Question

3 Using a Web Browser, search for information related to preparing an organization against terrorist attacks....

3 Using a Web Browser, search for information related to preparing an organization against terrorist attacks. Look up information on (a)anthrax or another biological attack (like smallpox), (b)sarin or another toxic gas, (c)low-level radiological contamination attacks. Using a web browser, search for available commercial applications that use various forms of RAID technologies, such as RAID 0 through RAID 5. What is the most common implementation? What is the expensive? ( 300 words word document  )

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  1. Anthrax:

  • In 2001, a series of anthrax attacks also known as Amerithrax occurred and killed five people and sickened 17 people. Government buildings in Washington D.C. were shut down.

  • This happened when some anonymous letters were laced with deadly anthrax spores. These spores started arriving at media companies and congressional offices thereby infecting people.

  • Anthrax is an animal disease that is caused by a bacteria called as “Bacillus anthracis”.

  • Any contact with this disease anthrax can lead to severe illness in both humans and animals up to several weeks.

  • The signs and symptoms of these depends upon the infection path and include skin sores, continuous vomiting and shock.

  • However, immediate treatment with antibiotics can give relief from most anthrax infections but still inhaled anthrax is difficult to diagnose and treat. It can cause severe damage to the body of the host.

  • This disease can occur in four forms which are skin, lungs, intestinal, and also through injection.

    Smallpox:

  • This is no direct threat of bioterror attack using smallpox. However, some people used to deliberately infect their enemies from this infection.

  • Smallpox is an infectious and contagious disease which is caused by variola virus.

  • Back in history, when the smallpox was not eradicated, 3 of every 10 people who would suffer from this disease used to die.

  • However, there are vaccines to protect people from smallpox.

  1. Sarin:

  • Sarin was originally developed as a pesticide in Germany in 1938.

  • Sarin is an extremely toxic compound which is used as an important component in making of chemical weapon.

  • Exposure to this compound is extremely harmful and even at very less concentration, this can easily cause human death within 10 minutes.

  • This compound can be very easily converted into gas and thus can prove even more damaging to living beings.

  • Any attack using this compound would be very deadly to human race.

  • The Tokyo subway sarin attack is an example of this attack. The attack has been one of the deadliest terrorist attack in japan.

  1. Low-level radiological contamination attacks:

  • A radiological attack can be referred to as spreading of radioactive material with the intention of doing harm to other people.

  • Radioactive materials are now-a-days very commonly used in laboratories, medical centers, industrial areas etc.,. Wrong or illegal use of this material can be very damaging to humans as well as animals.

  • Exposure to radiological contamination of lower level can highly increase the risk of cancer in the longer run and exposure to this radiation at higher levels can cause severe damages like radiation sickness and poisoning.

  • A common example of low-level radiation attack is a dirty bomb which is also popularly known as “radiological dispersal device” or simply RDD. The radioactive material used in this bomb can be dispersed into the air at low concentrations. This could result in radioactive or radiological contamination and could increase risk of cancer in the longer run for people and animals.

  • Commercial applications that use various forms of RAID technologies :

RAID : RAID refers to “redundant array of independent disks”.

  • RAID 0 : Level 0 is in RAID is achieved through a process called as "striping”. The advantage of this level is its optimized performance and disadvantage is its low level of fault tolerance or data integrity.

  • Commercial applications where RAID 0 is used are image retouching or video editing station.

  • RAID 1 : The RAID Level 1 is achieved through a process called as "disc mirroring. The major advantages of this level are data reliability and high degree of fault tolerance. The disadvantages are less availability of capacity in the drives.

  • Commercial applications where RAID 0 is used are mission critical storages.

  • RAID 2 : This level of RAID is used to ensure that the data is protected in the event drives. This enables high level of fault tolerance.

  • This level of RAID is used in error correction software.

  • RAID 3 : This RAID level uses the data striping methods that are used in 0 level of RAID. The major advantages are its high level of fault tolerance and data integrity.

  • Commercial applications like streaming media and graphics editing use RAID 3 level.

  • RAID 4 : This RAID 4 has somewhat similar concept as RAID 3. However, this level has higher degree of stripe depth. The major advantages are its fast data access in applications based on read-intensive and a disadvantage is that there is high chances of bottleneck in the parity drive.

  • Commercial applications like accounting system use this level of RAID.

  • RAID 5 : The major advantages of this level is that it minimizes the problem of bottleneck. This is done by distributing the parity stripes over the available hard drives.

  • Commercial applications that have limited number of data drives use this level of RAID.

Add a comment
Know the answer?
Add Answer to:
3 Using a Web Browser, search for information related to preparing an organization against terrorist attacks....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT