Tuesday, January 28, 2020

Threat Analysis and Risk assessment

Threat Analysis and Risk assessment Case articulation Staysure.co.uk Ltd specialises in insurance and financial services in the UK and Europe. It was formed in 2004 to provide travel insurance and expanded further to provide home, motor, health and life insurance along with some insurance products. In October 2013 Staysure.co.uk faced a security breach wherein over 100,00 live credit card details along with other personal details of the customers were compromised. This security breach affected 7% of the customers who had purchased insurance from Staysure before May 2012. Before May 2012 the firm stored the card numbers of the customers along with the CVV numbers and other personal details like customer name and addresses. The card details were encrypted but the CVV numbers were fed as plain text into the database even though the card security details should not have been stored at all according to the industry rules. The chief executive of the company said that these details were stored in the system to help customers in their renewal process. After May 2012 the company ceased storing these details. The server on which the website server was based had a software vulnerability and even though a software patch was published in 2010 and 2013 the data controller failed to update software both the times due to lack of formal process to review and apply software updates. The failure to update the database software and the security flaws in the IT security system made the company very vulnerable to a cyber-attack. The security flaws in the companys JBoss Application web server were exploited between 14th and 28th October 2013. The attacker used the vulnerability in the application server to inject a malicious JavaScript code called JSPSpy on the firms website. JSPSpy enabled the attackers to remotely view and modify the source code of the website and query the database containing the details of the customers. It also let the attackers open a command shell allowing them to remotely execute privileged operating system commands. The attackers specifically targeted and downloaded the payment card details. Even though the card numbers were encrypted the attackers were able to identify the keys used in the encryption and hence could decrypt the card numbers. At the time of the attack the database contained a total of 110,096 live card details, which were at a risk of being accessed and used in fraudulent transactions. The firm became aware of the attack on 14th November 2013 and immediately hired in dependent forensic data experts and wrote to 93,389 affected customers, to make them aware of the attack. The company also offered the affected customers free access to Data Patrol, which is an identity fraud monitoring service. After the attack Staysure was fined with an amount of  £175,00 by the   ICO since the company did not comply to the Payment Card Industry Data Security Standard (PCI DSS) , which is a standard administered by PCI Security Standards Council (PCI SSC) to increase payment card security and decrease the transaction frauds over the internet. References: http://www.itgovernance.co.uk/blog/staysure-fails-to-comply-with-the-pci-dss-and-is-fined-175000-by-the-ico/ http://www.insurancetimes.co.uk/broker-fined-175000-by-information-watchdog-after-cyber-criminals-raid-customer-records/1411917.article http://securityaffairs.co/wordpress/21002/cyber-crime/staysure-hacked.html https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2015/02/ico-fines-insurance-firm-after-hacked-card-details-used-for-fraud/ http://www.insuranceage.co.uk/insurance-age/news/2396976/staysure-fined-gbp175k-for-it-security-failings http://www.theinquirer.net/inquirer/news/2321017/staysure-travel-insurer-admits-to-credit-card-theft http://trainsure.com/news-posts/insurance-times-reports-another-cyber-attack/ http://www.moneywise.co.uk/news/2014-01-06/staysure-insurance-customer-data-stolen-hackers http://www.computerworlduk.com/it-vendors/travel-insurer-reveals-almost-100000-customer-details-in-cyber-attack-3495625/ Threat Analysis and Risk assessment The purpose of threat analysis and risk assessment is to maximize the protection of the three main pillars of security namely confidentiality, Integrity and Accessibility while still providing usability and functionality. A Risk to any organization or an individual is an interactive relationship of threat, asset and vulnerability. The various levels of risk can be represented as the product of the impact and probability (likelihood). Quantitative Measure Qualitattive Measure Description 5 High A high level risk can occur frequently and can have a drastic effect on the organization. Sever measures will be needed in order to mitigate a high level risk. 4 Medium High A medium high risk can occur/recur with high probability but might not persist. If it occurs the organization can have a significant or sever effect. 3 Medium A medium level risk is likely to occur   under many circumstances and if a medium level attack occurs it can have moderate to severe effects on the organization. 2 Low Medium A low medium risk can be considered when the organization will have a minor or moderate impact as a result of an attack. A low medium risk can occur occasionally or might not occur at all and can be mitigated easily. 1 Low The risk is considered to be low when the likelihood of an attack on an entity is low and the impact of the attack on the entity is negligible or minor. Low risks will never or rarely happen and can be mitigated easily. Table 1: Risk Rating Scale Figure1. Figure 1 shows a risk matrix which represents the various levels of risk. A vulnerability is a weakness in the system that can be exploited by an attacker or can be unintentionally triggered by a person within the organization. The likelihood is the possibility that any vulnerability will be taken advantage of or the vulnerability will be triggered by someone unintentionally. The likelihood is related to attackers intent, attackers ability and attackers target. If a certain vulnerability is exploited the impact on an organization can be expressed in terms like Negligible, Minor, Moderate, Significant, Severe. The table below shows a risk assessment architecture for Staysure.co.uk. The Firm had several security flaws in the system, which the attackers exploited to gain access to customer information. Asset Threat Vulnerability Threat Actor Threat vector Consequences Likeli hood Impact Risk Customer Personal details Can be assessed and manipulated The database had no security procedure in place hence the data was highly accessible. Hackers or a person within the organization (insider). Gaining access to the database by getting access to the webserver or SQL injections. Personal   details of the employees like name, address, phone can be accessed and used or even modified. Possible (3/5) Significant (4/5) Medium High Company website Source code of the website can be modified and malicious code can be injected and made to run on the browser (Cross site scripting). Cross site scripting can be performed on the website if security measures are not taken care of while developing the website. Hackers or an insider. Web pages Malicious code can be injected into the web pages thus allowing access to the web server and the database. Very Likely (5/5) Severe   Ãƒâ€šÃ‚  Ãƒâ€šÃ‚   (5/5) High Data controllers system No intrusion detection system. A system with no proper security measures can be easily penetrated. Hackers or an insider trying to get unauthorized access. Backdoor created in the web server. Getting access to the data controllers system enables the threat actor to execute Privileged operating system commands Very likely (5/5) Severe (5/5) High Financial card details Storing financial data incorrectly. Unencrypted card details stored in the database Hackers or an insider trying to get unauthorized access. Web site source code can be used to query the database Card details can be used to make fraudulent transaction and cloning. Very likely (5/5) Severe (5/5) High Encryption key Encryption algorithms   can be used to calculate the encryption key Simple encryption algorithm used to form an encryption key. Hackers or an insider. Reverse engineering. If the encryption key is compromised all the encrypted data can be decrypted. Possible (3/5) Severe (5/5) Medium High CVV number Storing CVV numbers in the database is a high risk. CVV numbers if not encrypted can be easily read if the attacker gets access to the database. Hackers or an insider. Web site source code can be used to query the database for CVV numbers. CVV numbers can be used to prove authentication while doing online transactions. Very likely (5/5) Severe (5/5) High JBoss Application Server Unpatched and out of date softwares and no intrusion detection system Scripts can be uploaded to the server which when executed gives remote administration access to the server. Hackers or an unauthorised insider. Backdoors created on the server via malicious script. Once administration access is acquired on the server various admin activities can be initiated and the hosted web servers can be accessed. Likely (4/5) Severe (5/5) High Database Database injections and unmanaged data The data in the database can highly vulnerable to SQL injections and can be highly inconsistent. Hackers SQL injections Data can be erased and stolen from the database and used in a fraudulent manner. Likely (4/5) Severe (5/5) High https://www.towergateinsurance.co.uk/liability-insurance/smes-and-cyber-attacks remove later http://resources.infosecinstitute.com/how-to-prevent-cross-site-scripting-attacks/ remove later Security Architecture Figure: 2 Figure 2 shows security architecture for Staysure during the time of the attack Security Recommendations Staysure.co.uk had no security policies in place which can be sited as the base for the cyber-attack. Being an insurance company and holding personal records of millions of customers the company should have had security procedures in place. It is important that the employees of a company are trained and made aware of the importance of information data security. The fact that the attackers took advantage of the software vulnerability in the JBoss application server even though there were patches available to fix the vulnerabilities shows the ignorance of the data controller towards information security. Table 2 lists security recommendations which would have prevented the attack. Security Recommendations Descriptions Security policies Security policies is an integral part of any organization. Staysure being an insurance company and handling millions of customer records should have had strict company security policies which could have prevented the attack. Security training and awareness The employees of Staysure were clearly not aware of the importance of data security and management. The employees should have been provided good data security and data management training and made aware of information security. Payment Card Industry Data Security Standard (PCI DSS) add appendix When an organization handles personal records of customers it is necessary that the organization follows certain industry standards for data storage. According to PCI DSS the CVV numbers should not have been stored in the database. If the standards were followed the attack would not have a major impact. Data storage and data security Data storage has both physical and logical security aspects.   The logical aspect being data authorization, authentication and encryption. The physical aspects include the place in which the servers are placed, it should be safe from heat-waves, power fluctuations and other physical elements. In case of Staysure the payment card details and the CVV numbers should have been encrypted with a strong encryption algorithm from the very beginning and the database server should have had an intrusion detection and prevention system which would have prevented access to the database. Patch management Unpatched systems and softwares pose a big threat to an organization. The most efficient way to shield from attacks is to have patch management procedure to make sure that all the systems and softwares are patched on regular basis. If Staysure had patched the vulnerabilities in the Jboss application server and software, the attackers would not have been able to exploit the vulnerability. DMZ (Demilitarized Zone) The servers that are faced towards the public should be kept in the DMZ, so that they can be separated from the private network. If a malicious party gains access to the server, he will be isolated in the DMZ and will not be able to attack the private network. If Staysure had a DMZ the attackers would not be able to access data on the private network. Encryption Encrypting any valuable information of customers is necessary in order to protect customer data from being accessible and using a strong encryption key is vital to serve the purpose of encryption. The data controller should have had made sure to encrypt the CVV and the card number and should have used a strong encryption key. IDS Staysure should have had Intrusion detection systems   so that the intrusion by the attacker could have been detected and would alert the authorities thus preventing high impact Firewalls Prevention of human errors http://www.ibm.com/support/knowledgecenter/SSTFWG_4.3.1/com.ibm.tivoli.itcm.doc/CMPMmst20.htm patch management policy. High level security diagram to prevent attacks

Monday, January 20, 2020

A Child Called IT Essay -- essays research papers

A Child Called IT What did I learn from this book? The only thing that comes to mind when I'm asked that question is pain. I didn't know what real pain was until I tried to understand what this child went through. Everything that meant anything to him, his family, those who should be the closest, was drowned out. He didn't know what to think and so often in the world today, we are naive. We don't have a clue of how life could be, and of how lucky we truly are to have the kinds of backgrounds that we were blessed with. On a more professional note, I learned that this type of obsession can take over one's life until they don't know what is real anymore. All they have in their mind is their uncontrolled illusion. It is really hard to not get angry at these people. One must realize that they...

Saturday, January 11, 2020

Engineering Hours Accounting System Essay

Introduction Avitronics is a medium sized engineering company that produces components for the aerospace industry. Employees keep track of the hours they work on different projects and at the end of the week turn in a timecard with this information on it. The company can take up to roughly 12 contracts a year; each of these contracts is assigned a ‘Job-Code’. The Current System At present each employee keeps track of their hours using their own system. This could be as informal as a rough tally on a scrap of paper. At the end of the week, the employees fill their hours into a formal timecard, which is handed in and tallied by a clerk. Objectives of The New System Mr. Salomon (the chief accountant) would like a system with data entry forms so that each employee can input their own hours into the system at the end of each week. He would like to have pull-down menus for the job-codes, so that clumsy engineers entering complicated codes do not make mistakes. Hours should be rounded to the nearest quarter-hour. Data entry should be quick and simple. Each individual employee should not be able to see the hours worked by everyone else. The information should be sent to a database from Mr. Salomon can produce reports. He wants to be able to get a report that shows how many hours each employee works each week (these should be sorted by employee number). Mr. Salomon would also like to have a graphical report, which shows the total number of hours worked each week against each contract. He would like to start a fresh new system at the start of each year. Mr. Salomon would also like an easy to understand user guide, which should include complete instructions for a novice, using no jargon. Performance Indicators My solution will have to: * Prevent all employees seeing other employees’ hours. * Be simple to use, and not waste employees’ time. * Prevent errors wherever possible by using validation and combo-boxes. * Allow Mr. Salomon to create reports (with graphs) from entered data. * Include a template for Mr. Salomon to reset the system at the start of the year. * Provide Mr. Salomon with a User Guide designed to assist novice users when they are using the solution. * Accurately calculate the total hours for each employee per week, accurate to each quarter hour. Accurately calculate the number of hours worked on each contract per week, accurate to each quarter-hour. If all of these criteria are met then my solution will be successful. Design Choice of Software A Spreadsheet is the best solution to the problem because I can use the software well already and I know how to solve the problem using this software. I have chosen to use Microsoft Excel because it is the most common piece of spreadsheet software in general use. I could use an equivalent spreadsheet package from a different company, but this may not be compatible with Mr. Salomon’s computer. Features of Excel that make it ideal for solving the problem: * Ability to create a blank template * Pivot tables to create sophisticated reports with graphs * Formatting to help make it clear to the user where to enter data * Macros to automate various functions * Macros which will execute automatically on opening and closing workbooks * Validation and Protection of cells to prevent tampering and errors Systems Overview My system will be based on one workbook, with three sheets (excluding reports). The Hours Entry sheet will be the main input form, where employees will enter the hours they have worked, on what days and on which contract. The Admin Options Sheet is where the Administrator changes Contract numbers and groups, he/she also sets the week beginning date. The database sheet is where reports and charts will be produced form. Detailed Design Follows on the next 6 pages†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Workbook and Sheet Discussion Hours Entry Sheet – This sheet is designed to let the employees enter their hours in a quick and simple way. It is important to keep it simple so that employees do not become disgruntled and frustrated with the system. This sheet has a simple colour scheme that distinguishes input cells from cells where input is not required. Combo boxes are used to keep certain aspects simple and to prevent mistakes. Buttons are used to execute macros that clear the sheet and transfer relevant data to the spreadsheet. As hours have to be recorded by the closest quarter-of-an-hour, I have used a ‘ceiling’ formula in the total cells to prevent mistakes being made when data is transferred to the database. Admin Options Sheet – This sheet contains any options the administrator may need to set concerning the system He/She can add/remove contracts and add/remove groups of workers. At the start of each working week He/She has to set the ‘Week Beginning date’ that is needed throughout the system, it is essential they enter this date correctly. The colour scheme for this sheet is simple, every cell is white, input cells have borders to distinguish them form non-input cells. This sheet contains two buttons that execute macros: – Protect Workbook – This macro opens up the protect workbook dialog, where the administrator can protect the whole workbook, with the exception with cells that are not ‘Locked’ (input cells). – Start New Year – This macro erases all the data in the workbook, and prepares the system for a new year. A warning box automatically pops up when this button is clicked to warn the user that they will be deleting all entered data from the previous year. This is to prevent all the data being removed accidentally. Database Sheet – This sheet contains all the data that has been transferred from the ‘Hours Entry Sheet’. It contains – Employee #, Hours Worked for each employee. – Job Code, Hours Worked for each contract. From this data, an employee report can be created, this is a report listing all the employees, and the number they have worked in a given week. From this data, a contract report can be created; this is a report listing all the contracts and the number of hours worked on them for a given week. From this data a contract graph can be created, this is a graph showing the number of hours worked for a given contract over the past month (4 weeks). These outputs will need to look professional and be suitable for their purpose. Data entry and Validation These are the fields in which data will be entered into my system: Last Name – The employee will type this in. I chose this method, as there is no reasonable alternative. Employee # – This will be typed in by the employee. I chose this method because there is no reasonable alternative. Employee number is a four-digit number. This cell will be validated so that numbers bigger than 9999 are not accepted; also text is prevented from being entered. I use this validation so that problems do not occur further on the process, when reports sorted by employee number are being produced. Group – The user will select this via a combo box this ensures no typographical errors are made when typing it in. I am choosing to use a drop down box as there are few options for the employee to choose from. Job-Code – This will be selected from a drop down box to prevent typographical errors being made. If it were a plain cell, with no validation or input aids, if an error was made it could cause unwanted consequences throughout the system. Monday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. Tuesday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. Wednesday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. Thursday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. Friday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. Saturday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. Sunday – Employees enter their hours by typing the number in the correct cell. Any number they enter will later be rounded up to the nearest quarter hour, by the use of a ceiling formula. The validation on this cell will be that it has to be a number between 0 and 20. User Aids to Operation User Aids to Operation that I have used are combo boxes, and buttons that execute useful macros. Combo boxes assist the user with entering data when there are only a few options to choose from. They also help prevent mistakes from being made when typing out something complicated. For example in my system, the user uses a combo-box to select a job code, if they had to type every job code in it is more than likely that every week several mistakes would be made. By using combo-boxes I have eliminated the probability of this occurring. By using buttons that execute macros I have enabled the employees to enter their hours in a simple entry form. If I did not use macros then each individual would have to type hours into the database, this could cause a huge number of problems for the company. Protection Sheet 1, Hours Entry Sheet The following cells on this sheet will NOT be protected: C6, Last Name C5, Employee # C10:C16, Monday’s Hour Entry Cells D10:D16, Tuesday’s Hour Entry Cells E10:E16, Wednesday’s Hour Entry Cells F10:F16, Thursday’s Hour Entry Cells G10:G16, Friday’s Hour Entry Cells H10:H16, Saturday’s Hour Entry Cells I10:I16, Sunday’s Hour Entry Cells These cells will not be protected because when I protect the sheet, I want them to be ‘editable’. Eg the employees need to enter data into them. Macros Transfer_Macro – This macro will be executed from a button on the ‘Hours Entry Sheet’. The macro transfers required data from this sheet into the database. After it has transferred the data it will return the user to the ‘Hours Entry Sheet’, where they can exit the spreadsheet when they are ready. If the transfer is completed successfully then a message box will popup saying ‘Transfer Successful’. Create_Employees_Report – This macro will create a report on the employees. It will copy selected data from the database, paste it into a new sheet and format it appropriately. The report will show the employee number, last name, hours worked for each week for each employee stored in the database. Create_Contracts_Graph – This macro will use selected data from the database to create a graph showing how many hours are spent on each job code over a period of weeks. The graph will show all of the job-codes and all of the data about each job code that is stored in the database. Auto_Open – This will execute automatically when the spreadsheet is opened, it shows the ‘Hours Entry Sheet’ and clear all of the white input cells. It will select the ‘Employee #’ input box ready for the user to begin. Clear – This macro clears all of the white input cells in the ‘Hours Entry Sheet’. If the employee enters a few mistakes or realises he has entered totally wrong data, instead of having to delete every piece of data separately he/she can simply click the button that executes this macro. Protect_Workbook – This macro will be executed via a button on the ‘Admin Options’ page, this will hide all menus and the taskbar and take the user to the ‘Hours Entry Sheet’. It will also run the ‘Clear’ macro so that the ‘Hours Entry Sheet’ is always blank when it shows up. Start_New_Year – This macro erases all data from the database ready for the system to begin a new year. The employees and job codes will stay on the admin options page as it would be unreasonable to assume that all the jobs were finished at the end of the last year. Data Flow Diagram Testing Test Strategy This is what my solution is required to do, as outlined in the Performance Indicators section of the Analysis: * Prevent all employees seeing other employees’ hours. * Be simple to use, and not waste employees’ time. * Prevent errors wherever possible by using validation and combo-boxes. * Allow Mr. Salomon to create reports (with graphs) from entered data. * Include a template for Mr. Salomon to reset the system at the start of the year. * Provide Mr. Salomon with a User Guide designed to assist novice users when they are using the solution. * Accurately calculate the total hours for each employee per week, accurate to each quarter hour. Accurately calculate the number of hours worked on each contract per week, accurate to each quarter-hour. Here is an outline of the tests I will have to carry out on my spreadsheet: * Does my system open correctly? * Ensure that the Database and Admin sections are hidden from the employees. * Ease of Use, as little complications as possible. * Tests of Validation (effects of incorrect/extreme data entry) * Tests of Protection * Accurate calculation of hours * Does my spreadsheet cause problems after closing? Test Plan The following tests will be performed: Basic Function Tests: 1. Open my spreadsheet. 2. Add data as outlined in test data set 1. 3. Test the ‘Submit Hours’ button. 4. Add data as outlined in test data set 2. 5. Test the ‘Clear Form’ Button. 6. Add data as outlined in test data set 3. 7. Test the ‘Submit Hours’ button. 8. Test the ‘Exit System’ button. 9. Reopen the spreadsheet. 10. Try entering data from test data set 4. 11. Try entering data in a locked cell (eg. The cell containing the word ‘Group’ and the cell containing the word ‘Totals’). Admin Function Tests: 12. Open my spreadsheet. 13. Test ‘Admin Options’ button, enter password from test data set 5. 14. Test ‘Admin Options’ button, enter password from test data set 6. 15. Test the ‘Enter New Employee’ button. Enter the data as outlined in test data set 7. 16. Select cell ‘F19’, Test the ‘Delete Job Code’ button. 17. Select cell ‘B11’, click the ‘Delete Job Code’ button. 18. Test the ‘Enter New Job-Code’ button, enter the data as outlined in test data set 8. 19. Test the ‘Enter New Job-Code’ button. 20. Test the ‘Create Contract-Chart’ button. 21. Test the ‘Employee Report’ button. 22. Test the ‘Change System Password’ button. Enter the password as outlined in test data set 9. 23. Test the ‘Protect System’ button. 24. Test the ‘Admin Options’ button. Enter the password as outlined in test data set 6. Error massage should appear. 25. Test the ‘Admin Options’ button. Enter the password as outlined in test data set 9. 26. Test the ‘Change System Password’ button; enter the original password again as outlined in test data set 6. 27. Test the ‘Start New Year’ button. 28. Click ‘File’ then ‘Exit’ please do not save any changes to the spreadsheet. Jonathan Stamp – ICT Excel Coursework Page 1 of 17 Jonathan Stamp – ICT Excel Coursework Page 1 of 17

Friday, January 3, 2020

The Debate Of Cell Phones - 1620 Words

The Great Debate of Cell Phones Technology has advanced over the years, causing our lifestyle to change drastically and head down a new path. With these advances in technology, the cell phone appeared and has evolved throughout time. The cell phone has become a necessity to many. All ages use this mobile device for either personal or business use. Higgins states that the amount of cell phones active has increased from â€Å"one billion in 2000 to 6 billion.† Although cell phones play an important role in the lives of many, the negative possibilities could cause destruction to our society. The cell phone has transformed over the years, changing from a bulky phone to a compact device containing the capabilities of a computer. According to Russell Ware, a cell phone is â€Å"any portable telephone which uses cellular network technology to make and receive calls.† A cell phone works through a maze of cellular towers that cross the world. This connects mobile devices that allow texting and calling betwee n two cellular devices. Motorola produced the first commercially available cell phone which officially went on sale in 1984 (Ware). This cell phone was called the DynaTAC 8000x which cost an extreme amount of money and only contained a battery of 30 minutes (Ware). Since this first masterpiece, the cell phone has advanced and developed into an entirely new object. Cell phones today contain the ability to text, call, use the internet, play games, and store files (Cell Phone). Due toShow MoreRelatedThe Debate Over Cell Phones863 Words   |  4 Pagesmany arguments surrounding cell phones, its advantages, and disadvantages. The conversation occurring around this topic is texting. Texting is a form of communication by sending messages between cell phones. Texting has advantages including proof-reading words, reaching someone quicker, and record keeping. Texting has disadvantages as well including deficient writing skills, addiction, and distraction from personal relationships. A sourc e I found that summarizes the debate on texting is that â€Å"TechnologiesRead MoreCell Phones Should Be Allowed in Schools Essay examples824 Words   |  4 Pagesbecause cell phones were not popular in schools then. When it comes to cell phones, some people think they should not be permitted in schools, and other people think they should be permitted in schools. I agree with the latter opinion for the following reasons: Cell phones are an efficient way to communicate when emergencies occur in school; cell phones can be a great tool for learning during school hours; and the current prohibitive rules on cell phones are merely fruitless efforts. Cell phones shouldRead MoreCell Phones Persuasive Essay813 Words   |  4 Pages Cell phones have become a major part of peoples lives and in modern society. Cell phones are current in society, adults to small children have cell phones. A debate on cell phones in school is occurring more and more. Do students deserve to have their cell pho nes for use during instruction time or school hours? Research states that cell phones are no benefit to students in school. Others claim to state that cell phones are in fact, beneficial to students and will not damage the learning environmentRead MoreCell Phone Radiation Essay1012 Words   |  5 PagesPurpose: My purpose is to provide information on cell phone radiation, the risks that can be caused by cell phone radiation, and the potential health problems that could result from this. Details of the topic: I am going to talk about the arguments about how cell phone radiation can affect our lives and whether these arguments are accurate or not. Cell phone radiation is a type of electromagnetic radiation that has the ability to cause health issues. The radiation from this device can causeRead MoreThe State Of The Teaching Profession Essay1281 Words   |  6 PagesThe State of the Teaching Profession Before starting my debate research, I made a cluster graphic organizer to see which characteristics correlated with the topic, the state of the teaching profession. The overall themes I came up with where teacher shortage, retention, and how the implementation of the Common Core State Standards affects teacher retention. Collectively, as a group, we decided on our three debate topics: teacher residency programs, teacher shortage related to mentorship, and theRead MoreCell Phones Should Not Be Banned1222 Words   |  5 PagesCell phones can definitely be educational tools in school What’s are everybody’s opinion on cell phones during school? Why should or shouldn’t they be allowed? I’ve always used mine as a helpful tool. I’ve heard many different sides of this debate, mostly they have been positive. I’ve used mine for reading a book in study hall and playing a game to benefit for a vocabulary test. Cell phones are educational tools and should not be banned. This is a debate that can go both ways. Lots of bigger schoolsRead MoreImpact of the Technology on Each Individual’s Behavior1129 Words   |  5 Pageskeep talking about the abbreviations and the influences on today’s language. By CQ Researcher, it says people today are more connected than ever, and each individual relies on the cell phones to work, entertain, and even maintain a relationship. Compare to these researches, this paper states what the influences for cell-phone usages and the connections of technology. Impact of the Technology on Each Individual’s Behavior Introduction Jennifer 8 Lee wrote â€Å"I think, therefore IM† was about studentsRead MorePros and Cons of Cell Phones in Schools626 Words   |  3 PagesAmericans place and receive most, if not all, of their calls on a wireless phone. The increase in cell phone usage has expanded into our children’s schools. Many children in today’s society carry a cell phone on their person to school. This increase of usage and change of demographic has created a debate in many schools. Read more: Pros Cons of Cell Phones in Schools | eHow.com http://www.ehow.com/about_5393195_pros-cons-cell-phones-schools.html#ixzz29NbPSPub School Emergencies The increase of schoolRead MoreShould cellphones be allowed to children of ages 6 to 12?1562 Words   |  7 Pagesreport clearly shows that there are a large number of children who own a phone. Now, with the latest advanced technology we cannot do much to prevent minors from gaining access to this type of devices. However, what we need to concern about is the damage that phones can cause to children. Lately, there have been many cases of abduction of children by social networks, and also cases of theft of cell phones. Therefore, the debate regarding children using cellphones whether or not has created differentRead MorePros Of Cell Phones At School755 Words   |  4 PagesCirelli, Cheryl. â€Å"Pros of cell phones in school.† Retrieved from http://cellphones.Lovetoknow.co Cheryl Cirelli’s â€Å"Pros of cell phones in school† is an excellent resource for debating in favor of cellphones in school. It offers examples and evidence to the topic of cellphones in the classroom. Cirelli explains that cellphones are not only an instant form of communication, but also a learning aid. In addition, cellphones can be used as a collaboration tool for group projects. Overall, she supports