Tuesday, May 19, 2020

Notes On The Day Of The National Anthem - 980 Words

Quotes 1 this quote reminds me of my training in jujutsu. For each black belt, there are three main concepts you must try and work in to your life. For the first degree, black belt one of those is determination. I believe that this is important for the first level because it help teach us to not give up and to continue to train no matter what. 2 â€Å"It is the mark of an educated mind to be able to entertain a thought without accepting it â€Å" This quote make me think about how important critical thinking skills are. If we blindly trust everything we here or whatever we think without truly analyzing what we are about to say. It is because we fail to analyze our thoughts that we end up with so much false in for nation. Currently I see this as a big problem without modern society as most people will just believe everything that we here on the news. Once we are educated thou we CNS better weed out truth from fiction. 3 â€Å"Should we stand to the national anthem at sporting events and why?† I think that it is truly your own opinion and that it also depends on why you chose to sit. I don’t think it is that important to stand for the anthem. I personally don’t see what the big deal with our obsession with our country is. Most Americans are overly patriotic if you ask me and we should all lighten up a little bit. We seem to think that our country is the greatest and that we are somehow better than other countries. Standing for the anthem should be a personal choice personally I would haveShow MoreRelatedItaly and Its Popular Landmark Essay1037 Words   |  5 Pagesmythological founder of Rome. One of the most surprising facts is each of the 16 foot, 60 ton columns were carried over 62 miles with no heavyweight machinery. Italys currency is Euros. The Euro looks like a Nickel, and the Euro note looks like dollar bills in USD. The Euro note ranges from five to five hundred. The Euro ranges from one, two, five, twenty, and fifty. Euros are used in 23 different countries. Euros were used to have one currency throughout all of Europe. When trading between EuropeanRead MoreThe Freedom Of Speech833 Words   |  4 Pagesalready plenty of people fighting fire with fire, and it’s just not helping anyone or anything. So I’m just going to keep listening, with an open mind†; said Nate Boyer in a letter to Colin Kaepernick. In 2016 when Colin Kaepernick sat during the National Anthem to protest police brutality towards African Americans. In response some people were angry but Nate Boyer, a former Green Beret, wrote him a letter. In the letter he states that his initial reaction was one of anger but after looking at Kaepernick’sRead MoreThe First Amendment : Uncensored Speech857 Words   |  4 Pagesreligion, speech, press and the right to assemble. Without this important amendment, millions of voices would be unheard. In fact, millions of voices are still suppressed. In modern-day society, citizens have restrictions on speech and as a consequence, dialogue between opposing groups is shut off. It is important to note that after Charlottesville, VA protest in August, communication was suppressed and unfortunate events occurred. Removal of Confederate monuments sparked the deadly incident. PresidentRead Moremaya Angelou Graduation1259 Words   |  6 Pageseveryone standing on the stage or in the auditorium when Mr. Edward Donleavy passively demeaned everything the students had worked so hard to achieve. This story is told by a women who had surpassed all of the difficulties in life to get to this day, and through her learned, and personal, figurative, and detailed writing, has been able to pass on both the ill feelings and the warm feelings of that experience from Mr. Donleavy’s speech, to that of Henry Reed. ! What Angelou does best is evokeRead MoreAp Us History: After Math 1812 -Ghent Treaty1144 Words   |  5 Pagesthe community of European nations. Inside its borders, America had the greatest nationalistic movement it has seen since the forming of the Union. Nationalism boosted the economy, the arts, and transportation. The American System was formed and an anthem was created that Americans can sing to show their patriotism. As the War of 1812 concluded the worlds super powers, France, Spain and Portugal, are stunned once again. For the second time the Americans control the British in North America. AmericansRead MoreMusic And Political Conflict Between Hong Kong And China1283 Words   |  6 Pagesspeaking, the problem among Hong Kongers and Chinese can be pointed out from Christine Loh’s article, which the â€Å"Chinese Communist party’s leading status was established gradually in the protracted struggle and practice of the Chinese people in pursuing national independence, prosperity, and a happy life; yet, Hong Kongers clearly want their preferred choice going forward†(Christine Loh p.314). A further description of the past, present, and future of the â€Å"One country, Two systems† to Hong Kongers and ChineseRead MoreAnalysis Of Satchmo Blows Up The World 1257 Words   |  6 PagesCentral High School in Little Rock, Arkansas, became a flashpoint in the nascent civil-rig hts movement when Governor Orval Faubus refused to abide by the Supreme Court decision in Brown v. Board of Education. Faubus famously deployed the state’s National Guard to prevent nine African-American students from attending classes at the high school. In the midst of the crisis, a high-school journalist interviewing Louis Armstrong about an upcoming tour asked the musician about his thoughts on the situationRead More A Day in the Life of a Teacher Essay1287 Words   |  6 Pages A Day in the Life of a Teacher I hear the sound of my alarm clock at 6:30am. Time to get up! I wish it was Saturday, no school! No, Im not a child, nor a student, but a teacher! You dont think we enjoy everyday at work, do you? No. Thats rubbish. Let me continue with my story of a day in the life of a teacher.. As I force myself out of bed, a chilling thought comes over me. Its Wednesday. This means I still have three whole days to get through until the weekendRead MoreHistory of Philippine Trnslation in the Philippines6599 Words   |  27 Pagescalled for Congress to take steps toward the development and adoption of a common national language based on one of the existing native languages. November 12, 1937 - the First National Assembly created the National Language Institute. President  Manuel L. Quezà ³n  appointed native  Waray-Waray  speaker Jaime C. De Veyra to chair a committee of speakers of other  regional languages. Their aim was to select a national language among the other  regional languages. -------------------------------------------------Read MoreEssay on Protest Songs Throughout the Vietnam War1445 Words   |  6 PagesThroughout all the anti-war protests and marches during the Vietnam War, it is interesting to note the changes in the music of that time. From the beginning of the war, where support and loyalty from Americans was present in songs, to the end of the war, where anger and distrust was evident in musical lyrics, American’s opinion changed about the war. This change in opinion was easily recognized by the altering of musical lyrics about the war when Americans grew tired of the constant sending of U

Chasing Halley s Comet The Comet - 854 Words

Chasing Halley’s Comet Halley’s Comet crosses the Earth’s skies every 75 years. Samuel Clemens just so happened to be born following Halley’s comet, and in 1909, he predicted that he would go with Halley’s comet the next year. Clemens stated, â€Å"I came in with Halley’s Comet in 1835. Halley’s comet will be coming again next year, and I expect to go out with it† (Samuel Langhorne Clemens (Mark Twain) - Historic Missourians, n.d.). On April 21, 1910, one of the world’s most influential writers died. Just as he predicted, he passed the night after the comet lit up the sky at the age of 75. Mark Twain, born Samuel Langhorne Clemens died from a severe heart attack. He changed his name to Mark Twain because he loved to be in the water and on sailboats. On the Mississippi River, Clemens meant two fathoms deep. He never thought that his age made a difference in his life. He always mentioned, â€Å"Age is an issue of mind over matter. If you don t mind, it doesn t matter† (Samuel Langhorne Clemens (Mark Twain) - Historic Missourians, n.d.). He was always optimistic about death and old age. During his life, Clemens was a wise and curious man. He wrote books and made inventions. Three of his inventions were patented: an automatically self-adjusting vest strap, a history game meant for improving memory, and a self-pasting scrapbook which was the only one ever to make him any money. He made some of the most famous books such as Adventures of Huckleberry Finn, The Adventure of Tom

Wednesday, May 6, 2020

Essay on The Homeless Are NOT Bums - 770 Words

Just because one homeless person has committed a crime or used the money he has collected on things such as alcohol or drugs does not mean that every homeless person is going to be like that. Many homeless people are Vietnam veterans, have a mental illness, or cannot survive in this economy which we are in. I have had a few experiences with homeless people but there is one which is unforgettable. It is much like when Nathaniel Ayres begins yelling at Mr. Lopez then proceeds to apologize later on (Lopez, 258). Most homeless people do not receive aid from the government or do not receive enough aid which is why they resort to panhandling. Seeing these many homeless people shows us how well our government is doing in protecting its people.†¦show more content†¦Rather then come back to continue what the man had started, he instead had come to apologize for his actions. He began explaining how he had an illness which he could not control at times. He also explained to us how he w as a Vietnam veteran and the amount of money he was getting from the government was nowhere near what he needed in order to get through his everyday life. He then offered to work to pay off whatever his actions had cost the store, and then asked if there was any type of job opening for him. Although this mans actions were frightening, they were also quit interesting. Many homeless people sit around lazily asking for money to buy drugs, while others try to find ways to make money to hopefully be given the chance to start a new life for themselves. Everyday no matter where it is that u live, whether u live around the downtown area or if u live in a richer, more nicer area, you will see a homeless person asking for money. Many people have no problem with pan handlers because they do not interfere with our lives in any way. Most people do not like carrying change around and hearing all those coins in their pocket smashing into each other with every step they take. When they see a homele ss person asking for spare change most people are almost more then welcome to help them out. Not all people just give their money to homeless people though; this is because mostShow MoreRelatedThe Issue of Homelessness Essays2064 Words   |  9 Pagesthree weeks, I have observed five regular and several wandering homeless people solely on State Street and East Liberty Street. However, homelessness is not a one-sided issue based only on affected individuals, it is also influenced by notions of the homeless from the non-homeless. There is an overwhelmingly negative connotation, a stigma, of homelessness due to misrepresentation. In effect, public perceptions affect how homeless are treated by other institutions and ultimately affect how efficientlyRead MoreThe Social Impact of Drug Abuse24406 Words   |  98 Pagescigarettes; one in five smokes marijuana. (In contrast, substance abuse is nearly absent among the market children.) Thus, inhalants are the most commonly abused substan ces among abandoned street children in Honduras, as opposed to alcohol and crack among homeless teens in the United States, but the overall rate of substance abuse turns out to be about the same in both contexts. Glue is a popular intoxicant among street children throughout the nations of the developing world because it is very cheap, diminishes

The Filipino Culture And Health Care - 1193 Words

Introduction A disparity can be defined as a difference, an inequality, a discrepancy, a gap, or an inconsistency. Within individual cultures, there are health disparities, or specific differences of a population in the existence of health outcomes, disease, health care access, and value of health care services existing across ethnic and racial groups. Disparities can stand for ineffectiveness within the system of health care and thus accounting for unnecessary costs. (Douglas and Paquiao, 2010) The Filipino culture has numerous factors leading to insufficient access to care and reduced quality of care, some of them being cultural habits concerning diet, language, and screening rates, as well as behavioral and mental health. Every culture has its own traditional beliefs and values amongst which can be shared transculturally to better international health whereas there are also those that are influenced by the Filipino culture that can be seen as non beneficial to future generations. Diet and Exercise People with more education have better health status, make better salaries, and are more likely to have children who become educated. (Douglas and Paquiao, 2010) Despite Filipino’s having higher rates of education, leading to better salaries, and having children who are educated, various health disparities exist. The root of the Filipino culture’s health disparities lies within their dietary intake. The Filipino culture is world renown for the exotic, intense flavors of theirShow MoreRelatedCulture And Health Challenges For Nurses And Providers998 Words   |  4 Pagesproviders that may decrease the quality of care for patients. It becomes more challenging when a culture’s health beliefs and practices contradict with the nurse’s own beliefs and practices. It is an integral role of a nurse to assess and identify a patient’s culture and health-related beliefs and concerns to provide maximum care of that particular patient. Filipino culture consists of health practices, perceptions, and beliefs that are not similar to U.S. culture. Serafica (2011) discusses on his articleRead MoreFilipino Mental Health Culture Paper1396 Words   |  6 PagesIntroduction â€Å"Culture comprises of shared beliefs values, and practices that guide a group’s members in patterned ways of thinking and acting. Culture can also be viewed as a blueprint for guiding actions that impact care, health, and well-being† (Leininger McFarland, 2006). â€Å"Culture is more than ethnicity and social norms; it includes religious, geographic, socio-economic, occupational, ability-or disability-related, and sexual orientation-related beliefs and behaviors. Each group has culturalRead MoreCultural Comparisons Between Three Cultures : South Indian, Filipino, And Polish- American1401 Words   |  6 Pagesthe cultural comparisons between three cultures: South Indian, Filipino, and Polish- American. The heritage assessment is significant in the field of medicine and an essential tool for healthcare providers and their patients. The heritage assessment tool is used as an aid that fosters a deeper understanding of the families that are studied, thereby assisting in forming a framework to approach and deal with a patient’s mental, physical, and spiritual health beliefs. Thus, it is an indispensable elementRead MoreCultural Influences Of The Filipino Culture1375 Words   |  6 PagesCulture The Filipino culture has a variety of cultural influences. Most of their cultural influneces come from past colonizations of Ameirca and Spain.In spite of all the influences, the older Asian culture of the Filipinos has been kept and is clearly seen in their way of life. The Filipino culture has become very evident and has largely been appreciated in many parts of the world. Filipinos are very passionate of their music. They use a variety of materials to create sound. They also enjoyRead MoreThe Theory Of Nursing And The Clinical Skills940 Words   |  4 Pagesnurse’s journey is to become culturally competent care provider. A nurse must understand the cultural differences that each individual uphold and practices. Lack of understanding and awareness of these differences can create conflict and misunderstanding when optimal care is being provided. Filipinos are diverse group of people whose attitudes, values, traditions, practices and beliefs can affect their decisions especially when it comes to making a health decision. These variables can all become a barrierRead MoreHeritage Assessment968 Words   |  4 Pagesknowledge of patient’s culture and beliefs prior to initiating care. (Spector, 2000). There are many different cultures in this country, brining different beliefs in health, illness, recovery, death, and life. The heritage asses sment tool is an important measure towards better understanding of cultural competency, or recognition of diversity. A person’s culture, beliefs, heritage, and language have a substantial impact both as a patient and a health care provider within the health care system. (SpectorRead MoreMy Experience At The Annual Filipino Harvest Dinner On The Eastern Side Of Washington State Essay1727 Words   |  7 Pagesis a melting pot of cultures. A misconception about the eastern side of Washington is said to not having a multitude of cultures but from working with the public, I have fortunately had the opportunity to work with many different cultures. I grew up in Toppenish, Washington which is 7-minute drive from where my cultural experience took place. In the fall, there are fewer events that take place around the valley and I have been to many events for other cultures. The culture in which I thought IRead MoreNontraditional Beliefs And Practices Regarding Health Care Practices 976 Words   |  4 PagesNontraditional Health Care Practices Cultural competence requires the health care provider to have awareness and knowledge of the wide variety of belief systems that exist in the United States (U.S) and worldwide. Purnell (2013), asserts that cultural competence may be one the most importance health initiatives with the U.S. as understanding the beliefs and practices regarding health and wellness are equally as important to the knowledge a provider has regarding physiologic and scientific responsesRead MoreCultural Identity In The Philippines1334 Words   |  6 PagesCHAPTER 1 Introduction Philippines is a heterogenous country. Many Filipino were confused about the real culture or native culture of the Philippines because of much foreign or alien culture that invaded the Philippines right now. But as a matter of fact Filipino is also the reason on having a confusing cultural identity as a nation. The Philippines is a country that has been colonized too many times. From the Spaniards, then we were sold off to the USA, and then we were invaded by the Japanese-Read MoreCardiovascular Diseases And Strokes And The Filipino Community1268 Words   |  6 PagesStrokes in the Filipino Community The American culture is not easily defined. The greatest thing about the American culture is that it consists of multicultural beliefs and accepted norms. One culture that has made a great impact on the American cultural is the Filipino-American culture. As we all may know, some of the major factors that play a critical role in a culture’s identification is food and medicinal practices. Unlike the American practices, persons of the Filipino culture are more drawn

Diploma in Business Management Production Supplies

Question: Discuss about theDiploma in Business Managementfor Production Supplies. Answer: Examples of Pricing Variables There are number variable costs that are associated with the businesses such as cost of direct materials, production supplies, piece rate labor, billable staff wages, commission, credit card fees, freight out and others (Kaplan and Atkinson 2015). Need for Pricing Variables It is important to review the pricing policy of an organization. It helps the company to determine the marketing strategy, formulate marketing mix decisions, and estimate the demand curve, calculation of fixed as well as variable costs, understanding the environmental factors and others (Kaplan and Atkinson 2015). It is an important part of the financial planning of the organization. Identification of Customer Needs It is important for the organizations to understand the needs as well as preferences of the customers. This would make the company to formulate products as well as services which would meet its requirements. There are various ways which can help the company determine the needs as well as requirements of the customer. The company must try to think from the customer point of view and observe the preferences of the customers. A data should be used for the purpose of understanding customer needs such as customer relationship management (CRM) (Neslin 2014). It provides customer analytics regarding their needs. A market research helps the company to understand the needs of customers. Effect of Customer Behavior on the Marketing Mix There are several factors that influence the consumer buying behavior such as cultural, social, psychological and personal. The four elements of marketing such as product, price, place and the promotion are being affected by the behavior of the customers. The consumer behavior determines the quality of the products and the related product attributes. The income of the customers determines the price of the products of the brand (Anselmsson et al. 2014). The accessibility of the customers determines the distribution pattern of the customers. The promotion tool involves the selection of various tools which should be based on the level of exposure of the customers. Statistical Tools There are various statistical tools that are utilized by the company to gather market intelligence data such as click stream data, corporate websites, data mining, data warehousing, dashboards, search engines, trade shows, suppliers and others (Segarra et al. 2016). Use of Statistical Data The statistical data is used by the company to assess the consumer attitude as well as consumer behavior. The channels of distribution can be identified based on type, availability and the effectiveness of the medium. The company would be able to decide the technological advancements that can be utilized and the concerned trade partners. The company can also help to identify the location of the target audience and specific geographic locations that are lucrative for the company. References Anselmsson, J., Vestman Bondesson, N. and Johansson, U., 2014. Brand image and customers' willingness to pay a price premium for food brands.Journal of Product Brand Management,23(2), pp.90-102. Kaplan, R.S. and Atkinson, A.A., 2015.Advanced management accounting. PHI Learning. Neslin, S.A., 2014. Customer Relationship Management (CRM). InThe History of Marketing Science(pp. 289-317). Segarra, L.L., Almalki, H., Elabd, J., Gonzalez, J., Marczewski, M., Alrasheed, M. and Rabelo, L., 2016. A Framework for Boosting Revenue Incorporating Big Data.Journal of Innovation Management,4(1), pp.39-68.

Threats Attack by Injection of Malwareâ€Free Samples for Students

Questions: How Cloud Platform is creating issue for Data Breaching? How the data breaching issue can be solved? According to the countermeasures stated, which one of the countermeasure is best? Why attack by injection malware is dangerous? Answers: Introduction Cloud computing is playing a significant role in the life of human being now a days. It helps in delivering the applications as well as spaces for storage as a part of their service through Internet for a very little cost. Cloud computation also been implemented in the businesses where company pays rent for the services to the providers of cloud computing. Cloud computing helps in reducing the cost of operation and helps in improving the flow of cash. For instance HR locker a software company takes the rent of services from Windows Azure for their software service of human resources. The convenience as well as nominal cost of cloud computing has changed the daily lives of human being. However, after being bliss to the life of human being Cloud computing has several issues of security. Cloud computing is very much vulnerable towards the cybercrime. The hackers are implementing various techniques for gaining access to the clouds. They do not have any legal authorization as well as disr upt services to the provider of cloud service. The hackers implement various tricks on cloud for making their illegal activities as valid and therefore by the help of this trick they can gain unauthorized access for the information which is stored in the cloud (Armbrust et al., 2012). Cloud Security Threats Attack by Injection of Malware The attack by injecting the malware includes scripting of cross site, failure of session management, injection flaws, improper handling of error, broken authentication and leakage of information. It helps in restricting the access of URL, malicious execution of file, improper validation of data and insecure communications. It is considered to be one kind of attack based on web where the hackers are capable of exploiting the web applications vulnerability (Watson et al., 2016). Hackers also embed codes, which are malicious in the machine and turns the course into normal execution. Similarly to web based applications system of cloud are vulnerable to the attacks done by injecting malware. A malicious application or program is been designed by hackers and are been injected to the cloud platform. After the completion of injecting, the execution of malicious code is been done like a valid program running on cloud platform and then the hackers can perform data theft and other illegal activ ities over there. SQL injection attack as well as cross site scripting attack are the dangerous malware injected data. SQL injections fundamentally targets servers of SQL which run on vulnerable database application (Ahmed et al., 2017). These vulnerabilities are been exploited by hackers and a malicious code is been injected for gaining bypass login to unauthorised access of backend databases. Wrapping Attack During the requests of service from the end of clients on the web server by the help of web browser the interaction of service is been done by utilizing messages from Simple Object Access Protocol which are been transmitted by HTTP protocol (Kumar, Mani Akunuru, 2016). This is been done by using the format of Extensible Markup Languages also known as XML. For ensuring confidentiality and integrity of data of messages from SOAP is done to provide security. The transit among clients and servers is a mechanism of security. Web Service security is been applied for the service of web. It utilizes digital signatures for getting the signed messages as well as use technique of encryption for encrypting the messages contents. Wrapping attacks utilizes wrapping of XML signatures for exploiting weakness at the time when web servers used to validate the signed requests (Chou, 2013). The attack is conducted at the time of translating SOAP messages in between authorized user and web server. Dupli cation of login credentials of user is done at the time of login where hackers incorporates a structural message known as wrapper and switch all the original messages under wrapper. Then the hacker replaces the original message content by malicious code. The hacker then sends messages to server. Therefore, hackers gain full unauthorized access to the secured resources. Counter Measures The infrastructure of cloud computing incorporates a service providers of cloud that helps in providing the resources of computing to the end users of cloud. The cloud computing technology in order to provide the best quality of services should enhance the mode of security. Security enhancement could be done by applying policies for security. Some of the security policies are been discussed below: Security Policy Enhancement: Any individual having a credit card with validity are eligible for registering to the service providers of clouds for utilizing their resources. Hackers therefore take the benefits of the excellent power of computing of clouds for conducting malicious activities. Such abusive behaviour can be mitigated with the help of strong registration system, monitoring fraud regarding credit card as well as blocking general blacklist (Li et al., 2013). Implementing security policies helps in reducing risk of the abusive use of power for cloud computing. Mirage Image System: Security as well as integrity for images of VM helps in foundation of security for cloud. This system identifies issue that are having relation with secure management and addresses them. Images of virtual machines are been encapsulated by each cloud application (Fan et al., 2013). This system of managing security for clouds comprises of components like Access Control, Image maintenance, running filters for transforming images and Provenance Tracking. If filter technique is been used for the injection attacks of SQL then it sanitize the input of user and check the attack from SQL injection. Architecture having proxy base can be implemented for getting secured from this type of attack. Denial of Service Attacks: Intrusion Detection System is been used as one of the most popular method for providing the defence against this type of threats. Defence federation is been used to safeguard the information from those attacks (Zhang et al., 2016). IDS have been loaded separately for each of the cloud. The main working principle of IDS is based on exchange of information. If attack is been conducted on a specific cloud IDS give alerts to the whole cloud system. Data Protection: Breaching of data is caused by insiders of organisation accidentally or intentionally. As it is difficult in identifying the behaviours of insiders therefore, an accurate security tool must be implemented for resisting threats from insiders. Tools like prevention system of data loss, detection tools for anomalous pattern of behaviour, authorisation technologies, encryption tools and decoy technology could be implemented (Chandramohan et al., 2013). They help in providing functions like detecting in real time on traffic monitoring and trapping of malicious activity. Access Management: The data stored in end user within the cloud is sensitive. The mechanism of access control should be applied for ensuring that access of data is been done by authorised users. Besides monitoring the system of physical computing the data access should be limited by applying security techniques. IDS as well as firewall are the general tools that are been implemented for restricting access coming from various untrusted sources (Peng et al., 2014). Moreover, Security Assertion Makeup Languages as well as Extensible Access Control Markup Languages are been used for controlling access for application of cloud. SAML concentrates for authentication transferring and XACML concentrates on the mechanism of arriving decisions of authorisation. Conclusion The continual advancement of cloud computing for making all the services available to the customers and therefore cloud computing has achieved a high level in the sector of Information technology. While individuals appreciate advantages of cloud computing brings, security within cloud is a key significant challenge. Much powerlessness within cloud exists and hackers keep on exploiting these security openings. With a specific end goal to give better nature of administration to cloud clients, security imperfections must be distinguished. In this report, we inspected the security vulnerabilities in cloud computing from three points of view, included related certifiable adventures, and acquainted countermeasures with those security breaks. Later on, we will keep on contributing to the endeavours in examining cloud security dangers and the countermeasures to cloud security breaks. There are three models of cloud services that helps in providing the services to the clients as well as these platforms also discloses the information that causes security risk and issue for the service. The hackers at first abuses the capability of computing that are been provided by cloud computing services with the help of conducting unauthorized activities (Hasizume et al., 2013). The three platforms of cloud computing services are SaaS, PaaS and IaaS. IaaS is situated in bottom layer and provides the powerful functionality of the entire cloud directly. It also helps in maximize the extensibility of the users for customizing real environment. Hackers also has the capability of taking a virtual machine by rent and then analyse the configuration then finding the vulnerabilities of the system and then attack the system of the customer who are present within the same platform of cloud. Secondly losing of data is significant issues of cloud platform. In SaaS platform companies and ent erprises uses the application of cloud computing for processing and storing the data regarding business (Avram, 2014). In PaaS platform developers utilises the data for testing the integrity of software at the time of system development life cycle. In case of IaaS new drives are been created by users on the virtual machines and the data are been stored in those drives. In all the three platforms of cloud model data can be accessed both by internal employees as well as external hackers. Thirdly traditional strategies of attacking of networks are been applied on the platform of cloud. For instance attacks on the web browser exploit authentication, accounting vulnerabilities as well as authorisation of cloud network. All the countermeasures have their own significance, but according to me Access management is the best counter measure. The mechanism of access control should be applied for ensuring that access of data is been done by authorised users. Besides monitoring the system of physical computing the data access should be limited by applying security techniques. IDS as well as firewall are the general tools that are been implemented for restricting access coming from various untrusted sources. Moreover, Security Assertion Makeup Languages as well as Extensible Access Control Markup Languages are been used for controlling access for application of cloud. SAML concentrates for authentication transferring and XACML concentrates on the mechanism of arriving decisions of authorisation. This make access management the best countermeasure. A malicious application or program is been designed by hackers and are been injected to the cloud platform. After the completion of injecting, the execution of malicious code is been done like a valid program running on cloud platform and then the hackers can perform data theft and other illegal activities over there. SQL injection attack as well as cross site scripting attack are the dangerous malware injected data. SQL injections fundamentally targets servers of SQL which run on vulnerable database application. These vulnerabilities are been exploited by hackers and a malicious code is been injected for gaining bypass login to unauthorised access of backend databases. These make SQL injection dangerous. Reference List Ahmed, H. A. S., Ali, M. H., Kadhum, L. M., Zolkipli, M. F., Alsariera, Y. A. (2017). A Review of Challenges and Security Risks of Cloud Computing.Journal of Telecommunication, Electronic and Computer Engineering (JTEC),9(1-2), 87-91. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2012). A view of cloud computing.Communications of the ACM,53(4), 50-58. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Chandramohan, D., Vengattaraman, T., Rajaguru, D., Baskaran, R., Dhavachelvan, P. (2013, March). A novel framework to prevent privacy breach in cloud data storage area service. InGreen High Performance Computing (ICGHPC), 2013 IEEE International Conference on(pp. 1-4). IEEE. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Fan, K., Mao, D., Lu, Z., Wu, J. (2013, June). Ops: Offline patching scheme for the images management in a secure cloud environment. InServices Computing (SCC), 2013 IEEE International Conference on(pp. 587-594). IEEE. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Kumar, B., Mani, J., Akunuru, P. C. (2016). A review of wireless hacking techniques that affect the security of cloud systems.Journal of Computations Modelling,6(3), 87-103. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Peng, M., Li, Y., Jiang, J., Li, J., Wang, C. (2014). Heterogeneous cloud radio access networks: A new perspective for enhancing spectral and energy efficiencies.IEEE Wireless Communications,21(6), 126-135. Watson, M. R., Marnerides, A. K., Mauthe, A., Hutchison, D. (2016). Malware detection in cloud computing infrastructures.IEEE Transactions on Dependable and Secure Computing,13(2), 192-205. Zhang, H., Cheng, P., Shi, L., Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system.IEEE Transactions on Control Systems Technology,24(3), 843-852