Thursday, February 27, 2020

Completing a threat assessment of ANSAR DINE. This entity poses a Essay

Completing a threat assessment of ANSAR DINE. This entity poses a threat to the United States in some way - Essay Example It is advisable that the US government should take this matter into serious consideration due to the fact that being an integrated part of ‘al-Qaeda’ it might raise threat against the interest of the US in the long run. One of such instances regarding this context includes the destruction of the ‘United Nations declared Heritage Sites’ in the area of Timbuktu, by Ansar Dine. This incident has raised severe levels of concerns for both the US as well as the security interests of the world along with bringing forward certain cases of humanitarian crisis2. Furthermore, the killing of ‘Osama bin laden’ (the leader of al-Qaeda) has further intensified the quest of this terrorist organization in the context of jeopardizing the western interests. Before the attack on the ‘World Trade Centre’ also known as (the attack of 9/11), the US government took the activities of this Islamic fundamentalist group in a casual manner. However, the attack of 9/11 completely changed the attitude of the US government towards this terrorist affiliate organization. The current fear of the US government is regarding the driving of the Ansar Dine militants into the ungoverned areas of the Sahara desert by the French army. The reason being, those ungoverned desert areas within Northern Mali can act as a settlement area for the al-Qaeda affiliates such as Ansar Dine3 This in turn has further increased the intensity of threat from this group both from the domestic as well as international perspective. This is due to the fact that Norther n Mali is a deserted border location within West Africa. Due to the geographical location of Mali, it will be easy for this Islamic fundamentalist group to easily smuggle funds, illegal machineries along with weapons from not only other states but also from the neighboring nations thereby increasing the threat intensity of the terrorist

Monday, February 10, 2020

NETWORK ADMINISTRATION AND SECURITY Essay Example | Topics and Well Written Essays - 1750 words

NETWORK ADMINISTRATION AND SECURITY - Essay Example 2002). UNIX back end server support the automatic generation of enterprise java beans facilitated the development teams to develop the J2EE application more efficiently. By the UNIX fast XML proxy support, web services are developed in no time on a distributed system as compared to the previous server architecture. IBM 32 way UNIX servers were also launched in year 2001 with the code name â€Å"Regatta†. The microprocessor architecture comprises of 1 GHz 64 Bit Power 4. This UNIX server is capable of self-healing technology and to decrease system failures. The system is capable to divide into 16 virtual servers which enable the businesses to unite several machines in to one (Popovich 2001). The Client-server model of UNIX was the core components for the growth of Internet and reshaping of the distributed systems networks. Inter process communication in the UNIX operating system involves the connection between the system components logically and physically. It supports real tim e network applications which allow the user to exchange messages in an interactive session. UNIX is known as a command line interface due to nonexistence of a GUI environment Today UNIX is equipped with a GUI along with dynamic communication functionalities. Some of the registered UNIX products are HP-UX, IBM AIX, SCO UnixWare, SGI IRIX, Sun Solaris etc. 2 UNIX Administration UNIX system administrator is responsible for installing software, patches, administer file system, analyze and constantly monitor the performance. If any issue occurs, system administrator troubleshoots the issue with the help of available tools and commands. Hardware and software configuration management, liaison with data center, software and hardware migration also add to the responsibilities of a UNIX system administrator. The UNIX administration is divided in to two separate groups. System Administration Network Administration 2.1 System Administration To administer Linux / UNIX, there are many commands an d tools available. To perform useful tasks, following commands are illustrated below with screen shots where possible. 2.1.1 â€Å"MAN† Command ‘MAN’ command â€Å"displays the online documentation for almost any command or program in UNIX. An incredible amount of information is stored in man pages, but you must know the name of the command you are looking for to be able to search† (, UNIX man command). This command extracts the title from the online reference manuals. As in the below mentioned snapshot, there is no manual installed. 2.1.2 â€Å"su† Command ‘Su’ is used to create a shell with a specific used id. It is used for switching between accounts as compared to Windows â€Å"switch user† option. See the snapshot for example 2.1.3 ‘Who’ Command This command displays the information regarding the users who is logged in, from how long, and how many users are logged in. As the below mentioned snapshot shows the us ername, time, date and how many users are logged in. Common switches are activity, state, line, time and name. 2.2 Network Administration Network administrator utilized ICMP â€Å"