Sunday, January 26, 2020

Data leakage

Data leakage Data leakage is the unauthorized or unintentional exposure, disclosure, or loss of sensitive information (GAO, 2007, p.2). Many businesses have in their control sensitive data about their organisation, employees and customers. The Information Commissioner (ICO) in a recent press statement (ICO,2010) is alarmed with the unacceptable number of data leakages within the modern world and will issue fines for major breaches to commence in 2010. In addition to our markets, the safety and security of our information could not be assumed either. (Verizon Business, 2009 p.2). In 2008 there appears to be a link between the turn of the recession and an increase in reported data leakages. Research conducted by Verizon Business (2009) showed that the number of reported compromised records was more than the previous four years combined as shown below in Figure 1.1. Figure 1.1 Number of records compromised per year in breaches investigated by Verizon Business (2009) Within this study (Verizon Business, 2009) it was found that the industries with the highest number of data leakages were in retail (31%) and financial services (30%). As employees exit, so does corporate data (Ponemon Institute, 2009, p.1). A survey conducted (Ponemon Institute, 2009) showed 59% of employees who left a business (including voluntarily and those asked to leave) stole data. It is difficult to measure the entire impact of a data leakage. Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited; However, the Full Extent Is Unknown. (GAO, 2007, p.1.)   The financial impact on a business per breach according to the Ponemon Institute (2006) is on average $4.8 million.   Breaches can not only be financially costing to a business but also extremely damaging to a companys reputation, this study (Ponemon Institute, 2006) showed that 60% of customers terminated or considered terminating contracts after a security breach. According to Verizon Business (2009) in 2008 91% of all compromised records were linked to organized criminal groups. Examples of confidential data that criminal groups may wish to obtain are companys financial information, customers sensitive data and credit card details.   There are many ways in which data leakage can occur, some of which will be discussed in the following chapter of this report. 1.2 Data Leakage in the Media The media is one of the most influencing ways of communicating issues globally. Data leakage appears to be increasingly more popular in the media as the reported breaches increase. The ICO stated that there were 434 organisations that reported data security breaches in 2009, the previous year had 277 reported (Unacceptable level of data loss, 2009). This evidence supports the theory of there being an increase in breaches during the recession but what must be taken into account is that there is an increase in the reported cases. It may be that more businesses are becoming aware of data leakages where previously they were oblivious to breaches committed or did not disclose the known leakages. Reported in the media, a Nationwide employees laptop was stolen from their home containing confidential customer data (FSA,2007). 11 million Nationwide customers were said to be at risk of identity crime at the time. The FSA (Financial Services Authority) were alerted by the breach and it was found that the Nationwide did not start an investigation until 3 weeks after the theft took place. The firm were fined  £980,000 by the City watchdog for the security violation. Another example in the media (Previous Cases of Missing Data, 2009) is the Ministry of Defence data security breaches. The Ministry of Defence admitted to losing or having stolen 121 memory sticks in a four year period. According to this press release (Previous Cases of Missing Data, 2009) Defence Secretary Des Browne said 747 laptops had been stolen of those only 32 have been recovered. 1.3 Data Loss Prevention (DLP) The protection of sensitive data, to avoid data breaches, should be a vital part of a business day to day operations. Yet organisations rarely have adequate visibility or control of their data (Broom, cited in When financial data goes missing, 2008). From the research conducted (Verizon Business, 2008) out of all the data leakages that occurred in the year 87% were preventable through simple or intermediate controls. This suggests that many businesses are not putting in adequate controls to prevent leakages. The Date Protection Act (DPA) is a framework to ensure that personal information is handled properly (ICO, The Basics, no date). One of the principles of the act is, it is the responsibility of the business to secure the sensitive data it withholds. The DPA have the right to prosecute and unless exempt, all businesses have to abide by this act. The difficulty faced by many businesses is to manage the risk without affecting their productivity and to manage risk in a new and challenging environment (CFO Research Services and Crowe Chizek and Company LLC , 2008, p.2). The important factors to consider when implementing a DLP plan is the alignment of process, technology and people as a unit.   developing a robust security policy and ensuring that all employees fully understand their role and obligations(Broom, cited in When financial data goes missing, 2008). Broom also stated that users need high-quality training and good communication regarding information security concerns. Chapter 2: Types of Threats Threats to the protection of data can be split into two broad categories: Internal and External threats. Internal threats are from within the business itself and majorly centred on employees actions. Attacks from outside of the business are known as external threats. Examples include hackers, organized crime groups and government entities (p.8, Verizon Business, 2009) According to Verizon Business (2008 or 2009) 20% of reported data breaches are caused by insiders whilst 39% of the breaches involved multiple parties, thus proving the importance of a combination of internal and external controls. 2.2 External Threats According to Verizon Business, 2008 saw   more targeted, cutting edge, complex, and clever cybercrime attacks than seen in previous years   (p5 2009). The fact that attacks appear to be increasingly more sophisticated is a concern for many organisations to ensure they have adequate control measures in place. One of the most common external threats to data security is Malware.   According to Easttom (p6 Computer Secuirty Fundamentals) Malware is the Generic term for software that has a malicious purpose. Malware can be used to steal confidential data from a personal computer to a global network. A virus is a small program that replicates and hides itself in other programs, usually without your knowledge (Symantec,2003) through Computer security fundamentals p6.) A Trojan Horse is a useful or apparently useful program containing hidden code that, when invoked, performs some unwanted function. (P48 info sec pipkin). Trojans must spread through user interaction such as opening an e-mail attachment. It looks legitimate and so users are tricked into executing the malicious program. The Trojan can then potentially delete files, steal data and spread other malware. They can also be created to generate back doors to give hackers access to the system. (http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html) An example of a dangerous Trojan is the Dmsys Trojan. According to (http://www.2-spyware.com/trojans-remova) and (http://www.uninstallspyware.com/uninstallDmsysTrojan.html) it steals users confidential information by infecting instant messengers. It uses a keystroke logging technique to steal passwords and private conversations. This information is stored in a log file and then sent to the hacker. Thus allowing the malicious user to have access to potentially, confidential information. There are various tools online that can dispose of this Trojan automatically, but if a user wanted to do it manually they would need to delete the files: dmsysmail.eml and dat.log. Manually Deleting Malware Each program consists of files. Evenspyware, a virus or a different parasite all have their own files( http://www.2-spyware.com/news/post203.html ) To remove a parasite usually means to delete all its files. According to this website, it is not always this simple, as files being used by active applications can not be deleted and some of the Malwares files may be set to invisible. Following this sites guidelines: Open Windows Task Manager and select End Process but only works if you know what processes should be running and those that look suspicious. Once you have stopped the process it is now possible to try and delete the malicious files. Locate the folder you believe the program to be (eg My Computer) and ensure all hidden and protected files are visible (Tools, Folder Options, View, Advanced Settings).There may still be files that are invisible, now type cmd into run to access the Command Prompt. Within the Command Prompt enter dir /A folder_name. All files within this folder will be listed including all hidden files. To delete these files within the cmd enter the command cd folder_name to locate the folder. Then enter del file_name to delete the file. Ensure the Recyle Bin is also emptied. http://www.2-spyware.com/news/post203.html steps on how to manually remove Malware. Preventing Malware attacks Since new viruses are introduced daily (p49 info sec pipkin) an up-to-date valid anti-virus software is essential to avoid data leakages via Malware. Vulnerability patching firewalls A combination of the mentioned attacks can be catastrophic to the security of data hacking gets the criminal in the door, but malware gets him the data (p20 verizon) It is critical that a blend of the above security measures are put into place. 2.1 Internal Threats Whether knowingly or unknowingly, innocently or maliciously, employees engage in behaviours that heighten the risk of data loss.( Cisco data leakage find page) According to a study conducted by cisco data leakage 46% of employees admitted to transferring files between work and personal computers and approximately 1 in 4 admitted sharing sensitive information with friends, family, or even strangers. According to the Deputy Information Commissioner David Smith (http://news.bbc.co.uk/1/hi/uk_politics/8354655.stm) Unacceptable amounts of data are being stolen, lost in transit or mislaid by staff. Dangerous numbers of personal data is still being needlessly stored on unencrypted laptops and USB sticks. if they do not think about security, users can start to cause quite a few problems p37 computer insecurity book. bar chart 5 ponemon 2009 page8 info kept after leaving chart 7 ponemon 2009 page 9 According to Ponemon (2009), only 11% of the respondents who took part in this research had permission from their supervisor to keep this information. in figure à ¢Ã¢â€š ¬Ã‚ ¦. An alarming percentage of the above transfers may have been avoided with appropriate controls, which will be discussed later in this report. It can often be hard to detect data leakages, such an employee copying confidential data to a USB device. more often, the information is left just as it was so that the theft is not quickly discovered p59 info sec pipkin. Using a Data Leakage Prevention tool can assist in monitoring and blocking users risky actions to avoid leakages. In this report Digital Guardian by Verdasys will be used to demonstrate some examples of how a DLP tool can be used to assist in the battle of information security. Chapter 3: Verdasys Digital Guardian Software Introduction Digital Guardian is a comprehensive and proven data security solution for protecting and tracking the flow of critical data anywhere in the world. (Verdasys, 2006) (http://www.daman.it/wp/dg/Digital_Guardian_DS.pdf ) According to Verdasys (2006) Digital Guardian (DG) can help to prevent the loss of data by identifying hard to detect user actions. The tool can block unauthorized access, copying, printing, and other user actions. The DG platform consists of a central server and control console to communicate with remote agents deployed to desktops, laptops and servers where data needs protection. It is an agent based (Endpoint) Data Loss Prevention (DLP) tool. These agents operate silently and report rules violations, continuing to operate even when a device is removed from the network. (Verdasys, 2006 http://www.daman.it/wp/dg/Digital_Guardian_DS.pdf ). The DG server is accessed via a web-based interface to the Control Console.   Figure à ¢Ã¢â€š ¬Ã‚ ¦ DG Management /Control Console The above figure is the web-based management console. This tool can be implemented on both Windows and Linux machines. For this project Windows machines have been used. Capabilities Digital Guardian can monitor or block various risky actions users are taking. Whether it be users abuse or accidental operations. There are many actions that the software can perform some of which will be shown in the followingà ¢Ã¢â€š ¬Ã‚ ¦.. Rules can be created within the software and then applied to policies which are deployed to machines chosen. These rules can generate warnings to the user and also email alerts to administrators upon policy breach. Reports can be generated to allow for auditing and drilldown summaries of use of data and users actions. Along with being able to completely block specific actions DG can also ask for justification from a user which is a form of Soft Blocking (DG, 2006). This type of DLP can also allow for a monitoring only approach, which   according to ( http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) can be more   successful than a blocking solution. It can be used assist in computer forensics investigations whether it would be monitoring triggered rules by prohibited actions that breach corporate policy or more sinister illegal activity. According to (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php)   The beginning of the investigative process is to find out what was being sent, where, and by whom. Is it legitimate business reasons? Maliciously? They didnt know any better? Blocking may keep the data safe, but it wont answer those questions. (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) There are functions within the tool that can block the removal of confidential data via clipboard actions (cut/paste/print screen).   add on features such as mail/file encryption and content inspection by Autonomyà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ (company name) (Verdasys 2006) Figure (à ¢Ã¢â€š ¬Ã‚ ¦) shows the capabilities of the software, How the software works Digital Guardian installs drivers that tie into the Operating System (O/S) at a very low level within the kernel. When an application wants to save a file, it calls a function within the application that does this, and that the O/S handles the task, right down to the kernel that does the hard work, without application writers having to know the details.DG ties into that kernel, detects these events happening, extract useful details (like the filename and size etc), and then send the details onto the DG server. The advantage of this is that any application saving a file will have to get the O/S to do it, so tying in at that very low level ensures it works for virtually all applications. Any more Installation oh god try and remember!! Installation details of .. appendix. windows server,   SQL Server, DG Server, DG Agents,   Hardware and Software à ¢Ã¢â€š ¬Ã‚ ¦ pre , key etc. Detailed in the à ¢Ã¢â€š ¬Ã‚ ¦. Digital Guardian files.   Limitations  Ã‚   - FIND some Digital Guardian is mainly used for insider threats and doesnt lessen external threats by intruders or malicious attacks. It also does not address server and network vulnerabilities. (http://www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) No functionality to actually block users downloading applications (CHECK THIS) and running them if not already blocked within Application Management. The software has to be installed on the network to be able to block the use of it. check!! No rule to be able to block all attachments sent via emailcheck Scalability challenge of maintaining classifications of Windows shares/content (http://www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) Chapter 4: Testing and Implementation Policy Exception USB Encrypt Email Prompt Encrypt Mail Rule Encrypted Email Password Application Management Application Management Exceptions Application Management Exceptions Block of Applications Prompt Upload Via Webmail Upload via Webmail Prompt Block upload via webmail sites. This rule controls users access. Instead of completely blocking their access to certain sitesà ¢Ã¢â€š ¬Ã‚ ¦. Can access the specified sites but can not upload to these sites. For example social networking sites like Facebook. Stops the sending of attachments via webmail.   à ¢Ã¢â€š ¬Ã‚ ¦ If laptop accessed from outside of network these rules will still functionà ¢Ã¢â€š ¬Ã‚ ¦.. NEED BETTER SCREEN SHOT THAN THIS IS THERE A COMPONENT RULE FOR THIS? Control of USB Devices Block non-approved USB devices Within DG it is possible to block all uploads to all USB devices, thus preventing all users from removing any data from the network. It is also possible to block uploads to USB devices with the exception of predefined USB devices. For example if a business provides users with an encrypted USB device (such as Kingston.) a rule is created to say block all USB device if stated device is not listed in the component rule associated. The USB device is recognised by its Product ID and Vendor ID. These IDs can be discovered by using a simple tool such as à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦. Block non approved USBs Above is the control rule called Block non approved USBs. This rule is set to block any File Copy/Move/SaveAs to a removable device that is not listed within the function (component control rule) approved usb device. Component rule for USB Approved Within the approved usb device component rule is the Vendor Id and Product Id for the approved USB device(s). USB Block Prompt If the USB device inserted does not match the predefined approved removable device then the above prompt is triggered. This prompt is flexible and any message the administrator wishes to set will be displayed. Once Close is selected no data can then be transferred to the device. This way if the USB device is lost/stolen it is encrypted so would be extremely difficult to view any sensitive contents on the device without knowing the password. This rule could be useful for businesses where their employees have to travel regularly (eg Sales) and so data needs to be easily transportable. Obviously this rule does not stop users from stealing the data but does assist with accidental loss. The software could still be used to monitor who/what/how much data is being transferred to these devices. BETTER SCREEN SHOT Content inspection rulesà ¢Ã¢â€š ¬Ã‚ ¦. Look into TRY AND CRACK/BREAK THESE RULES. Manually blocking USB within the Registry It is possible to manually block all USB devices via the registry. The following steps were taken from Microsofts Support site (http://support.microsoft.com/kb/823732). Before manually adapting the registry it is strongly recommended that a backup of the registry is made as any errors made within the registry can cause severe problems.   To enter the registry of the computer from the Start menu click Run and enter regedit.   Find the registry key : HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesUsbStor. On the right hand side double click Start as highlighted in figureà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.   Ensure Hexadecimal is highlighted and enter 4 within Value data. This will now block all USB devices being used on this machine. When a device is plugged into the machine the device will not be acknowledged. To re-enable USB devices follow the same steps above but change the Value data back to the default value of 3. Chapter 5: Analysis of results founded by Digital Guardian.   Digital Guardian Technology   ANY IMPROVEMENTS FOR DG Chapter 6: Critical review of other products Having assessed an Endpoint (agent based) DLP tool, secondary research was conducted on a Network DLP tool, Websense Data Security, for comparison. Figure below is a table of brief pros and cons for different DLP measures available, taken from informationweek.com . Analyse table Taken from (http://www.informationweek.com/1163/163ss_impactassessment690.jhtml;jsessionid=WA0XH3S4GN0CTQE1GHPSKH4ATMY32JVN) WhenDLPvendors are being honest, theyll readily admit they cant stop the serious and skilled insider from getting data out. (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php)Their real significance is in finding employees who are accidentally leaking data, those who dont know its against policy or who are taking risky shortcuts to get their jobs done. Websense Data Security is a network based DLP tool with forward proxy.   According to a review by (http://www.software.co.il/data-security/17-data-loss-prevention-shoppers-guide.html) it is typically used for monitoring email traffic and quarantining suspect messages. It requires placing an application-layer proxy next to an Exchange server or server agent. With a network based DLP such as Websense it avoids having to install an agent onto every machine, and instead involving installing network taps. As data passes through these it is checked, and events collected that way. According to(http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Network-based solutions have the potential to be more vulnerable to an insider threat. An insider can steal data out via thenetwork, using encryption or steganography (where data is embedded within another data format). Unlike DG a network-based tool would not prevent a user plugging in a USB stick and copying files, it also would not log that this event had even occurred. TYPE UP MORE COMPARISONS Still, an even somewhat paranoid but unskilled insider can use a cell phone or digital camera to photograph documents on the screen. No form ofDLPcan protect against that. (http://www.networkcomputing.com/wireless/time-to-take-action-against-data-loss.php) Installing   a DLP tool is not the be all and end all protection against threats and as emphasised earlier in this report a combination of measures needs to be addressed. Chapter 7: Conclusion and Future Work. Highlight any deficiencies etc Ethical Traking employees? ANY IMPROVEMENTS FOR DG   .Many different aspects to consider Link intro with conclusion. Verizon other factors p3 . The best security technology in the world wont produce a good return on investment without the foundation of security processes, policies, and education. P8 Cisco data leakage. if you have never experienced a security incident, does this mean that you are secure? Or does it just mean that, so far, you have been lucky? computer insecurity book in short no one is immune computer insecurity book More.. Glossary Bibliography Online Sources ICO. (2010), Press Release: Data Breaches to Incur up to  £500,000 penalty, [Online]. Available at [Accessed 31st January 2010]. (2009),Unacceptable Level of Data Loss, [Online]. Available at [Accessed 1st February 2010]. FSA. (2007), Final Notice to Nationwide Building Society, [Online]. Available at [Accessed 26th January 2010] (2009), Previous Cases of Missing Data [Online]. Available at   [Accessed 12th January 2010] Broom, A. (2008),When financial data goes missing.[Online]. Available at [Accessed 3rd February 2010] ICO. (date unknown), The Basics . [Online] Available at [Accessed 2nd February 2010] Journals GAO. (2007), What GAO Found, Report to Congressional Requesters Verizon Business (2009), Data Breach investigations Report Ponemon Institute. (2009), As Employees Exit so does Corporate Data, Data Loss Risks During Downsizing Ponemon Institute. (2006), 2006 Annual Study: Cost of a Data Breach CFO Research Services, Crowe Chizek and Company LLC. (2008), The Changing Landscape of Risk Management Appendices

Saturday, January 18, 2020

Hu Jintao

Hu Jintao Since the beginning of civilization dictators have taken over and ruled there people. While some dictators are cruel and ruthless, others desire happiness of their people. Some acquire their power by force, while others go through the process fairly. Once in power it is important to keep ones people in control through laws and policies. In George Orwell's Animal Farm, one can compare the rise to fame, rules and policies, and cruelties and atrocities of Napoleon to that of the dictator Hu Jintao.One thing that sets Jintao apart from Napoleon is that somewhat low key way he ose to power. Hu Jintao began his political career at the bottom of the ladder and eventually climbed his way to the top (galegroup. com 2003). In 1982 Jintao was named party secretary of Guizhou Province by Hu Yaobank, a communist party officer. Once receiving this position he worked his way up to the title of president of china in 2003. Opposite of Jintao, Napoleon rose to power by force and cruel act (O rwell). Napoleon immediately named himself the leader of Animal Farm after old major died.When feeling threatened by his co-leader Snowball, he has him chased ff the farm by his guard dogs. Similar to the contrast of the rises to power, their actions as dictators also contrast greatly. While Napoleon is a leader of force and absolute control, Jintao is more about prosperity of China. Jintao had â€Å"shown that he can work effectively with others both those above and below his rank and with those of different governments† (galegroup. com 2004). Hu Jintao has tried successfully to rule china and its people to a state of prosperity.He has transformed the policies of China to upport this goal, while closely sheltering his people from the outside world. As Hu Jintao continued to lead China to prosperity napoleon inadvertently led the animals to destruction (Orwell). As leader, Napoleon made the animals inferior by creating laws that gave the pigs more rights. He changed many of t he commandments to support his desire of absolute power. As dictators create these many policies, the republic naturally begins to resent them and in some cases they rebel.As the nation's people began to question the actions of the government, many ictators resort violence as a way to control masses. Although not as major cruelties as Napoleon, Jintao has also committed some crimes as president. (history. com). while attempting to shelter the nation, Jintao has quietly been accused of crimes against the people of China. As a member of the communist party, Jintao was accused of human rights atrocities. While Jintao crimes are hidden and minor, Napoleon crimes are major and unimaginable (Orwell).Napoleon forced many of the animals to confess their unlawfulness and then shot and killed each one. He also sent boxer to be slaughtered at a glue factory once he was injured. As a dictator, Jintao and Napoleon committed unforgettable crimes. In George Orwell's Animal Farm, one can compare th e rise to fame, rules and policies, and cruelties and atrocities of Napoleon to that of the dictator Hu Jintao. He had a normal rising to power while Napoleon forced himself to be a ruler. Hu tried to destruction. Hu did not do any major atrocities, only being accused of minor crimes while Napoleon killed many.

Friday, January 10, 2020

Discourse Community Paper

Analyzing Discourse Communities Then and Now As students grow older in life and in school their written as well as, their oral communication will mature and become more sophisticated. I will be informing you of how my written and spoken communication skills have gotten better throughout my years in high school and how they have improved being in college. I will first do this by talking about how my communication was in high school football and how it compares in college. Secondly, I will focus on my current major of communications and how my public speaking has changed over the years.Lastly, I will talk about the oral and written communication within the real estate profession. Communication in football has to be the most important aspect on the field. If a team desires to be successful they must be great communicators. Players need to communicate effectively with each other to play well as a team. Communication not only means simply talking to each other, but non verbal communicatio n plays a vital part in being a successful team. Being able to direct teammates using hand signals is a very important factor.Using verbal and non verbal communication together can be effective in completing a pass, a tackle, or kicking a game winning field goal. Playing football without communicating is impossible and would make winning extremely difficult. Communication does not only have to do with getting the plays from player to player, it also has to do with motivating the team and being a positive leader on and off the field. If a captain is discouraging or belittling to teammates they are not going to put in the effort for practice or games.I had a lot of trouble with this in high school with teammates putting down other players and it resulted in the same effect. They didn’t want to be at practice and it lead to some of my teammates to quitting. Now that I play at the college level the camaraderie and attitudes have turned a complete 180. As a whole, we have the same mentality and the best intentions by wanting to get better each and every day. Along with spoken and non verbal communication in football, believe it or not, we actually have written communication as well. A football play is nly a bunch of X’s and O’s until written down. Teams may have hundreds of plays and will remember all of these by constantly writing them down. We also have to write in our playbooks the blocking schemes for the week, depending on who the opponent is. Additionally, every player is required to take a class about coaching and football. We write out our own practice schedules and at the end of the year we complete a one page essay describing what we have learned about being in the coaches shoes. As for my major of communications, there is a great deal of writing along with plenty of oral speeches.When writing or preparing a speech in high school I would procrastinate more often than not and wing it at the last minute. I would be extremely nervous whe n talking in front of people. In comparison, now that I am older and have communications as my area of study I have taken it a lot more seriously. I now take the necessary time and pride in planning out what I have to say in an outline and utilize brainstorming sessions. I feel I have grown in both my written and spoken communication as a public speaker from high school to now being in college.Orally when talking about communications that’s mainly all there is, but like I stated before there are outlines and brainstorming ideas that students use. When it comes to public speaking our speech is all about how well we present it. There are many different factors that go into how well students can orally present their speech. Some of which include; confidence when presenting in front of a large crowd and how well a student prepared for this topic. With that said, I have also learned to relax and control how nervous I get by ensuring that I am confident about the material and well prepared for the presentation.Finally I will be talking about written communication in real estate. When my dad first started in real estate it was all done at a kitchen table or at an office desk. Today it can be done virtually. Realtors can check all their email, faxes, contracts and more by using a phone. The industries future is mobile. For example, some agents today use DOC U SIGN and/or Digital Ink which enables Agents and clients both to electronically sign required documents from anywhere in the world. Therefore, written communication is now taking out the human factor in real estate and having o verbally communicate to a client is becoming less and less important. Yes, verbal communication still takes place, but it is becoming not as much of a factor. It now has less to do with your personal appearance because most of everything done today is digital. Clear communication is more essential because real estate agents need to be able to convince possible clients to work with t hem. And when agents don’t have the opportunity to work with clients face to face they need to make a great first impression.With everything that has been said throughout my essay I do agree that spoken communication is a vital part in communicating effectively. However at the same time I feel that written communication in anything today is becoming the new normal. Whether it is in your discourse community of football, the area of study such as communications, or in my future career path of real estate, communication being verbal or written will always be there. It will also determine and be an important factor in how successful you are in life.

Thursday, January 2, 2020

Gender and Sexuality in Sports Essay - 973 Words

Gender and Sexuality in Sports When individuals, male or female, decide to enter a non-traditional sport for his/ her gender, there will inevitably be benefits and costs. Because sports themselves are divided along gender and race lines, one would expect that individuals who intend to play a sport deemed by culture and by society as counterintuitive are bound to be criticized and alienated because of their choices. Difference automatically threatens conventions, traditions, and expectations, and hence, it threatens the individuals who belong to that traditional sphere. Because sports are affected as much by funding as they are by issues of diversity and accessibility, the following questions address those issues: which group of people†¦show more content†¦Women, however, are perceived by society as the gentler sex. Women are thought of as nurturers, mothers, daughters, but they are not thought of as being physically strong or physically capable of being strong. Once women began to enter the sports world, their coaches and spectators had different standards for them. They were expected to look feminine, to wear feminine uniforms, and to compete against each other but to have no physical contact with other players. The fact is that when women first began to play sports they were still something to be objectified. They were something to survey, and they had to be pleasing to the eye (mens eyes). I want foxes, not oxes (Ed Temple, Tennessee State 1952). This statement reinforces societys expectations regarding not only the ways women are supposed to look as they are engaged in a sport but it also gives credibility to the type of sports women are traditionally allowed to play. Because gender constructions have been so influential in deciding what positions men and women occupy in the world and what part of ones identity should be reinforced in the activities one chooses to engage in, men and womens involvement in sports that do not reflect cultural and/or societal expectations like weight lifting, body building, boxing for women, and synchronized swimming, figure skating, field hockey for men can result in a number of conflicts. It can lead to social,Show MoreRelatedFemale Gender And Sexuality Constructed Through Sport3418 Words   |  14 PagesHow is female gender and sexuality constructed through sport? Within sport, as throughout society, gender differences exist. The socially constructed phenomenon of gender dictates a dichotomous system whereby females are feminine and males are masculine. Focusing on females specifically, society determines the feminine traits and roles ascribed to this gender. Being domesticated, slender, passive and heterosexual are a part of the desirable appearance that society has formed surrounding femininityRead More Societal Views on Sports and Gender Essay846 Words   |  4 PagesSocietal Views on Sports and Gender Sports have become a major part of American culture and society. It is ingrained in us as a small child that playing a sport is almost necessary. In elementary school we take physical education where we are exposed to competitive sport. But even at this level it is our genders that control which types of sports are deemed appropriate. Since women started to become involved in sports, there have always been those who have opposed them being there. We sawRead MoreSex Tests And Gender Policies Essay1499 Words   |  6 Pagesup normative ideas about bodies, genders and sexualities in order to preserve the societal hierarchy that greatly benefits them. White, cisgender, heterosexual males are often at the top of this hierarchy and are the active perpetrators of their imposed rigid standards. Categories are created by these dominant groups to exercise their control and those who do not fit or refuse to categorize themselves are punished, either metaphorically or literally. In the sports realm, these norms are ubiquitousRead MoreThe Effects Of Queer Theory On Post Secondary Sport Teams1397 Words   |  6 PagesDRAFT ASSIGNMENT The Effects of Queer Theory On Post-Secondary Sport Teams Shayna Stoymenoff SDS378 Instructor: David Pereira February 29, 2016 The issue of sexuality in sports is highly complex and controversial. Through queer theory, it enables one to challenge traditional and heteronormative assumptions regarding gender and sexuality by reconstructing labels used for sexual identification, emphasizing both physical and mental strength and skill among British male university students and rejectingRead MoreAnalysis Of A Miniature Lit 1742 Words   |  7 PagesJarvis Washington Miniature Lit Review Introduction Gender inequality in sport is a hot button issue in our society today. Women, for the most part, have been on the short end of the stick for centuries in reference to participation in sports. Way back in Ancient times, women were not even allowed to watch the Olympics games because they were deemed â€Å"ladylike†. Women slowly began to play sports beginning in the 1800s. Some notable events were the first all-women’s golf tournament in Scotland inRead More Black Women in Sports: Sexuality and Athleticism Essay935 Words   |  4 PagesBlack Women in Sports: Sexuality and Athleticism Men and women who chose to engage in sports from which they would traditionally be discouraged because of their gender, particularly as professionals, redefine the sport. The social and cultural costs are not the result of the individuals participation, but rather the way in which sports have been socially, politically, and economically constructed. Gender is only one of the few ways in which people are categorized according to their proficiencyRead MoreThe Body, Gender, And Sexuality964 Words   |  4 PagesAllise Sellers Unit 2 Reading Response The body, gender, and sexuality are intertwined concepts that have been simplified to a point that attempts to explain each of these characteristic constructs purely through biology. However, ignoring the social implications in various cultures takes away from the complex analysis these foundational human descriptors actually deserve. In the writings of R.W. Connell, Suzanne Kessler, S.E. Smith, Lisa Wade, Riki Wilchins, and Patricia Hill Collins, these authorsRead MoreSocio-Cultural Influences On Sexuality. Socio-Cultural1156 Words   |  5 PagesSocio-Cultural Influences on Sexuality Socio-cultural influence plays a major role in sexual behaviors. It gives a better comprehension on why men are men and women are women. These socio-cultural are influenced by physical, emotional, cultural and economic aspects. Time and time again research has proven that socio-cultural influences have a significant role in human sexuality. Culture is the manner of life of the people. Thus, culture shapes the ideas of what behaviors are acceptable for men andRead Moreâ€Å"Transsexual and Transgender Policies in Sport†, Essay931 Words   |  4 PagesPolicies in Sport†, the vast variety of genders that make up our society today including transsexuals and transgender are still not accepted into the world of sports due to anxieties from large sporting organizations. In our culture, there is a ‘binary structure’ which separates male from female. When a person is transsexual or transgender, the binary structure becomes challenged. There are so many exceptions t o the binary structure, that it becomes nearly impossible to universalize â€Å"gender inclusiveRead MoreDo A Fast Food Commercial That Will Become Explicit As This Paper984 Words   |  4 Pagescommercial for this assignment because it is a good example of intersectionality with different cultural identifiers: gender, athlete, fast food, and a bit of sexuality. The four cultural differences are all interweaved in a very interesting way; however, let’s discussed each one. With Ronda, gender comes up very quickly. A female that can fight at this level shouts volumes for not only gender roles, but also cultural values. The cultural of men or woman has changed over the course of time—change has been