Saturday, January 25, 2020

Network Security and Vulnerability Threat Table

Network Security and Vulnerability Threat Table LAN Security Is the local area network that access control using the private VLANs and its a networking device within a small geographical area. They are not safe and secure compared to other networks because its easy to access the WLAN security compared to others its more of convenience over security thus it will help business and IT organizations to improve on their network by providing suitable choices for WLAN security for organizations to have a safe WLAN in their working place they must have procedures that outlines forms of double connections that are allowed in the work place for security purposes, also to consider security and its impacts to other networks for instance theWLAN ,to have client devices and APs,also to perform attack and vulnerability monitoring respectively to support this type of network and lastly to carry out a regular assessment about WLAN security in the organization. The wireless system helps devices to connect to the computer minus them being connected to the network,WLAN consists of client devices for examples the laptops and the access points(APs),the APs connect client devices with distributing system(DS) and DS its the only way by which client devices can pass information or communicate with LAN and other networks. Also we have wireless switches that help the WLAN is administrators to manage it. WLAN Architecture It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture, and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming; a microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect Threats of WLAN The following explains the security threats of WLAN that are likely to happen: eavesdropping, spoofing and denial of service A) Eavesdropping Involves attack against the confidentiality of data that is transmitted across the network, eavesdropping is a big threat because the attacker can intercept the transmission over air from a distance that is away from the organization B) Spoofing It is where the attacker could gain access to data and resources in the network by assuming the identity of a valid user this is because some networks do not authenticate the source address thus the attackers may spoof MAC addresses and hijack sessions. C) Denial of service This is where the intruder floods the network with either genuine or fake information affecting the availability of the network resources, WLAN are very vulnerable against denial service attacks due to the nature of the radio transmission. LAN Security Is a wireless networking device within a small locality that access control using the private VLANs. Identity management Is the system discipline whereby the right people access the right and valid information at the right moments and for good particular reasons. Physical security Its the protection of the hardware, software, networks, and data from actions that could cause loss or damage to an organization for instance theft. Personal security Availability Is the quality or state of information or data of being available and easily accessed. Privacy Is the state of a person to seclude himself or herself, or information about him or her, so its the procreation of information or confidentiality of data. Cyberattactks in tabular format Type of attack Effect Malware Its a computer code that a malicious function, used to destroy   or steal private data in a computer. Password attacks They attack on cracking a person or user is password so that the attacker may obtain access to a secured system. Denial of service Focuses on the interruption of a network service when an attacker sends volumes of traffic to the network that is targeted. The following will be employed to mitigate the above types of attacks on the computer: Threat intelligence reports, are documents that describe types of system and information that is on mission or the one being targeted and information important to the organization. We have security alerts that are notifications about the current vulnerabilities and some security concerns. Tool configuration is the recommendations for mechanisms that support the exchange, analyzing, and the use of threat information. Indicators can also be used, they suggest or tell that an attack is imminent or its underway for instance we have the IP. Plan of protections openStego-its a free steganography that has the following functions: Data hiding where it can hide data within a cover file watermarking files with an invisible signature. Quickstego -helps someone to hide text in pictures so that its only users of quickstego who can be able to retrieve and go through those messages. Oursecret -enables the user to hide text files for instance images and videos thus suitable for sending confidential information. Veracrypt -it adds enhanced security to the algorithms used for system and partions encryption making it immune to new developments in brite-force attacks. Axcrypt -it integrates seamlessly with windows to compress, encrypt, decrypt, store, send, and work with individual files. GPG-it enables to encrypt and sign data, communication, as well as access modules for all public directories. Cryptographic mechanisms to organization Cryptographic is writing is in secret code within the context of any application and these are the requirements for it; Authentication, privacy, intergrity, and non-repudiation They include:schannel CNG provider model,ECC cipher suites,AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. Risks associated with these are that they make the problem of general key recovery difficult and expensive and too insecure and expensive for many applications and users as large. File encryption tools Veracrypt, axcyrpt, Bitlocker, GNU Privacy Guard and 7-zip File encryption method We have the following methods; exceptions, syntax, remarks and security Results of the encryption files They provide an overview and pointers to resources on EFS They also point to the implementation strategies and best practices Encryption technologies Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text block coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Description security architecture of the organization It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming a   microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect. the cryptographic means of protecting the assets of the organization Cryptographic is writing is writing in secret code within the context of any application and these are the requirements for it; Authentication,privacy,intergrity and non-repudiation They include: schannel CNG provider model, ECC cipher suites, AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial. important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. the types of known attacks against those types of protections Password attacks-its a third party who tries to get access of information by cracking the password. Malware-codes with malicious intent to steal data or destruction of the computer system. DOS attacks-it majors on or targeting disruption of the network and can be prevented by keeping the system secure. Strong passwords are the only way against this attack. Malware should be avoided by doing away with links to unknown users. How to ward off the attacks Malware-avoid clicking and downloading attachments from unknown users. Phishing-through verification of any requests from organization via email over the business phone. Passwords attacks-use of strong passwords DOS attacks-the system of the organization to be kept secure with software updates. Encryption Technologies Data Hiding Technologies and Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text blocks coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image, or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Network security vulnerability and threat table above Common Access Card Deployment Strategy How identity management can be part of security program and CAC deployment plan Identity management involves telling what the user can do to certain devices at a given time. Identity management can be part of the program because of its reasons well known for instance: increasing security, also production while decreasing the cost and effort. The program tools of identity management need to run as application towards a server because it defines the type of user and devices allowed to work on a certain network this for it to be part of the program, must depend on alerts, reports, policy definition and alarms Thus offering directory integration and connection of the wireless and non wireless users and meeting almost the operational and security requirements. Deployment plan of the common access control Can come for different reasons so as to deploy and enforce the authorization policy for instance: The organization -wide authorization policy   that is driven from compliance level of organizational requirement.also departmental authorization policy where they have some special data handling the requirements that would be passed to various department. Then the specific data management relating to compliance and targeting at the   protection of the right access of information. Email Security Strategy Types of public-private key pairing Public keys may be disseminated widely but private are only known to user owner. This makes two functions-the authentication when public key is used to verify or show a private user sent a message and encryption where the holder of the private key can decrypt the message. Authentication-is when the public key is used to verify that a holder of the paired private key sent the message. Non-repudiation-its an attribute of communication that seeks to prevent the occurrence of the untrue or false denial of involvement by either party because it provides the originator of data with credible evidence showing information was received as it was addressed. Hashing -its used to index and retrieve items in database because it is faster to find an item through the use of shorter hashed key thus hashing being the transformation of a string of characters into a shorter fixed length than the original size. This added security benefit will ensure integrity of messaging by: Speeding being high   this is when the number of entries is large because maximum number of entries can be predicted in advance so that the bucket array can be allocated once also one may reduce the average lookup cost by a careful choice of the hash function and even the internal data   of structures. Pretty Good Policy-its a program that is used to encrypt and decrypt email over the internet as well as to authenticate digital messages with signatures the stored files that are already encrypted. GNU privacy Guard-its an encryption software program since it uses the combination of conventional symmetric-key cryptography for speed. Public key infrastructure -its a cryptography key that enables the distribution and the identification of the public encryption keys thus enabling the devices to exchange data securely over various networks. Digital signature -its an electronic signature that can be used to authenticate the identity of the person sending the message. Mobile device encryption-they help mitigate security risks whereby data must be encrypted while it is in transit and when in storage. How to use smartcard readers tied to computer systems Smartcard are the credit-sized plastic cards that do contain the circuit card that are integrated they can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks. Complexibility of cost and technical of email encryption strategic to security benefits The following elements must be considered: The basics because encryption is a process that is based on the cipher that makes or ensures information is hidden.Aslo choosing what to encrypt because it will be part of the risk management and the planning process of data governance. The three states of data in order for data to be secure from data in motion to data at rest and last data in use. Recommendation Smart card can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks A deployment plan   its a step to step on what need to happen in the last stage in the email security strategy, for a deployment plan to be effective the following must be put into consideration: Layered application that deals with the design management dependencies  Ã‚   between components also the people who structure application layers should not be same again to structure the hardware infrastructure. Reference Atul.kahate, cryptography, and Network security Tata mc Graw.Hill Publishing Company Limited, 2003 E .kranakis primarily and cryptography, Wiley, 1986

Friday, January 17, 2020

Defining Social Media Essay

In my opinion, social media is used to keep in touch with people, share ideas, videos, and pictures, and gain some knowledgeable information in networks and virtual communities. Social media is very handy when it comes to keeping in touch with long-lost friends and family members. Social media is a great resource to search things that you don’t know and that allows you to become knowledgeable about things you needed to know. Article Selected: Vine’s Biggest Teen Star Criticized for Homophobic Video Response: My response to this article is that you should always watch what you put on social media because anything can be saved and it could generally be held against you depending on what the post may be about. Social media isn’t always a person’s best friend. You need to watch what you post; especially for employer reasons. Majority of employers will go onto your Facebook page and see what kind of a person you really are. In this certain article, Nash Grier is a very popular person on Vine. After he posted the video making a homophobic slur, he did delete it because of negative comments that started to begin. The trick to this though, is that he deleted it, but someone else had already saved it and posted it again and it went viral. After that, Nash Grier did take it upon himself to apologize on Twitter saying how he was being ignorant, stupid, and how he was stuck in a bad place. He may have apologized, but from here on out, it’s possible that this discrimination will be held against him for life, due to one mistake he didn’t think about before he posted it on social media. Conclusion: Think before you post. You should always know that whatever you post on social media, may or may not affect you in the long run. Be smart and think about what you’re posting before you actually submit it. Citation: Vine’s Biggest Teen Star Criticized for Homophobic Video. (2014, July 8). Retrieved February 2, 2015, from http://articles.chicagotribune.com/2014-07-08/entertainment/sns-201407081348reedbusivarietyn1201259209-20140708_1_vine-civil-wars-social-media

Thursday, January 9, 2020

Analysis Of The Play A Raisin Of The Sun - 896 Words

The play A Raisin in the Sun is a drama that was written by Lorraine Hansberry, who loosely based it off of her own family. It’s about an African American family made up of five people that each have their own individual dreams. Dreams is the main theme of this play. The main character to be focused on though is Walter. His dream is able to show how oppression of a dream or a deferred dream can tear a person down until Walter is able to change and not have a dream that is self-centered. The play starts off with a poem by Langston Hughes, this poems purpose is to give the reader insight into what the theme of the whole play will be about. The main line in the poem to give this insight is when it asks â€Å"What happens to a dream deferred?† (Hansberry 918). This line allows us to think ponder on the question throughout the play and see how it affects Walter since his dream is being deferred. Walter is self-centered and can only think about his dream and what it means to him. He doesn’t like to hear what his wife or mother says about his dream he just takes it as them tearing him down. An example of Walter thinking that his wife has no faith in his dream can be shown here; â€Å"There you are. Man say to his woman: I got me a dream. His woman say: Eat your eggs.† (Hansberry 926). Walter thinks that it is crazy for his family to not support him even though he wants to open a liquor store. This also is a reason that he seems angry all the time. Not having the support from loved ones canShow MoreRelatedAnalysis Of The Play A Raisin Of The Sun 1343 Words   |  6 PagesIn the play, A Raisin in the Sun by Lorraine Hansberry, money plays an essential role in character development. The play is set in the South Side of Chicago in the late 1950s. Raisin follows the lives of a poor, urban, African-American family, the Youngers, during this period of heightened racial tension in the United States. The story begins after the death of the patriarch of the family, Mr. Younger. With his death comes a $10,000 check representing the proceeds of his life insurance policy. SinceRead MoreAnalysis of Plays, Fences and A Raisin in the Sun Essay2025 Words   |  9 PagesJose Morales English 164 Dr. Kidd 08/03/2012 â€Å"Fences† and â€Å"A Raisin in the Sun† Plays, â€Å"Fences† and â€Å"A Raisin in the Sun† share similar plots. They take place in the mid-western United States in the 1950’s and explore the family dynamics of the African-American Family and the paradigmatic shift it experienced between two generations. The older generation, who could remember slavery by first-hand experience or by being born during a time when success for the average African-Americans wasRead MoreCharacter Analysis Of Walter Younger From The Classic Play A Raisin Of The Sun 1108 Words   |  5 PagesIn the majority of households, the man is always looked at as the head of the house. However, not every man can handle this position. Walter Younger from the classic play, A Raisin in the Sun by Lorraine Hansberry, finds it very difficult to rise up as the man he’s supposed to be. The story shares the life of a family living in Chicago in a small apartment. It highlights mainly the financial issues the family faces which puts Walter in a bind. He faces obstacles and his actions determines his manhoodRead More Analysis of A Raisin in the Sun Essay1267 Words   |  6 PagesA Raisin in the Sun Analysis Upon walking out of Krannerts production of A Raisin in the Sun, an eerie silence drizzled about the audience as people murmured and slowly shuffled towards the exits. After witnessing such a powerful yet melancholy piece of theater work, words seemed inappropriate. For three hours, A Raisin in the Sun encompassed us with racial, economic, and social issues of the 1950s. Swirling portions of humor, disgrace, pride, and sadness into a smooth blend, the play developedRead MoreThe Last Critic That Will Be Evaluated844 Words   |  4 Pagescritical analysis is titled A Raisin in the Sun: Anniversary of an American Classic. Wilkerson’s critical analysis discusses the â€Å"various social, historical, and artistic factors that have contributed to the play’s contemporary relevance and popularity, with particular focus on script revisions.† (Wilkerson 442) Wilkerson states that critics claimed that plays about the Black experience were seen as unattractive and of tempo rary or limited appeal to the theatre audiences. A Raisin in the Sun was differentRead MoreInitial Expectation And Purposes Of Theatre845 Words   |  4 PagesTheatre â€Å"Lorraine Hansberry’s A Raisin in the Sun (1959) probes the racially charged politics of home ownership in post–World War II Southside Chicago† (Matthews). Before going to see this performance, I made a quick research about this play and that research formed an initial view about this performance. I have read about the play in general, a short synopsis a historical and influences upon American society and theatre. Lorraine Hansberry’s â€Å"A raisin in the Sun† is a play that tells the story of a blackRead MoreA Raisin in the Sun by Lorraine Hansberry Essay1343 Words   |  6 PagesA Raisin in the Sun by Lorraine Hansberry is a play that displays housing discrimination in Chicago during the 1950s. Housing discrimination was partially an effect of the Great Migration. This was an event during the 1950s that resulted in about six million African Americans â€Å"migrating† from the south to the north, Midwest, and west regions of the Unite d States. This caused the population of black people in major northern cities to increase rapidly. They are then only able to live in certain neighborhoodsRead MoreAnalysis Of The Poem Harlem 1303 Words   |  6 Pagesbody’s rest. Because it does happen mainly during the rapid-eye movement, or REM, stage of sleep, when brain activity is high and most resembles that of being awake, dreams can be ferociously active and wildly vivid; often leaving them open to intense analysis and interpretation. Thematically, a dream can also act as a physical representation of â€Å"crossing boundaries.† As one wakes from a dream state to an awoken state, they have crossed a border from an unconscious to conscious state. Hughes’ poem canRead MoreCharacter Analysis Of Beneatha In A Raisin In The Sun1487 Words   |  6 PagesCharacter Analysis â€Å" A Raisin in the Sun† is a play written by Lorraine Hansberry about the life of an African American family during the era of segregation. The play starts off with the Younger family receiving a 10,000 dollar check from Mr. Younger’s insurance policy. The family argues over what they are going to do with it. Mama wants to buy a house with it, Walter wants to invest in a liquor store, and Beneatha wants to use the money to go to medical school. The contrast of the characters’ personalitiesRead MoreCharacter Analysis Of Lorraine Hansberry s A Raisin990 Words   |  4 PagesCharacter Analysis: A Raisin in the Sun The play A Raisin In the Sun, by Lorraine Hansberry is a classic, revolutionary play written in the times of segregation and discrimination of skin tones. Throughout the story, the Youngers display how they are just like an ordinary family; everybody has their own special personality. This caused many conflicts when it was time to decide what to do with the check coming in the mail for ten thousand dollars. Walter Lee Younger, the son and oldest child of mama

Wednesday, January 1, 2020

The On Gospel Essentials Of The United States - 1489 Words

Gospel Essentials One of the fundamental rights in the U.S. constitution is guaranteed to all citizens in the first amendment. We have the right to practice any religion of our choosing, including the practice of no religion at all. The framers of the constitution even put the freedom of religion before our rights to free speech and free press (Haiman). This constitutional right allows America’s blend of naturalists, pantheists, theists, and spiritualists to practice their beliefs without interference from the government. This collection of religions adds to our diverse culture and creates an atmosphere of individuality without persecution. The Christian worldview possesses very unique qualities that separate it from the others. Christians believe that only one God exists (Timothy 2:5) and that he created mankind in his own image (Genesis 1:27). God then sent his son Jesus to die for the original sin of man and to allows us to ask forgiveness for our sins. Christian values are built off the teachings of the holy bible and are absolute with the teachings of God. In order to analyze the Christian worldview and actively practice it without persecution one must investigate the belief in God and his son Jesus, understand human nature, and accept restoration and redemption. God. The Christian worldview has God at the forefront of all creation. God created the heavens and the earth (Genesis 1:1), he created all that walks, all that talks, and all the beasts on Earth. InShow MoreRelatedBuilding Faith Community From Day One924 Words   |  4 Pagesculture, is to connect the school’s core values and beliefs to Christ and the Gospel intentionally, deliberately, and continually.† (Cook, 2001, p. 20) The principal, being the spiritual leader of the school, helps support the Catholic school’s mission and the xxxx of the Catholic identity of the school. They must lead through example and build the faith community. The United States Conference of Catholic Bishops states that â€Å" Within such communities teachers and pupils experience together what itRead MoreDescription Of A Post Office Box1544 Words   |  7 Pagesas the Gospel of Matthew, while others make little or no reference at all, such as the Gospel of Luke. The first book of the Bible, Genesis, contains the story of Adam and Eve. When Adam ate from the Tree of Knowledge, he doomed humanity to sin. In the Christian bible, this was preparation for Jesus. The New Testament begins in Bethlehem, with the appearance of Jesus. Jesus was God’s only son, whom was sent to save us from the mankind’s inherent sin. Jesus’ story was told in four gospels, whichRead MoreSpiritual and Religious Music1831 Words   |  7 PagesThe summation of the stanzas in a particular contemporary Christian song represents a religious concept, specifically in the Christian tradition, where in times of weakness or uncertainty, one must put all of their faith in God. â€Å"Oceans† by Hillsong United is simply a powerful story within itself, where each stanza conveys a part of that story to its listeners. For example, the first stanza begins with the phrase, â€Å"You call me out upon the waters, the great unknown where feet may fail.† The person whoRead MoreHealth Policy Values : Personal Values And Beliefs884 Words   |  4 Pagesand how we analyze the world (The Gospel Coalition, 2014). Values are principles or standards that a person or group of people holds in great respect. These values direct the way this author lives, and the choices made throughout my life. One of the utmost misconceptions about religious belief is that it involves a belief in God or a supreme existence. Religious beliefs are beliefs that produce worship or worship-related deeds, such as going to church (The Gospel Coalition, 2014). This author believesRead MoreThe Civil Rights Movement And The Movement Of The 1960s1513 Words   |  7 PagesThe civil rights movement was a large and very popular movement that secured African Americans equal access and opened doors for the essential benefits and rights of U.S. citizenship. In spite of the fact that the foundations of the movement go back to the nineteenth century, it crested in the 1960s. African American men and ladies, alongside whites, sorted out and drove the movement at national and neighborhood levels. They sought after their objectives through lawful means, arrangements, petitionsRead MoreThe Distribution of Wealth892 Words   |  4 Pagesdifferent opinions on how wealth should be distributed properly. Andrew Carnegie does not believe wealth is distributed properly (Carnegie 485). In fact, he has a few different ideas of how to distribute wealth. In Carnegie’s essay, â€Å"The Gospel of Wealth,† he states, â€Å"There are but three modes in which surplus wealth can be disposed of .† The first way he suggests to dispose of wealth is to pass it down in the family after the one with wealth passes away. The second way to dispose of wealth is, afterRead MoreRock And Roll Or Roll1549 Words   |  7 PagesShake and roll (frequently composed as rock and roll or shake n roll) is a classification of mainstream music that started and developed in the United States amid the late 1940s and mid 1950s,[1][2] from a mix of African-American sorts, for example, soul, boogie-woogie, hop soul, jazz, and gospel music,[3] together with Western swing and nation music.[4] Though components of rock and roll can be heard in soul records from the 1920s[5] and in nation records of the 1 930s,[4] the class did not obtainRead MoreThe Poverty Of The Hunger Rebellion1671 Words   |  7 PagesThe Hunger Rebellion â€Å"The United States ranks near the bottom of the pack of wealthy nations on a measure of child poverty, according to a new report from UNICEF. Nearly one third of U.S. children live in households with an income below 60 percent of the national median income in 2008 - about $31,000 annually. In the richest nation in the world, one in three kids live in poverty.† according to Cristopher Ingraham, a political writer who previously worked at the Brookings Institution and the Pew ResearchRead MoreHistory Of South American Poverty And The Development Of Liberation Theology1451 Words   |  6 Pagescasualties of these economic and regional changes were the poor peasantry who were pushed into a deeper marginalization and small depressed villages of shacks and huts. Dependent upon capitalism and subordination to rich nations, primarily the United States, led to widespread movements demanding changes in the socio-economic structure of the countries. Many of the movements accelerate d into demonstrations and militant type activism. The dictatorships responded with a strong military response in reactionRead MoreLanguage : A Reader For Writers Essay1736 Words   |  7 Pagescountry would be a national identity for the United States. Their used to be such a strong belief that everyone in the United States that in the early 20th century they stopped teaching foreign language in schools. Another reason why English has spread so much is because of the Christian missionaries. In the article â€Å"The Church of Please and Thank You† Traves believes that they teach their gospel to kids who do not have a religion and teaching their gospel ends up promoting English. Traves says â€Å"Thousands