Sunday, January 26, 2020

Secure Sockets Layer in Security Technology

Secure Sockets Layer in Security Technology SSL (Secure Sockets Layer) the most widely used and most powerful measure in security technology for creating an encrypted link between the Web Server web browsers. If the link is encrypted, they use https protocol. Secure receptacle Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect users confidentiality when they sending data from a customer side to a web server; this is an important protocol due to the extension of Internet. In fact, it is a long way to make the SSL/TLS protocol fully . However there are still flaw and problems during the development of SSL/TLS, and we cannot deny that theremaybe some other potential security hole in the latest version. sequential attack is fatal for both the user and the company in using these protocols to establish a safe channel to transfer information. This article will introduce three typical attacks: Cipher suite rollback attack, narration rollback attack and password exception in SSL/TLS channel.[1]. As the web and World Wide web become common, it is necessary to think about the system security. this can be because the plaintext flowing through the web is unencrypted, it is for cracker or hacker, even a user with none programming information, to intercept the message and modify it. The way to defend personal privacy, and a way to guarantee a secure on-line commerce.. These square measure the challenge for info Technology. SSL/TLS will created a legitimate secure channel between server and shopper which may code the plaintext, then the third party who intercept the message can not disclose the first message without decrypt it.[1]. The Secure Sockets Layer (SSL) could be a methodology for providing security for web primarily based applications. it is designed to create use of TCP to produce a reliable end-to-end secure service. SSL is not one protocol however rather two layers of protocols as illustrated It will be seen that one layer makes use of TCP directly. This layer is understood because the SSL Record Protocol and it provides basic security services to various higher layer protocols. an freelance protocol that creates use of the record protocol is that the hypertext language (HTTP) protocol. Another 3 higher level protocols that also create use of this layer are a part of the SSL stack.SSL include two phases: handshaking and information transfer. throughout the handshaking method, the consumer and server use a public-key encoding algorithm to work out secret key parameters, during the information transfer method, each side use the key to inscribe and decode successive information transmissions[1]. SSL (Secure Sockets Layer) is a technology to encrypt communications between the user and the web server. It helps to prevent hacker attacks that are based on eavesdropping. When you use a web page that is protected by SSL, you see a padlock icon that assures you that the page is secure. 3.1 Is the web site really secure with SSL? No. SSL secures the network communication link only. Although this is an important security layer for sensitive applications, most attacks on websites are not actually done this way. Most attacks on websites are actually done in one of the following ways: The server is attacked directly. SSL does not protect you from this. Rather, you need to have a good IT security policy to protect your server. The user is attacked directly, either by infecting their PC with malware, or by using phishing to steal their passwords. SSL does not protect you from this, either. To protect your own PC from this, you need to use a good anti-virus program, and use lots of common sense and a small amount of paranoia when on the Internet. However, it is unrealistic to expect that all the PCs of all of your website visitors will be adequately protected. In other words, SSL does very little to prevent the website from being hacked. It only prevents 3rd parties from listening to communications between the user and the website. In that case, when is SSL important to have? If you are transmitting sensitive private data over the internet, SSL is an important additional security layer. Although eavesdropping may be a less common form of attack on the website, there is no reason not to protect against it if the consequences are serious. Although the risk to the website may not be that great, the risk to individual users may be significant in some cases. For instance, any user accessing your website from a public wifi connection (such as at a coffee shop) can be eavesdropped on fairly easily by other users at the same location. Eavesdroppers can see what is typed into forms on non-SSL sites, so the risks will depend on what sorts of forms you have. The most obvious high-risk form is your login form, which asks for username and password. An eavesdropper can potentially obtain these login credentials and then log in as that user. How risky or dangerous that is depends on what personal information the eavesdropper can obtain, or what harm they can cause with this information. Even if the risk is low with regards to your website, you should also consider that some users will re-use passwords on many websites, so the risk may extend to sites and situations that are beyond your control. What kind of sensitive private data needs protection? Private data is information that should only be known to you (the website owner) and the user. The most obvious example is credit card numbers. If you outsource your credit card processing to an external e-commerce gateway, the transactions are protected by your e-commerce providers SSL. Adding SSL on your website is not necessary in this case. Passwords are the next most obvious thing to protect, as noted above. If you do not have a membership or public user base, then your own personal admin passwords may be the only ones you need to think about. If you do not do website administration from public wifi networks, then this is not a major concern. Note that personal information such as names, email addresses, phone numbers, and mailing addresses are not private. This is information that is meant to be shared with others. SSL does not really protect information that is already publicly available in more accessible formats such as the phone book. (However, you do need a good privacy policy when storing and using peoples personal information, to assure your users why you need their personal information, and what you intend to use it for. This is mostly because some organizations have a history of selling their databases of personal information against the wishes of their clients. SSL does not help with this, however.) There is a grey zone between private data (which should be known only to you and the user), and personal data (which is known and used by many others). Individual pieces of personal data may not be a big deal, but if you collect enough personal data, identity theft may become a plausible threat. Special account or identity numbers (SSN, SIN, drivers license, health care, or passport numbers for example), along with birth dates, common security questions (eg. mothers maiden name, names of family members), and information of that nature may collectively comprise an identity that could be stolen for nefarious purposes. The more of this sort of information you collect, the more SSL might be a worthwhile addition to your security policy. The Secure Sockets Layer (SSL) Protocol was adopted by Netscape in 1994 as a response to the growing concern over Internet security. Netscapes goal was to create an encrypted data path between a client and a server that was platform or OS agnostic. Netscape also embraced to take advantage of new encryption schemes such as the recent adoption of the Advanced Encryption Standard (AES), considered more secure than Data Encryption Standard (DES). Indeed, by June 2003, the US Government deemed AES secure enough to be used for classified information. 4.1 Birth of SSL When web browser developed their applications programmer, they found that in the dealings between internet server and web browser, there should be some security methodology to guard the message alternated between shopper and server, particularly for a few business poppers. At first, web browser established some secret writing in their applications. However, they found that the secret writing didnt support non-HTTP applications. SSL (Secure Sockets Layer) protocol was developed that is simply above the TCP (Transmission Control Protocol) to form this security.[1]. 4.2 Development of SSL During the previous few years, SSL developed rapidly, as a result of theres invariably some secure holes and a few previous versions of SSL cannot forestall attacker to eavesdropping or intercept properly. as an example, Version 3.0 of SSL was destined to right a flaw in previous versions 2.0, the cipher-suite rollback attack, whereby Associate in Nursing entrant might get the parties to adopt a weak cryptosystem.[1]. TLS was discharged in response to the net communitys demands for a standardized protocol. The IETF provided a venue for the new protocol to be overtly discussed, and inspired developers to provide their input to the protocol. The Transport Layer Security (TLS) protocol was discharged in January 1999 to create a customary for private communications. The protocol allows client/server applications to communicate in an exceedingly approach thats designed to prevent eavesdropping,tampering or message forgery.According to the protocols creators, the goals of the TLS protocol square measure crypto graphical security, ability, extensibility, and relative potency. These goals square measure achieved through implementation of the TLS protocol on two levels: The TLS Record protocol and also the TLS handshake protocol. TLS Record Protocol The TLS Record protocol negotiates a private, reliable connection between theclient and also the server. although the Record protocol will be used while not secret writing, ituses bilaterally symmetrical cryptography keys, to make sure a private connection. This connection issecured through the utilization of hash functions generated by employing a MessageAuthentication Code.TLS handshake ProtocolThe TLS acknowledgment protocol permits genuine communication to startbetween the server and client. This protocol permits the client and server to talk thesame language, permitting them to agree upon Associate in Nursing secret writing algorithmic rule and secret writingkeys before the chosen application protocol begins to send data. Using constant handshake protocol procedure as SSL, TLS provides forauthentication of the server, and optionally, the client. many changes were created tothe handshake protocol, and people are going to be mentioned during a later section. [2]. 5.1 what different between SSL and TLS: difference between TLS and SSL area unit their assortment of cipher suites. SSL cipher suites generally begin with SSL, whereas TLS cipher suites begin with TLS. Notably missing in TLS area unit the FORTEZZA cipher suites, that area unit supported in SSLv3. On the opposite hand, notably present within the later versions of TLS (more specifically, beginning at TLSv1.1) area unit the AES cipher suites. The Advanced coding normal (AES) cipher suites were integrated into TLS by virtue of RFC 3268[3]. Im pretty positive there area unit many different variations however these area unit those that actually stand out for USA. If there are a unit those you think that we should always add, be at liberty to allow us to grasp. 6.1 Public key and private key What is public key and private key? The association of public key (sometimes known as asymmetric key) and personal key (also known as symmetric key or secret key) will make sure the safe dealing between internet server and browser, the most perform of this combine of secret is encrypting and decrypting info. privateKey, that saves in web server, can decode the data being sent from browser. However, browser encrypts its info within public key. [1]. 6.2 Public-key encryption The sender uses public key to cipher the message, and the receiver uses private key to decipher it. So every public key owner will send his or her encoded message and solely a non-public key owner will scan the message inside decoded the message. but decrypting a message, that encrypted with public key, may be a CPU intensive, like RSA ( Rivets -Shamir-Adelman) Another usage of public keys the sender encodes the message inside secret key, and the receiver use the non-public key to decipher that message with the associated public key. this is often economical for message authentication, like a bank server sending their digital signature encrypted with private key, so any client will decipher the message inside private key and verify the message.[1]. 6.3 How SSL secure a transaction Figure 2SSL renegotiation messages SSL renegotiation messages (including varieties of ciphers and secret writing keys) ar encrypted and so sent over the prevailing SSL connection. This feature is sweet as a result of it will produce a secure SSL session supported the very fact that a secure affiliation is already established. SSL renegotiation is helpful in many things wherever a normal SSL session is already established. Here ar some examples[2]: Client authentication is required A different set of encryption and decryption keys are needed A different set of encryption and hashing algorithms are used. The shopper or the server will request renegotiation at any time. For the shopper to request renegotiation the shopper sends a Client Hello message within the already-established encrypted channel and also the server responds with a Server Hello and so the negotiation follows the conventional shake process. The server will initiate the renegotiation by causing the shopper a hello Request message. once the shopper receives the request, the shopper sends the Client Hello message and also the shake process takes place.[4]. One fast note of clarification: the shopper and server also can complete a session beginning vice a session renegotiation. A session beginning essentially resumes a previous session (using a previous session ID), and it saves the shopper and server the computing work of generating new cryptography keys. Renegotiation could be a method by that the complete shake method takes place over an already existing SSL association[1]. 6.4 SSL/TLS From PHP (Server to Server) As much as I love PHP as a programming language, the briefest survey of popular open source libraries makes it very clear that Transport Layer Security related vulnerabilities are extremely common and, by extension, are tolerated by the PHP community for absolutely no good reason other than its easier to subject users to privacy-invading security violations than fix the underlying problem. This is backed up by PHP itself suffering from a very poor implementation of SSL/TLS in PHP Streams which are used by everything from socket based HTTP clients to the and other file system functions. This shortcoming is then exacerbated by the fact that the PHP library makes no effort to discuss the security implications of SSL/TLS failures. If you take nothing else from this section, my advice is to make sure that all HTTPS requests are performed using the CURL extension for PHP. This extension is configured to be secure by default and is backed up, in terms of expert peer review, by its large user base outside of PHP. Take this one simple step towards greater security and you will not regret it. A more ideal solution would be for PHPs internal developers to wake up and apply the Secure By Default principle to its built-in SSL/TLS support. My introduction to SSL/TLS in PHP is obviously very harsh. Transport Layer Security vulnerabilities are far more basic than most security issues and we are all familiar with the emphasis it receives in browsers. Our server-side applications are no less important in the chain of securing user data. Lets examine SSL/TLS in PHP in more detail by looking in turn at PHP Streams and the superior CURL extension. Figure 3example of google chrome Our attacks are supported the subsequent scenario: the assaulter sniffs an oversized number of SSL connections encrypted with RC4,waiting for a hit; thats the arrival of a weak key. Once a weak key arrives, the assaulter predicts the LSBs of the key streambytes, and uses these to extract the LSBs of the plaintext bytes from the cipher text with important advantage. In order to satisfy this state of affairs, the assaulter has to determine that SSL sessions ar those within which weak keys were used. For this isolation, the assaulter will use the actual fact that the primary encrypted bytes embrace the SSL Finished message and HTTP request, both having foreseeable data. Thus, once a weak key is used, the plaintext patterns are XOR-ed with key streampatterns, generatingcipher text patterns visible to the assaulter. and different previous attacks on SSL use little applied math biases to combination little items of plaintext data. so as to make this aggregation doable, the target object sh ould be encrypted over and over, with a similar key in and with totally different keys.[5]. 7.1 Decrypting traffic where the private key used for encrypting the information is available. This is useful for situations where the traffic in the network is relayed through a transparent SSL proxy and the user has access to the private key used by the proxy for encrypting the traffic sent to the clients.[6]. 7.2 Decrypting traffic in situations where the session keys are available. This situation applies for traffic generated by Mozilla Firefox and Google Chrome browsers in rectify mode. The browsers can dump SSL session keys in NSS (Network Security Services) log format. The file is made within the path such that by the SSLKEYLOGFILE atmosphere variable.[6]. 7.3 How Is the Attack Accomplished? Using the renegotiation attack, associate degree attacker will inject commands into an HTTPS session, downgrade ahttps association to a HTTP association, inject custom responses, perform denial of service, etc. That explains to some extent however serious the matter is. its easier to know however the attack is accomplished.[7]. 8.1 Advantages of SSL Certificates. Entrust Advantage SSL Certificates secure ecommerce, communications and personal data passed from browser to internet server and between servers. Entrust Advantage SSL Certificates supply bigger set-up and preparation flexibility by permitting you to add a second absolutely qualified name for free of charge and secure domain.com once your certificate is for WWW.domain.com. Plus, you get added security services that notice malware on your website} and protect it site from obtaining blacklisted. 8.2 Disadvantages of SSL With such a large amount of blessings, why would anyone not use SSL? are there any disadvantages to exploitation SSL certificates? value is a noticeable disadvantage. SSL suppliers ought to started a trustworthy infrastructure and validate your identity therefore theres a value concerned. as a result of some providers are so renowned, their costs are often overpoweringly high.[8]. BEAST leverages a kind of science attack called a chosen-plaintext attack. The attacker mounts the attack by selecting a guess for the plaintext that is associated with a famed cipher text. to see if a guess is correct, the attacker wants access to AN encoding oracle7 to visualize if the encoding of the plaintext guess matches the famed cipher text. To defeat a chosen-plaintext attack, common configurations of TLS use 2 common mechanisms: an data formatvector (IV) and a cipher block chaining mode (CBC). an IV is a random string thats XO Red with the plaintext message before cryptography even if you encrypt the same message double, the cipher text are totally different, because the messages were every encrypted with a special random IV. The IV isnt secret; it simply adds randomness to messages, and is sent along with the message within the clear. it might be cumbersome to use and track a new IV forevery coding block (AES operates on 16-byte blocks), so for longer messages CBC mode sim ply uses the previous Cipher text block as the IV for the following plaintext block.[9]. 9.1 ATTACKERS PERSPECTIVE In a single session the same secret/cookie is sent with every request by the browser. TLS has an optional compression feature where data can be compressed before it is encrypted. Even though TLS encrypts the content in the TLS layer, an attacker can see the length of the encrypted request passing over the wire, and this length directly depends on the plaintextdata which is being compressed. Finally, an attacker can make the client generate compressed requests that contain attacker-controlled data in the same stream with secret data. The CRIME attack exploits these properties of browser-based SSL. To leverage these properties and successfully implement the CRIME attack, the following Conditions must be met: The attacker can intercept the victims network traffic. (e.g. the attacker shares the victims (W)LAN or compromises victims router) Victim authenticates to a website over HTTPS and negotiates TLS compression with the server. Victim accesses a website that runs the attackers code.[9]. Secure sockets layer (SSL) is used to protect voluminous network users however how vulnerable is it? Over the last several years, there has been associate array of attacks designed to subvert SSL. whereas the technology is basically secure, attackers are invariably probing for loopholes to bypass security protocols and standards. And SSL could be a huge target. its wont to protect sensitive hypertext Transfer Protocol (HTTP) traffic. Attackers, United Nations agency prefer to assume outside the box, are invariably seeking new ways in which to realize access to sensitive data. Lets consider a number of the different ways in which hackers are attempting to break SSL. Trick, no treat: Trick the user to accept a foul certificate. this is often the classic approach once targeting users of SSL. the concept is to get the user to click through to a website despite the fact that a warning or error is flaunted to the tip user. whereas this attack is simple to launch, it needs the victim to just accept a certificate that clearly has issues. Most users can notice this kind of fraudulent activity; so, the threat level is low. Fraudulent certificates: whereas this approach might seem far-fetched, its been winning within the past. in a very few cases attackers are able to acquire valid certificates and use them maliciously. In one case, hackers breached a Dutch certificate authoritys security in 2011 and so created phone certificates for sites like Yahoo, Google, WordPress et al. With possession of valid certificates, the attackers got past HTTPS protections. Still, the threat level of this attack remains low. Take away the SSL and send data via clear text: In 2009, a new technique to subvert SSL was pioneered with one thing known as SSLStrip. rather than trying to urge the user to click through warnings, this tool acts as a proxy and strips off the S in httpso the user is instead bestowed with HTTP. SSLStrip conjointly permits the assaulter to gift the user with the favicon lock therefore the solely indication that one thing is wrong is that the browsers show of http rather than HTTPS. If the user doesnt notice this one small detail, the attacker will gain access to secure data. The threat level of this attack is medium. Crack the keys: Most certificates presently use 1,024-bit or 2,048-bit keys. The 2,048-bit-length keys are extraordinarily robust and would need eons of your time to crack employing a standard PC. That said, its been reportable that the National Security Agency has created nice strides in gaining access to SSL traffic. whereas some theorize that the NSA could have discovered new quantum computing techniques, its additionally entirely potential that the agency has merely obtained cryptography keys or maybe placed backdoors (entry points) into computer code and hardware. The threat level of the NSA or others accessing secure data during this approach is unknown. Man in the middle: This attack may be a style of active eavesdropping within which the attacker makes independent connections with the victim and relays messages to the server. Case in point: Lucky 13, named once 13-byte headers in Transport Layer Security Media Access management calculations. whereas this ciphertext attack is in theory potential, itd need a controlled setting and a awfully long quantity of time; so, the threat level is taken into account terribly low. Side-channel attacks: Over the last several years, several side-channel attacks are incontestable that may be used to recover http requests and cookies used for authentication. Browser intelligence operation and Exfiltration via adaptive Compression of hypertext (BREACH) is one example. BREACH leverages compression and takes advantage of http responses, that are compressed victimisation mechanisms like gzip. For the applying to be vulnerable, it should use HTTP-level compression, mirror user input in http responses and expose cross-site request forgery tokens in http response bodies. whereas on paper attainable, controls is accustomed mitigate this attack, and therefore its thought-about an occasional threat. 10.1 What is DROWN? It is a heavy loophole infect protocol HTTPS and different services that consider TLS, SSL and a few of the essential secret writing protocols for the security of the internet. These protocols enable everybody on the web to browse sites and electronic messaging, looking and transfer of vital data while not permitting a third party the flexibility to ascertain whats being changed between a user and also the World Wide internet.The name of the shortcut Decrypting RSA with Obsolete and Weakened encryption. 10.2 What do you get it from penetrating this gap? Gets anything is passed between the user and the server, and includes, for example, user names and passwords, account numbers, e-mails, instant messages, important documents, and according to some Scenarios can also forward the work of spoof secure site content and intercept the requests and what the user sees.[10]. When you log in to an Access Enforcer, or any UTM device, you will see a number of network attacks detected and blocked. The number may be in the thousands, or even hundreds of thousands. Many of these attacks are scans precursors to attack. Depending on your settings, a good number might also be firewall policy violations. But what are other types of network attacks? What are the most common ones today? One answer comes from the latest Threat Report from McAfee Labs. The chart below aggregates data from the companys network of millions of sensors across the globe. It shows the most common network attacks detected in Q1 2015.[5]. SSL is important to net security. It provides a robust sense of confidentiality, message integrity, and server authentication to users. The business of e-commerce is tied closely to client confidence within the operation of SSL across world wide web. within the future, SSL termination devices are able to handle additional transactions at a quicker rate. The secret writing of key lengths and therefore the cipher suites used also will still evolve so as to ensure the safety of sensitive info over the net. This way, e-commerce are ready to still grow in quality as users grow additional intimate in searching and banking on-line, and clutches new on-line applications . [1]Three attacks in SSL prot ocol and their solutions. Hong lei Zhang , https://www.cs.auckland.ac.nz/courses/compsci725s2c/archive/termpapers/725zhang.pdf . [2]SANS Institute.pdf.Holly Lynne McKinley,https://www.sans.org/reading-room/whitepapers/protocols/ssl-tls-beginners-guide-1029 . [3]Secure Socket Layer (SSL) Secure Socket Layer (SSL). Raj Jain,http://www.cse.wustl.edu/~jain/cse571-09/ftp/l_15tls.pdf . [4]Transport Layer Security..Giuseppe Bianchi,http://www.uniroma2.it/didattica/iss/deposito/4_tls.pdf .

Saturday, January 18, 2020

History of Personal Loss Essay

It is always not easy to hear that a person died and it is really hard to accept if a family member passed away. The first death that I can remember and that affected me was the death of my aunt, my father’s sister. I was still 12 years old at that time when it happened. I was not that close to her but a month before she died, we communicated often and she even asked permission to my father for me to spend my summer with her but my father declined. When we had the chance to spend time together years back, she spoiled me with toys and clothes, thus she became my favorite aunt. Her death came as a shock to all of us. She had a motorcycle accident. Upon hearing the news, I could not believe my ears. My father and I flew immediately to their place and there I saw her remains. It was horror for me. She was such a healthy woman and it terrified me seeing her inside the coffin. My heart was crushed when I saw my father cried. It was my first time to see him cry. That was also the first ever funeral service that I attended to. When it was time to send her to her last resting place, we followed her wake by foot and during that long walk; almost all the cars that passed us by threw coins at us. My cousins explained that it’s a way of showing their sympathy to us. I really can’t forget that experience because my cousins and I was so busy picking up the coins and it made me forget my grief. As Goodman (2000) has discussed, it is not unusual that people faced with sudden death experience â€Å"absent grief† and the initial reaction to the news is usually disbelief and shock. The most recent death in our family was the death of my aunt Elsa. She had peptic ulcer disease which escalated to carcinoma. We found out about her illness about a year ago and the progression of the disease was very rapid and none of us was ready for her rapid deterioration. After she died, I still can’t believe that she’s gone. Every time I visit her working place, I still expect to hear her voice greet me and ask me what I want and how I’m doing. It’s really painful not to hear her voice ever again and not seeing her doing what she does best, taking care of the patients in the community. As much as possible, I try to avoid going to her once office because even up to now, I don’t want to be reminded that she’s gone forever. Goodman (2000) also pointed out that a grieving person may experience a feeling that the person is still living. Even though, Aunt Elsa’s death was really painful, the most painful death that I ever had was the death of my little brother. He had a congenital heart disease, specifically tetralogy of fallot. Ever since he came into our lives, I didn’t treat him as fragile as he should have been because for me, he is a strong individual and that he can surpass every heart attack he had. Going to the hospital was a normal thing for me, since he was sick most of the time. When he was eight years old, upon arriving from school, I was informed that he was again admitted. I was very nonchalant about it but when I found out that he was in the intensive care unit that was the first time I felt fear for his health. When I entered the ICU, my heart just died upon seeing my brother. There were so many tubes inserted in his body and the respirator and cardiac monitor was really getting to my nerves. I tried to wake him up but he won’t respond. I tried not to cry; I tried to be strong for him but the mere act of speaking was very difficult for me. I want to tell him how much I love him but I can’t speak. I don’t want him to hear my trembling voice and give away my emotion. It was very difficult because I know his time is running out and I can’t even tell him how much I do love him. The day after, I had to go to school but I wanted to stop by the hospital however, I was running late so I decided against it. After school, I went directly to the hospital, but the ICU nurse said that he died 9:00 A. M. that day. I couldn’t believe my ears and I went home shocked. It was only when I saw him there, lying in the coffin that I believed that he already left. He left without me telling him how much I do love him. He left me. My brother’s death made me realize that anybody that I love can leave me without any notice, anytime. Now, I fear of being left by my parents. They are all that I have and I can’t stand a thought of them leaving me for good, forever. They’re both old and I know their time in our world is almost up. I try to have myself ready for that dreadful day. I think, based on experience, my initial reaction would be disbelief then followed by numbness, which can last for several days. The numbness would then evolve into anger. I know I will be angry to myself for not being a loving daughter that I should have been and anger because they left me all alone. The stages of grief that are discussed by Smith (2009) are denial, anger, bargaining, depression and acceptance. One lesson that my parents taught me after my brother passed away was life goes on. People we care for and love do come and go but we continue to live. We should accept what we have or don’t and try to live life the way we should have. I believe that one can never forget one’s loss but he can only get used to living without the person. Thus, I know I have resolved my grief when I am already used to have a life empty of my loved one’s absence. This topic is so sensitive for me so I think it is appropriate for me to share my own experiences of grief with a client/ patient if it could give the patient assurance that after the heartache, he still can have a life. References: Smith, M. , Jaffe, E. , & Segal, J. (2009). Coping with Grief and Loss: Support for grieving and bereavement. Retrieved May 11, 2010 from http://helpguide. org/mental/grief_loss. htm Goodman, R. F. , (2000). Coping with grief after a sudden death. Retreived May 11, 2010 from http://virginiatech. healthandperformancesolutions. net/Tech%20Trauma%20Articles/Articles/Coping%20With%20Grief%20After%20a%20Sudden%20Death. pdf

Friday, January 10, 2020

Practical Detail B Tech Mechanical Heat Transfer Lab

The equipment consists of a metallic container in which steam generation takes place. The lower portion houses suitable electric heater for steam generation. A special arrangement is provided for the container for filling the water.The glass cylinder houses two water cooled copper condensers, one of which Is chromium plated to promote drop wise condensation and the other is in its natural state to give film wise condensation. A connection for pressure gauge Is provided. Separate connections of two condensers for passing water are provided. One Rota meter with appropriate can be used for measuring water flow rate in one of the condensers under test. A digital temperature Indicator provided has multiplying connections.Which measures temperatures of steam, two condensers, water inlet & outlet temperature of condenser water flow. To find the heat transfer coefficient for Drowses condensation and Film wise condensation process. Condensers : One chromium plated for drop wise condensation & one natural finish for Film wise condensation otherwise identical in construction. 19 mm outer did. 170 mm length. Fabricated from copper with reverse flow in concentric tubes. Fitted with temperature sensor for surface temp Measurement.M. S. Fabricated construction comprising test section & steam generation section. Test section provided with glass cylinder for visualization of the process. Suitable water heater. 1) Temperature Indicator: Digital 0-199. 9 0 C with multinational switch. 2) Temperature Sensors : RD PUT – 100 Type 3) Rota meter for measuring water flow rate. 4) Pressure Gauge: Dial type 0-2 Keg/cam Dimensions Mall unit 1 OFF Heating Elements : Instrumentation Web S tit : www. Etherealness. Com Email: [email  protected] reengineering. Com, [email  protected] Com

Thursday, January 2, 2020

The History of Marriage and Family is Changing Essay

The History of Marriage and Family is Changing Things have changed a great deal from the Puritanical beliefs integrated long ago that said people must have a license in order to live together. Now, blended families are commonplace and marriages between people of the same sex are a reality. The history of marriage and family is actually filled with a variety of thought quite foreign to say, the average American. Marriage was often an agreement of practicality, arranged to provide a linkage between family fortunes. The film Titanic exemplifies this type of thinking even as late as the turn of the century. Thus, it is only in relatively recent history that marriage has been looked at in terms of romance. Although throughout the†¦show more content†¦In fact, Fisher found that even though the number of American couples living together tripled in the seventies, the peak year for divorce among married couples remained the same (312). Living together may have some effect on an impending marriage. Of course, the obvious effect would be that the couple realizes that they are not right for each other, or marriage is not right for them, and they would not marry at all. There are also those relationships that seem to go on endlessly and never culminate in a commitment, even though one party or another want to make things official. Cohabiting prior to marriage would likely not have much of a positive or negative effect in today’s society because the actual relationship would stay the same regardless of the living arrangements. If any effect would be noticeable at all, it would be the effect on the children the couple have or would have in the future of the relationship. Statistics show that the number of children living in families with married couples declined from 88% (Furstenberg 34) in 1960 to 69% (34) in 1994. Divorce does explain the drop to some extent, but much of the change may be attributed to the rise in nonmarital childbearing (34). Births occurring out of wedlock went from a mere 5% (34) in 1960 to 31% (34) in 1993. Some of these have occurred among couples who are living together; however, the vast majority of these babies were born to single parents (34). Thus, when people live together it should notShow MoreRelatedThe American Concept Of Marriage1140 Words   |  5 PagesThe American concept of marriage foundation has been a foundation for human civilization for centuries. Likewise, forty-one American states revere matrimony laws of Moses between man and woman. However, the concept of marriage for Americans is under review by the United States Supreme Court. Citizens interested in changing the Law of Moses will present their purpos e and reason challenging the Federal Defense of Marriage Act. Historical marriage values are questionable to some individuals in AmericanRead MoreFamily Structure In Post-War Britian Essay1219 Words   |  5 Pagesconflict in history lasting from 1939-1945, it involved most of the worlds nations including Great Britain. WWII had far-reaching implications for most of the world. The following essay will demonstrate the changes the UK family has undergone since World War Ç , the following essay will also throw light upon the changes in family types, economic activities of women , power distribution, laws and sexuality with respect to disciplines of sociology, economics, history and politics. Family used toRead MoreThe Evolution Of Marriage : Private Relationship Or Pubic Policy1668 Words   |  7 PagesSamantha Young Dr. Catherine Kerrison 29 April 2015 Historiography Paper The Evolution of Marriage: Private Relationship or Pubic Policy From the popular 1960s televisions series â€Å"Father Know Best† depicting the perfect traditional family, to the 2011-2012 Best Comedy Series â€Å"Modern Family,† the idea of how marriage is portrayed in the United States continues to evolve. The evolution of marriage extends beyond the private relationship between two people, into the public domain where societalRead MoreThe Freedom Of The Free Love Movement Essay1582 Words   |  7 Pagesthe need for children to help maintain farmland was no longer necessary. Cities emerged and reproduction slowed. This period was a major turning point for the dominant meaning of sexuality; thus it has great significance. D’Emilio writes about this changing sexual ideology when he states â€Å"especially within the middle class, sexual desires had become increasingly fused with a romantic quest for emotional intimacy and even spiritual union† (84). Sexuality no longer held strong ties to procreation andRead MoreThe Case For Marriage Redefinition1231 Words   |  5 PagesThe Case for Marriage Redefinition The debate over whether same-sex marriage should be legalized has raged on furiously over the past several years in both the United States and Britain. Opponents of same-sex marriage fear what consequences the redefining of marriage may bring while gay rights lobbyists deny that the meaning of marriage is being threatened. What is really at the heart of this debate, however, is personal liberty. Marriage needs to be redefined to include all genders and the inherentRead MoreThe Roles Of Men And Women1477 Words   |  6 PagesThroughout history, men and women have had different roles in everyday life. Men were traditionally the bread-winner, the handyman and the ruler of the household. Women were the cook, cleaner, child-bearer (and raiser), and clothes maker. As humankind progresses, humans progress. Should women be subjected to always be the little housewife? Should men always be pressured to be the money makers of the family? My answer to both of those questions is: absolutely not. This essay will display how the rolesRead MoreSociology1220 Words   |  5 PagesFamily is a set of relationships The main tension we have talked about is the how the family exists in reality and how we view the family We organize ourselves as families because of economics, continuity, communication, convenience and efficiency The myths from the textbook are that marriage is universal, family harmony, you are what your family is, and the stable past The three revolutions: Post industrial – life and modernity, evolution of life, altered family with technology, workRead MoreEssay on The Divorce Rate and Women in the Workplace1723 Words   |  7 PagesThe Divorce Rate and Women in the Workplace Marriage Most ancient societies needed a source environment for the upholding of the species and a system of rules to handle the granting of property rights. The institution of marriage handled both of these needs. Some varieties of marriage are Polygamy- one man, several wives or one woman, several husbands. Polygyny- one man, several wives. Polyandry- one woman, several husbands. Endogamy- requirement to marry someone who belongs to his or herRead MoreLegalizing Same-Sex Marriage Essay1238 Words   |  5 PagesEveryone is aware of marriage. We have heard about it, gone to one, or even been in one. The idea of marriage is something that is bestowed upon us and something that we look forward to ever since we were children, but what about those who what to get married to the same sex. How is that possible? As you know, everything changes at some point or another, this includes marriage. That is why same-sex marriage should be legalized. It has come to a point where the idea or a â€Å"normal† marriage has to change inRead MoreThe Cultural Aspects Of Family1237 Words   |  5 Pagesis meant by the term ‘family’ and to look at the differences of the term, when we study the family cross culturally. There are many different family forms which I will explore whilst writing this essay, along with the increasing family forms, and how the y have changed over time. I will also be studying the cultural aspects of family both in Western and Non Western societies explaining how they differ to western families. ‘Kinship’ is said to be the foundation of the family according to anthropologists