Friday, January 31, 2020

Health Promotion Activity Essay Example | Topics and Well Written Essays - 1250 words

Health Promotion Activity - Essay Example Also the organization would have low employee turnover as the employees appreciate the organization’s concern about their wellbeing (Infinite Wellness Solutions, 2008) At present numerous health issues need to be addressed and selecting one among those is a challenging task. However, in recent times obesity has garnered the attention of everyone as this medical condition leads to many complications such as cardiac problems and diabetes. There have been a lot of studies which have demonstrated the prevalence of the condition in most of the families in America. Statistics reveal that in 2003-2004, the risk of overweight percentage in children and adolescents was 33.6% with the percentage of overweight children being 17.1%. This is a considerable increase when compared to the results of the year 1999-2000 (Ortiz, 2006). The prevalence of the condition has increased in the recent times due to the fast pace of life, increased consumption of junk food and lack of physical activity. However, this condition can be brought under control with lifestyle changes and support and would offer a lot of positive outcomes for both the employee and the organization. After identifying the problem that needs to be addressed the next step is to garner the support of the management. The organization should understand the significance of the health promotion activity and should be able to allot adequate funds for the implementation of the same. The next step would be to set goals for the activity and then form a health promotion team or a planning committee (Infinite Wellness Solutions, 2008). Goals need to be established in order to proceed and accomplish what you hope the program will do. It serves as a sort of framework identifying the current situation and the future course after the implementation of the program. A person would head the committee and would focus primarily on the activity, strategies for making the program work and to meet the

Thursday, January 23, 2020

What is Cystic Fibrosis? :: essays research papers

Your child is under weight, has greasy, smelly diarrhea, a chronic cough and seems to always be getting pneumonia. He wheezes when he breathes and has impaired exercise ability. He seems to never being growing to the average size of his peers and his skin is very salty (5). The doctor’s first instinct should be to test your child for a disease called cystic fibrosis. Cystic fibrosis is a disease, which causes the mucus in your body to be thicker in some areas. The most affected areas are the lungs and digestive system. As a result, the person may get chest infections and have difficulty digesting food. When cystic fibrosis is a consideration for a person’s disease the physician will do what is called a sweat test. This is a simple and cheap way to determine if your child has the disease. Because people who have cystic fibrosis (CF) have saltier sweat than others, the sweat test detects the amount of salt in the sweat of the individual (4). This is the best way to diagn ose a person with the disease (5).   Ã‚  Ã‚  Ã‚  Ã‚  CF is a genetic disease, meaning that a person does not â€Å"catch it†, it is inherited in the genes passed down to the person. Cystic fibrosis lasts with the patient for their whole life. This makes it a chronic disease, not communicable (9). All symptoms of CF are caused by a mutation to the single chromosome 7. This particular gene is responsible for the building of the protein called the cystic fibrosis trans membrane conductance regulator (CFTR). Normally, the gene regulates the passage of chloride ions in and out of the cell, but when mutated as in the case of CF patients the chloride ions cannot move throughout the cell membrane because the CFTR does not open. In about three- quarter of CF cases the CFTR is not just broken, but is completely missing from the cell. The missing CFTR has many effects on the human body. One is saltier sweat because as the sweat rises to the skin, cells reabsorb sodium and chloride molecules. The loss of the CFTR does no t allow the body to reabsorb the sodium ions making a CF patient’s sweat five times saltier than that of a normal person. This can lead to irregular heart rhythms. The loss of chloride ions affects the pancreas also. The loss of the CFTR ultimately makes it impossible for digestive enzymes to be sent to the intestines.

Wednesday, January 15, 2020

Identifying Potential Risk, Response, Recovery

In this paper I have just been hired as an Information Security Engineer for a video game development company. I have previously identified all of the potential Threats, Vulnerabilities and Malicious Attacks for the videogame development company. The CIO have reviewed my report and has now requested that I draft a report analyzing and assessing any potential Malicious Attacks, Vulnerabilities and Threats that may be carried out against the company’s network. I will then choose a strategy for dealing with risk, such as mitigation, assignment, risk and avoidance.Next I will develop controls that will be used to mitigate each risk. Now let’s begin by discussing the threat of the Web/FTP server, some servers, or hosts, must be open to the internet. Web servers are examples of such hosts. You want any user to be able to access your web server- but you don’t want everyone to be able to get to your internal network (Fundamentals of Information Systems Security). The sim ple solution for this is just to isolate the host that is connected to the internet from the internal networks and then create a demilitarized zone.The risk mitigation for the Web/FTP, the FTP is very useful for working with remote systems, or to move files between systems. On the other hand the use of FTP across the internet or other untrusted networks, exposes you to certain security risk. Your object authority scheme might not provide enough protection when you allow the FTP on your system. The next risk for FTP is a hacker can mount a denial of service attack with your FTP server to disable user profile (FTP Security). This is usually done by repeatedly trying to logging on with the incorrect password for a user profile, generally until the profile is disabled.This kind of attack will disable the profile if it reached the maximum sign on count of three. If the company use a FTP server logon exit program to reject logon requests by any system user profile and those user profiles that the company designate will not be allowed FTP access. Now we will discuss the NIDS, the primary purpose of a network-based intrusion detection system is to identify attackers trying to expose vulnerable network services. The NIDS can respond to the attack or alert personnel, who can take the necessary and appropriate actions for this type of attack.NIDS allows administrator to respond to attacks with actions appropriate to their security policy. To properly analyze false alarm reduction strategies, it is necessary to quantify risk and the NIDS role in risk reduction. The NIDS uses two formulas, one formula assumes that risk is roughly equivalent to single loss expectancy. This formula for this quantification is SLE= (Asset Value x Exposure Factor) (Fundamentals of Information Systems Security). The next formula states that risk is equal to exposure multiplied by threat. Risk= Exposure x Threat.This equation determines threat and the type of threat. For example there are threats of port scans, automated scans and sweeps, Denial of Service and Service attacks and compromises. Now we will move on to Windows 2008 Active Directory Domain Controllers (DC), because domain controllers provide critical services to their clients, it is crucial to minimize the risk of any disruption of these services that may be caused by malicious attacks. Antivirus Software can be used to mitigate the risk of malicious attacks in Windows 2008 Active Directory Domain Controllers.Make sure that you verify the antivirus software you select is confirmed to be compatible with your domain controllers. Do not use domain controller systems as general workstations. Another way to prevent malicious attacks on domain controller systems is to not allow users to use domain controllers to surf the web or to perform any other activities that can allow the introduction of malicious code. Only allow browsing on sites that are known to be safe, this will be did strictly for the purpose of supportin g server operation and maintenance.Another practice to keep in mind is to make sure that all of the company’s files, including the shared ones, should be ran against a virus scanning software. This bring me to the file servers, have the potential to receive different viruses such as worms, Trojan horses and logic bombs. To allow an end user to upload files to your website, is like opening another door for a malicious user to compromise your server (acunetix. com). File uploads are permitted in social network applications. File uploads are also allowed with blogging, e-banking sites and you tube.All of these network sites allow users the opportunity to efficiently share files with corporate employees. Users are allowed to share files with corporate employees, through uploaded videos, pictures, avatars and many other types of files. The best way to prevent malicious attacks through the company’s file servers is to make sure that the file that is being uploaded is validat ed. This will prevent a hacker from uploading files with malicious codes that can lead to a server compromise. Another way to prevent a malicious attack on the file server is for the company to block all dangerous extensions.In cases like this, there would be a blacklist, the list will show the dangerous extensions and there access will be denied if the extension of file they are trying to upload is on this list. The best practices to follow when uploading files onto websites and web applications. The first risk mitigation in a file server is to estimate the size of programs, files, and transaction. Then you will need to prevent deviation in size of the files as well as the amount of users that have access to the files. Now we will move forward the Wireless access point (WAP), this is the connection between a wired and wireless network.This is also a wireless security protocol designed to address and fix the known security issues in WEP. WAP’s are radios, sending and receivin g networking information over the air between wireless devices and the wired network wireless (Fundamentals of Information Systems Security). The best way to prevent malicious attacks on a WAP is to increase security. Presently WPA provides users with a higher level of assurance that their data will remain protected by using Temporal Key Integrity Protocol for data encryption.If the data is not encrypted then it is considered as fair game, because it would be very easy for anyone that have access to a radio to access this data. The mitigation risk for a Wireless access point is to make sure your technology is updated. Failure to upgrade to newer, more advanced technologies could potentially impact productivity and lead to significant downtime, security vulnerabilities, and non-compliance issues. Older wireless technology do not support new features and functions that are proving to be so valuable.Next you will need to choose the right carrier, ensuring information is secure within t he supply chain, complying with all the latest government and retailer mandates and taking advantage of all the latest features and functions to save time and money can seem like a daunting task ( Wireless technology Migration: Mitigating risk and increasing supply chain efficiency). Now we will discuss the 100- Desktop/Laptop computers, both of these computers are subject to viruses such as worms, hoaxes, Trojans and other security vulnerabilities.The best way to prevent these from occurring is to install and use a firewall. Always make sure you are installing and updating the latest critical security software. Add a virus software scanner, to allow the software to scan your computer for potential viruses. Next we will discuss the VOIP telephone system, this is one of the newest technologies that is being rapidly embraced by the market as an alternative to the traditional public switched telephone network. The malicious attacks that can occur with this system is denial of service, impersonation or spoofing or toll  Ã‚  fraud.The best way to prevent this from happening is to add port security, cisco secure access control server, DHCP Snooping, Cisco firewall solutions and intrusion prevention. Data transit can also be used to protect the voice traffic over the wireless LAN’s. The risk mitigation for desktop/laptop is as followed is to target malware with automated defenses. One of the first line of defenses for any PC or laptop is to block or eliminate viruses, worms, spyware, and other malware, including Trojan downloaders and keystroke loggers, both on endpoints and at the gateway.Deploy anti-malware and filtering software for all email gateways, to prevent malware and spam from ever reaching the PC’s. Next you would want to patch your vulnerabilities as quickly as possible, create a password to access your PC or laptop. To really maximize security in a minimal amount of time, as part of the â€Å"acceptable use† policy, prohibit users from installing unauthorized software on PC’s or laptops (10 Ways to mitigate your security risk).

Tuesday, January 7, 2020

Texting While Driving Essay - 846 Words

A study made by Virginia Tech, says that an individual is twenty-three times more likely to get in a car accident if they are distracted by a mobile device (cbsnews.com). Thirty-eight states have banned texting, and 8 states have partial bands on texting and driving. Evidence shows that drivers that are distracted by a phone, while behind the wheel of a 4000 pound vehicle endanger not only themselves but others as well. â€Å"You’re a hazardous driver to yourself and everybody else† (Web MD). The impacts and effects associated with texting and driving should be outlawed because of the danger that every single driver and passenger are at risk of. There have been studies that show that†¦show more content†¦Some countries are taking drastic actions by scaring people into stopping texting and driving by making gruesome informed commercials. They are showing the impact that one’s mindless driving, and texting can cause serious consequences. For example, there is one video that shows a car full of distracted teen’s texting while driving, which cause a head-on collision. The teens were looking at their phones instead of the road and merged into the other lane. They collided with a family. It showed the inside view of both vehicles, and how one small device used irresponsibly could cause so much danger. What is being done in the community about texting and driving? So far there have recently been attempts to try and pass a law to ban texting and driving. â€Å"Idaho is closest to joining Oregon and Washington; in the banning texting while driving proponents are trying to push through a bill† (House Bill141 and OPB News). However, Representative Marv Hagedorn said that texting and driving is ok as long as an individual’s driving is not distracted but that is pretty ridiculous because it has been shown that if an individual is texting and driving their attentions span is being affected. Therefore, Idaho is finally making a progress to take control of the texting and driving situation. If the law is passed, the worst punishment would be a 300 dollar fee and up to 90 days served in jail, however, it is unclear on how many warnings a repeat offender willShow MoreRelatedTexting While Driving And Driving1184 Words   |  5 Pagesexploring apps, to texting while driving, peop le cannot seem to put down their smart-devices. According to the passage Introduction to Cell Phones and Driving: At Issue, the average amount of texts people send daily runs from around 40 – 110 (2015). It may not seem like the highest number, but knowing that more than half of those messages are sent while driving makes the matter of texting a lot worse. At this point in time, there have been laws prohibiting texting and driving as well as talking onRead MoreTexting While Driving And Driving883 Words   |  4 Pagesgovernments try to make to avoid people texting while driving, only so much can be done on the government’s and law enforcement’s side of the matter. Different states have different rules. Some outlaw texting while driving when under the age of 21 or 18. Other states have hand-held bans on cell phones while some states have an all-phone ban. Law enforcement officers who regulate and enforce traffic matters have to catch the person in the act of tex ting while driving. Catching a person in the act is notRead Moretexting while driving1007 Words   |  5 Pagesï » ¿ The Dangers of Texting While Driving Over the past few years, texting while driving has become a major issue for many Americans across the country. It has been the cause of many deaths and injuries and is a huge distraction for drivers. Texting while driving is said to be as dangerous as drunk driving. Many campaigns have been developed to further reduce the rate of accidents caused by texting while driving, but these are not taken to notice by the thousands of people taking their chancesRead MoreTexting While Driving And Driving993 Words   |  4 PagesTexting while Driving â€Å"Text messaging †¦ had the longest duration of eyes-off-road time of 4.6 seconds at a six second interval. This equates to a driver traveling the length of a football field at 55 miles per hour without looking at the roadway.† This statement was made by the Virginia Tech Transportation Institute when they did a texting while driving study (â€Å"Skip Menu†). Texting while driving has become a large problem in the United States and it is growing. There are about 1,600,000 accidentsRead MoreTexting And Driving While Driving1518 Words   |  7 PagesSummary Texting in cars and trucks causes over 3,000 deaths and 330,000 injuries per year, according to a Harvard Centre for Risk Analysis study. Texting while driving a vehicle has now replaced drinking while driving as the leading cause of accidents and deaths of teenage drivers. Texting in traffic isn’t simply a problem among teens and 47% of adults admit that they text while driving. Texting drivers are 23 times more likely to be involved in a crash than non-texting drivers (Driving while TextingRead MoreTexting While Driving1688 Words   |  7 Pagescall while already out? Break out that cell phone and call whomever is needed; it is just that easy. Need to get a message to someone but not in a position to talk? Send a text message and get things squared away in just a few seconds. Nowadays, cell phones even come with all kinds of games and other fun applications that help to relieve boredom and occupy the time of the beholders. This is great and all, but what happens when these individuals are abusing these phones and using them while they areRead MoreTexting While Driving: Texting to Death1158 Words   |  5 P agesSeeing someone behind the wheel of a car and texting has become quite a frequent sight. Texting and driving is a serious hazard, which could ultimately cost you your life or others. This pressing issue needs well thought out ads that will convince people to act on this deadly habit and not just be aware of it. Through that idea I felt that my ad is a perfect fit for this problem. This will be revealed through understanding how important this topic is, while also understanding the pathos and logos behindRead MoreEssay on Public Service Announcements on Texting and Driving1154 Words   |  5 Pagesdisregard warnings and are most like to be distracted drivers, texting and driving PSA’s bring awareness and self consciousness to the general public as they display from moderate to severe graphic scenes on what happens when you take your eyes off of the wheel. A distracted driving PSA ad is not only one of the best ways to alert people of the consequences of unfocused driving, but it can also reduce the number of distracted driving incidents, thus keeping families not only careful and alert, butRead MoreDriving While Texting : Distracted Driving992 Words   |  4 Pagestraffic deaths nationwide were due to distracted driving. It is believed that distracted drivers are 23 times more likely to get into a traffic accident as compared to those who are completely focused on the road. The Ohio State Highway Patrol reports that there were 302,307 motor vehicle crashes in Ohio in 2015. These crashes resulted in 1,110 fatalities. 22 of these fatalities were attributed to drivers who were distracted by their phones, texting, emailing or other electronic communications. 17Read MoreA Research On Texting While Driving939 Words   |  4 Pagesphones to send or receive text messages while driving despite the majority recognizing that the activity represents a risk. It found that male drivers are more likely to engage in texting while driving but consider themselves more proficient drivers than others and so less likely to endanger themselves or others while doing so. Analysis indicates texting impulsiveness is positively associated with people who text frequently and those who text while driving, it reports in the International Journal