Thursday, February 20, 2020

Confucious and the golden rule, East meets west Coursework

Confucious and the golden rule, East meets west - Coursework Example From the Chinese philosopher’s perspective, a person who does not want to be hurt should not hurt others. On the other hand, Jesus implies that if you do not want to be harmed, do good to others because if you are good, then other people will give you back the same treatment. As an individual, I live by the same rule of Jesus because I strongly agree that people should be active participants in their community in making it a peaceful and harmonious place to live in. I recognize the view of Confucius that people should not do to others what they do not want others do to them. However, I am more inclined to strongly concur with Jesus’ point of view because it is not only stated positively but it also encourages an active participation of a person. I firmly believe that we need to stay away from doing dreadful things as Confucius interjects but in order to minimize if not eliminate awful situations, we have to actively do excellent things. According to Tao, the best man benefits all things just like water does. Where there is water, life abounds and the same is true with the best man. Tao says that the best man is selfless, able to benefit the people around him and does not compete with them. Instead, he is able to see identify a need and does something to meet the need without thinking about what he should gain from it or what he is going to lose if he needs to spend a lot of time and money in accomplishing the task. The best man, despite his commendable attributes will remain humble and simply continues to exist influence his community in a positive manner. Humility is that place which Tao says the water goes to which all disdain. Indeed, through the different centuries, only a handful strove to do good and still remain quiet about what they did. Most people set their goals high and do mighty works and above all their achievements, they want to be recognized and exalted. Nevertheless, the best man takes a different route. He gives

Tuesday, February 4, 2020

CIS333 Week 8 Assignment 2 Coursework Example | Topics and Well Written Essays - 1250 words

CIS333 Week 8 Assignment 2 - Coursework Example It is also vital to bridge protocol in the organisation in case of an extreme emergency that would otherwise cost the groups dearly. The organization should have a means to prevent such attacks when they occur, for example, having a backup plan. Rooms with sensitive information like the server rooms should have steel doors and enabled biometric system to authenticate users to the room. They should also be locked with huge padlocks to avoid physical attacks by insiders. It is also necessary to have alert systems when there is any bridge being noticed in the organization. Implement as software that informs the administration in case power, for example, goes below the required amount. Failing systems are set with warning systems such as an imminent failure in the hard drives of the organization. It is also necessary to have corrective means to bring back a damaged or altered system back into its original course of action. For instance, the organization should have data recovery mechanisms in case of vital data disappearing. The history of any organization depends on facts gathered over time. Every process of the society is documented and stored as data. Such information is vital to knowing the organization’s current state, compare it to its past and to make correct future predictions. Data faces physical security threat where somebody walks into an office and transfers the information they want. Others break rooms to get these resources while others just need to be on the internet to access them. To maintain such data, we need physically to protect their locations. It includes the use of steel doors, heavy hinges and padlocks.It is also necessary to employ new means of identifying persons who have permission into these offices. We need to use biometrics to identify bonafide members (Bosworth & Kabay, 2002). Also, employ the use of encrypted passwords to unlock such doors. For instance using MD5, which is a very useful