Friday, February 28, 2020
Ethics and Professionalism in Teaching Research Paper
Ethics and Professionalism in Teaching - Research Paper Example All professions in all societies have the task of contributing to the common good. Compared to other professions, teaching is considered as the noblest job of all. It is described not only a selfless career but as having the most significant impact on society because it takes upon itself the daunting task of educating children. Teachingââ¬â¢s greatest contribution to society, therefore, is to nurture the welfare and development of its citizens ââ¬â the students. Education, as opposed to the transmission of information, implies an outward orientation of opening up someoneââ¬â¢s mind to thinking and reasoning. To achieve this, teachers must concern themselves with both intellectual and moral development. Contrary to Aristotleââ¬â¢s concern of determining which should be the topic of education ââ¬â intellectual or moral virtue ââ¬â education would be incomplete without the other. As a result, teachers are tasked not only to impart information to its students to help them become professionals in their own field some day, but also the task of ensuring that they become responsible members of society who could positively contribute to the common good. Teachers have dual roles in their profession. As educators, they have the moral obligation of imparting not only knowledge but also, more importantly, values to students. Instrumentally, they also play other roles in the community and in the school. This includes their roles as researchers, instructors, mentors, and administrators and even the roles they play in their personal lives.
Wednesday, February 12, 2020
SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Dissertation
SECURITY ISSUES IN RED HAT ENTERPRISE LINUX - Dissertation Example The intention of this study is security as a key concern for enterprise Information technology (IT) managers with a regular apprehension to keep the systems properly updated and configured to prevent unwarranted exploitation from outsiders. OpenSCAP implements an open Source of Security Content Automation Protocol (SCAP) framework for creation of uniform approach for maintains secure systems. A lot people are paying a lot attention on security matters particularly in governments to ensure their systems are well guarded and are not exposed to uncalled for bugs and exploits. With OpenSCAP, the open source community is leveraging a number of different components from the security standards ecosystem to enable the framework. In order to avoid all sorts of attacks, this research indicates some security issues of the system and software configurations in the Red Hat Enterprise Linux (RHEL) such as OpenSCAP, Security Audit system and some OpenSCAP tools, which play a vital role in the Linux security domain. Grasping these skills not only can help the administrator defend from the potential security risk making the environment more secure but also can understand the concepts of security deeply promoting the development of computer security. The world of computer security has changed dramatically in the last few years, and one of the greatest challenges now facing CIOs and IT directors is the task of maintaining the security of their IT environments. The effects of a security breach can be catastrophic, including unplanned downtime and the resulting loss of service, a potentially significant financial impact, and the loss of sensitive and confidential information. This problem has been compounded by the proliferation of networked PCs and servers as well as the growing intelligence of malicious software that seeks to exploit and expand throughout the Internet infrastructure. Companies such as Red Hat are releasing new technologies and tools to address the needs of system administrators responsible for managing the security of large numbers of geographically dispersed systems. For example, technologies such as Position Independent Executables (PIE) and Exec Shield help protect against buffer overflows, a tactic frequently employed by attackers to infiltrate and compromise flawed software programs. Another technology, Security Enhanced Linux (SELInux) prevents users and applications from damaging an entire system by enforcing security policies at the kernel level (Farrell, 2003). On the tools front, Red Hat Network, a key part of Red Hat Enterprise Linux, provides system administrators a way to review information about security vulnerabilities and proactively apply relevant security measures and other updates to large numbers of Red Hat Enterprise Linux systems easily and efficiently. With recent technologies, applications can be shielded in environments which do not expose them to: Potential flaws that may be inherent in the application
Subscribe to:
Posts (Atom)