your friends? Did your parents haveRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesMoney Doesn’t Make You Happy, You Aren’t Spending It Right† 262 Questions for Review 263 Experiential Exercise Assessing Employee Motivation and Satisfaction Using the Job Characteristics Model 263 Ethical Dilemma Spitting Mad 264 Case Incident 1 Multitasking: A Good Use of Your Time? 264 Case Incident 2 Bonuses Can Backfire 265 3 9 The Group Foundations of Group Behavior 271 Defining and Classifying Groups 272 Why Do People Form Groups? 272 Stages of Group Development 274 The Five-StageRead MoreMarketing Management 14th Edition Test Bank Kotler Test Bank173911 Words   |  696 Pagestheir expertise in improving overall product quality and supplier relationship. Page Ref: 34 Objective: 1 AACSB: Analytic skills Difficulty: Moderate 124) In the central role of strategic planning, only a handful of companies stand out as master marketers—Procter Gamble, Southwest Airlines, Nike, Disney, Nordstrom, Wal-Mart, and McDonalds to name a few. From a consumers perspective why do you think they stand out? Explain. Answer: Students should explain that these companies focus on

U.s. Failed During The Vietnam War - 987 Words

This investigation seeks how the U.S. failed in the Vietnam War. The main body of this investigation outlines why the U.S. lost the winnable war, the causes for the U.S. defeat, and the differences between Vietcong and the Americans, which is one of the main reason why the U.S. failed in the Vietnam War. Two main sources used in this essay are When We Lost the Winnable War by Bruce Walker and The Vietnam War 1964-75 - The causes for the US defeat by Jyri Hintikka. Both of these sources of information gives details and causes on how the United States lost the war. Section 2: Investigation On November 1 of 1955 was the start of one of the largest colonial war, the Vietnam War. The war lasted from November 1, 1955 to the April of 1975, approximately 19 years and 5 months. The war was a fight between South Vietnam, anti-communist, and North Vietnam, the communist. The South Vietnamese were supported by the United States and other anti-communist nations. While North Vietnamese were backed up by the Soviet Union and its communist allies. After the war, there a big controversy on why the U.S. lost a winnable war and why they backed out. Why exactly did the U.S. lose the Vietnam War? Vietnam War a war that America could easily have won, and should have. There are many reasons why the Americans lost to Vietcong, but it did not make it impossible to win. The American hi-tech tactics constantly killed the wrong people and dispirited their own troops. With that fact most of theShow MoreRelatedFrom The Dropping Of The Atomic Bombs On Japan In 19451498 Wor ds   |  6 Pagesworld. The U.S. spent billions of dollars during the Cold War period on foreign policies of containment, but is criticized that these strategies were ineffective in containing the spread of communism. In 1946, The Long Telegram, put forth by the father of the containment theory, George F. Kennan, stated that in order to defeat Soviet communism the U.S. must to thwart the spread of communism throughout the world. Therefore, the success of the United States’ foreign policy of containment during the 1960sRead MoreThe Vietnam War Was The Biggest Failure Of The 20th Century1628 Words   |  7 PagesThe Vietnam War The Vietnam War is one of the most controversial wars the United States participated in. Communism in the 20th century, was a huge threat to the U.S. It become a priority of the U.S. to stop the spread of Communism. In the late 1940s, the French struggled to control its colonies in Indochina - Vietnam, Cambodia, and Laos (history.state.gov). The U.S. saw that the French were struggling in south Vietnam so they decided to come and help France. They tried to support France and theRead MoreThe Failure Of Guerilla Warfare Methods During The Vietnam War1369 Words   |  6 Pages(1350)The Failure of Guerilla Warfare Methods in the Vietnam War: An Analysis of the Causality of the â€Å"Counter Insurgency† Governmental Policies and the Presidential Campaign of 1968 This colloquium will define the connection between various sources related to the â€Å"counter insurgency† policies of the American government throughout the 1960s that caused a slow escalation of the Vietnam War in the fight against communist expansion in Southeast Asia. The Campaign of 1968 defines the legacy of presidentRead MoreThe War Of The Vietnam War Essay1158 Words   |  5 Pagesâ€Å"The war in vietnam is but a symptom of a far deeper malady within the American spirit.† Martin Luther King, Jr. once said. The Vietnam War was considered one of America’s greatest defeats of all time. Not only did the US failed to stop the spread of communism, but they also embarrassed this country as a whole with the outcome of this war. The overall outcome from this war will be remembered for years to come. In this essay, I will be talking about how the United States would have won the VietnamRead MoreThe Soviet Union And The Cold War1038 Words   |  5 PagesAfter a series of events during the time of World War II, tensions between the United States and the Communists such as the Soviet Union and China, developed into a military and political conflict such as the Cold War. During the Cold War, which went on for 50 years, the Soviet Union and the United States competed to expand their economical and political influence. Although, the United States military has increased in size and it’s strategy. The United States power today is highly supreme when itRead MoreThe Impact Of Modern Day Vietnam On The Vietnam War1475 Words   |  6 Pagesled to the all out war between the South Vietnamese backed by the U.S. and the communist forces of North Vietnam known as the People’s Liberation Armed Forces of South Vietnam (Viet Cong). On March 29, 1973, the last U.S. troops were withdrawn from Vietnam, and soon after in 1975, the South Vietnamese capital of Saigon fell to the hands of North Vietnam. Modern day Vietnam (Known as the Socialist Re public of Vietnam) was founded a year after in 1976. During the Vietnam War, the U.S. was faced withRead MoreThe War Of The Vietnam War1704 Words   |  7 Pagesthe British during the Revolutionary War, even before we were a country. How we jumped in during WWI to help bring it to an end. Also, how we raided the shores of Omaha to save Europe from Hitler, and drop nukes on Japan. We learned how we beat the Soviet Union so hard during the Cold War that they don’t even exist anymore. One war that America does not seem to talk about is the Vietnam War. The Vietnam War was a proxy war during the Cold War, but it is always swept aside. The Vietnam War divided theRead MoreReasons Why the United States Failed in the Vietnam War852 Words   |  3 Pageshad been granted the powers to prosecute the war in Vietnam. Senator Wayne Morse or Oregon voted against it, reminding McNamara that â€Å"the North Vietnamese patrol boat attacks had been provoked by U.S. presence in Tonkin Bay† (Armstrong 52). It was apparent that the past of American policy in South Vietnam seemed to be leading America into war. The United States had affiliated themselves with a policy that was a form of American colonialism, of saving U.S. interests at the cost of the Vietnamese peopleRead MoreWhat Led The United States Into The Vietnam War?1449 Words   |  6 PagesReilly Fletcher HUS History Mr. Hlavacek 5/30/16 What Led the United States to Enter the Vietnam War? The United States played a very crucial role in the conflict that occurred in Southeast Asia between the U.S.-backed democratic South Vietnam, and Soviet-backed communist North Vietnam. Following the defeat of its French administration in 1954, North Vietnam, led by Communist leader Ho Chi Minh, wanted to reunify the country with the help of its rebel allies in the south, known as the Viet CongRead MoreCOIN Compaigns: Vietnam and Afghanistan1321 Words   |  5 PagesCOIN Campaigns: Vietnam and Afghanistan United States (U.S.) doctrine focuses its COIN methods on the ability to assist a host nation in building political legitimacy and creditability. Establishing political legitimacy is the foundation of COIN strategy enabling governments to create rapport with local leaders and gain the support of its communities while simultaneously eliminating an insurgency. Doctrine is subjective rather than prescriptive; however, failure to adhere to fundamental principles

Epic Heroes free essay sample

Cushman Sings. Professor Calliope Pappas Civilization 1 Red September 15, 2013 Civilization 4-page essay dont know title Ill be talking about how Galoshes, Odysseus, and Oedipus fulfill their role as an epic hero. Secondly Ill talk about how they compare to each other. Thirdly what the heroes do right according to their traditions. What do they wrong and why do they do it. Why does Odysseus succeed as hero while the other heroes fail in the key way? What makes Oedipus a tragic hero? Ill talk about if we can blame Oedipus for his failures n personal flaws, mistakes, chance, fate, or a mix of factors. Ill also talk about what statement Sophocles seems to be making about reverence in Hellenic society. Oedipus is an epic hero because he was a strong, powerful, part god, and was stronger than any king alive. He was a hero who showed skill and intelligence throughout his lifetime. We will write a custom essay sample on Epic Heroes or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Shillelaghs friendship with Unkind show s his loyalty to people that show respect for his city and for himself. He shows his bravery and strength by fighting Human the monster and returning homely safely without an injury. Which is not a simple task and no ordinary person would be able to do. He also shows his superior fighting skills when he makes the god Sister mad who tells Ann. to release the mighty bull. He has to kill the bull because the bull is destroying the city and Galoshes wants to help his people. Since the bull is doing that he slays it. The bull was no ordinary bull, but still Galoshes is still able to slay it. He was a true leader because he was willing to die for his kingdom. Galoshes has proved to be a hero because he shows all the characteristics of an epic hero

Tuesday, May 5, 2020

Information Security Social Engineering

Question: Describe about Information Security, Social Engineering and Problems occur with social engineering? Answer: Introduction: Security is mainly concerned about the fact whom to trust. It is important to know about when to keep trust and to ignore. It often happens that someone told his personal information to someone else while communicating, though keeping trust on the websites or social media is not safe due to the intruders, who hack the website form the middle of the conversation or some time it may happen that the device is being used for the communication is not legitimate. Generally the user with less knowledge of online scams and also the users, who newly stepped into the social sites, may face the problem caused by the hackers, intruders. Users, who have the less knowledge about the security tools, which are most applicable for their device even can easily keep their faith over the online friends and the online media to reach friends and family can become the victim of the social engineering. Introduction to Information Security Information security is nothing but the method of securing data, giving protection to datas confidentiality, availability and the integrity of information. There are few key information security concepts which are involved in the process of securing data, Such as- Access: Access ca referred as a objects capacity to use, modify, manipulate or can affect another object. A legitimate user can have the authorized access to the system, where the illegal user do not have authorized access to the system and its data. Assets: Assets can be referred as the resources that have gained the focus to get protection. Assets can be the physical devices in use or the information about the websites, it can be the person with expertise and it may be the computer system or other physical object. Attack: Attack can be referred as the intentional or unintentional act of damaging physical system or the confidential data. Exploit: This technique is use to take advantage of a system. The threat agents may cause the unethical access of the data for their personal gain. Exposure: It is a condition of the system or the system component, when the system is vulnerable enough to welcome the hacker. Loss: A single event of damage caused by the unauthorized discloser or the modification. Security profile: The total set of security measures and the control including awareness, training, policy and technology that need to be implemented in order to give protection. Threat: Threat can be the person, object, or those entities that can cause danger to the assets. Threat agent: Threat agent can be identified as the component of threat. E.g. a hacker is a threat agent (Axelrod, Bayuk and Schutzer, 2009). Vulnerability: Vulnerability can be referred as the weakness in system. 1. Social Engineering: Social Engineering is a attractive method to manipulate people, so that they can give their confidential data, such as, their user name, password, bank details. The information types, which are mainly concern of these kinds of hackers, can vary. When an individual is targeted, the criminals usually try to tick a person to access his computer secretly by motivating him to download some malicious software into their system. All these information give privilege to the hackers to access personal data as well as control over victims computer. Criminals keep using tactics on social engineering, as it is easiest one to exploit someones natural tendency to trust then it makes the way to hack the software or the whole system (Katsikas and Gritzalis, 2006). Security is mainly concerned about the fact whom to trust. It is important to know about when to keep trust and to ignore. It often happens that someone told his personal information to someone else while communicating, though keeping trust on the websites or social media is not safe due to the intruders, who hack the website form the middle of the conversation or some time it may happen that the device is being used for the communication is not legitimate. As a common social engineering attack it may appear as message or as a mail form a legitimate user, where a criminal manages to socially engineer one persons email id and password and have access to his personal contact list in mailing account. In this the hackers have control over the email account and send messages to all of his friends social pages (Cheswick and Bellovin, 1994). 2. Findings: When a hacker does social engineering and sends message to other persons account, then that person may be asked for some verification by clicking on the link. After clicking on the link, it may ask for the personal information. The link location may seem very legitimate with the contents, logo. Some time all content the link is containing may be copied from some legitimate site, so it also looks legitimate. If someone trusts this link, they are asked to provide information (Zelkowitz, 2004). While phishing is concerned, there are several types of phishing, such as- Baiting: Baiting happens when an attacker intentionally leaves his physical device totally malware-affected at such a place, where it sure to be found. When finder picks up that device and loads these devices onto his computer, the user keep installing the malware in absence of its awareness. Phishing: Phishing take place when a malicious third party sends a fraudulent message or mail cloaked as a legitimate message or email. It often act as a coming from trusted source. This message is intended to trap the recipient to install the malware on his system or device or ask some financial information (Katsikas and Gritzalis, 2006). Pretexting: Pretexting takes place, when one party gives false information about them to another party in order to take the original information about the recipient. Quid pro quo: A quid pro quo happens when attacker ask for the personal information in exchange of credentials. For example, attackers may ask for the exchange of credentials with some attractive gifts. Spam: Spam is generally an unwanted junk message or mail. Spear Phishing: In this method of phishing, a modified approach is used for an organization or individual. In these kinds of cases attacker tries to revel personal information to a specific organization, so that they can obtain the trade secrets or the financial data (Kirkby, 2001). Tailgating: When an unauthorized party keeps following another legitimate party into an secured and verified location, usually for stealing the confidential information and the valuable property. 3. Problems occur with social engineering: Those people who take bait may become the victim with wicked software that is able to generate numbers of exploits against their contact and their personal information. It may cause to lose money without receiving the purchased items (Lai, 2012). It sometime happens that there are such proposals online to fasten the speed of the operating or to fix the bugs of the operating system for free. The moment someone gives response to these trap, become victim of exploitation. There are several of social engineering attacks. In a single attack may hacker can give someone experience of exploits in multiple forms. Then the criminal sell the information to others, so that other person can use the information to exploit that person, even friends and friends of friends of that person can be affected to (Merkow and Breithaupt, 2000). 4. Way to carry out the problems: To be aware of these attacks, an online user may flow some basic advices, to not to become victim of these kinds of attacks (Oriyano, 2013). User must slow down himself while there is a suggestion to take steps in urgent. Spammers try to trap someone to act before think. If there is a message of urgency to choose some option, it is then advised not to go with the flow and keep the careful review not influenced. Before acting upon any kind of malicious information user must have some researches upon that giver information. User must delete all those requests which generally ask for the a/c information or financial information. User must reject help offers. As any legitimate company never offer help personally contacting someone over mail or messages. User must be aware about any kind of download when someone is not sure about the content of the file or about the sender. In this scenario downloading can be a mistake. Some time receiving offers of foreign lottery are not legitimate. They may request to transfer money from a foreign country, which are easily recognizable as a scam. User must set the spam filters to high. User must secure its computer devices by automatically or manually updating the operating system of his device. He can also use anti-phishing tools to get alert about the risks (Wright, 2014). 5. Who are the victims? Generally the user with less knowledge of online scams and also the users, who newly stepped into the social sites, may face the problem caused by the hackers, intruders. Users, who have the less knowledge about the security tools, which are most applicable for their device even can easily keep their faith over the online friends and the online media to reach friends and family can become the victim of the social engineering (Peltier, Peltier and Blackley, 2005). 6. Recent trend: Attackers are increasing these days along with their increasing threats of social engineering, which is going beyond the targeted employees and trying to trap the employees to give up their information (Vacca, 2007). Cryptography 1. Significance and Functionality of different stages of cryptographic system: Cryptography system has much significance with predetermined functionality. Cryptography is mainly use to convert the plain text into cipher text (Phoha, 2002). Different stages of cryptography system is- There three stages of cryptography given in an order- Plain text Cipher text Plan text Functionality at different stage: Sender sends data as plain text, which is readable and can be modified by the sender, receiver and everyone else. When data passes through the encryption algorithm, there will be an application of encryption key. At the sender end, senders public key and receivers private will be used to encrypt the data. After this process the data become cipher text. When the cipher text arrives to the intended user, the receiver uses senders public key to decrypt the text. Senders public key will be known to everyone (Preetham, 2002). Numbers of cryptographic standards are there. There are standard protocols and algorithm to build popular application, which attracts a huge amount of cryptanalysis. Specific standards for Encryption: Triple-DES CipherSaber The original algorithm for public key encryption, RSA. OpenPGP Advanced Encryption standard. Data Encryption Standard. Hash standards: SHA-1, which is 160 bits MD5, which is 128 bit SHA2, it is available in different bit variance of 224, 256, 384,512, 616 and 680 PBKDF2, it is a key derivation function. Digital Signature Standards: RSA Digital Signature Standard, which is applied on Digital Signature Algorithm Elliptic Curve DSA PKI (Public-Key infrastructure) standards: 509 public key certificates. Wireless Standards: Wi-Fi protected Access, which known as WAP and better than WEP. It is a pre-standard and partial version of 802.11i. MD5 standard: MD5 is method of encryption, where the plain text is converted in cipher text. The security of MD5 hash function is compromised severely. MD5 algorithm takes message as input. Messages are of different length (as per requirement) and generate an output of 128 bit messages digest or finger print of the input (Reddy and Padmavathamma, 2007). The intention behind the application of this security algorithm is to compress a large file in a secure manner before the encryption with a private key under a public key cryptosystem (PGP). Network Security fundamentals a) Reason behind limiting rate to reduce the damaged caused due to DDoS attacks: A DNS amplification attack is the popular form of DDoS (Distributed Denial of Service) attack. In this case attackers use open DNS servers, which is publicly accessible by the attackers to flood a under fire system with DNS response traffic. The primary method in this attack is to send an open DNS server a lot of DNS lookup request. Where server gives IP address to the client assuming it a legitimate user but in the middle way, the fraud one get all the response and the legitimate one keeps starving for its turn. Lastly the DNS pool is empty enough to give response to the requests (Shim et al., 2000). The attacking method is closely related to open recursive resolvers, but it seems to be more difficult to mitigate. In this it is the reason why delay should focus on using the Response Rate Limiting to give restriction on the amount of traffic. b) Opinion and reason behind limiting rates can limit effectiveness too: Rate limiting is mostly used on the ISPs router, which is used to connect the home network to the WWW (World Wide Web). If someone is experiencing a flood attack, which is saturating the internet link may not that scenario where rate limiting will work for the improvement of the scenario. Rate limiting restricts the huge amount of outbound traffic. For example, if someone is victim of Smurf attack, he or she can use the rate limiting as a solution for short span of time to limit the traffic flood that he is sending to the attackers network (St. Denis and Johnson, 2007). c) Causes behind giving protection to the community problem due to the DDoS attack: As far as the DDoS attacks are concerned, attackers can easily achieve control of the infected bots to initiate the attack. They even amplify the attacks by exploiting the vulnerable areas in public services. This public services use the UDP (user datagram protocol) such as Network time protocol or the Domain name system services. Due to all these reason DDoS attacks are difficult to manage, due to its high capital costs of building infrastructure of attack mitigation and also the lack of proficiency in operating protected network. These are the reason why it is not only confined within the individual victims firms, but a community problem to deal (Stewart, 2011). d) Justification behind holding an effective defense by black against DDoS attack: Yes, Black hole routing has an effective impact against DDoS attacks. Black hole routing is known as the range of IP address or the IP address, which results the coming packets rather than being discarded, it protect the system resource for the wicked effects of DDoS. It also causes the packets to discard with malicious traffic attack (The Basics of Information Security, 2014). Firewalls Firewall is known as a security system in computing where it uses some protocols and packet filtering mechanism to give protection to the system, where the firewall is installed. It keeps users notified about malicious act going on behind the scene. Many hardware based firewall is also there which provide functionality to internal network, such as DHCP server for a network (Tipton and Krause, 2005). 1. Comparison between the different filtering mechanisms and information on the protocol used in firewall: Stateful packet inspection filtering Static packet filtering Application Proxy filtering Network Address Translation Static packet filtering is replace by the stateful packet inspection filtering It filtering technique has come prior to the stateful packet filtering It stands between two parties and requires the client to initiate the session with the proxy, then the proxy creates a session with the destination In firewall NAT functionality is used in order to hide the original address of the protected hosts. Analysis of the packets are done in the application layer Only packet headers are checked Proxy server checks from layer 4 to layer 7 for the valid connection Its functionality is used in order to address the limited number of routable IPv4 address Stateful packet inspection is able to monitor the communication of the packets over the time span. Static packet filtering only operates as per the administrator defined rules As the client set the session with proxy, which in turn authenticate the other side connection (destination) before the creation of the session Routable IPv4 addresses are assigned to the organization or to the individuals for providing enough public address space with a reduced cost. Conclusion: During early few years, Information security is directly a straight forward process of securing the physical components and the simple document checking scheme. The primary information security threat comes by physical theft of the devices or spying the data from the middle and damaging it. Information security is nothing but the method of securing data, giving protection to datas confidentiality, availability and the integrity of information. Security of information is needed at every phase of processing, storage and transmission. All these can be achieved by the technology, education, policy, training and awareness. References Axelrod, C., Bayuk, J. and Schutzer, D. (2009). Enterprise information security and privacy. Boston: Artech House. Carlet, C. (2009). Editorial: Cryptography and Communications, Volume 1, Issue 1. Cryptogr. Commun., 1(1), pp.1-2. Cheswick, W. and Bellovin, S. (1994). Firewalls and Internet security. Reading, Mass.: Addison-Wesley. Katsikas, S. and Gritzalis, S. (2006). Security issues of IT outsourcing. Bradford, England: Emerald Group Pub. Kirkby, A. (2001). Internet Trust And Security. Network Security, 2001(9), p.6. Lai, C. (2012). Security Issues on Machine to Machine Communications. KSII Transactions on Internet and Information Systems. Merkow, M. and Breithaupt, J. (2000). The complete guide to Internet security. New York: AMACOM. Oriyano, S. (2013). Cryptography. New York: McGraw-Hill Education. Peltier, T., Peltier, J. and Blackley, J. (2005). Information security fundamentals. Boca Raton, Fla.: Auerbach Publications. Phoha, V. (2002). Internet security dictionary. New York: Springer. Preetham, V. (2002). Internet security and firewalls. Cincinnati, Ohio: Premier Press. Reddy, P. and Padmavathamma, M. (2007). An authenticated key exchange protocol in elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography, 10(5), pp.697-705. Shim, J., Shim, J., Qureshi, A. and Siegel, J. (2000). The international handbook of computer security. Chicago, Ill.: Glenlake Pub. St. Denis, T. and Johnson, S. (2007). Cryptography for developers. Rockland, MA: Syngress Pub. Stewart, J. (2011). Network security, firewalls, and VPNs. Sudbury, Mass.: Jones Bartlett Learning. The Basics of Information Security. (2014). Network Security, 2014(9), p.4. Tipton, H. and Krause, M. (2005). Information security management handbook. [London]: Taylor Francis e-Library. Vacca, J. (2007). Practical Internet security. New York, NY: Springer. Wright, O. (2014). Social Engineering. Engineering Technology Reference. Zelkowitz, M. (2004). Information security. Amsterdam: Elsevier Academic Press.