Sunday, December 29, 2019

Economic Growth Of Latin America - 1623 Words

INTRODUCTION: Obscured by the enticement of Asia the Latin American market has been overlooked by major Australian companies. Recent studies show Latin America to be much more appealing for Australian companies than predicted. When it comes to marketing dimension, the largest Latin National market segments – Brazil, Chile, Argentina tends to be compelling for Australian trade as Chile and Brazil are major trade partner in Latin America. The Latin America region has witnessed swift adjustment economically and politically in the recent years which accelerated it’s opportunities of trade with Australia. The acceleration in economic growth of Latin America has created demand for diversified products in the region which has further created†¦show more content†¦Usually automated mining consists of two types of technology with the first dealing with the operations and software advancement and second one helps in mining vehicles and equipment with computerized technology by applying robots. The technology is offered in three forms full automation, remote control and teleoperation. Handheld remote control helps in mining bulldozers that operate in risky conditions like underground mining, blast areas and are operated with the use of handheld remote. Teleoperated technology also helps in mining vehicles by a operator but at a safe distance from the mining location with use of positioning software, cameras. Lastly whole automation, providing actual autonomous command of more than one mining vehicle. Robotic technology is used mostly for accelerating, ignition, and brake without the need for operator. EXCHANGE RATE REGIME AND VOLATILITY: The selection of exchange rate regimes has decisive implications on the behaviour of the nominal exchange rate. It is the key macroeconomic parameter that affects the behaviour of relevant nominal and real exchange rates including the balance of payments, inflation rate, employment levels and the GDP rate. It emerges from our analysis is that the Latin American countries have benefited from adopting more flexible exchange rate regimes to manage with global financial volatility. From the 2000s, almost all the major Latin American countriesShow MoreRelatedEconomic Growth And Development Of Latin America Through Socialism1961 Words   |  8 PagesEconomic Growth and development of Latin America Through Socialism. South America is turning to the left this much is widely known. It is due to the socialist ideas and values that are very old in the Latin American culture. They can be found, according to Hugo Chà ¡vez, in biblical texts, in the Gospel, and in the practices of our indigenous peoples. The Bolivarian Revolution that started in Venezuela under the presidency of Hugo Chà ¡vez has reignited debate in Latin America and internationally onRead MoreRelationship Between Social Institutions And Economic Growth By Comparing Countries From East Asia And Latin America1072 Words   |  5 Pagespolicies in East Asia and Latin America, the existing literature mainly focuses on the government’s role in the nation’s economic growth (e.g., Haggard and Cheng 1987; Krugman 1994; Birdsall and Jaspersen, 1997; Todaro and Smith2003). There is a lack of research in the effect of social institutions on economic performance in these two regions. The main proposition of this research is an anal ytical focus on the relationship between social institutions and economic growth by comparing countries fromRead MoreTrade Between China And Latin America1162 Words   |  5 PagesIn 1999, trade between China and Latin America totaled approximately $8 billion; by 2009, that number had had grown to $130 billion. Earlier this year, a study by the United Nations’ Economic Commission for Latin America and the Caribbean (ECLAC) concluded that by the year 2016, trade between China and Latin America will surpass that between the Eurozone and Latin America, making China Latin America’s second largest trading partner. Most studies of this partnership have focused on: a growing securityRead MoreA Review On Disclosure Practices1726 Words   |  7 PagesA Review of Disclosure Practices of Latin American Companies Abstract This paper analyzes current practices in several Latin American countries in the areas of corporate disclosure and transparency by focusing on the extent to which information is disclosed to investors through public channels, such as websites. We find weak disclosure practices, which will continue to prove problematic for capital flows and the future development of these countries. Specifically, poor disclosure practices leadRead MoreThe Latin American Debt Crisis1584 Words   |  7 Pages The Latin American Debt crisis did not occur over night, the crisis was many years in the making and signs of its arrival were prominent in Latin American society. The reasons for its occurrence are also expansive; some fault can also be place in countries outside of Latin America. The growth rate in the real domestic product of many Latin American countries grew at a constantly high rate in the decade prior to the crisis in the 1980s, this growth led to an increase in foreign investment, corporat eRead MoreEffects Of Economic Development On A Nation1511 Words   |  7 Pagescauses of economic development in a nation can vary, but popular arguments for their success is the geographical location of that nation, and their amount of natural resources. The broadening of economic wealth for a nation could lead to many outcomes, such as conflict, shifts in power, or a complete transfer in political ideology. From the late 1880’s through the 1920’s there was an exponential jump in the economic growth of Latin America. This spike was the result of the harvesting of Latin AmericaRead MoreThe Latin America Debt Crisis1002 Words   |  5 PagesThe Latin America debt crisis What Happened Both internal and external for Latin Americas roller coaster economic performance in what was known as the crisis. During the 50’s and 60’s there was favorable conditions in place to maintain steady employment creation, capital investment and overall economic expansion. But this period ended in 1973 amid the first world oil crisis rocked the world economy and caused an era of debt-led growth among the oil importing Latin America countries. Latin AmericanRead MoreThe Post War Era Of Reconstruction1313 Words   |  6 Pagesmodern economic thought. This lead to a rapid embrace of Keynesian, or centrally planned economic theories, to encourage the recovery of nations devastated, as well as the growth of nations that were not at that point considered amongst the â€Å"developed world†. This radical notion of central planning resulted in many nations expanding the traditional role of government in the context of the economy. This shift in dynamic and approach to econo mic thought was felt especially in the fledgling Latin AmericanRead MoreNeo Liberalism1568 Words   |  7 PagesWyckoff, 2008). There are several Latin American countries who are accepting the neoliberalism ideology; however, there are some countries like Peru and Bolivia who are not embracing the neoliberalism philosophy. â€Å"Recent protests in Peru and Bolivia reflect the popular anger against trade policies that seem to benefit only the elite† (Rowntree, Lewis, Price, Wyckoff, 2008). This essay will discuss neoliberalism policies in depth as well as neoliberalism in Latin America. Furthermore, this essay willRead MoreEssay on The Impact of the Remittances in Latin America1400 Words   |  6 PagesIntroduction In Latin America migration and remittances have become structural features in the economy, the society, and in the political environment; due to the underdevelopment and inequality of the region. Because they relative importance, trends in migration and the impact of remittances in population of Latin America are the main topics that we will analyze in this research focusing on reduction of poverty and inequality. This research will aim to answer the next: Do remittances finance

Saturday, December 21, 2019

A Comparison of the Poetry of Emily Dickinson and Robert...

The Poetry of Emily Dickinson and Robert Frost The poetry of Emily Dickinson and Robert Frost contains similar themes and ideas. Both poets attempt to romanticize nature and both speak of death and loneliness. Although they were more than fifty years apart, these two seem to be kindred spirits, poetically speaking. Both focus on the power of nature, death, and loneliness. The main way in which these two differ is in their differing use of tone. The power of nature is a recurring theme in the poetry of Emily Dickinson and Robert Frost. Dickinson uses this theme in her poem `Nature is what we see -. The power of nature is strongly portrayed in this poem by Dickinsons articulation of what the speaker sees in nature. †¦show more content†¦Frosts poem is recalling the speakers childhood. So was I once myself a swinger of birches. / And so I dream of going back to be (472-473). Nature held such power over the speaker as a child that he dreamt of going back to relive being one with nature and swinging in the trees. Dickinson and Frost both used death and loneliness as main themes. In Emilys poem my life closed twice before its close - it has been interpreted that the speakers life closed twice when two lovers died leaving the speaker alone. The speaker also refers to her own death when it is said, If Immortality unveil / A third event to me (278). The third event is referring to the speakers own death. In the last two lines of the poem, Parting is all we know of heaven, / And all we need of hell(278). The speaker is talking about heaven being the relief of seeing pain end for the loved one. The interpretation of hell is the pain and grief that one feels after a loved one has died. Like Dickinson, Frost also conveys the themes of death and, even more so, loneliness. In his poem, Acquainted with the Night the speaker outwalked the furthest city light (466). The narrator of this poem has walked outside of society. He has walked out in rain-and back in rain(466), this symbolizes that the speaker has endured a lot. Frosts poem Fire and Ice not only speaks of the end of the world, but also the end of the speaker himself: Some say the world will endShow MoreRelated The Theme of Death in Poetry Essay819 Words   |  4 PagesThe Theme of Death in Poetry Robert Frost and Emily Dickinson are two Modern American Poets who consistently wrote about the theme of death. While there are some comparisons between the two poets, when it comes to death as a theme, their writing styles were quite different. Robert Frost’s poem, â€Å"Home Burial,† and Emily Dickinson’s poems, â€Å"I felt a Funeral in my Brain,† and â€Å"I died for Beauty,† are three poems concerning death. While the theme is constant there are differences as well as similaritiesRead MoreAnalyzing the Elements of Poetry Essay849 Words   |  4 Pagesbe very little that I would learn about the elements of poetry. This is not because I am an expert and have nothing new to learn, but rather the opposite. I have never really spent the time to break down and appreciate poetry. One of the reasons I think that I haven’t spent the time on poetry is due to my reading habits. I usually read to gather information and poetry is on the other end of the spectrum. Fredrick Gruber sums this up, â€Å"Poetry tends to give general truths while history gives particularRead MoreEnglish 10B Unit 4 Analysis of Poetry1144 Words   |  5 PagesUnit 4: Analysis of Poetry This Unit Activity will help you meet these educational goals: 21st Century Skills—You will use critical-thinking and problem-solving skills and communicate effectively. Introduction In this activity, you will read and analyze three poems by different poets and examine the similarities and differences among them. __________________________________________________________________________ Directions and Analysis Task 1: Read and Analyze Poetry Read these poems,Read MoreAmerican Literature11652 Words   |  47 Pagess inner feelings emphasis on the imagination over reason and intuition over facts urbanization versus nostalgia for nature burden of the Puritan past Genre/Style: ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · literary tale character sketch slave narratives, political novels poetry transcendentalism Effect: ï‚ · ï‚ · ï‚ · helps instill proper gender behavior for men and women fuels the abolitionist movement allow people to re-imagine the American past Historical Context: ï‚ · ï‚ · expansion of magazines, newspapers, and bookRead MoreANALIZ TEXT INTERPRETATION AND ANALYSIS28843 Words   |  116 Pagesmiddle. In still other cases, the chronology of plot may shift backward and forward in time, as for example in William Faulkner’s A Rose for Emily, where the author deliberately sets aside the chronological ordering of events and their cause/effect relationship in order to establish an atmosphere of unreality, build suspense and mystery, and underscore Emily Grierson’s own attempt to deny the passage of time itself. Perhaps the most frequently and conventionally used device of interrupting the flowRead MoreLogical Reasoning189930 Words   |  760 PagesNorman Swartz, Simon Fraser University v Acknowledgments For the 1993 edition: The following friends and colleagues deserve thanks for their help and encouragement with this project: Clifford Anderson, Hellan Roth Dowden, Louise Dowden, Robert Foreman, Richard Gould, Kenneth King, Marjorie Lee, Elizabeth Perry, Heidi Wackerli, Perry Weddle, Tiffany Whetstone, and the following reviewers: David Adams, California State Polytechnic University; Stanley Baronett, Jr., University of Nevada-Las

Friday, December 13, 2019

My Personal Learning Style Free Essays

Benjamin Franklin once said, ‘’Tell me and I forget. Teach me and I remember. Involve me and I learn. We will write a custom essay sample on My Personal Learning Style or any similar topic only for you Order Now ’’ Great quote to simplify how some people learn best, by doing rather than seeing or hearing. It is important to realize that most students do not know the learning style that stands out in their personalities; under that circumstance, it could be hard for them to improve their grades. That is why I consider important knowing and understanding the characteristic of a kinesthetic learner to thereby adjust my study habits and do better in college. Whereas for some people it is easy to remember materials they have seen or heard, for me it is easy to remember things that I have experienced. Likewise, I can say that ‘’learning through doing’’ is the first characteristic that helped me to recognize myself as a kinesthetic learner. Additionally, there are three others characteristics that put me in that category. First of all, I learn best by actively exploring objects. I do not usually read instructions or manuals, ‘’Forget the manual, I will work it out’’ is a phrase I use often when I buy a new electronic device or any product that needs to be assembled. Secondly, as a kinesthetic learner I find hard to study by reading or listening. It takes me more time to remember and understand the material given in class. As a result, I quickly get tired and bored about studying and later I may become distracted by my need for activity. The final characteristic that makes a this kind of learner is that I need to be active constantly. I may feel uncomfortable if I have to sit for long periods of time, specially in classrooms where I lack of opportunities for exploration. The only exception of a class where I never become bored during high school was chemistry, due to the experiments that the professor assigned in class. It is important for me as a student to know the study habits that fit better my learning style, it not only will help me to preform better in college, but it also will make me understand and study the material given in class easily and quickly. The first adjustment I would like to make to my study habits is joining to study groups. Better understanding of the course material and the development of teamwork skills are some of the benefits I can obtain by joining to people who are willing to learn with me. Another change I would make to my study habits to fit my learning style, would be studying in short blocks. It is true that my need of exploring distracts me while I study for tests or quizzes, but taking breaks of 15 minutes as a reward after studying from 45 to 60 minutes, will help me to get rid of any possible distraction or negative feelings such as, boredom or tiredness. By carefully making the right adjustments to my study habits that, at the same time, would fit my personal learning style, I know that I would improve and do better as a student not only in tests and quizzes, but also in college. How to cite My Personal Learning Style, Essays

Thursday, December 5, 2019

Pros and Cons of Intrsuion Detection Systems - Free Samples

Question: Discuss about the Pros and Cons of Intrsuion Detection Systems. Answer: Introduction: The case study is a research report/study conducted by the European agency for Network and Information security commonly known as ENISA. This is an organization that provides networking and information system security expertise in European Union member states, private firms and it citizen at large. This report provides a thorough analysis of security threats related to Big Data. The study looks into various big data assets which include abstract assets, virtual assets (for example, data), physical assets human resources and money. These assets are related to information and communication technology. ENISA provides various threats to these big data assets which include; loss of information, eavesdropping, interception and hijacking, nefarious activity, legal-related threats and organization-related threats (Panchenko, 2016). The report also provides more detailed information on some of the threat agents that brings about various big data threats. These agents are; corporations, cyber criminals, cyber terrorists, online social workers, script kiddies, employees and nation states (Hesley, 2014). All these agents posts various security issues to existing information systems as explained in the case study. Finally, the report by ENISA gives some of the recommendations or best practices in which can be undertaken in order to minimize these security threats to information systems. Some of which are; Access control, cryptography, information system security measures design among others. This report is based on various sources which include; desk research, conference papers, articles, technical blogs and open source information related to big data (Claudio Agostino, 2016). The report highlights various security techniques that are related to these information infrastructures. ENISAs Big Data security infrastructure diagram representing this can be shown below. The diagram above represents relationship between various categories of Big Data Assets, security techniques used and different infrastructures through which security measures are implemented to the data contained in these infrastructures. Top Threats The following are some of the top threats that I would consider more significant and which has a greater impact when it comes to the security of Big Data assets and infrastructure (Zadelhoff, 2016). According to this report, nefarious activities involve manipulation of existing information infrastructures by attackers using specific software or tools. These actions might lead to interference with the security of the Big Data infrastructures such as Storage models, software, hardware and computing models (Leech, 2016). Some of the security threats related to nefarious activities include; use of malicious code commonly known as virus to paralyze the operations of Big Data infrastructures. Identity theft which involve use of information system credentials by unauthorized persons, denial of information services, use of rogue certificates and audit tools misuse. The reason as to why nefarious threats are rated high is because in most cases where a malicious code is used, it always target large data sources especially in big company or government organizations (Henry, 2010). For instance, the use of wannacry virus that attack major organization information systems in 2017 (WOOLLASTON, 2017). Eavesdropping, interception and hijacking This is where attackers intercept information being transmitted via the information systems infrastructures such as network. The attackers tap on the transmission media by accessing the victims network and thereafter gaining unauthorized access to the data contained in the information system. This interferes with integrity and confidentiality aspect of the information contained in the information systems (Gill, 2015). This threat is one of the top since most it is done via the internet and once the attacker has established a connection with the victims system, a lot of damages can be caused; such as information theft, modification or even rendering services unavailable (Zetter, 2013). This is information is lost by mistake and it fall into the hands of unintended people. This leakage of information would be as a result of unintended information sharing such as via emails, web applications or inadequate information on the information system in use (Darmian, 2015). This kind of information system threat can damage the victim largely. For instance, if the data contained in the information system belongs to patients in a hospital, then the information is leaked to the public by mistake, the victim in this case the patient will be so much damaged and traumatized as his/her medical information will no longer be confidential as it should be the case. Big Data Security Threat Agents These are people who conduct unauthorized activities using the internet or networking channels by targeting an information system. These criminals conduct these activities for their own personal gain. The motive of cyber criminals would be information theft or modification of information such as Point of sales, banking systems among others for the purpose of financial gains. The victims of cyber criminals can be local, national or international organizations such as banks, insurance companies, and many more (Mbele, 2014). According to a report be Peter, countries such as South Africa, China and Russia were highly affected by cybercrime between 2011 and 2013 (Mbele, 2014). Cyber criminals can be controlled in various ways. One of the ways in Control of Access. This feature of security entails a way of authorization level classification process where each system user has his/her own access credentials to a defined part of the information system. This will prevent unauthorized users from accessing unauthorized information thus reducing cybercrime rate. Another mechanism is the use of anti-virus by organization handling big data. This will ensure that malicious software or codes used by cyber criminals do not penetrate into the information system. Another control of cybercrime is monitoring of the information system infrastructure and scanning all the information contained in the system. This will ensure that every unauthorized behavior is detected and taken care of before any damages are made (c, 2017). ENISA report mentions cyber terrorist as one of the information system security threats. Cyber terrorist are those people who use internet to establish attacks by using viruses, malwares to computer networks belonging to various people or organizations. Some of the targets of these terrorist include; individuals, governments and organizations. This act of terrorism is always propagated by political or religious ideologies. The main aim of cyber terrorist is to cause damage and bring about destructions through the use of internet and information systems of their victims (Curran, 2016). To mitigate cyber terrorism various security measures can be used. These security techniques include; Design of information system security mechanisms from the start. This is a preventive measure that will ensure that the information system is secure from any attacks. Consideration of this approach of integrating security measures into the information system during design will enhance security by ensuring that intended attacks are prevented and therefore damages intended by cyber terrorist are avoided. Another security measure is physical isolation of the information systems. This will ensure that physical attacks such as theft of information system assets or devices are prevented. This approach also will reduce electromagnetic pulses attack that could be done by the terrorist on the electronic devices of the information system. Another way of preventing cyber terrorism is the use of cryptography security mechanism (Goodman, 2008). This is where the information system infrastructure such as the computer network and the data contained in the information system are encrypted. When these assets are encrypted it will be difficult for the cyber terrorists to penetrate through the information systems and launch their attacks. Online social hackers According to the ENISA report, these are attackers who are influenced by political and social issues. These types of attackers uses existing computer systems to address their issues or cause harm to others using social sites such as websites, institutions such as military, corporations or intelligence agents (Claudio Agostino, 2016). This form of hacking is aimed at manipulating information which in turn influences the social perspective or behavior of the victim. Online social hackers always get access to their victims information without the victims consent. This is achieved by the attacker impersonating his/her victim after acquiring the victims credentials either directly or indirectly. Once the attacker has been able to gain access to his/ her victims information, he uses the victims weakness to influence the social perspective or image of the victim. For instance in the case where an attacker accesses a victim credentials for a social site such as Facebook, the attacker might c hoose to post images or posts that might affect the social behavior of the legit Facebook owner. The attackers mainly use tools related to their targets hence bypassing privacy of their targets. The attackers uses various sources to access the social sites such as; loggers and social sites accounts among others. Also they use high tech techniques to penetrate the social platform of their target organizations. In order to mitigate such attacks, measures such as use of strong credentials to prevent hackers from accessing unauthorized information should be put into considerations. Such credentials should be hard to guess even through brute force attempts. Also the information shared or transmitted over an information system should be encrypted in such a way that it would be difficult for the attacker to manipulate it. Also access control mechanisms should be considered. This will ensure that attackers do not get access of the information they are not meant to see. This will reduce most of the social attacks that might be propagated via the information systems. Looking at the data provided on the involvement of threats agents in facilitating different security threats explained in the ENISA report, it is evident that all the highlighted threats can be caused by any of the threats agents which include; Corporations, cyber criminals, cyber terrorists, script kiddies, online social hackers, employees and nation states. This shows that there are no specific threats that are associated by specific agents of threat. Any agent can give rise to any threat and therefore the information systems should be protected against all security threats agents in order to make it more safe and secure from attacks. Improvement of ETL process Due to large amount of information in whole ETL process, an improvement of its performance is necessary in order to make the whole process smooth. Thus, the process could be improved by considering the followings: Use of rows which are only changed:this will reduce the large amount of data extracted in this process and in turn the processing speed of the ETL processes will be improved. The rows should be extracted by having tables containing information from previous ETL run date. Batching:This will be used to improve the performance of the whole process by either extracting the various rows by separating them logically or by recurring used data already extracted. This will ensure that data is being extracted at different intervals thus making the process more efficient. This would also in reduce the amount of data used for each implementation of ETL load. Thus diminishing the amount of load on the system network and various conflicts of resources at the main database. Implementation of SQL Server Destination: This will improve the performance of the ETL process since in the case where information is to pushed to a local server, the SQL server destination will reduce the process limitations. This will also provide the enable and disable options during the process of loading data thus reducing problems affecting the performance of ETL. ENISA satisfaction on it Current state of IT security As per this research, it is right to say that ENISA should be satisfied with its current state of IT security since they have identified information security threats and group them into categories and then provide mechanism on how to mitigate the identified threats. ENISA security measures help in both reducing the number of effects associated with these threats and also provide ways of securing the information through various infrastructures without interferences. Also the fact that the ETL process has improved the extractions of rows inserted or changed, this has led to improvement of ETL operations and functions at large. ENISA has also solved some of the threats contained in the embedded systems and other hardware devices by taking them out. Also all threats that could bring about information leakages or unauthorized access have been controlled by use of control access and use of safe and secure credentials. From the analysis carried out on the ENISA report, it is evident that intrusion detection systems, firewalls and loophole scanners have a greater impact on the protection of information systems. Benefits which are brought about by the use of these mechanisms are discussed below respectively. Intrusion detection systems IDS are those tools that are integrated into the information systems and acts like an alarm to any potential threats towards the information system. They are mainly on the network and are aimed at monitoring network traffic (Lake, 2017). These tools have sensors which detect any outside attack into the system. These systems help in creating threat awareness of someone or anything trying to activate nefarious activities such as identity theft, use of malicious code or even denial of service as seen in the ENISA report. Therefore, with IDS in place any intrusion will be automatically detected and if attended quickly no harm will befall the information system. The use of firewalls which is a system that is placed on the network or internet help in protecting various agents of threats as seen in the ENISA that aim at directing an attack into the information system or Big Data systems (Lacher, 2017). Some of the benefits of firewalls include; preventing unauthorized access to the system thus safe guarding the systems from external attack. Every activity within the information system network is filtered in the firewalls and if any activity is found to be from unauthorized persons then it is blocked. This prevents the information system from various attacks such as eavesdropping, interception and hijacking. It also prevents any nefarious activities such as use of malicious code to attack the system. Vulnerability scanners These are tools that are used to assess any loopholes in the information system which consist of networks, software computers and operating systems. These tools are good in detecting any security threat at an early stage and also help in preventing such threat from attacking the systems (HKSAR, 2008). The tools also can be able to detect unauthorized or rogue systems that act as a threat or might lead to security threat to information system. With these tools it is easy to conduct a thorough inspection and monitoring of all devices or infrastructures of information system as explained in the ENISA report. Therefore, the use of these tools will improve the security of the information system since solutions to the loop holes found are easily implemented thus making the system more resistant to external attacks. Conclusion It is therefore concluded that ENISA report for security standard has given the support to the information systems, networking and cyber security improvement. This support could impact the operations and functionalities of an IT organization. This report provides various strategies that are useful for mitigating insider security threats as well some of the top information system security threats from the ENISA report for analyzing the various impacts on the strategies and operational security. Also a number of detailed information on various Agents of threats which include online social hacking threats that affect organizational functions (Falkner, 2015). References Five steps to mitigate the risks of increasing cyber attacks in healthcare. MetricStream. Claudio Agostino, F. Z. (2016). Big Data Threat Landscape and Good Practise Guide. ENISA. EU: European Union Agency for Network and Information Security. Curran, P. (2016). Cyber Terrorism - "How real is the threat?". check marrx. Darmian. (2015). Towards Big Data Leakage Analysis. Proceedings of the privacy and security of Big Data workshop, 2-3. Falkner, J. H. (2015). "Identification of IT Security and legal requirements regarding Cloud services". Research. Gill, T. (2015). 2016s top information security threats. IT disaster recovery, cloud computing and information security news, 1-5. Goodman, S. (2008). Cyberterrorism and Security Measures. NAP. Henry, V. (2010). Top 10 Security Threats Every IT Pro Should Know. IT-opts, 2-4. Hesley, R. E. (2014). Identifying Information Security Threats. Previous Screen, 10-13. HKSAR, G. o. (2008). An Overview of Vulnerability Scanners. Government of the HKSAR. Lacher, S. (2017). What are advantages and disadvantages of firewalls. Leaf Group Ltd. Lake, J. (2017). The pros and cons of intrsuion detection systems. Komand Komunity. Leech, S. (2016). Cloud Security Threats - Abuse and nefarious use of cloud services. Grounded in cloud, 1-2. Mbele, P. (2014). Cyber-crime Treat and Mitigation. Johannesburg: iAfrikan. Panchenko, A. (2016). Nine Main Challenges in Big Data Security. Europe: Data Center Knowledge. WOOLLASTON, V. (2017). WannaCry ransomware: what is it and how to protect yourself. Ransomware, 1-2. Zadelhoff, M. v. (2016). The Biggest Cybersecurity Threats Are Inside Your Company. SECURITY PRIVACY, 1-5. Zetter, K. (2013). SOMEONE'S BEEN SIPHONING DATA THROUGH A HUGE SECURITY HOLE IN THE INTERNET. 1-8.