Monday, May 18, 2020

The Endless Battle with Prison Gangs - 1689 Words

The Endless Battle with Prison Gangs As the years pass, the rate of gang affiliated crimes in the Unites States has progressed extensively, accumulating more inmates into our major prisons doubling the maximum occupancy that the jails can hold. In the U.S there are currently 33,000 active violent street, motorcycle, and prison gangs with a recorded 1.4 million members combined. The registered number of police officers is a mere 683,396; which is not even half of our countries gang population. Incredibly enough, even with their small numbers these officers do the impossible to control, learn, and manipulate the ways of the inmates; taking all of the precautions necessary to stop and protect the normal citizens on the streets and the†¦show more content†¦Gang members have even gone so far as to soaking postcards in substances, or gluing and ironing cocaine filled cards down to almost paper thin and sending them through mail into the prisons where if not caught, the inmate who received the card will chew on the paper to receive the effects of the drug. Another surprising factor of these gang members is the way that they continue to communicate with one another even when they are always on watch by the officers. There has been secret code languages discovered that they created on their own, so no one, other than those in the gang, can understand what they’re saying when planning for an attack or kill. Another method these inmates are using to communicate, especially those in solitary confinement who don’t get to interact with anyone, is by talking into the pipes to transfer messages from one cell to another. Through this the prisoners can talk to one another like a telephone system without the guards hearing them. The more resources and ways of communicating the gang has, the more powerful they are perceived, and as the gangs get larger these tasks then become a lot easier to achieve. As stated in the beginning, police officers are extremel y outnumbered by the prison and street gangs all over the country; but, with the training that some of these police officers have received and keep receiving, they’re ready to take on any task or person despiteShow MoreRelatedEssay on MS-13: A Dangerous Gang1167 Words   |  5 PagesFor many Americans MaraSalvatrucha or commonly known on the streets as (MS-13) is an unfamiliar gang but to (FBI) Federal Bureau Investigation,(ATF) Alcohol, Tabaco, Firearms and Explosives, and local law enforcement agencies,MS-13 is an uprising globalized menace of ruthless criminals who are growing in numbers exponentially. These plagues of criminals are not only making their mark here in the United States but they are deeply rooted in their country of origin, El Salvador and all throughout CentralRead MorePoverty Is A Hot Topic On The Current World Of Politics1467 Words   |  6 Pageslow-income Americans. Government spent $916 billion on these programs in 2012 alone, and roughly 100 millio n Americans received aid from at least one of them, at an average cost of $9,000 per recipient.† He fears that the U.S. government is fighting a battle that it cannot be won because the number of people in poverty are growing and putting more stress on the national deficit (Rector). In America, the economy and poverty run hand and hand. When jobs are plenty and the economy flourishes, the numberRead MoreThe Death Penalty And Capital Punishment3365 Words   |  14 PagesThe time in prison is meant to take the criminal’s freedom to go anywhere he or she may want to go, or whatever he or she chooses to do in the world. Which will cost the criminal to think about the crime and not want to come back. But when the person is put to death, they are taught absolutely nothing because they are no longer alive to learn from it. The penalty is nothing but a cruel murder killing someone. A murder killing a possible murder. 2. The death penalty is also known as capitalRead MoreThe Death Penalty And Capital Punishment3192 Words   |  13 Pagestrafficking, and death resulting from aircraft hijacking. However, they mostly consist of various forms of murder such as murder committed during a drug-related drive-by shooting, murder during a kidnapping, murder for hire, and genocide. The time in prison is meant to take the criminal’s freedom to go anywhere he or she may want to go, or whatever he or she chooses to do in the world. Which will cost the criminal to think about the crime and not want to come back. But when the person is put to deathRead MoreThe Slavery Of The United States1869 Words   |  8 Pagesin the world, after drug smuggling and arms dealing (U.S. Laws on Trafficking Persons), which law enforcement across California say that local gangs are moving from selling drugs to selling women and children. Gang members have turned to human trafficking for financial gain. Aside from the financial gain of exploitation of women and children, street gangs are turning to human trafficking as a way to generate the funds because the risk is lower than selling drugs in the street. The National HumanRead MoreEssay on The Drug Enforcement Administration2607 Words   |  11 Pagescrossing drugs from U.S. borders. The United States already has many criminals and with more criminals with addictions crime rates rises. Having more DEA personnel will help stop all these drug traffickers, end all their networks, and be put them in prison. Background On March 28, 1973, President Richard Nixon signed the Reorganization Plan No. 2 of 1973 introducing the Drug Enforcement Administration (DEA), which later became established on July 1, 1973. Along with other agencies, the Bureau of NarcoticsRead MoreCity of God, by Fernando Meirelles and Pixote, by Hector Bebenco3034 Words   |  13 Pageswill analyze and compare both films commenting upon the similarities in the causes and effects of street children in Brazilian society. In City of God , Rocket stands on the fence balancing equally between both the gang lifestyle and his escape. In Pixote, Pixote is forced into the gang lifestyle by by societal constraints, and authoritative figures that limit the choices . In this essay I will explain how societal norms and ideas inflicted on children mold the future of the Brazilian culture typicalRead MoreA Critical Thinking Exam # 31751 Words   |  8 PagesWhites are actually more likely than blacks to sell drugs and about as likely to consum e them. Arrests of blacks for drug related crimes have increased dramatically. Ever since 1970s, the War on Drugs has been the United States’ longest, most expensive battle. Over 40 years, hundreds of billions of dollars has been spent and millions of lives encountered havoc. President Obama has made provisional movement away from the Drug War. In 2010, President Obama signed a law reducing disparity in sentences forRead MoreGuns Are Good For Protection And Self Defense2491 Words   |  10 Pageson illegally possessed firearms. Imagine all of the children and young-adults who attend all different types of school like elementary school, middle school, high school, and even universities. All of their lives are in danger, due to a seemingly endless amount of firearms in circulation. Everyone should be worried about that, because not only are the children at risk, but everyone who is vulnerable and defenseless. However, it seems like nothing is done about what is going on every day, every weekRead More Rude Boy Music In Comparison With Gangster Rap Essay4815 Words   |  20 Pagesmachetes or a small knives. It is quite dangerous to carry a gun in Jamaica, because of the stiff penalty for possession of a gun. Normally if you are caught carrying a gun you are sent to gun court where a typical sentence if life in prison. Fuelled by the seemingly endless loop of cowboy and gangster shoot ‘em ups on offer at the downtown cinemas and, as they perceived it, empowering for the first time ever, these self-styled gunslingers assumed casual violence as their currency. (Bradley, 183) This

Wednesday, May 6, 2020

Why Is Julius Caesar A Tragic Hero - 1619 Words

In Shakespeares theatrical-dramas there is a consistent trend of there being a tragic hero of some sort. In Shakespeares Julius Caesar the tragic hero just so happens to be Marcus Brutus, this is quite obvious because he fits some of the set standards that makes up a tragic hero in any of Shakespeares stories. Brutus is the tragic hero in Julius Caesar, because he posses a great trait of good, then it becomes his downfall in the end. He makes many errors in judgement which leads him to committing the deed that begins his downfall. And He is often blind or has a distorted image of reality. This is why I believe he is the tragic hero of Julius Caesar. The play Julius Caesar follows the storyline of a man named Julius†¦show more content†¦Well, honor is the subject of my story. I cannot tell you what other men Think of this life, but for my single self, I had as lief not be, as live to be In awe of such a thing as myself† (1.2.90-96.). Brutus goes through with killing Caesar,but talks the men out of killing Mark Antony out of the belief he has done nothing wrong. Caesar believes he has done the correct thing and has saved the people of Rome from a corrupt leader, and he performs a speech to the people of Rome explaining his actions and why he murdered Caesar. This leads to his downfall in the end, because the act of not killing Mark Antony creates a war that is order to kill Cassius and Brutus. Cassius and Brutus start to fight over the fact that Cassius is taking bribes. Brutus fights Cassius on this because in his mind this makes him a bad man because what Cassius is doing is against his moral code. â€Å"You have done that you should be sorry for. There is no terror, Cassius, in your threats; For I am armed so strong in honesty That they pass by me as the idle wind, Which I respect not. I did send to you For certain sums of gold, which you denied me; For I can raise no money by vile means. By heaven, I had rather coin my heart And drop my blood for drachmas† (4.2.65-73). During this fight Brutus mentions the fact Portia has committed suicide in the fact that she longed for her Brutus. But he seemed unphased by her death and he did not shake with anyShow MoreRelatedDoes Brutus â€Å"Qualify† as a Tragic Hero?873 Words   |  4 PagesDoes Brutus â€Å"qualify† as a tragic hero? Marcus Brutus does qualify as the tragic hero in Shakespeare’s play The Tragedy of Julius Caesar. A tragic hero is a good or even great man and thus wins our sympathy causing catharsis. A tragic hero displays hamartia— the hero makes a mistake causing the downfall of his fortune. A tragic hero usually brings suffering and death to other characters, even a whole country. Finally, a tragic hero goes into a situation in which there is no gettingRead More Brutus is the Tragic Hero of Julius Caesar Essay858 Words   |  4 PagesBrutus is the Tragic Hero of Julius Caesar      Ã‚  Ã‚   Shakespeares play Julius Caesar is a tragic play, where the renowned Julius Caesar is on the brink of achieving total control and power by becoming emperor of the Roman Empire. Ironically enough, when he thinks he is one step away from pulling it off, his friends (most from the senate) decide to overthrow him, with Caesars most trusted friend, Marcus Brutus, acting as leader of the conspirators. Though the fall of Caesar from the mostRead MoreMarcus Brutus as the Tragic Hero in Shakespeares Julius Caesar1267 Words   |  6 PagesBrutus as the Tragic Hero in Shakespeares Julius Caesar Because of Shakespeares popularity among scholars and literary critics, his plays have been studied time after time. In the four hundred or so years since they were written, Shakespeares plays and other literary masterpieces have been categorized. Many of them, including Shakespeares portrayal of Julius Caesars murder and the resulting events for Rome and for Caesars conspirators, have been put into the tragedies category. AccordingRead MoreJulius Caesar : A Tragic Hero934 Words   |  4 PagesJulius Caesar is a work of art by William Shakespeare in 1599. Within this play Julius Caesar is portrayed as a tragic hero. A tragic hero is defined as â€Å"the main character of a tragedy [who is] usually dignified, courageous, and high ranking† (novel study guide). Also vital to defining a tragic hero is that, â€Å"the hero’s downfall is caused by a tragic flaw† ( novel study guide). It is very evident that Julius Caesar in William Shakespeare’s Julius Caesar i s a tragic hero given that he is of nobleRead MoreJulius Caesar : A Tragic Hero1171 Words   |  5 PagesJulius Caesar Julius Caesar, the greatest war hero and most noble of all wanted to be praised by all Roman citizens wanted to achieve power to rule as a king. The play is set in ancient Rome in the year 44 B.C. when the Roman general Julius Caesar was almost ruler of the entire world at the highest point in his career. Within this play Julius Caesar is portrayed as a tragic hero. A tragic hero is defined as â€Å"the main character of a tragedy [who is] usually dignified, courageous, and high ranking†Read MoreThe Tragic Hero Of Julius Caesar By William Shakespeare1241 Words   |  5 PagesTragic Hero Essay A tragic hero is a main character that is usually of noble birth, suffers a catastrophe, and has a tragic flaw during his or her role in a novel or play. In The Tragedy of Julius Caesar by William Shakespeare, Marcus Brutus is the tragic hero. When making a tragic hero, Shakespeare has his character go through hesitation and doubt before making a decision, presents the character with inner turmoil through soliloquy, and focuses on the choices the character makes instead of theirRead MoreJulius Caesar : A Tragic Hero937 Words   |  4 Pages Caesar the Great Julius Caesar is a work of art by William Shakespeare in 1599. Within this play Julius Caesar is portrayed as a tragic hero. A tragic hero is defined as â€Å"the main character of a tragedy [who is] usually dignified, courageous, and high ranking† (novel study guide). Also vital to defining a tragic hero is that, â€Å"the hero’s downfall is caused by a tragic flaw† ( novel study guide). It is very evident that Julius Caesar in William Shakespeare’s Julius Caesar is a tragic hero givenRead MoreA Tragic Hero As Used By Shakespeare. In, â€Å"The Tragedy1657 Words   |  7 PagesA Tragic Hero as Used by Shakespeare In, â€Å"The Tragedy of Julius Caesar,† by William Shakespeare, you can see Shakespeare’s use of a tragic hero. The Tragedy of Julius Caesar is a play about how Marcus Brutus and Cassius contemplate the murder of the great Julius Caesar. The play discusses the planning of the murder, and the events that follow the catastrophe. Brutus is one of the conspirators in the murdering of Caesar and is also one of his beloved friends. Shakespeare incorporates traditionalRead MoreJulius Caesar the True Tragic Hero1526 Words   |  7 Pagesonce said â€Å"A man doesn’t become a hero until he can see the root of his own downfall.† These words best describe what a â€Å"Tragic Hero† is and both Julius Caesar and Brutus displayed this characteristic, so the question is â€Å"Who is the real tragic hero in this story?† This paper shall explore the reasons behind why each man is considered a hero in his own right and who the rightful owner to the title of the play truly belongs to. There have been countless tragic heroes in the works of William ShakespeareRead MoreJulius Caesar by William Shakespeare646 Words   |  3 Pagesof a tragic hero, and the tragic hero is someone of greater power or high standing obtaining a flaw. One of Shakespeare’s greatest tragedies is the story of Julius Caesar. In this story, the main character, Julius Caesar, is plotted against his best friend, Brutus, and the head of the conspiracy, Cassius. After Caesar gets assassinated, his right hand man, Mark Antony, tries to get revenge on the people that killed him. However, in this particular story, the main character is not the tragic hero

The Cyber security

Question: Analysis of Cybersecurity Capabilities ? Answer: Introduction Cyber security consists of the technologies, policies and procedures that are designed for protecting the public and private networks and their data from external attacks and unauthorized access (Wang and Lu 2013). Cyber security is basically the security for the computers. It provides security to the computer from external theft and damage. In addition to this it provides safety of the hardware as well as the software components of the computer. In addition to this, it also provides safety from external network access and malicious code injections. It also controls the physical access to the machines. The cyber security issues are growing day by day with the increase of the with the growth of the number of computer systems and over dependence on these computer system. The report consists of description of different types of cyber security tools and a brief analysis about them. The report contains an analysis of two the different tools in different categories such as, Network Intrusion Detection System (Liao et al. 2013), Host Intrusion detection System, Web Application Firewall (Razzaq et al. 2013), Honeypot (Holeczer et al. 2015), Security Information and Event Management, and Network Vulnerability Scanner. In addition to this, the report also contains a brief analysis of the existing threat models. Cyber security Threat Models and Risk Management Standard The threat model is very essential for website development or any other application developments. There are various models: Stride The Stride is the scheme to classify the threats according to the kind of damage they to the system. The STRIDE is basically: Spoof Identity: Identifying the spoofing is a very serious risk identity technique for the applications. It can help to identify the spoofer so that, no can inherit the attribute of the other users. Tampering with the data: The data of the users can be manipulated or changed according to wishes of the mal practitioner. It should be ensured that the data of the user is not lost or stolen. Repudiation: The dispute in the transactions should be solved by this type of procedure. Information Disclosure: The user are aware of the submitting the details to the company or the organizations. This might lead to wrongful use of their details of the users. The system can prevent this type of mal partition. Denial of Service: There are various kind of services that are inappropriate for the users. The Denial of services unapproved these kind of services. Elevation of Privilege: The accessing privilege are also a very serious issue. The elevation of privileges can control these privilege accesses. Dread This is a scheme that can classify the risk by quantifying and also by setting priority of the amount of the risks. The DREAD is also known as: Risk_DREAD Damage Potential Reproducibility Exploitability Affected Users Discoverability In addition to these are various alternative threat models that are existing are: Trike AS/NZS 4360:2004 Risk Management CVSS OCTAVE Host Intrusion Detection System The host intrusion detection system is the system that can monitor and analyze the internal systems of computer. In addition to this, it also protects the network packets and the network interface of the system. It monitors the dynamic behavior of the computer system. The computers have encountered the tools that, monitor the dynamic processes, in the form of the anti-viruses. The programs also monitor the state of the system as well. They also control the lines that are blurred and the overlapping contents. The HIDs generally, uses the database system and the system objects in it. During the communication procedure, the client exchanges the passphrase fro verification of the identities. The HIDS take great measures in preventing the tampering of the data objects. They adopt the crypto technique for this procedure. The HIDS also allow the administrators the option of storing the data in physical memories. Among the HIDS tools OSSEc is the most important one. Ossec OSSEC is multiple piece tool (Mehta et al. 2015). It consists of a central manager for receiving and monitoring the information from the syslog, agents, databases and devices that are agentless. OSSEC can be installed on the Microsoft Windows platforms as an agent. For, installing these system on Linux, an OSSEC server has to be present in the system. The agentless systems need some integrity check to be performed. IT can be used for scanning the firewall, routers and even the operating system. Input / Output and configuration procedure of the tool: The process contains several steps: Step1: Downloading and Verifying the OSSSEC on the server and on the agent. In this step the user is required to download OSSEC tool and the checksum file along with it. The user is required to log in to the server and update the package database. sudo apt-get update The user is required to install the available updates. sudo apt-get upgrade The user is required to install the packages required and install the following on the server; sudo apt-get install inotify-tools build-essential The following is to be installed on the agent. Sudo apt-get install build essential After this the user is required to download OSSEC and its checksum on both the Droplets. wget -U ossec https://www.ossec.net/files/ossec-hids-2.8.1.tar.gz wget -U ossec https://www.ossec.net/files/ossec-hids-2.8.1-checksum.txt After this the user needs to verify the md5sum of the compressed tarball. md5sum -c ossec-hids-2.8.1-checksum.txt The output would be: ossec-hids-2.8.1.tar.gz: OK md5sum: WARNING: 1 line is improperly formatted These processes should be followed by verifying the SHA1 checksum. Step 2: Install the OSSEC Server In this step the user is required to install the OSSEC server. The following commands should be executed only within one droplet. The user should then start the installation procedure. Sudo./install.sh After this the user needs to select the mode in which the tool is to be installed.What kind of installation do you want (server, agent, local, hybrid or help)? After the successful installation the following output would be produced. - System is Debian (Ubuntu or derivative). - Init script modified to start OSSEC HIDS during boot. - Configuration finished properly. More information can be found at https://www.ossec.net Press ENTER to finish (maybe more information below). --- Then the user is required to press enter. Step 3: Configuring the OSSEC Server The user needs to OSSEC server stings and make sure that it can send alerts to the specified emails. At firs the user needs to move into the root directory. When inside the root directory the user needs to change the directory into the location of the configuration file of the OSSEC. The user needs to make a backup copy of the configuration file. Then the original file is to be opened, and the nano text editor is used to configure the file. Nano ossec.conf The following configuration setting need to be done: global email_notificationyes/email_notification email_tosammy@example.com/email_to smtp_servermail.example.com./smtp_server email_fromsammy@example.com/email_from /global After modifying the settings the user need to save the file and start the OSSEC. Step 4: The installation process The user needs to install the tool. Sudo ./install.sh What is the IP Address of the OSSEC HIDS server?: your_server_ip The user needs to provide the IP address the user had received earlier. For the other settings the user needs to select the default values and press ENTER. Step 5: Add Agent to the Server and Extract its Key. The user is required to start the process of adding the agent, /var/ossec/bin/manage_agents For adding the agents the user would be prompted to specify the name, IP address and an ID for the agent. After entering all the fields the user need to confirm by pressing y. Step 6: Importing the key from the server to the agent. The user needs to import the key from server to the agents. The user needs copy the key from the server to the agent. Step 7: Allow the UDP port 1514 Traffic through the Firewalls Firstly, the user needs to remove the drop rule. Sudo iptables D INPUT j drop For adding the OSSEC server, the OSSEC IP of the agent needs to be entered. Next, all the outbound traffic is required to be allowed. Iptables A OUTPUT j ACCEPT Finally, add the drop rule again to both. Sudo iptables A INPUT j DROP Step 8- Restart OSSEC Agent and Server The user needs to restart the server and activate the agent by typing /var/ossec/bin/ossec-control restart. If the connection is successful an output would be produced. agentUbuntu-111.111.111.111 is active. After successfully completing all the procedures the user would be getting the outputs. The line of the alerts of the agent would look like OSSEC Notification - (agentUbuntu) 111.111.111.111 - Alert level 3 OSSEC have many methods of sending the alerts to the other systems or the applications. The main methods of sending the alerts are, Syslog, email, and sending alerts to any SQL database. The output methods are only alerts and not full data. Honeypot The Honeypot is the security mechanism that would detect or deflect or counter the effects of the effects of unauthorized access. It consists of the data that is generated from the legitimate part of the site. Although the actual function of the tool is monitoring and controlling the processes of the website and preventing the attackers from potentially blocking and disrupting the processes of the website. The process is actually inducing the offender to commit the offence and catch the offender in exchange. These tools prohibits several applications from effecting the websites. These are: Deception Technologies, Malware Honeypots and Spam version of the software. Kippo Kippo honeypot can be defined as a secure shell medium-interaction honeypot which is used to block the shell interaction or brutal attacks created by any attacker (Sochor and Zuzcak 2014). Python 2.5+, Twisted 8.0, PyCrypto or Zope interface is required to run this software (Rivvers and Koedinger 2015). It should be run through dedicated non-route user. Basic kippo configuration includes switching to a dedicated user and then acquiring Kippo. Later essential logging table is created after which setup suitable to the environment is made. After configuring the whole set up accordingly, one can run Kippo with ($./start.sh). It has the option to get more than one password to a user name but it may prove too suspicious to others. It portrays an annoying sticky feature. With this the attacker cannot exit from the shell by simply clicking on exit command. It actually acts like a honeytrap which holds the attacker into a shell which executes and shows meaningless results. Kippo graph is anot her feature which allows a user to see the honeypot in a statistical way. The Kippo graph uses a Libchart PHP. It detects all the attacks done for a given time and generates it statistically. It elevates the usability of Kippo for logging data into a SQL database. The generated graphs are in Python. A single graph is generated twice once in a larger scale and the other in its tenth form. Input / Output and configuration procedure of the tool: For the installation procedure of Kippo the following files would be required. kippo - directory with Kippo source files (python); kippo.tac - configuration file for twistd (twistd is required to run Kippo); start.sh - shell script for starting Kippo; For the configuration process of the tool the configuration file is to be accessed. The configuration file can be found at: https://kippo.googlecode.com/svn/trunk/kippo.cfg.dist. The main configuration file for the tool is to be saved with the name of kippo.cfg. There are three sections in the configuration file: [honeypot] - mandatory section including core honeypot configuration; [database mysql] - optional section including configuration of the MySQL logging module; [database xmpp] - optional section including configuration of the XMPP logging module; In the honeypot section the following parameters are to be defined. ssh addr - IP address on which Kippo listens for new connections (default is 0.0.0.0 that means any address IP); ssh port - TCP port on which Kippo listens for new connections (default is 2222); hostname - hostname displayed by shell prompt; log path - directory for saving log files download path - directory for saving files downloaded by the emulated wget command; download limit size - maximum size of downloaded file filesystem file - path to the file containing emulated filesystem contents path txtcmds path data path public key private key out addr - IP address used by emulated wget for opening outgoing connections sensor name fake addr banner file interact enabled interact port In the database_mysql section the following configurations are to be done. host - name of the server running database database - database name username - name of the database user password - password of the database user port - port on which the database listens for new connections; In the database _xmpp section the following fields are to be configured: server - name of the XMPP server user - name of the XMPP user password - password of the XMPP user muc - name of the MUC service signal createsession signal connectionlost signal loginfailed signal loginsucceeded signal_command signal_clientversion debug - flag (true or false) In addition to this some option for the twistd are also to be set: Option -1: default is log/kippo.log Option pidfile: default is kippo.pid The tool also requires some additional configuration data: userdb.txt - text file containing in each row a trio login:uid:password last.log - text file containing information about last logins to the system emulated by Kippo After the completion of the configuration procedure the start-up procedure is implemented: The start.sh file has to execute for starting the process. The output characteristics of the Kippo: establishment of TCP connection: -source IP address: L, B, X; source TCP port: L, X; target IP address: L, X; target TCP port: L, X; time of establishment of TCP connection: L, B; Termination of TCP connection/SSH session: reason of termination of TCP connection/SSH session: L; time of termination of TCP connection/SSH session: L, B*, X*; in the case of termination of SSH session: content of the file with SSH session history: B*; Receiving of the information about the version of the SSH client: client version: L, B*, X*; 8 time of receiving of information about client version: L Establishing the connections that are encrypted- encryption algorithm: L; time of establishment of encrypted connection: L; The authentication attempt of the client: login: L, B, X; password: L, B, X; information if attempt was successful: L, B, X; time of performing the clients authentication attempt: L, B; in the case of successful authentication (i.e. creating SSH session): size of terminal: L, B; name of created file to record SSH session history: L; values of environment variables (e.g. XMODIFIERS, LANG): L; Execution of the shell commands: command name: L, B, X; information if command was recognized by Kippo: L, B, X; time of command execution: L, B; in the case of wget command: URL of downloaded file: L, B; name of the file where downloaded file was saved on the host machine: L, B; time of starting the file download: L, B; time of finishing the file download: L; The data input for the shell command command name: L, B; input data: L, B; time of data input: L, B; The output format: Main Log: timestamp - log entry creation time context - log entry context message - log entry message The main log consists of these three parts. The TCP connections are established in the main log as single entry. context := [kippo.core.honeypot.HoneyPotSSHFactory] message := New connection: IP source:port source (IP dest:port dest) [session: session id], where: IP source: source IP address; port source: source TCP port; IP dest: target IP address; port dest: target TCP port; session id: number uniquely identifying TCP connection/SSH session in the main log (session identifier); 10 The output that is generated by this connection: 20130108 14:18:25+0100 [kippo.core.honeypot.HoneyPotSSHFactory] New connection: 192.168.122.1:35533 (192.168.122.82:2222) [session: 0] Information log bout the encrypted process: 20130108 14:18:26+0100 [HoneyPotTransport,0,192.168.122.1] kex alg, key alg: diffiehellmangroup1sha1 sshrsa 20130108 14:18:26+0100 [HoneyPotTransport,0,192.168.122.1] outgoing: aes128ctr hmacmd5 none 20130108 14:18:26+0100 [HoneyPotTransport,0,192.168.122.1] incoming : aes128ctr hmacmd5 none 20130108 14:18:26+0100 [HoneyPotTransport,0,192.168.122.1] NEW KEYS 20130108 14:18:26+0100 [HoneyPotTransport,0,192.168.122.1] starting service sshuserauth The authentication attempt of the client. 20130108 14:33:27+0100 [SSHService sshuserauth on HoneyPotTransport,0,192.168.122.1] login attempt [root/123456] succeeded 20130108 14:33:27+0100 [SSHService sshuserauth on HoneyPotTransport,0,192.168.122.1] root authenticated with keyboard interactive 20130108 14:33:27+0100 [SSHService sshuserauth on HoneyPotTransport,0,192.168.122.1] starting service sshconnection 20130108 14:33:27+0100 [SSHService sshconnection on HoneyPotTransport,0,192.168.122.1] got channel session request 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] channel open 20130108 14:33:27+0100 [SSHService sshconnection on HoneyPotTransport,0,192.168.122.1] got global nomore sessions@openssh.com request 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] pty request: xterm (33, 129, 0, 0) 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] Terminal size: 33 129 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] request env: x00 x00x00nXMODIFIERSx00x00x00x08@im=none 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] request env: x00 x00x00x04LANGx00x00x00npl PL.utf8 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] getting shell 20130108 14:33:27+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] Opening TTY log: /var/log/kippo/log/tty/201301081433279152.log 20130108 14:33:33+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] /etc/motd resolved into /etc/motd Execution of the Shell command: 20130108 14:51:47+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] CMD: wget www. dna.caltech.edu/Papers/DNAorigaminature.pdf 20130108 14:51:47+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] Command found: wget www.dna.caltech.edu/Papers/DNAorigaminature.pdf 20130108 14:51:47+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] Starting factory HTTPProgressDownloader: https://www.dna.caltech.edu/Papers/ DNAorigaminature.pdf 20130108 14:51:50+0100 [HTTPPageDownloader,client] Updating realfile to /var/log/kippo/dl/20130108145147 http www dna caltech edu Papers DNAorigami nature pdf 20130108 14:51:50+0100 [HTTPPageDownloader,client] Stopping factory Inputting data 20130108 14:51:47+0100 [SSHChannel session (0) on SSHService ssh connection on HoneyPotTransport,0,192.168.122.1] INPUT (passwd): pp Establishment of the connection: insert into sensors (id, ip) values (3, kippo hp); insert into sessions (id, starttime, endtime, sensor, ip, termsize, client) values (e28678b4599511e2bab10800277e980c, 20130108 13:18:26, NULL, 3, 192.168.122.1, NULL, NULL); Termination of the TCP connection update sessions set endtime = 20130108 14:03:22 where id = e28678b4599511e2bab10800277e980c; insert into ttylog (id, session, ttylog) values (4, e28678b4599511e2bab10800277e980c, BLOB); The XMPP: The TCP connection information: message from=kippo-events-createsession@conference.localhost/kippo -XDJQcVxo type=groupchat to=kkoltys@localhost/localhost body kippo xmlns=https://code.google.com/p/kippo/ type=createsession session locaLhost=127.0.0.1 session=136371692 cdb4d91b3eec6ff04618232 locaLport=2222 remote_port=35533 remote_host=192.168.122.1/ /kippo /body /message message from=kippo-events-connectionlost@conference.localhost/ kippo-XDJQcVxo type=groupchat to=kkoltys@localhost/ localhost body kippo xmlns=https://code.google.com/p/kippo/ type=connectionlost session session=136371692cdb4d91b3eec6ff04618232/ /kippo /body /message message from=kippo-events-clientversion@conference.localhost/kippo -XDJQcVxo type=groupchat to=kkoltys@localhost/localhost body kippo xmlns=https://code.google.com/p/kippo/ type=clientversion version session=136371692cdb4d91b3eec6ff04618232 version=SSH - 2.0-OpenSSH_5.3/ /kippo /body /message message from=kippo-events-loginfailed@conference.localhost/kippo- XDJQcVxo type=groupchat to=kkoltys@localhost/localhost body kippo xmlns=https://code.google.com/p/kippo/ type=loginfailed credentials session=136371692cdb4d91b3eec6ff04618232 password =123 username=root/ /kippo /body /message message from=kippo-events-loginsucceded@conference.localhost/kippo -XDJQcVxo type=groupchat to=kkoltys@localhost/localhost body kippo xmlns=https://code.google.com/p/kippo/ type=loginsucceeded credentials session=136371692cdb4d91b3eec6ff04618232 password =123456 username=root/ /kippo /body /message message from=kippo-events-command@conference.localhost/kippo- XDJQcVxo type=groupchat to=kkoltys@localhost/localhost body kippo xmlns=https://code.google.com/p/kippo/ type=command command session=136371692cdb4d91b3eec6ff04618232 command= known pwd/command /kippo /body /message Conclusion For conclusion it can be said that, there are various types of security tools, which are open source. So, it can be brought for free and free services can obtained from these tools. The report consists of a brief analysis about various kind of security tools. Each tool has some different feature and are efficient in their own way. Hence, different tools must be used for different functions in different situations. Although, most the tool are suitable for almost all type of jobs and in all type of open source platforms. References Arambatzis, T., Lazaridis, I. and Pouros, S., 2016, May. Modern Windows Server Operating Systems Vulnerabilities. In The Third International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2016) (p. 29). Arney, C.A. and Wang, X., 2016, September. Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. In Proceedings of the 5th Annual Conference on Research in Information Technology (pp. 54-54). ACM. Bacs, A., Giuffrida, C., Grill, B. and Bos, H., 2016, April. Slick: an intrusion detection system for virtualized storage devices. In Proceedings of the 31st Annual ACM Symposium on Applied Computing (pp. 2033-2040). ACM. Blas, G., Javier, F., Wyrzykowski, R., Jeannot, E. and Carretero Prez, J., 2015. Proceedings of the Second International Workshop on Sustainable Ultrascale Computing Systems (NESUS 2015) Krakow, Poland. Blas, G., Javier, F., Wyrzykowski, R., Jeannot, E. and Carretero Prez, J., 2015. Proceedings of the Second International Workshop on Sustainable Ultrascale Computing Systems (NESUS 2015) Krakow, Poland. Choug, J., Kayal, E.S., Ben-Nissanh, B. and Oktari, F.N., 2015. Nano-Bioceramic Synthesis from Tropical Sea Snail Shells (Tiger Cowrie-Cypraea Tigris) with Simple Chemical Treatment. methods, 23, p.24. Di Rita, M., Nascetti, A. and Crespi, M., 2017. Open source tool for DSMs generation from high resolution optical satellite imagery: development and testing of an OSSIM plug-in. International Journal of Remote Sensing, 38(7), pp.1788-1808. Holczer, T., Flegyhzi, M. and Buttyn, L., 2015. The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems. Keller, N., 2015. Cybersecurity Framework-Industry Resources. Liao, H.J., Lin, C.H.R., Lin, Y.C. and Tung, K.Y., 2013. Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), pp.16-24. Lin, H., Slagell, A., Kalbarczyk, Z. and Iyer, R.K., 2014, September. Semantic security analysis of scada networks to detect malicious control commands in power grids (poster). In Proceedings of the 7th International Conference on Security of Information and Networks (p. 492). ACM. Mehta, V., Bahadur, P., Kapoor, M., Singh, P. and Rajpoot, S., 2015, February. Threat prediction using honeypot and machine learning. In Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015 International Conference on (pp. 278-282). IEEE. OLeary, M., 2015. IIS and ModSecurity. In Cyber Operations (pp. 457-483). Apress. Razzaq, A., Hur, A., Shahbaz, S., Masood, M. and Ahmad, H.F., 2013, March. Critical analysis on web application firewall solutions. In Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on (pp. 1-6). IEEE. Rivers, K. and Koedinger, K.R., 2015. Data-driven hint generation in vast solution spaces: a self-improving python programming tutor. International Journal of Artificial Intelligence in Education, pp.1-28. Rizal, M., 2015, July. RANCANG BANGUN SISTEM PENCEGAHAN PENYUSUPAN PADA JARINGAN KOMPUTER BERBASIS CYBEROAM. In Seminar Nasional Informatika (SEMNASIF) (Vol. 1, No. 3). Sochor, T. and Zuzcak, M., 2014, June. Study of internet threats and attack methods using honeypots and honeynets. In International Conference on Computer Networks (pp. 118-127). Springer International Publishing. Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp.1344-1371. Xu, Z., Malmer, D., Langille, M.G., Way, S.F. and Knight, R., 2014. Which is more important for classifying microbial communities: who's there or what they can do?. The ISME journal, 8(12), p.2357.