Saturday, December 28, 2019

Analysis Of Toni Morrison s The Bluest Eye - 1232 Words

In modern society, women continue to be victimized by an illusory culture that offers the affectation of equality and hope but a reality of gender inequality. The little acts of chivalry conducted by men are just prolonged sugary illusions meant to hide the unpleasant truth of women and their strained relationship with the media s’ perception of beauty. Many women who are subjected to society s’ views of beauty often aim to convert to theses said beauty standards. This desire can, at many times, become unhealthy and lead to problems such as anorexia, bulimia, and self-hate. There is clearly a need for re-self-identification within the Black female community. With focus on self-hate one can see that this problem particularly becomes apparent in African American communities, author Toni Morrison in her novel The Bluest Eye not only highlights this self-hated within the Black community but also displays an urgent need for feminism within the black community, through her ch aracterization of Pecola, and Claudia. One indication of Morrison’s intentions is her creation of Pecola as an African American female character who apparently think that she is worthless, as she does not fit society s strict beauty standards of being white and or fair skinned. Secondly, Morrison portrays the narrator Claudia as a strong African-American female with an aversion to the beauty myths of her society. However, Morrison exposes Claudia fighting feelings of anger and self-hate towards not onlyShow MoreRelatedAnalysis Of The Bluest Eye1555 Words   |  7 Pages The Bluest Eeye Bbackground A woman’s race and the time period she lives in influences not only whether she will be a victim of sexual assault but also, the punishment of the offender. Toni Morrison, The author of The Bluest Eye, a victim of segregation, deals with sexual assault and segregation in her book. Chole Anthony Wofford, who goes by the name of Toni Morrison when writing her books, was born in Lorain, Ohio on February 18, 1931. Her father had several jobs to supportRead MoreToni Morrison s Beloved And The Bluest Eye2300 Words   |  10 PagesLiterary Analysis Paper Toni Morrison s Beloved and The Bluest Eye Toni Morrison is known for her use of poetic language. In many of her writings Morrison captures the pursuit of African Americans identities(Parnell). Considering Morrison never experienced the horrific tragedies she writes about, she is a witness to many identities that were destroyed by society depiction of them. The themes that Toni Morrison illustrates in her works Beloved and The Bluest Eye demonstrates how Toni Morrison worksRead MoreThe Bluest Eye Essay1462 Words   |  6 PagesToni Morrison’s The Bluest Eye (1970) takes place in Ohio towards the tail end of the depression. The story focuses on the character of Pecola Breedlove who wants to have blue eyes. Pecola becomes convinced that if she had blue eyes her life would be different. Through the eyes of our narrator, Claudia, and her sister Frieda we see the pervasive racism and abuse Pecola is subjected to. Claudia and Frieda act as witnesses to Pecola’s disintegration and as a result, they will spend the rest of theirRead MoreLiterary Analysis Of Recitatif1135 Words   |  5 PagesLiterary Analysis Paper: â€Å"Recitatif† by Toni Morrison Many authors write fictional novels about historical events. A common topic written about is the racial integration between African Americans and whites during the 1950’s. Although the short story â€Å"Recitatif† explicate many different themes, the central topic of Morrison’s writing is about racism. Throughout the story, the author expresses examples of hatred between black and white races at the shelter, the different encounters they have, andRead More Compare racial and cultural struggles in Alice Walker’s The Color2850 Words   |  12 PagesWalker’s The Color Purple as well as Toni Morrison’s The Bluest Eye. In African-American texts, blacks are seen as struggling with the patriarchal worlds they live in order to achieve a sense of Self and Identity. The texts I have chosen illustrate the hazards of Western religion, Rape, Patriarchal Dominance and Colonial notions of white supremacy; an intend to show how the protagonists of Alice Walker’s The Color Purple as well as Toni Morrison’s The Bluest Eye, cope with or crumble due to theseRead MoreBlack Naturalism and Toni Morrison: the Journey Away from Self-Love in the Bluest Eye8144 Words   |  33 Pagespostmodernism with its emphasis on race, class and gender, but the theory of naturalism as well: the idea that one s social and physical environments can drastically affect one s nature and potential for surviving and succeeding in this world. In this article, I will explore Toni Morrison s The Bluest Eye from a naturalistic perspective; however, while doing so I will propose that because Morrison s novels are distinctly black and examine distinctly black issues, we must expand or deconstruct the traditionalRead MoreThe Bluest Eye Essay1889 Words   |  8 Pageseasy bridge to cross and the road to recovery is never an easy route. In the â€Å"Bluest Eye† written by Toni Morrison, it tells a story in the narrative of Claudia MacTeer. She tells the story of childhood memories about what happened to Pecola through seasons and the influe ntial characters and events that shape Pecola s life. Pecola was an adolescent who felt her black beauty wasn’t enough and dreamed of having blue eyes. In the story, she was raped by her drunk father when she was eleven years oldRead MoreEssay on Themes in Song Of Solomon2113 Words   |  9 PagesToni Morrison is one of the most talented and successful African-American authors of our time. Famous for works such as The Bluest Eye, Sula, and Beloved, Morrison has cultivated large audiences of all ethnicities and social classes with her creative style of writing. It is not Morrison’s talent of creating new stories that attracts her fans. In contrast, it is her talent of revising and modernizing traditional Biblical and mythological stories that have been present in literature for centuries.Read MoreThe Bluest Eye And Alison Bechdel s Fun Home Essay2269 Words   |  10 PagesToni Morrison’s The Bluest Eye and Alison Bechdel’s Fun Home are both novels that e mploy a reflective narration of the past to address common themes of trauma, unorthodox family relationships, and sexuality. Although they demonstrate pronounced differences in setting and design, both stories utilize this retrospective narrative to expose masculinity’s stratified hegemony as a driving force of internalized shame, violence, and the death of self. Furthermore, it becomes clear that these shared themesRead MoreThe Bluest Eye By Toni Morrison1760 Words   |  8 Pagesmind, not knowing whether to doubt herself or listen to her screaming thoughts. in Toni Morrison’s The Bluest Eye, we meet Claudia, a young girl growing up in a puzzling environment. Claudia is growing up in an era where society’s ideology has been carved out by a single group—White America. Beauty is one of the aspects that is forged by this group. Claudia is aware of what society tells her: beautiful is blue eyes and blond hair, and it is not dynamic. Her awareness takes her on a muddled journey

Friday, December 20, 2019

Serial Killers Be Understood By Society - 924 Words

Serial killers are yet to be understood by society. Psychologists have no reason behind why serial killers do what they do and what motivates them to murder innocent people. In most cases, police investigations and forensic data collected from crime scenes leads to arrest. In â€Å"The Chessboard Killer† by Peter Savodnik, the case of Alexander Pichushkin, a Russian serial killer, in prison after being convicted of killing 48 people maliciously. Pichushkin stated, â€Å"For me, life without murder is like life without food for you.†(204). Psychologists have found him insane, yet they have no explanation for his madness. In this article about Alexander Pichushkin, Savodnik uses logos in the article through data collected, Pichushkin’s life details, and direct quotations from those involved to reveal how the Russian society created such a violent individual. On the outside, Alexander Pichuskin seemed to be an ordinary person. He spent most of his days living on the couch of his mother’s apartment with the rest of his family. He worked in a grocery store as a clerk. Pichushkin drank heavily, the way many Russians did, with cheap vodka and beer. He socialized with others on a regular basis that shows a sign of normalcy. However, signs of trouble were apparent. He began withdrawing from society and his family, yet no one really noticed. Many psychologists believe that the abandonment of parents does not necessarily contribute to a person becoming a serial killer. In many cases, childrenShow MoreRelatedSerial Killers in the World1085 Words   |  4 PagesOverview In the 1980s serial killers were understood to be a new development, a phenomenon frequently accredited to the excesses of American culture. It was a decade of change, one of freedom and great music. It was also a decade that brought the shock and fear of serial killers. Today it seems as if all societies have serial killers. People in today’s society are left with questions such as: Who are they? Why are they so different? Why do they commit such horrific crimes? There are many theoriesRead MoreA Critical Analysis of Healthcare Serial Killers1484 Words   |  6 PagesSerial murder, which is defined as â€Å"the unlawful killing of two or more victims, by the same offenders, in separate events†(Lubaszka Shon, 2013, p. 1), is a term that American society has become quite familiar with. At a ripe age, parents begin teaching their children not to talk to strangers in hopes of shielding them from the potential evil our world has to offer, but what if I told you the serial killer may not always be the scary man driving a van and offering candy? Our society, like it doesRead MoreJeffrey Dahmer : An American Serial Killer912 Words   |  4 PagesAccording to the FBI (Federal Bureau of Investigation), a Serial Murder is defined as â€Å"The unlawful killing of two or more victims by the same offender(s), in separate events.† Jeffrey Lionel Dahmer, who is well known as an American serial killer and sex offender who was born on May 21, 1960, in Milwaukee, Wisconsin. He is known for his murders committed in his teenage years between the years of 1978 and 1991; Jeffrey Dahmer murdered 17 males. He not only murdered 17 men, but horrifically disposedRead MoreIs Sociopaths Lack Of Guilt? Essay1479 Words   |  6 Pagesguilt.. Sociopaths are usually defined as people displaying antisocial behavior which is mainly characterized by lack of empathy towards others that is coupled with display of abnormal moral conduct and inability to conform with the nor ms of the society. People suffering from antisocial personality disorder are often referred to as sociopaths. Some of the other characteristics that sociopaths may display are stealing, lying, lack of remorse for others and towards living beings, irresponsible behaviorRead MoreSerial Killers1651 Words   |  7 Pagesthe case, then what makes a serial killer tick? The definition of a serial killer is; a series of two or more murders committed as separate events usually, but not always, by one offender standing alone. (Brookes, 1988) Over the years, many murderers have been given this term. From the early days of Jack the Ripper, to the most recently publicized case of the sniper, all have different motives and reasons to the crimes that they commit. Most of the serial killers suffer from mental illness/addictionsRead MoreWithout the Rule of Law Anarchy Would Prevail800 Words   |  4 Pagesto fight the law without even realising what is happening. People can not live side by si de without conflict. I think it is impossible. Everyone has opinions, and our own certain way of performing which might cause conflict. Such as in the worlds society. Not a single person on this earth has no opinion. We couldn’t count how many people, woman, and man child has died fighting for what they believe in, or basic civil rights. Tiananmen Square 1989, there was no one reason. People of China were inRead MoreAileen Wuornos1416 Words   |  6 PagesWuornos, serial killer. A serial killer is someone who murders more than three victims one at a time in a relatively short interval. Serial killers have the ability to behave in a manner that arouses no suspicion. There are, however, a few signs to identify their potential to become a serial killer. People who suffers from psychopathy, involves a huge tendency towards antisocial behavior, are most likely to develop into a serial killer. FBI estimated that any given time between 200 and 500 serial killersRead MoreThe Scien ce of Criminology: Understanding the Mind of a Killer1108 Words   |  5 Pagesindirectly brought it into the United States and rest of the world. On the other end Jeremy Bentham supported Beccaria and shared ideas and common theories about criminology and criminal behaviors, where both agreed that criminal conducts could be understood and well controlled. The classical school theory of criminology basically considers human nature rational and hedonistic where human beings acts caused self interest but at the same time rational and capable of creating new laws and punishmentsRead MoreCharacter Analysis Of Hannibal Lecter1543 Words   |  7 Pagesvillain become a villain? Is it not all just based on our society’s views on what is right and what is wrong? After binging Hannibal, this is pretty much all I could think for several days. One moment you’re hoping that whoever this cannibalistic serial killer is, gets caught and put away for a long, long time and then the next moment, you’ve fallen in love with him. It’s really quite a rollercoaster. This show raises a lot of questions about morality, it aims to take your preconceived notions aboutRead MoreThe Dangers Of Teenage Smoking Awareness987 Words   |  4 PagesHe decided to have a chat with his grandson in explaining why he shouldn’t get into the habit of smoking a cigarette. The grandpa straight goes to the point about why his grandson shouldn’t get in to the habit of smoking and he states that, â€Å"In a society it is not unordinary to see a teen year old child smoking a cigarette in public.† Grandpa describes how in big sports events in the major cities mostly around the world there are big cigarette companies sponsoring the sports event. Teenage students

Wednesday, December 11, 2019

The Social History Of Maycomb Essay Research free essay sample

The Social History Of Maycomb Essay, Research Paper The Social History Of Maycomb Maycomb is said to hold a really carinate societal construction. Some people would depict it as a societal trigon. In this piece of work I will seek to explicate that construction utilizing remarks made by Jem. At the top of the societal pyramid are the people that Jem describes as the normal common people, like themselves and the neighbors. These people would include Miss Stephanie, Mrs Dubose, The Radleys and Miss Maudie. However, we have found out that the Radleys are considered foreigners from the community because they don t tend to socialize. Jem and Scout had neer seen any of the Radleys outside their house until he saw Boo Radley, or Arthur Radley, one dark when Miss Maudie s house gimmicks on fire. The following people down on the societal graduated table are the people who are Like the Cunninghams, out in the forests. We will write a custom essay sample on The Social History Of Maycomb Essay Research or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page These people are rather hapless, but still hold self regard and certain regulations. For case, on Jem s foremost d ay at school, Walter Cunningham has no tiffin, so his instructor offers to impart him some money to run down to the stores for nutrient. However, he does non accept the money because he know he cant wage her dorsum. Below the Cunnighams are the people such as the Ewells. These are people who live down in the mopess and have particular regulations that they live by. Rules such as they can run all twelvemonth unit of ammunition and maintain what they kill. Besides, Burris Ewell and the other Ewell kids, merely have to travel to school for one twenty-four hours each twelvemonth. They don t attention what people think of them and they live their lives nevertheless they want. At the underside of the ladder are the inkinesss. In the narrative we don t here much about the inkinesss, except that Atticus is supporting one in tribunal. Because of this, Atticus is called a nigga lover by some members of the community. In simple footings, and in the words of Jem ; Our sort of common people Don T like the Cunninghams, the Cunninghams don T like the Ewells and the Ewells hatred and contemn the colored common people.

Wednesday, December 4, 2019

Challenge of Byod Security in Modern Day

Question: Describe about byod(Bring Your Own Device) security is a new challenge that modern day corporations are increasingly facing. Research the issue of BYOD security and write a report documenting your findings. Answer: Introduction Bring your device (BTOD) is also referred to as bring your technology, or bring your phone. It entails the policy of permitting the employees to bring their personal devices like laptops, the tablets, and smartphones to their place of work, and to use the tools to be able to access the privileged corporation information and the application. The BYOD scenarios the employees use their own devices for their personal and the work use. (Ghosh, Gajar Rai, 2013)This program can apparently blur in line between the business and the personal use of the mobile device. The phenomenon of the BYOD is referred as the IT consumerisation. Besides, the term is used to highlight on the same practice that is applied by the students using their phone to the education setting to use on the programs like the Kahoot. The use of the BYOD to make an important development to the business world, with approximately seventy five percent of the employees in the growing market in Russia and Brazil and around 40% i n the developed market using their technology to work. An example of the survey carried apparently showed that 95% of the employees said they used at least one personal device for work. Various factors are driving the adoption of the BYOD programs(Scarfo, 2012). Nonetheless, there is an upward trend to the adoption of the diverse use of the mobile devices, like the tablets, and the smartphones by the individual that are. This paper will clearly demonstrate on the background information of the BYOD when it came into existence, the security challenges that are the adoption of the BYOD program has posed to the business, the protection mechanism that the organization is adopting to overcome these difficulties There is also need to look at the security implications of computer networks and the issues and concept of management in ICT. . Moreover, it will also highlight on the future trends of the BYOD program to the business needs and advancement of the same in the market(Burt, 2011). Background The BYOD has come a long way with the first appearance in BYOD in 2009, to the steady fast rise in 2011. It started at the Intel when they recognize the increasing number of the employees bringing their own personal devices like the smartphones, iPhone and laptops to the workplace and using them on the corporate network of the organization. In the year 2011 the term achieved prominence when the Information services providers, Unisys and the software vendor the Citrix systems began sharing their perceptions and experience of this trend. (Assing, 2013)The BYOD has mainly been featured as factor to the consumer enterprise in the way the enterprises associates with the clients. The role was reversal in the aspect of the business when it was the driving factor in the consumer technology innovations and all their trends. To better understand the evolution of the BYOD there is need to look at past years since the term was introduced. The terms were first imposed in the year 2009, but it had its first mainstream in the year 2010.The CIOs began to experience the pressure when personal devices began to flood at the workplace. During the same period, the Android had started to pick the steam and there was introduction of the first iPad in the market. The influxes to the new devices in the market made the employees bring more devices like the smartphones, the tablets in the work place. Some of the business began to block the personal devices to their networks and their mail servers. In that year, there were many MDM companies that were started and a new API came up to manage the mobile networks. It is due to this that the IT and organizations realized they can longer ignore the element of BYOD. In the year 2011, there was official support of the Bring your device programs which were introduced at the workplace at a fast rate. According to report of Aberdeen 2011, around 75% of the companies had the BYOD policy. It is the same year the Blackberry dominance started to give t o the alternative options of mobile and the acceptance of the BYOD was all-time high. In the year 2012, there was a significant concern for the data security and the data leakages. (Shim, Mittleman, Welke, French Guo, 2013)Moreover, the users were becoming more concern of the privacy. In the same year, many businesses were now focused on the adaptation of clear communicated policies of BYOD to the users, while at the same time working to understand their privacy and implications of the security. There was an increase of the MDM solutions to cater for these implications. In 2013, the applications and the security data continued as the hot topic in regards to the BYOD. There was also a major pivot to secure the device to be able to manage the apps and the data within the business; there were issues of the data breaches which were increasing on a daily basis.. (Shim, Mittleman, Welke, French Guo, 2013)The purpose of the containerization of this apps is to be able to separate the pers onal data and the data of the corporation. Security challenges posed by the BYOD program The unknown third-party access through the mobile application When the employee downloads and installs an application for their use, they likely allow the free third party to access some of the sensitive information for the organization that may be stored to their personal devices. Applications that are downloaded be infected with the viruses and the malware; which are instructed by a hacker command and the control servers to be able to steal any data that is on the mobile devices, without even an alert from the users device. (Burt, 2011)If the employees of an enterprise connect their devices to an open WI-FI devices, the data of the company that is stored on their devices may be compromised and be stolen. Moreover, if the security apps are imposed on the devices of the employees it would become a problem to them, because it requires frequent updates, in which if they dislike this they can easily uninstall. Nevertheless, these software reduces the performance of the device and also degrade on their experience by stretching on the memory and the processor of the devices. Mixing of the personal and corporate data This is the major security challenge to the BYOD, especially when coping with the issue of storage of the personal and corporate information on the same device. Indeed, some data of the organization may be leaked at some point. Some hackers may use the keyboard logging technique and acquire some sensitive information for the company, and this data in the long hands can cause significant harm to the organization(Ghosh, Gajar Rai, 2013). IT fracture Some of the infrastructure in the organization do not conform to the BYOD setting. The BYOD entails that CIOS make various modifications to the current IT infrastructure so that it is a complaint to BYOD. (Assing, 2013)There is a need to identify the applications employees are using to interact with the corporate information. It is fundamental that the data is protected, and conform to the current IT infrastructure. Technical challenges Various technical difficulties may pose on the BYOD program; an example is the control access to the mobile conceding the deployment of BYOD. The companies are unable to determine the permission level for each of the employees when they access certain resources for the company when using the mobile devices and the external network connections. Some of the other factors which may determine the access control are; limitation on how many individuals can be able to access on the resources at one time and how the employees would gain the access to the resources of the company. (Ghosh, Gajar Rai, 2013)It is important to understand the access control aspects differ on the aspect of the location, the size, and the employees number in that company. There is also the issue of incorporating the security measures to cater a given range of devices that are portable against the risk, and usually the threat is very complex. This is so when the employees may own a random number of devices that has different operating systems, which means the needs of the security to every need to be supported equally where it is possible. Protection mechanism Comprehensive BYOD security framework The security measures that exists currently are; the Virtual Private Networks (VPN), the use of the firewalls and email filtering tools. These components are essential for the protection of the inside network and when the personal devices are engaged in the BYOD before enforcement to the formal policies. The VPNs helps to implement on the private network connections to the devices and also allows access to the resources in an environment that is controlled(Ghosh, Gajar Rai, 2013). This contributes to reducing the cost of storing the data on the personal devices. (Burt, 2011)The firewalls, helps protection of the networks by monitoring the traffic and denying access to suspicious requests. The email filters, contributes in the detection and warning of the users of the emails that are infected. The personal devices can sync the application of email thus, it becomes a benefits on the device when the application of filtering the email is active. There is the use of the Network Access Control mechanism. This tool helps to limit the number of the devices that are connected, thus it helps to determine the permission and also denies the devices that are unrecognized to the companys internal network. This mechanism was well implemented before the rise of the BYOD. Thus, it is a focal point for the enhancement of the BYOD framework.(Assing, 2013) The Identification and the Access Management is also a variation of the NAC that entails the customized device access control rules to an individual network. In addition it manages on the sign on and separation of the duties. The single purpose BYOD security mechanism On this aspect, there is need for the final user agreement, the policies that are acceptable and used and the liability agreements that are formal contracts to ensure that the companies and the employees they agree mutually on the Bring your device policies of security. It is imperative for the component to be compatible for success of the BYOD. There is also the issue partition of containerization on the mobile device storage space into the independent sections to divide personal and work data. The component that contains the company data has its own policies on the security that are implemented, and they enable for remote access on the control of the company, without affecting the personal data. In addition, there is a need for the antivirus, and spyware applications that are important to strengthen the BYOD security framework(Scarfo, 2012). Security implications of computer network The security is essential to the computer network, especially when it relies on the corporate data in an organization. It entails the protection of the information systems from theft or the damage of the hardware, and the information that is contained in them. (Shim, Mittleman, Welke, French Guo, 2013) There are various security measures that need to be put up in order to prevent the breach of the information. Some of them are the user of the account access control and the cryptography to protect the system files. (Blum, Eskandarian Hoffman, 2004) There is need to input the firewalls to help on the network security by shielding the access to the internal network services and the use of the intrusion systems for the detention. These systems helps to detect the network attacks that is in progress and helps in the forensics of the post attack. In the events of the breach of the computer network it can lead to great implications for the company. (Merete Hagen, Albrechtsen Hovden, 2008 ) The clients to the company can seek to sue the company for the disclosure of the information, on the ground of the breach of the confidentiality. Cryptography The modern cryptographic techniques are the essential in IT system that needs to store-to protect personal data. It is important to note that on itself the cryptography does not provide any protection against the data breaching; but only when it is applied correctly in a specific contest does it provide the protection to the personal data. (Merete Hagen, Albrechtsen Hovden, 2008) It is usually a large field. Some of the newer cryptographic techniques are homomorphic encryption, which are essential in the processing and the searching in the personal data. There are various techniques that exists for the searching through the encrypted data, that is able access to provide a privacy protection and selective to the sensitive data. One of the technique that is used for the designing privacy preserving systems is the homomorphic encryption. The cryptographic system is only as strong as the encryption algorithms, the digital algorithms and the message authentication codes. If any of these components are broken the system becomes damaged. Most of the system fails because of the mistakes that are done on the implementation. Some do not ensure that the plain text is destroyed after the encrypted. Others may use the temporal files to protection against the data loss when the system crash. Issues and concepts related to management of ICT security In the management of the ICT security there are various issues and concept that are related to its planning and on the development of an effectiveness. In any organization it should design, implement and maintain the coherent set policies in the planning and development of the security plan, processes and systems to be able to manage the risks to its information assets. In this aspect, it will ensure acceptable levels of the information security risks. (Swiler, Phillips, Ellis Chakerian, 2001) On the concept, it is important to have a plan phase. On this it is involves the designing the information security management, this is by accessing the information security risks and selecting the appropriate controls. The next concept is the do phase, that involves the implementing and operating the control. Nevertheless, the check phase objective that involves the review and the evaluation of the performance. The last concept it the act phase that involves any changes that are made where ne cessary on the peak of the peak performance (Saint-Germain, 2005). Security planning and development The most significant part of the deployment of the ICT management system is the planning. It is not possible to plan for the security, until the full assessment of the risk has been done, the security planning involves the deployment of the security policies and the implementation control to prevent computer risks from becoming reality. The security planning varies from one organization to another. The first aspect of the planning is the risk assessment. (Perrig, Stankovic Wagner, 2004)There is no plan of action that can be developed and implemented before the risk is assessed has been done. It provides the baseline for the implementation of the security plan. The next steps is to identify the assets. (Scarfo,2012)This is by performing of the information asset inventory by highlighting the various items that are needed to be protected within the organization. It should be done on the basis of the business plan of the organization. The next is to identify the risk to the information assets. (Shim, Mittleman, Welke, French Guo, 2013) It is vital to determine the risks that affect each of the asset in the organization. It is then necessary to identify the threat and the method of the attack. The threat is any action that is potentially harmful to the organization through the disclosure, the breach of information, modification of destruction. It is then necessary for the development of the security policies and control. (Shin, 2010) These components will give a clear guideline for the various areas of the responsibility, and the plans which highlights the steps to take and the rules to be followed in the implementation of the policies. Conclusion and future trends The rapid growth of the personal devices is continuing to redefine communication and the productivity in the workplace. As a result to this, the BYOD programs, in which the employees use their smartphones and tablets for the business aspect has increased tremendously. (Scarfo, 2012)According to Gartner he predicts that by 2017, fifty percent of the employers would require their employees to supply their own devices to work. Further research from Juniper concluded that by the year 2018, there would be more than one billion devices that are used by the program of BYOD worldwide. With the increase in the sales through the mobile devices over the last years, every business that has not implemented the BYOD policy would suffer from breach of sensitive corporate information and be shared freely outside the corporation. Nevertheless, mobility drives productivity for the CIOS and the business by increasing the number of the mobile application users in the workplace. (Shim, Mittleman, Welke, French Guo, 2013)The rolling of requests throughout the place of work will present a myriad of opportunities that are beyond the traditional use of the mobile emails and the communications. There is also the need to evaluate the BYOD needs, since most of the leaders do not understand the benefits. (Assing, 2013)Throughout the world, the BYOD market is expected to grow to more than eighteen billion dollars by the year 2017. In the paper, it has clearly demonstrated on the background information of the BYOD program and how it has advanced over the years. It has also demonstrated, on the security challenges that are posed by the BYOD programs and the protection mechanism on the same. Nonetheless, there are also future trends on the BYOD programs in which there would be exponential growth to the number of business adopting it, the increase in revenue it is projected to bring, and the improvement of the security measures to secure the corporate data. References Assing, D. (2013). Mobile access safety: Beyond BYOD. John Wiley Sons. Baker, W. H., Wallace, L. (2007). Is information security under control?: Investigating quality in information security management. Security Privacy, IEEE, 5(1), 36-44. Blum, J. J., Eskandarian, A., Hoffman, L. J. (2004). Challenges of intervehicle ad hoc networks. Intelligent Transportation Systems, IEEE Transactions on, 5(4), 347-351. Burt, J. (2011). BYOD trend pressures corporate networks. eweek 28(14), 30-31. Ghosh, Gajar Rai. (2013). Bring Your own device(BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, 4(4), 62-70. Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee, B., Wood, J., Wolber, D. (1990, May). A network security monitor. In Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on (pp. 296-304). IEEE. Hill, D. W., Lynn, J. T. (2000). U.S. Patent No. 6,088,804. Washington, DC: U.S. Patent and Trademark Office. Li, Y., Guo, H., Jajodia, S. (2004, October). Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on Digital rights management (pp. 73-82). ACM. Merete Hagen, J., Albrechtsen, E., Hovden, J. (2008). Implementation and effectiveness of organizational information security measures. Information Management Computer Security, 16(4), 377-397. Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P. (2004). Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR. Perkins, C. E. (2008). Ad hoc networking. Addison-Wesley Professional. Phillips, C., Swiler, L. P. (1998, January). A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms (pp. 71-79). ACM. Perrig, A., Stankovic, J., Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53-57. Saint-Germain, R. (2005). Information security management best practice based on ISO/IEC 17799. Information Management, 39(4), 60. Scarfo. (2012). New security perspectives around BYOD. In broadband, wireless computing, communication and Applications(BWCCA), 2012 Seventh International Conference. 446-451.IEEE. Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers, 22(5), 428-438. Shim, J.P., Mittleman, D., Welke, R., French , A.M., Guo, J.C. (2013). Bring your own device(BYOD): Curent status, issues, and future directions. Schneier, B. (1999). Risks of relying on cryptography. Communications of the ACM, 42(10), 144-144. Stinson, D. R. (2005). Cryptography: theory and practice. CRC press. Walker-Osborn Mann. (2013). TO Byod or.... or not to Byod. ITNow, 55(1). 38-39. Susanto12, H., Almunawar, M. N., Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical Computer Sciences IJECSIJENS, 11(5), 23-29. Swiler, L. P., Phillips, C., Ellis, D., Chakerian, S. (2001). Computer-attack graph generation tool. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX'01. Proceedings (Vol. 2, pp. 307-321). IEEE.