Wednesday, February 26, 2020

Introduction & Conclusion Essay Example | Topics and Well Written Essays - 500 words

Introduction & Conclusion - Essay Example overview of the history of my hometown and some information and trivia of note that helps make the Freetown, Sierra Leone area of West Africa a very interesting place to visit. Not everyone knows that Freetown is the capital city of Sierra Leone and as such, holds the distinction of having the Atlantic Ocean as its major port. This city, with a current population of over 1.2 million has an economy that relies heavily on the harbor for its jobs with the Sierra Leone River providing most income for the population thanks to having the worlds largest natural deep water harbor. As a historical landmark, Freetown is home to the founding history of Sierra Leone. Founded by African - Americans, it once also housed liberated West-Indian and African slaves. All symbolically represented by the Cotton Tree which once stood as the historic symbol of Freetown. Freetown exists with a mostly tropical climate that has only 2 seasons, wet and dry that is enjoyed by the Muslim and Christian residents of the area. All of whom are united by the Krio (Creole language) that is the first language of all Freeportians. English is also spoken widely among the more well educated members of the town society. Comprised of 6 municipalities and governed by a city council, its local government is composed of a typical heirarchy: a mayor with executive authority who also happens to be the city manager, and the elected members of the Freetown City Council who hold their offices for 4 years respectively. It has been led by the All Peoples Congress since the 2004 elections. As a modern 21st century town, Freeport continues to exercise its importance as the economic center of Sierra Leone. With the continued development of the Queen Elizabeth Quay II, the Freetown port is highly capable of receiving a vast number of ocean going vessels in support of the countrys export industry. Industrial developments covering food and beverage processing, fish packing, rice milling, oil refining, diamond

Monday, February 10, 2020

Wa#2 Assignment Example | Topics and Well Written Essays - 500 words

Wa#2 - Assignment Example An example is an employee who gets access to several reports on salaries and decides to compute the individual salaries of some employees. She is allowed to access each report individually, but she does not have permission to know individual salaries. In other words, not properly understanding the implications of access to several data all at once can lead to semantic security breaches. 2. Reporting systems increase the risks of semantic security breaches because they give access to several reports simultaneously for reporting needs. Reporting systems do not realize that giving a bulk of information to one employee can result to the latter using them to deduce certain information that they are not allowed to know or access. These systems are important to getting work done, but they can offer access to too much information that can result to semantic security breaches. These systems unintentionally offer information that one person should not have, provided that the person does some deduction that can result to logical assumptions. 3. An organization can protect itself from accidental losses due to semantic security problems by ensuring that no one person can get access to several data systems or data that can result to semantic security breaches. At the same time, it can hire one people to do one part of the job and not all of the activities of the job, so each person can have limited permissions to access data. Furthermore, it can create clear policies about permissions and data restrictions and penalties for transgressions. These transgressions can prevent employees from conducting data triangulation. Moreover, it can also ensure that the organization has records of the data access it gives to different employees, so that if semantic security breaches happen, they can determine who accessed what. At the same time, the organization can purchase insurance on its semantic security, so that it can have access to