Monday, December 30, 2019

Laissez Faire Lack of Government Interference in the...

Laissez Faire was policy that stated that the government should interfere as little as possible in the nations economy in the 1800s. This means that the government has little regulation in business and that businesses can operate in a purely free market. It had advocated individual self-interest and competition, and opposed the taxation and regulation of commerce by government. It had reached its peak during the age of industrialization in 1870s; a time when American manufacturing was made easier as factories were operated free handed. However, the governmental policy of Laissez Faire was in fact encouraged and continued by a direct government intervention. Not many know but government did include a big hand in the policy of Laissez Faire†¦show more content†¦For this, the government began to favor more, bigger businesses. The government was also involved in the Pullman Strike in 1894. The Pullman Strike was a nationwide conflict between labor unions and railroads. Pres ident Grover Cleveland sent the Marshals and US Army troops, commanded by Nelson Miles, to break the strike up between the labor unions and railroads. Therefore, the governmental policy of Laissez Fairewas in fact encouraged and continued by a direct government intervention, as they were the ones who help to end the conflict. During the 1800s as high protective tariff were passed, it had greatly helped the Northern factories and business by taxing the foreign goods. Another thing that helped business to grow and spread was when the US government had allowed immigrants to come into the nation. This had a vast influence as it helped to provide cheap labor for the factor owners. This allowed the North and the South to grow productively. Many did not realize but government was the one who was providing opportunities and was in fact encouraging economic development even during the time of Laissez faire. To make land cheaper for people to purchase and to grow business on, the US Congress has passed the Homestead Act in 1962. It had declared that any citizen could claim 160 acres but they must grow crops on it. The Homestead Act made settlement in the West feasible for many new immigrants. Even though theShow MoreRelatedThe Jacksonian Democratic Party And The Whig Party1770 Words   |  8 PagesDemocratic Party and the Whig Party each, exemplified different beliefs on the role of the federal government in the economy and towards westward expansion in the 1830s and 1840s. However, the Jacksonian, laissez faire supporting Democrats and the economic nationalistic Whig party shared almost no beliefs except for the removal of American Indians in the areas their supporters wished to settle. The lack of similarities is because the Whigs formed their own party to oppose President Jackson’s strong-armedRead MoreSixteen Most Significant Events in U.S. History between 1789 to 19756920 Words   |  28 PagesSixteen Most Significant Events in U.S. History between 1789 to 1975 After a review of United States history from 1789 to 1975, I have identified what I believe are the sixteen most significant events of that time period. The attached sheet identifies the events and places them in brackets by time period. The following discussion provides my reasoning for selecting each of the events and my opinion as to their relative importance in contrast to each other. Finally, I have concludedRead MoreThe Impact of Agricultural Sector on Economic Growth in Nigeria18675 Words   |  75 PagesCONCEPTUAL APPROACH OF THIS INAUGURAL LECTURE 6 REFLECTIONS ON THE STRATEGIC ROLE OF AGRICULTURAL ECONOMY 8 3.0 4.0 5.0 AGRICULTURE FROM THE LOOKING GLASS OF MAN’S ECONOMIC HISTORY 16 AGRICULTURAL ECONOMY FROM PARADIGMATIC VIEWPOINTS ABOUT THE STATE VIS-A-VIS MARKET 21 6.0 NIGERIAN AGRICULTURE FROM THE PERSPECTIVE OF MODELS OF AGRICULTURAL DEVELOPMENT 29 7.0 AGRICULTURAL SECTOR FROM THE LOOKING GLASS OF EVOLUTION OF NIGERIA’S POLITICAL ECONOMY 38 THE AGRICULTURAL ECONOMY: THE PARADOX INSIDERead MoreEconomics Text Book Chapter Summaries21497 Words   |  86 Pagesassuming quality of A has not also gone down Abstractions - simplifications that omit irrelevant facts Policy economics - economic theory and data .. formulation of government policies and courses of action .. solve economic problems and achieve economic goals Economic policy is most often applied by governments after problems arise, but with economic analysis we can predict problems and apply policy in advance, e.g.: Federal Reserve Bank (central bank of the U.S.) anticipationRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesD421.E77 2010 909.82—dc22 2009052961 The paper used in this publication meets the requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1992 Printed in the United States of America 2 4 6 8 9 7 5 3 1 C ONTENTS Introduction Michael Adas 1 1 World Migration in the Long Twentieth Century †¢ Jose C. Moya and Adam McKeown 9 †¢ 2 Twentieth-Century Urbanization: In Search of an Urban ParadigmRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages Organizational Behavior This page intentionally left blank Organizational Behavior EDITION 15 Stephen P. Robbins —San Diego State University Timothy A. Judge —University of Notre Dame i3iEi35Bj! Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editorial Director: Sally Yagan Director of Editorial Services:

Saturday, December 21, 2019

Informed Consent - 1247 Words

LAW AND ETHICS | IS INFORMED CONSENT AN ABSTRACT CONCEPT IN HEALTH TODAY? | | This essay will focus on both negative and positive attributes on ‘Is informed consent an abstract concept in health today’. For this essay we have interpreted the topic as Medical staff in health care has to use abstract means, such as word books or demonstrations to promote patients having understanding whilst vulnerable for informed consent. | | | 16th November 2010 | | With the development of medical sciences, mortality and morbidity related to medical treatment and management has reduced. Further effort to reduce this further is an ongoing process (Subhash, 2005). Unforeseen and expected complications and even death do occur during the†¦show more content†¦* Very young * Very old In these situations where a patient may not be able to ensure they are informed lawfully, it then becomes the medical staff’s moral Duty to advocate for the patient to protect them, this involves ensuring enough information, that can be tolerated and is amoebic to the situation isShow MoreRelatedInformed Consent3145 Words   |  13 PagesInformed Consent 1 Running Head: HUMAN SUBJECTS Human Subject’s Comprehension of Informed Consent Informed Consent 2 Statement of the Problem A primary protection of the rights of clinical research subjects revolves around the concept respect for persons and the provision of informed consent (Belmont Report, 1979). Legal and ethical policies and guidelinesRead MoreInformed Consent2410 Words   |  10 PagesMarch 2013 Informed Consent What is an informed consent? What do we know about it? Where did it come from? What purpose does it serves? These days, there is a variance in what informed consent means. Its definition depends on what specific manner it accentuates in accordance with the pertinent setting of application. The American Medical Association (AMA) has definitions on a clinical setting and on the field of research. However it is defined, informed consent was the product ofRead MoreInformed Consent Essay852 Words   |  4 PagesHealthcare Consent legislation applies to everyone above the age of 18 (some places 16) and has the following rights (Ref 1) 1) The right to give or refuse consent 2) The right to choose a particular form of healthcare on any grounds including moral or religious grounds 3) The right to revoke consent 4) The right to expect that a decision to give, refuse or revoke consent will be respected 5) The right to be involved to the greatest degree possible in all case planning and decision making Read MoreEssay on Informed Consent1178 Words   |  5 Pages Informed consent is the basis for all legal and moral aspects of a patient’s autonomy. Implied consent is when you and your physician interact in which the consent is assumed, such as in a physical exam by your doctor. Written consent is a more extensive form in which it mostly applies when there is testing or experiments involved over a period of time. The long process is making sure the patient properly understands the risk and benefits that could possible happen during and after the treatmentRead MoreConfidentiality and Informed Consent1060 Words   |  5 PagesConfidentiality and Informed Consent Claudia Lewis PSY/305 6/29/15 Dr. Daniel Williams Jr, PsyD, MSW Confidentiality and Informed Consent Introduction Dear client this paper is to inform you, of your right to confidentiality, and further more explain the process of informed consent. In the world of Psychology and counseling, confidentiality and informed consent has been the cornerstone to our practices (University of Phoenix, 1994). This paper will help you to understand how the thingsRead MoreInformed Consent Essay: Ethical Principles of Gaining Informed Consent1798 Words   |  8 PagesInformed Consent Essay: Ethical principles of gaining informed consent â€Å"Respect for human beings involves giving due scope to peoples capacity to make their own decisions. In the research context, this normally requires that participation be the result of a choice made by the participants† (NHMR, 2007, p.3).   Freegard 2012 (p.60), states that  Ã¢â‚¬Å"respecting the rights of others,† includes a responsibility for Health professionals â€Å"to let others know about their rights† and that this forms the basisRead More Informed Consent in Healthcare1819 Words   |  8 Pagesfor the patient) to shared decision making where the patient is considered an equal partner in his/her own health related decisions. Informed consent is the cornerstone for this view. When a patient or a research subject makes an autonomous decision after understanding, the risks and benefits involved with the decision is Informed consent. Complete Informed consent covers the following components: competency, disclosure, comprehension and voluntary. Compet ency refers to the requirement for the individualRead MoreInformed Consent For Psychotherapy Consultation Essay1415 Words   |  6 PagesInformed Consent for Psychotherapy Consultation This form provides you, the client, with information that is additional to that detailed in the Notice of Privacy Practices and it is subject to HIPAA preemptive analysis. Therapy is a relationship that works in part because of clearly defined rights and responsibilities held by both the client and the therapist. This understanding helps to create the safety to take risks and the support to become empowered to change. As a client in psychotherapyRead MoreInformed Consent Essay1268 Words   |  6 Pagesup by the American Psychological Association (APA). They need to understand concept of risk to benefit ratio. One of the ethical guidelines explored in this paper is informed consent and the impact on psychological research. Under the APA Ethical Principles of Psychologists and Code of Conduct, section 8.02 explains informed consent. Research is important but guidelines are necessary to protect the researchers and the participants and to make sure the results are valid and reliable. Ethics ManyRead MoreInformed Consent For The Pediatric Population944 Words   |  4 PagesInformed consent is the â€Å"process by which patients are informed of the possible outcomes, alternatives, and risks of treatments and are required to give their consent freely† (Burkhardt Nathaniel, 2013, p. 528). Informed consent is a right given to the patient that provides an opportunity for the patient to actively participate in their own healthcare. But when it comes to the pediatric population, children are not guaranteed this right. While children are often allowed to voice their opinions

Friday, December 13, 2019

Greek and Etruscan Architecture Free Essays

Greek Etruscan Architecture Greek and Etruscan architecture began to take shape during the Archaic and Early Classical periods. There were similarities between the early Greek and Etruscan architectural styles, but there were far more differences. One of the most obvious similarities between the Greek and Etruscan styles was the use of a gabled roof. We will write a custom essay sample on Greek and Etruscan Architecture or any similar topic only for you Order Now A gabled roof resembles a triangle in that it has a peak in the middle, and then has two straight slopes from the peak to each side wall. These roofs were often supported by the use of pillars or columns and is evident in both Greek and Etruscan architecture. Like Greek temples, Etruscan temples also featured an â€Å"inner chamber† known as a cella. A cella is typically an enclosed prayer room located in the center of a temple. Many of the structures made during this time period were comprised of wood or a mud-brick mixture, which is why there are few structures that remain today. Beginning with the Classical period, Greek architects began to set themselves apart from Etruscan builders by using more durable materials like limestone and marble to construct their temples and buildings. Greek temples were mostly built in the Doric or Ionic orders, while the Etruscans used the more primitive Tuscan order. The Doric and Ionic orders are very ornate, detailed, and aesthetically pleasing. They feature a column with a fluted design, which gives the pillar a thinner, taller, more elegant look. The Tuscan order on the other hand, is a very plain design and features columns with a simple base (foundation), capital (crown of the column) and frieze (horizontal section resting on top of the capital, but below the entablature). Etruscan pillars of the Tuscan order were often made of wood and did not have flutes. Some of the other major differences between Etruscan and Greek architecture can easily be seen when comparing the Greek Parthenon to an Etruscan temple. The Parthenon features a colonnade (row of columns) and steps around the entire perimeter of the complex, while the typical Etruscan temple would have a colonnade and steps in the front of the building only. The Parthenon also featured a one-room cella with two porches. One porch would lead into the cella and the other porch would lead out of the cella. Etruscan temples featured a three room cella with only one porch in the front. The final distinction between the Parthenon and a typical Etruscan temple would be in the artistic level of detail each one was designed with. The Etruscan temple was built in the very plain and basic Tuscan order, with no ornamentation built into the actual structure itself, but multiple statues of gods placed on the roof of the temple. The Greek Parthenon however, was built in both the Doric and Ionic orders, with hundreds of lavishly decorated statues, figurines and figural reliefs built into the pediments (triangular section above the entablature), metopes (a decorative band that fills the space between the frieze and the entablature), and frieze. How to cite Greek and Etruscan Architecture, Papers

Thursday, December 5, 2019

Network Security Vulnerability & VPN Technology - Research Analysis

Question: Describe about the Research on Network Security Vulnerability and VPN Technology Protocols Application? Answer: Introduction This particular research paper emphasizes in identifying the network security vulnerabilities and with Virtual Private Network protocol identification. In order to conduct the research, the analysts first select the outline of the research to identify the several network security components, and examining the existing weaknesses. After that, the researchers recognize the several types of VPN; present the research findings on the data security, analyzing data packets with Wireshark usage. The final research report will determine the outcome as depicting any identified weaknesses in VPN (Yan et al. 2012). Finally, a set of recommendations will be provided on the further research on the agenda. The research methodologies will include the primary and secondary techniques in order to gain detailed responses from the respondent sample. The primary research as in quantitative research will be performed among the users of Virtual Private Network and the qualitative research will be continued for the Internet Service Provider vendors (Aloul et al. 2012). To conduct better analysis on the agenda, the hypotheses are to be identified and individual independent and dependent variables are selected for creating regression or t-test model. To support the primary research outcomes, the secondary or case study analysis will be performed as well. Aim and Objectives The research aim and objectives are illustrated in this section, for showing the primary responsibilities of any research paper in order to conduct detailed analysis (Hahn et al. 2013). This section shows how the aim is relevant in this study, with aspect of the research objectives, with selecting the research questions and hypotheses setting. The weaknesses identify the security vulnerabilities in the context of data security. The technologies as TCP/IP network include weaknesses in HTTP, FTP, ICMP protocols. According to Knapp and Langill (2014), the various network devices are not free from vulnerabilities as well, the devices lack from safe and secure password protection, routing protocols, firewall gaps, and other limitations. In case of configuration, the user accounts, systems accounts with guessable passwords, wrongly configured network, are the primary instances of network vulnerabilities. Again, as Viduto et al. (2012) claimed, in security policies, the weaknesses stay as in lack of continuation, access controls, hardware and software installation without policies, and disaster recovery planning. Research Aim: Research aim is primarily for identifying the research questions and objectives. The aim is to identify the VPN components and their importance analysis, to identify the security technologies and their vulnerabilities, and to analyze the data packet reliability, network security in VPN. Therefore, in short to be precise, the research is aimed at incorporating the VPN technology in order to minimize the existing weaknesses in security options. Research Objectives: After identifying the research aim in this study, the objectives are set as following. To identify the network security technologies and their existing vulnerabilities To identify the VPN components and their importance in context to the data protection To analyze the Data packet security, reliability in non-VPN network To analyze the level of network security required for VPN network with applying Wireshark To present the findings as a report in including recommendations on further research The research objectives are similar for the primary and secondary techniques in this context of VPN security and exiting vulnerabilities identification. In the objectives, the research aims are aligned as usual. Research Questions: After considering the research aim and objectives in this agenda, the researchers have derived the particular research questions. The research questions are noted as following. What are the existing weaknesses in the network security technology components? What are the important factors of VPN acting as a solution in data protection? Are the data packets reliable enough in non-Virtual Private Network? Are there any existing weaknesses present in Virtual Private Network? Research Hypotheses: The hypotheses are set for proving primary research questions with findings in the study. The set hypotheses are the following. Hypothesis 1: H0: The data packets are reliable enough in non-Virtual Private Network. H1: The data packets are not reliable enough in non-Virtual Private Network. Hypothesis 2: H0: There are several existing weaknesses present in Virtual Private Network. H1: No existing weaknesses are present in Virtual Private Network. The hypotheses are relevant for identifying the dependent and independent variable in this context for multiple regression analysis. Research Methodology This section addresses the most appropriate way in which the research will be conducted in order to achieve the complete and detailed results of the process. Vacca (2012) demonstrated that the theories and concepts in research methodology adoption makes the procedure understood to VPN vendors, users with security requirements in non-VPN and VPN architecture. Gonzalez et al. (2012) opined that the detail process of research will lead to common blunders as the limitations of the study and future scope as well. Aside the common errors, the researchers will be able to apply the entire research process for identifying the network security and existing vulnerabilities, VPN security, and other aspects. Method outline: The method outline includes the detailed research techniques, with security vulnerabilities identification and the important factors of VPN in data protection. The selected research approach is deductive with allowing the VPN components recognition, and the identification of vulnerabilities in the current network structure (Van Der Merwe et al. 2014). The descriptive design will help the researcher in order to define the study importance in this aspect. The primary and secondary data sources will increase the study quality and details. Forty-five users of the network will be identified and five ISP vendors will be included in this study. Research Approach: The research approach will set out the study format with showing the two basic types of study as deductive and inductive. The study may include the inductive approach in case of data required is not readily available and the researchers need to derive the data. Rosado (2013) included that the study may be setting new theories with incorporating the older concepts. On the contrary, deductive approach denies the theoretical approach rather than application of practices in the context, the deductive approach includes the data analysis and detailed specifications for new theory emerging (Hengeveld and Harris Corporation 2012). In some cases, the nature of the study should be according to the chosen approach in order to analyze with suitability in the topic. In this particular study, the security technologies and their vulnerabilities will be analyzed with security requirements identification. The inductive approach will fail in this scenario, whereas the deductive approach will be practical with the research agenda. Therefore, the deductive approach will be precise in this context. Research Design: Mullick et al. (2013) determined that the research design supports the explanation framework with the topic with data collection and analysis process. The data collection process will follow a particular design for analysis as identified as exploratory, explanatory and descriptive. Figure 1: Research design (Source: Gong, Liu and Zhou 2013, pp. 3263) Exploratory design is important for acknowledging the several types of ideas and thoughts for research paper completion. The explanatory research design will describe the certain scenarios and incidents occurrence and the derived effect in the study. The descriptive research design is suitable for overall cause-effect analysis with detailed visibility of data and security requirements (Lehmann Jr, and Dye 2013). The selected research design will be descriptive for depicting detailed study with individual results analysis. The explanatory design should not be applied in this context as the research required cross-sectional analysis. Again, the exploratory research design will fail to analyze the with respect to the secondary data sources. Data collection process and analysis techniques: The research will be performed with primary study and secondary sources of data with including the respondents and the secondary research papers. Bianzino et al. (2012) illustrated that the primary study will need to be performed with reliability and data clarifications. The secondary study will analyze the concepts with accessing sufficient literatures, articles, books, blogs and others. The primary data collection will be analyzed with qualitative and quantitative process. The network users and their responses will be analyzed with quantitative techniques and the responses from ISP vendors will be analyzed with qualitative techniques (Conti and Giordano 2014). The two types of data collection and analysis techniques will be able to provide in-depth identification of findings in this context. Sampling Techniques, Size, Population and Ethical Considerations: The sample is selected with identifying the 45 users and 5 individual vendors in UK. For quantitative research process, 45 users and for qualitative research process, 5 vendors are selected. The sampling technique is selected as random probability technique in this study and the respondents will be selected randomly. The sample size is taken as 50 in total and the population for the sample is identified as the United Kingdom VPN users and network vendors available. The ethical considerations are very important in this aspect with comprising the handling technique applicable for the respondents. The respondents should be controlled professionally with setting certain activities and events. Literature Review As per the researchers point of view, there may several types of security vulnerabilities may occur with technical, configuration and security policy perspective. Keromytis (2012) opined that the HTTP, FTP, ICMP and even the SMTP, SNMP protocols are vulnerable with technological insecurity over the design. Again, Yan et al. (2012) discussed that the operating system and platform may turn out to be primary concern for security threats and risks. Moreover, Aloul et al. (2012) claimed the technological threats may include the devices risks and weaknesses. The device weaknesses may include insecure password protection, authentication issues, improper routing protocol, and firewall gaps as well. Hahn et al. (2013) demonstrated that the technological risks and weaknesses as well as the configuration weaknesses may include exploit with insecure user accounts, easily guessable passwords as the common issues in this aspect. Knapp and Langill (2014) illustrated that the internet services may b e wrongly configured in certain scenarios with JavaScript, IIS, FTP problems. The default setting within the products may include several security issues with loopholes. Viduto et al. (2012) depicted that the security policies were in a turf war due to implementing the suitable process to support data reliability and protection. The logical access controlling process lacks from adequate monitoring and auditing process and as well as maintenance (Vacca 2012). The wrongful termination of policies may stand up with legal challenges in policy enforcing. The software and hardware installation and the unnecessary, unapproved changes in network may create security loopholes. Gonzalez et al. (2012) indentified that recovery plan may cause chaos, panic and pandemonium in organizations with chances of sabotage. Apart from the above mentioned reasons and security threats, there are certain issues and risks as malicious insiders, identity theft, and others. The VPN technologies have some other competitive advantages within the network architecture. According to Van Der Merwe et al. (2014), Virtual Private Network incorporates enhances security feature with encrypted facility of data protecting from attackers. Rosado (2013) opined the remote control facility is present in VPN and secure sharing process helps to circulate files among the friends. Again, Hengeveld (2012) mentioned that the bandwidth and network efficiency can be increased even after VPN is implemented. The VPN network reduces cost of maintenance and service providers do not consider the surveillance as a cost concern (Bianzino et al. 2012). Therefore, the VPN is cost-efficient and as well as effective network solution. Conclusion After discussing the research methodologies with literature review, and comparison with several sources, the researchers have concluded that the study will be deductive. The identified sampling method will be random probability sampling and the primary and secondary data collection will be considered. The study included only important part as the data collection and analysis, the entire research the outcome is dependent over the analysis conducted. The analysis provides specific amount of details and along with particular portion of in-depth and empirical view of the study. The study is better understood with the analysis results and findings and hence, the certain research is set up with proven hypotheses. The hypotheses show whether the particular section is proven along with suitable support of sources, articles, documents and others. The undertaken project will become a success with respect to the hypotheses setting, again, when the outcome is verified with the research design; t he outcome is aligned with the project objectives. The alignment is important for verifying the project validity with current study progress. After the project is completed, the project success factors are identified for viewing the project deliverables and whether they are achieved or not. To serve this purpose, sometimes, the project Key Performance Reviewing is utilized with high-value indicators. References Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M. and El-Hajj, W., 2012. Smart grid security: Threats, vulnerabilities and solutions.International Journal of Smart Grid and Clean Energy,1(1), pp.1-6. Bianzino, A.P., Chaudet, C., Rossi, D. and Rougier, J.L., 2012. A survey of green networking research.Communications Surveys Tutorials, IEEE,14(1), pp.3-20. Conti, M. and Giordano, S., 2014. Mobile ad hoc networking: milestones, challenges, and new research directions.Communications Magazine, IEEE,52(1), pp.85-96. Gong, L.H., Liu, Y. and Zhou, N.R., 2013. Novel quantum virtual private network scheme for PON via quantum secure direct communication.International Journal of Theoretical Physics,52(9), pp.3260-3268. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Nslund, M. and Pourzandi, M., 2012. A quantitative analysis of current security concerns and solutions for cloud computing.Journal of Cloud Computing,1(1), pp.1-18. Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.Smart Grid, IEEE Transactions on,4(2), pp.847-855. Hengeveld, T.A., Harris Corporation, 2012.Multi-tunnel virtual private network. U.S. Patent Application 13/477,185. Keromytis, A.D., 2012. A comprehensive survey of voice over IP security research.Communications Surveys Tutorials, IEEE,14(2), pp.514-537. Knapp, E.D. and Langill, J.T., 2014.Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Lehmann Jr, L.C. and Dye, T.A., Meetrix Corporation, 2013.Applying multicast protocols and VPN tunneling techniques to achieve high quality of service for real time media transport across IP networks. U.S. Patent 8,477,778. Mullick, A., Nanjundaswamy, S. and Soni, A., Citrix Systems, Inc., 2013.Method and appliance for authenticating, by an appliance, a client to access a virtual private network connection, based on an attribute of a client-side certificate. U.S. Patent 8,413,229. Rosado, J.J.A., Telefonaktiebolaget LM Ericsson (Publ), 2013.Mobile virtual private networks. U.S. Patent 8,544,080. Vacca, J.R., 2012.Computer and information security handbook. Newnes. Van Der Merwe, J., Gerber, A. and Ramakrishnan, K., AtT Intellectual Property I, LP, 2014.Methods and apparatus to communicatively couple virtual private networks to virtual machines within distributive computing networks. U.S. Patent 8,705,513. Viduto, V., Maple, C., Huang, W. and Lpez-Perz, D., 2012. A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem.Decision Support Systems,53(3), pp.599-610. Yan, Y., Qian, Y., Sharif, H. and Tipper, D., 2012. A survey on cyber security for smart grid communications.Communications Surveys Tutorials, IEEE,14(4), pp.998-1010.