Friday, February 28, 2020

Capcakes Essay Example | Topics and Well Written Essays - 1000 words

Capcakes - Essay Example In order to open the cafà ©, the first and foremost challenge in front of me is to identify the cost of making the plan of "Yammay Cupcake† cafà ©. I intend to start the business with US $24,000. I think about renting a small shop in the pearl land that I can acquire for US $800 per month. It is a new luxury mall, in a luxury area in Qatar surrounded by many offices and a park. I can guarantee that my customers will be employees, who will visit my cafà © in their break time. Also, the families, especially kids in the park will make potential customers. I plan the location of "Yammay Cupcake" in such a way so that it will make the nearest cupcake cafà © for the offices and the park. Also, I think I shall sell coffee, juices and lollipop cakes for the children. The fundamental ingredients for most of the desserts will be flour, sugar, oil, cream, natural cooking colors and chocolate. All of them can easily be purchased from a famous market in the locality. I intend to import ingredients for the cakes’ decoration from USA, for I know a good decoration shop in USA, that sells good decoration material for the cupcakes for little cost. That shop is IKEA. Its stores are available in many countries, though those in USA are accoutered with the most beautiful decoration material. I can tell this because I had visited the IKEA stores in Dubai and the decoration there was not like what I had seen in the stores in USA. I talked to the manager in the Dubai store. He told me that he would help me import decoration material from the USA stores for a fee of $150. I shall take all the equipment from a specialized shop that sold excellent equipment for cooking and coffee. The shops owner is my uncle. He will give me a good deal, and it will cost around US $2500 after discount. The culture of Qatar is polychronic. Duty is more important time. So I chose â€Å"Yammay Cupcake" cafà © as my first business. I have many reasons for doing so.

Wednesday, February 12, 2020

Enterprise Info Security Essay Example | Topics and Well Written Essays - 1250 words

Enterprise Info Security - Essay Example This may result in erratic program behavior, including memory access errors, incorrect results, a crash, or a breach of system security. They are thus the basis of many software vulnerabilities and can be maliciously exploited Understanding the difference between data and programs is a very important element of avoiding various overflow attacks. When one understands that data is just computer information while a program is the software screen, he or she can be able to apply new defense systems. It’s easy for someone to understand how to use the modern security features like Data Execution Prevention (DEP) can be applied in modern operating system like Mac OSX, Linus and Microsoft Windows. For example DEP works in two different ways; either its hardware encoded or software encoded. Software-encoded DEP do not protect data pages from execution of codes, but from another type of attack. Knowledge about this security features and operating systems is very important when one is loo king for the best defense against overflow attacks. Question 4.2 Consider a system that writes event numbers to its audit log and uses a table to translate these numbers into messages. What is the potential advantage of using this level of indirection in log file entries? What are the potential dangers? This system is the Computer Aided Dispatch System (CAD System). Potential advantage CAD system is a greater boost to public communication. These include providing instant and reliable communication through alarm connections, mobile data systems, and time and records management systems. Potential Dangers The design, development, purchase, and installation of CAD systems can be a complicated for both a medium or large-size public safety agency. It involves not only the installation of computers and the CAD software, but usually connection to a wide variety of other systems: alarm inputs, mobile data systems, time synchronization sources, records management systems. This process is ther efore very expensive and complicated to handle (Computer-Aided Dispatch Software Resource, Para 2). Question 4.3 How spoofing can be performed When a particular machine claims to own a particular IP address and the first machine sends all its messages to that machine. Using this attack, a machine can listen to all the traffic that a machine wants to send out. This happens when two machines are on the same network. Normally one machine sends a packet to the other machine IP address and the network routes back to its destination. This kind of attack is called ARP spoofing. RP doesn't have any way to check if a particular responding machine does in fact own a particular IP address. This can be exploited by having other machines claim to be certain IP addresses. Defenses against spoofing Some of the defense mechanism against spoofing includes; Guarding algorithm for ARP spoofing Updating ARP cache method Checking the ARP cache each and every time Information encryption Controlling by th e use of switching equipments Configuration of static ARP cache (Li, B., Dong, K., Dong, L. & Yang L.) Question 5.1 Explain the concept of dual signature used in SET (Secure Electronic Transfer) Protocol and its Components. Secure Electronic Transaction (SET) is system of protecting electronic transaction using credit cards online. This process uses the concept of dual signature. Dual signature concept operates in the following procedure; The owner of the card will take the cards payment information