Tuesday, December 31, 2019

Masculinity Gender and Violence Essay - 2138 Words

Being a male in today’s society is not about living and enjoyment, it has become more of a task. Social pressures and media have made it difficult for males to live a life in which they are not being pressured to act or perform a certain way. In order to reassure themselves of their masculinity, violence has become the main method in assuring themselves and those around them that they are powerful. Not only is this violence being perpetrated against others, but self-inflicted violence also exists. The violence being used is not only physical but it is emotional abuse as well. Masculinity has forced many males to perform in ways that are detrimental to their own health as well as their loved ones. Furthermore, it has also put males in the†¦show more content†¦The definition of masculinity shows young males that in order to be respected, power must be applied upon others and intimidation is the only method of gaining this respect. Through the use of this power and intim idation, females are often oppressed and kept under the control of men. Woman has need of the male in order to gain human dignity, to eat, to enjoy life, to procreate; it is through the service of sex that she gets these benefits; because she is confined to that function, she is wholly an instrumentality of exploitation (De Beauvoir, 360). Males use power over women to reassure their manliness and to portray their masculinity. This violence is not only present in households. It is also present in masculinity versus nature in a capitalist society, where the environment must be altered and destroyed for economic gains. It appears that violence against nature-that is, the impossible and disastrous drive to dominate and conquer the natural world-is integrally connected with domination among humans (Kaufman, 7). Another example of showing this power is through rape and sexual abuse. Through rape, men display their dominance in the most violent and gruesome ways. As Kaufman notes, in the testimonies of rapists on hears over and over again expressions of inferiority, powerlessness, anger (15). By committing this crime, males display their physical strength upon the victim and this is what masculinity is defined as, a display of power andShow MoreRelatedViolence, Masculinity And Femicide Within South Africa1502 Words   |  7 PagesIntroduction Gender-based violence refers to the act of causing harm to a woman in the form of sexual harassment, female genital mutilation or rape (Boonzaier, 2006). It is a major problem that is present in our day-to-day lives and it is this violence that affects everyone and can occur in almost any and/or every situation we come across. However, this violence against women is not a recent development as it has occurred as early as the eighteenth century (if not earlier) and it is a problem thatRead MoreViolence And Masculinity Of South Africa1578 Words   |  7 PagesViolence against women is prominent in South Africa. Many women have been murdered by the hands of their partners or the average men you see on the way to work (Merten, 2017). This essay will discuss the relationship between violence, masculinity and femicide in South Africa. It will further use the key theoretical contributions of Feminist and Hegemonic Masculinity Theories in assisting us to understand violence against women in South Africa. Gender is a critical social issue as it is associatedRead MoreMasculinity, Masculinity And Violence1728 Words   |  7 Pagesmany gender systems, masculinity is an expression of male gender that can vary based upon culture and society. Many cultures uphold a set of standards and expectations that an individual must maintain in order to be considered masculine. Several of these expectations can often be dangerous, violent, or even abusive. In particular with a focus on the two-sex, two-gender system of Western, patriarchal society, this paper will investigate the correlation between enforced masculinity and violence. AccordingRead MoreThe Representation Of Gender Masculinity1729 Words   |  7 PagesThe representation of gender in a masculine context in New Zealand is constructed through hegemonic constructions formed through colonisation. Due to being constructed by this dominant ideology, which in terms of a New Zealand context is Pakeha and male (Hegemony), the construction of masculinity appears natural. This hegemonic masculinity is so naturalised it becomes invisible and we don’t see or think about it. Law, R (1997) states that â€Å"The concept of hegemonic masculinity allows for us to theoriseRead MoreSocietys Social Construction of Gender1055 Words   |  4 PagesGender is defined as the social arrangements that are built to meet personal traits of being male or female and society has created roles that reflect a gender to act in a certain way in society. Rape culture is seen as normal behavior in society where genders experience violence in social institutions. Society has ar ranged roles to males and females that have led females to experience violence in society and is seen as a norm rather than a problem, because males need to show their masculinity toRead MoreMasculinity and Gender Roles1232 Words   |  5 PagesHow is gender and gender roles socially constructed? Soulliere states that gender is a cultural creation that is frequently developed by and represented through popular cultural media such as advertisements, music, sports, and entertainment television (Soulliere 2006). The article â€Å"Wrestling with Masculinity: Messages about Manhood in the WWE† by Danielle M. Soulliere (2006), examines messages about manhood revealed by televised professional wrestling (Soulliere 1). Messages concerning masculinityRead MoreThe Patriarchal System Essay1749 Words   |  7 Pagesto explore patriarchal values that reinforce violence towards women in intimate partner relationships. This paper argues that patriarchy and the social construction of mascu linity reproduce male violence against women. The following sub-issues that that will be discussed are patriarchy, capitalism, the religion of Islam, and the construction of masculinity and femininity. All the sub-issues encompass patriarchy values which allows inmate partner violence. Patriarchy First and foremost, patriarchyRead More`` Boys Don t Cry ``1621 Words   |  7 Pagesselected principles of our associated gender is a directing factor of interpersonal interaction throughout humankind. Particularly, the structure of gender among males has assisted in the strengthening of the destructive attributes related to hegemonic masculinity. In other words, structural ideals of gender among males solidify the position of male social dominance over women. These adverse features may directly be related to a rise in gendered violence and other aggressive acts committed byRead MoreGender Inequality For Women And Womens Development1121 Words   |  5 Pageswomen’s status as it does not tackle gender inequalities, I continue to argue that the post-conflict moment itself is not sufficient for tackling the roots of gender inequalities that prevent women from experiencing full empowerment and inter-sphere equality. First, there is a need to understand why women face increa sed levels of violence in the post-conflict period, as this pattern goes beyond Rwanda (Moran, 2010:266). In explaining why there is a spike in violence against women in the post-conflictRead MoreIntroduction In this paper, I argue that while sexual violence is arguably the monopoly of men, it1000 Words   |  4 Pagesargue that while sexual violence is arguably the monopoly of men, it is culturally cultivated rather than biologically determined. Consistent with the concept of Hegemonic Masculinity which theorises male domination of other males and subordination of females (Connell, 2005), I assert that rape is particularly rampant in societies where sexual violence is an effective means of attaining this status quo. Thus when rape is institutionalised in the context of war where masculinity is measured by the ability

Monday, December 23, 2019

Religion And The Nature Of God - 953 Words

The Nature of God is a category that always comes into question in many conversations or debates I have seen, and listened to and participated in, this is why I have chosen this topic. Some religions focus on subjective experience of the religious individual while others consider activities of the religious community to be most important.by being willing to learn and engage into the very nature of God in different religions is an interesting topic on its own, and can be very educational as well as informational. I will be looking at this particular category from a Christian point of this goal is to investigate whether the view is sufficient evidence to prove that world religions are complementary and by analyzing what religion belief is about which is a perception of someone religion and how major some culture is are evolved. The Nature of God tells the story in different religions, although I think this would be the significance and play an important role in a deciding factor for someone looking into making a decision to believe in a particular religion. By basing on how religion is and being able to believing in a religion I would ask what are the differences in the nature of God in different religions and by studying throughout the weeks help us in identifying key features in the Nature of God in many different religions, some have similarities while others are completely different. For example , the similarities in Jainism, Buddhism, and Confucianism is that thereShow MoreRelatedThe Nature Of God And Which Lense One Helps View Religion Or Spirituality1685 Words   |  7 Pagesmany different views about the nature of god and which lense one chooses to view religion or spirituality. The nine that will be discussed are animism, polytheism, henotheism, pantheism, religious dualism, deism, theism, a theism, and agnosticism. While some of these have overlapping principles, they are each unique viewpoints as of the nature of god and are held by different religions throughout the world today and in history. One of the first forms of religions was animism, or the view that thereRead MoreCommon Threads Throughout Judaism, Christianity, and Islam1233 Words   |  5 PagesThe monotheistic religions of Judaism, Christianity, and Islam have over many thousands of years established many traditions and beliefs. Many of these are from their respective book of scripture such as the Bible, Torah, or Qu’ran. Others are from the interpretation of the religions over the many years from their leaders and the generational stories that have been passed down. Many of these can be seen as quite similar between the religions, but others can be considered unique to each one ofRead MoreAncient Egypt : Religion And Religion1374 Words   |  6 Pagescountry with lots of religious connections. Religion in Egypt helped the communities come together and created understandings and shared values. Aspects of Egyptian life like law and art were connected with religion. Gods were represented with many thi ngs in nature like animals. Religion and life were very combined. Many aspects of Egyptian culture and civilization are connected with religion. Nature aspects like the sun and river is answered with what the gods do in mythology. Ancient Egypt had an organizedRead MoreRalph Waldo Emerson And His Influence On European Thought1074 Words   |  5 Pagesof belief in his first published book, Nature. He starts the book discussing the currents of the Universal Being that circulate through him making him part God or a piece of God. This is what transcendentalism is mostly about, the belief in the divinity of the human and nature. Through the universal being everything in nature is linked, including humans. Nature’s spirit expresses itself through us and creates a unity between God, spirit and humanity. Nature rewards the noble and those who performRead MoreShinto - A Japanese Religion Essay1687 Words   |  7 PagesShinto: A Japanese Religion Uncovering the religious significance and practices of Japanese Shinto As an ancient religion of Japan, Shinto was originally a combination of nature worship, divination techniques, and shamanism. Meaning the way of the Gods, the origins of Shinto are not apparent in comparison to other religions, especially other Asian religions and beliefs. With no obvious founder, as well as original written scriptures and authentic laws, a number of theories exist about theRead MoreReligious Traditions and History Essays1587 Words   |  7 Pages History 233 February 2, 2013 Introduction to the Beginnings of Religion Religion is a staple of life in all countries of the world. There are many types of religious beliefs. This paper will attempt to piece together the different beliefs at various times of history and what the motivation behind each one was. Today’s religions weren’t always about the afterlife. The author, Kevin Reilly put it best when he said: â€Å"By what appearsRead MoreThe Tyger, The Lamb and Lord of the Rings1031 Words   |  4 Pagesthoughts religion, nature, and the battle between good and evil in one’s mind. In the novel, The Lord of the Rings by J.R.R Tolkien, there is seemingly a lot left up in the air about religion and the symbolism of nature, but when read the way the author intended, there are a few very strong themes that resemble those portrayed in â€Å"The Tyger† and â€Å"The Lamb†. Throughout the writings, the two authors portray nature in a way that allows it to symbolize their own personal thoughts and views on religion. ReligionRead MoreThe Absolute Paradox For Kierkegaard Essay1609 Words   |  7 Pagescontemplate the â€Å"unknown†, and the unknown— according to Kierkegaard—is essentially God. Humans are foolish in their attempt to prove God’s existence; for humans’ attempted to do so already assumes god’s existence. In other words, , there would be no need for proof. The bible is in no way able to act as the only proof of God’s existence. To argue that the events in the world must derive from an all-good being (God) assumes that these events are all ultimately good—and this assumption is based onRead MoreThe World Is The Best1018 Words   |  5 Pageselapses, ideas, thoughts, and view of the world tend to modify. I assume that the literature that is present from hundred years ago until now, displays a shift of religion to nature. Religion used to be the basis for most of the things, but as new ideas approached, nature began to replace it. Not implying that nature completely replaced religion, but it became a new way to understand the world. I believe there is always going to be a debate on which way to understand the world is the best. Religious peopleRead MoreThe Egyptian Religion And Religion911 Words   |  4 Pagesin nature and the rich polytheistic culture and rituals shaped their daily life, art, religious beliefs, funerary practices and kingship. The ancient Egyptian religion is centered on deities and overtime, their religious belief which influenced their whole existence changed based on the rise and fall of important gods in control of the forces and elements of nature. The Egyptian religion was shaped by the polytheistic view of the universe. A belief in polytheism determined the belief in gods, death

Sunday, December 15, 2019

Classical Conditioning Free Essays

‘Classical conditioning provides us with a way to learn cause and effect relations between environmental events’ (Martin, Carlson and Buskist, 2010, pg 259). Classical conditioning is learning by association and is the main way in which we develop phobias. The main type being specific phobias which are generally influenced by genetics or a traumatic childhood event. We will write a custom essay sample on Classical Conditioning or any similar topic only for you Order Now There are three basic principles off classical conditioning which are important to be aware of when researching the development of phobias: Acquisition, extinction and spontaneous recovery. Indirect conditioning is also a major factor in how phobias can develop. Examples of indirect conditioning are generalisation, higher order conditioning, sensory preconditioning and vicarious conditioning. Ivan Pavlov’s discovery is by far one of the best for describing the process of classical conditioning. In this essay it will explain how he used dogs and the production of saliva to show how we learn by association. Phobias are sometimes treated by systematic desensitisation. ‘The verb to sensitize means â€Å"to make someone highly responsive or susceptible to certain stimuli,† and the prefix de- indicates removing, or doing the opposite. (Sarafino E. P. , 1996, pg 232). This essay will also show some examples of how systematic desensitization is performed. Although Ivan Pavlov was a trained physiologist he still became one of the most famous researchers in psychology. He started out studying various substances secreted by animals which helped aid digestion and on noble prize for his study in 1904. One substance which was of partic ular interest to him was saliva. He became intrigued as to what stimuli influenced the production of saliva. Pavlov based his study on dogs and was able to measure the amount of saliva produced by connecting a tube to their salivary ducts (Mazur, 2006). He did a number of testing sessions where food powder would be placed in the dog’s mouth each time. After a few times the dogs became experienced and began to salivate even before the food powder was placed in their mouths. He decided to control this phenomenon. He came up with an experiment using an inexperienced dog and sounding a bell each time just before the dog was given the food powder. After 12 or so of these sessions the food powder was no longer needed for the production of saliva as the sound itself was enough. Pavlov showed that salvation can be elicited by a new learned stimulus (CS) so salvation n becomes a conditional response (CR). He studied this type of learning for the rest of his life, which is now called classical conditioning (Martin et al. 2010). According to Martin et al, classical conditioning accomplishes 2 functions. First, is the ability to learn to recognize stimuli that may predict when an important event is about to occur so it enables the learner to respond faster and more effectively. This ability would be extremely important for people with phobias as this allows them to avoid their feared stimuli or event. For example, with a person who is afraid of spiders (arachnophobia) and has seen a web, their main reaction would be to get away from the area as quick as possible as the web would initiate that there is a spider nearby. Second, stimuli that were previously unimportant can become associated with important stimuli and therefore change people’s behaviour towards the stimuli. For example, we would respond more positively to a stack of gold bricks then to a stack of concrete bricks. Phobias are generally caused by something that may have happened earlier in life, where the person was ‘exposed to the now-feared object in conjunction with a stimulus that elicited pain or fear. ’ (Martin et al. 2010, pg 262) Classical conditioning principles are the main processes which show the development of phobias. Acquisition is the main reason why phobias develop. According to Martin et al, a single pairing of the CS with UCS is not generally enough for a learned response to take place. Therefore this shows that a small event which does not affect the person does not create a phobia. Acquisition is the learning phase of classical conditioning, during which the CS gradually increases in frequency or strength. The main two factors that are associated with the development of a phobia learned by classical conditioning are intensity and timing. If there is a great amount of pain associated with the stimuli the person will learn quickly to fear the stimuli and in severe cases even develop a phobia. The second factor is timing of the CS and the UCS; if they both occur in close timing of one another the person is more likely to develop a fear of the stimuli. Extinction of the feared event can occur when the CS occurs many times with the UCS to get rid of the CR, thus the CS will no longer elicit the CR. Indirect conditioning also influences the onset of phobias. Generalisation is one such way in which a CR can be elicited indirectly. When certain stimuli are alike the CS and are able to elicit the CR this is called generalisation. For example if a person had a bad experience with a dog and now fears that dog, it is likely they will be afraid of all types of dogs. Vicarious conditioning is also another main process in which people develop phobias indirectly. For instance, if someone hears or reads about a story which is of an unpleasant event described in detail that imaginary event that we would picture as we hear or read the event (UCS) can provide imaginary stimuli (CSs) that can lead to real life conditional responses(CRs). (Martin et al, 2010) Another example that would most commonly occur today is if a parent has a fear of cats their child may witness their fearful response and therefore the child can develop a phobia with being exposed to a traumatic event involving a cat. One of the most famous examples of an experiment and how classical conditioning principles can develop phobias is that of Little Albert. This experiment was carried out by John B. Watson who was influenced by Pavlov’s work. Watson carried out his experiment on a 9 month old bay called Albert who had no fear of rats. Watson found when he struck a steel bar the sound that came from it startled little Albert. He then repeated this but the second time placed a rat with Albert. Watson repeated this about seven times and then presented the rat by itself and Little Albert became distressed. He was then shown similar object and the initial conditioned response was generalised to some of the similar objects such as a rabbit and dog. (Martin et al, 2010, pg 262) Systematic desensitization is generally used to get rid of phobias. According to Sarafino, Joseph Wolpe used the concept of counter conditioning as a basis in developing a technique to get rid of people’s fears which he had described in the following way: ‘ a physiological state inhibitory of anxiety is induced in the patient by means of muscle relaxation, and the is then exposed to a weak anxiety – arousing stimulus for a few seconds. If the exposure is repeated several times, the stimulus progressively loses its ability to evoke anxiety. Then successively â€Å"stronger† stimuli are introduced and similarity treated. ’ ( 1973, pg 95, as cited in sarafino, 1996) This thought to be a very successful way of getting rid of phobias and is one of many ways in which Systematic desensitization is used. From this essay it is clear that classical conditioning principles strongly influence the development of phobias using many key factors. From the extract of Joseph Wolpe it gives a clear understanding how his understanding concept of counter conditioning is used to desensitize phobias. References: * Martin, G. N. , Carlson, N. R. , Buskist, W. (2010) Introduction to Psychology. Essex; England. Pearson Education Limited * Mazur, J. E. (2006) Learning and Behavior. Upper Saddle River, New Jersey, Pearson Education. * Sarafino, E. P. (1996) Principles of Behavior Change. Toronto, Canada, John wiley and sons, Inc. How to cite Classical Conditioning, Essay examples

Saturday, December 7, 2019

International Journal Computer Applicationsâ€Myassignmenthelp.Com

Question: Discuss About The International Journal Computer Applications? Answer: Introduction Information security is a process and action to ensure the protection of information and preventing the unauthorized use of confidential and private information, especially electronic data. Information security ensures different measures in achieving the correct security standards for particular information (Peltier, 2013). There are different risk agents that can launch an attack on the information system in with an aim of data theft and corrupting the data. One of the major threat agents is ransomware, which is a type of malicious software, typically designed to block the access of data or the whole computer system, until a sum of money is paid to the attacker (Brewer, 2016). The recent cases of ransomware attack include the attack on UKs National Healthcare Service, Russias Interior Ministry and staffers at selected offices of FedEx. The global ransomware attack on this organization has resulted in the disruption of normal services loss of confidential data. The increasing attack of ransomware is alarming as many organizations and computer system are targeted by these attacks to fetch a huge sum of money from the user (Mansfield-Devine, 2016). The background, risks and security concerns along with the future trends in relation to such ransomware attacks are elaborated in the following paragraphs. Background A worldwide cyber attack by Wanna Cry ransomware, as it is called has potentially put many lives at risk by paralyzing the computer systems of National Health Service, UK. The attack paralyzed thousands of appointments and emergency operations of the hospital as the ransomware attack threatened to delete crucial files unless an amount of $300 is paid (Collier, 2017). The ransomware was capable enough to break into the robust cyber security measures taken by the hospital in protection of data. However, the attack were mainly laid on the systems, that were using Windows XP and the malware managed to jump from computer to computer by targeting the weakness of the this older version of windows operating system (Clarke Youngstein, 2017). Only the windows XP were targeted as Microsoft had stopped supporting it in the year 2014, and the computers that were still operating on windows XP did not install the patch (Mattei, 2017). A similar cyber attack was led on Interior ministry of Russia, by making a use of hacking tools created by U.S National Security Agency. The attack was launched on more than 100 countries and locking the files and data of different computers demanding a payment of $300 for restoring the access (Mohurle Patil, 2017). According to the cyber extortionists, the attackers have used the stolen NSA hacking tools for sending spam emails with the ransomware attached in form of invoices, job offers, security warnings and other legitimate files. Once the user opens that files, the malware gets installed into the computer and encrypts all the files present in the computer (Mattei, 2017). The files can only be decrypted after paying a certain amount of money in form of bit coins as demanded by the attackers. Furthermore, if the amount is not paid within 7 days, the files are permanently deleted from the system and thus, the user has no choice apart from paying the attacker. Even the staffers of FedEx offices were attacked by this ransomware. Security software makers of Avast said that they have observed of about 57000 infections in 99 countries and the top target of this attack was Russia, Ukraine and Taiwan (Mohurle Patil, 2017). One of the most dangerous features of ransomware is that the ransomware-encrypted files cannot be decrypted that easily. Furthermore, the malware has the ability to scramble the files names, so that it remains undetected or becomes very difficult to detect. After locking the crucial files, the ransomware displays a message asking for a specific sum of money in order to decrypt the files. One of the major concerns about the ransomware is that, it targets the infected machines into botnets so that the future attacks become easier to conduct. After infecting a single computer, the ransomware can easily spread to other computers connected in a local network (Rajput, 2017). Ransomware generally has data infiltration capabilities and includes geographical targeting as well. This indicates that the ransom note is generally translated into victims language, thus increasing the chances of ransom to be paid. The most common methods that are generally used by the attackers in launching and executing a ransomware attack are listed below (Mansfield-Devine, 2013)- sending spam email campaigns that contains malicious links and attachments security exploits in different vulnerable software injecting malicious codes in legitimate websites creating Botnets The above-discussed processes are the most common technique of ransomware attack. However, there are many different processes of launching ransomware attacks as well. Ransomware attack mainly uses complex set of different evasion techniques that generally go unnoticed by traditional antivirus. The different types of ransomware includes encryption ransomware, lock screen ransomware and master boot record ransomware (Sittig Singh, 2016). The attacks cited above are mainly encryption ransomware attack, which is also known as file encryptor ransomware. The risks and security concerns associated with ransomware are elaborated in the next section. Risk and Security Concerns of Ransomware The different risks and security concerns associated with ransomware are elaborated in the following paragraphs (Akkas, Chachamis Fetahu, 2017)- The risks associated with the ransomware are listed below- 1) Ransomware is an infection vectors that are propagated with the user-initiated actions, which include, clicking some malicious links obtained from spam email or visiting any malicious websites. Therefore, it becomes almost impossible to detect a ransomware before it actually launches the attack. 2) The major target of a ransomware attack includes mobile devices, weak operating systems, software and cloud based applications and resources. 3) All the crucial files are locked by the ransomware paralyzing the entire system. The files cannot be decrypted by any means without paying the amount as demanded by the attacker and therefore it becomes very difficult or impossible to access the files without paying the attackers (Mohurle Patil, 2017). 4) As an effect of ransomware attack, different process within an organization may come to a hault, risking even peoples life as happened with the case of National Health Service in UK. There are other risks associated with a ransomware attack as well, which includes loss of confidential data, stealing of data and so on. The security concerns associated with a ransomware attack are elaborated in the next section. Security Concerns The major security concerns associated with the ransomware attack are elaborated below- 1) The attacker makes use of the vulnerability in the operating system or a device in order to launch an attack. This indicates that the operating system or the security essentials of the system and devices is needed an upgrade. This may be further lead to the loss of confidential data and information (Bhardwaj et al., 2016). 2) The major security concern associated with ransomware attack is that, once infected a single computer, it can easily spread to different computer systems. 3) The ransomware attack generally targets different public institution and organizations making a use of the untrained staffs who handle the information security systems. Thus, out of date equipments and untrained staffs may lead to loss of data and considerable monetary loss as well. The vulnerabilities of the information system of the institution are targeted in different ransomware attack (Pathak Nanded, 2016). Ransomware attacks may Change the name of the files of a particular system, thus it becomes impossible to detect such attack. The different strategies that can be implemented in lessening the risk and security issues associated with the ransomware and preventing the ransomware attack are elaborated in the previous section (Hampton Baig, 2015). Strategies for addressing the risks and security concerns The strategies for addressing the different risks and security concerns associated with the ransomware are listed below- 1) In order to prevent the risk of Ransomware attack, all the out of date information systems are to be updated and patched regularly. The core security fundamentals that include patch management, regular backup and disaster recovery must be ensured regularly in order to prevent the risks of a ransomware attack. 2) Regular maintenance of windows and updating the antivirus software is a major strategy in preventing such ransomware attack. 3) Another strategy in avoiding the payment of ransom even if the attack occurs is to keep a backup of the most important files. This way, the user will not have the need of unlocking the encrypted files by paying money as he already has another set of data (Everett, 2016). 4) Ransomware is generally spread via email and therefore, it is utmost necessary to configure the email web server and block the doubtful attachment extensions such as .exe, .vbs and .scr. 5) The user should not respond or even open the email and messages sent by unfamiliar people. Furthermore, the phishing emails should be detected and avoided as much as possible. 6) On account of detection of suspicious activities and processes, the internet connection of the system is to be disconnected as soon as possible in order to prevent the further spreasing of the malware. 7) The volume shadow copy service or VSS of windows can be used for restoring the previous version arbitrary files. If the VSS is disabled on a computer at the time of attack, can later be used to restore the encrypted files. Therefore, VSS can be used in order to eliminate the effects of the ransomware attacks. 8) Windows Firewall should be kept enabled all the time. 9) Additional firewall protection can also be leveraged in enhancing the security essentials of the information system in order to prevent any ransomware attack. 10) The computer security software must be effective enough to scan the compressed or archived files of the system, in order to detect the ransomware attack. 11) A browser add on may also be installed that can help in blocking the pop ups. 12) Auto play should be disabled in order to prevent the automatic launching of files from external media. 13) The automatic file sharing should be disabled, as in case a system is hit by a ransomware attack, it does not spread to the other systems. 14) Bluetooth and other wireless connections should be kept off when not in use. Conclusion Therefore, from the above discussion, it can be concluded that the ransomware attack is strategically launched in order to leave a widespread effect. Different ransomware attack has been discussed in the report and the major causes of these attacks are found to be the improper security essentials and out of date system. Ransomware attacks are more dangerous because the files once encrypted by the attack cannot be decrypted without paying the sum of money the attacker is demanding. The report discusses the different security concerns and the risks associated with a ransomware attack. The major strategy of preventing the ransomware attack is keeping the systems up to date and patched. The other strategies that can be implemented for preventing the attack and lessening the impact of a ransomware attack are further discussed in the report. The most feasible technique of not paying the ransom even if an attack is experienced, is to keep regular backups of the important files, so that even the if they are encrypted by the ransomware, the user does not have to pay the ransom. Future Trends The future trends associated with the ransomware and the attacks related to the ransomware are listed below (O'Gorman McDonald, 2012.)- 1) Based on the strategies used for the launching the past attacks, it can be said that the ransomware attacks are going to take a more dangerous structure in future 2) The ransomware attack can however be prevented by improving the information security essentials and generating awareness among the users for keeping their security systems up to date. 3) The future of ransomware includes targeting the security of web mail providers 4) Declination of ransomware can however be possible by enforcing a law for shutting down the attackers of ransomware and the exploit kits that deliver them. References Akkas, A., Chachamis, C. N., Fetahu, L. (2017). Malware Analysis of WanaCry Ransomware. Bhardwaj, A., Avasthi, V., Sastry, H., Subrahmanyam, G. V. B. (2016). Ransomware digital extortion: a rising new age threat.Indian Journal of Science and Technology,9, 14. Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), 5-9. Clarke, R., Youngstein, T. (2017). Cyberattack on Britains National Health ServiceA Wake-up Call for Modern Medicine. New England Journal of Medicine. Collier, R. (2017). NHS ransomware attack spreads worldwide. Everett, C. (2016). Ransomware: to pay or not to pay?. Computer Fraud Security, 2016(4), 8-12. Hampton, N., Baig, Z. A. (2015). Ransomware: Emergence of the cyber-extortion menace. Mansfield-Devine, S. (2013). Security review: the past year. Computer Fraud Security, 2013(1), 5-11. Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage. Network Security, 2016(10), 8-17. Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information: Lessons from the Recent WannaCry Cyberattack. World Neurosurgery, 104, 972-974. Mohurle, S., Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal, Management. O'Gorman, G., McDonald, G. (2012). Ransomware: A growing menace. Symantec Corporation. Pathak, D. P., Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing challenge. International Journal of Advanced Research in Computer Engineering Technology (IJARCET) Volume, 5. Peltier, T. R. (2013). Information security fundamentals. CRC Press. Rajput, T. S. (2017). Evolving Threat Agents: Ransomware and their Variants. International Journal of Computer Applications, 164(7). Sittig, D. F., Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Applied clinical informatics, 7(2), 624.