Sunday, January 26, 2020

Threats To Ict System And Organisations Information Technology Essay

Threats To Ict System And Organisations Information Technology Essay Scanners Various methods are used by people to attack systems using scanners. People are able to download scanners from the internet in order to scan addresses and obtain information about TCP ports. People can discover IP addresses by mapping using DNS. Hackers use this potential tactic assuring what systems are active and available to hack. Range of addresses This is a scanner which is very simple, visual and fast at scanning as it searches for a range of addresses. Deep probe in order to reveal essential information of a device then completing a deep probe is the useful way moreover, it can also be used when there is a remote fault. Scanning a wireless system If there is no encryption can result wireless systems to be very vulnerable. When looking at mobile networking, wireless access points need to be established as they can be accessed when connected to the laptop, PDA, or mobile. Windows has a feature that contains a tool that can allow you to click on a network icon for your wireless network connection. ARP poisoning Within the system these are known as switch based networks that are very secure as they create micro-segments. However, there is still an issues of attack in many networks. In order to tackle this problem, the memory must be monitored of many network by checking MAC address as they appear in locations more than once: here is a diagram to help your understating Default Gateway Victim Victim Default Gateway Man in the middle Magic disk are known to be boot disks that can be downloaded on the internet for the purpose of restarting the computer and subvert the operating system. There are some very good magic disks for instance the ultimate boot CD that can resolve issues of viruses and Trojans moreover, drive, hardware and operating system failures. In order to avoid anyone using a magic disk it is vital is password lock the BIOS and also USB sticks, floppy disks and CD/DVDs should not be used as boot devices. Key loggers Key loggers are applications that are used to record key stroke also can be used for mouse activities then interestingly sends the information to a file or in some case that are often used remote network location. There are very difficult to track as they are hidden but can be found using anti-virus software application. If suspecting there is a threat, run a protocol scanner, which works by looking at contents of every data packet. Access causing damage to data or jamming resources Unauthorised access to software can result to damaged data or restricting resources. There are attacks that can access systems without the need of damaging however, an intrusion can always have an effect on the system. Virus Attacks in all computer systems, virus attacks can occur when rogue code has entered in to the system. Viruses work by hiding themselves in ordinary executable code. They can damage the system by opening and closing the CD/DVD door, swapping key responses or can spread themselves by self reproducing and can serious damage the hard drive. There are virus scanners which will detect a virus by opening the file and scanning the code. Trojans Trojans are programs with a hidden identity and seem to look as a program or a file in which it can be normal or harmless to your PC. Worms Worms have a process of forwarding through the use of emails from the data of your contact list. Piggybacking, Tunnels and probes Knowledge is required for data for when forging data or spoofing and that knowledge network programming languages ranging from; Java, C++ or VB.NET. Hackers have the ability to hand craft a data packet in order for an application to be forced or information given away by server, lead to a service attack or piggyback/tunnel in which that happens into a system via an acceptable protocol. Phishing and Identity theft This is a recent developed method that allows unauthorised to systems. Phising works by luring people into showing their personal information in which this is done through social engineering for instance; when you receive emails supposedly to be from banks saying ISP etc. asking you to follow this link to lead you to their site in order for you to change your details in which that can be a HTTPS which that can be in operational. Natural Disasters Natural disasters can occur to many systems ranging from power outage, flood or fire leading to serious major damage. Organisations have computer systems that are specifically built to cope with these series of issues. The disaster policy have several ways to implement the following: Remote storage of all data to be done in daily back up Duplication of critical servers Malicious damage constantly there are malicious damages occurring internal and external to systems. Malicious damage can be caused by external hackers. The hackers then attack the systems. There are many security ways of preventing this however, hackers always find a way to do what they do best. Technical Failure There is always technical failure that occurs a lot now at days for instance when sever storages are lost, or bad internet connection that can cause disruption to the whole organisation. The large use of network technology for instance voice, video and CCTV can lead to a commercial damage and disrupt the security of the system. Human Errors Human errors occur unpredictably however, it does happen very frequently due many things for instance being forgetful, ignorant, or having lack of knowledge. This then results to system failure. Users can forget to back up data which then leads to loss of data is something happens to the system etc. Theft An Organisation or individuals can be damaged heavily in which that can be long lasting impact due to theft of data. Theft occurs in the cyber sense in which that is known as to be hacking, or physically removing data by CD/DVDs, memory sticks etc. Integrity and completeness of data This is a critical matter integrity and completeness of data as damaged can be caused if there is incorrect data. Incorrect data can result to distress and legal action especially the data in medical records, police systems as well as credit reports. You need to have appropriate people to check the data correctly maybe of customers or personal details by asking a colleague or customer to check if correct. Physical Security Systems can be safe with the latest the latest anti virus and firewall however, that is all useless if anyone can have access to the sever room and manages to get critical data on to a USB memory stick by copying the data. In organisations there should be security features that need to be present; lock and key security, equipment identificatyion, CCTV, Detection of intrusion etc. Lock and Key Security There is a need to secure devices such as laptops by inserting a padlock chain. In buildings there are many locks and key systems that operates a system that is master/submaster system. Equipment Identification this involves stolen properties identified for instance if a computer from school/college is stolen, it can be identified from the marking clearly showing ownership and origin which can lead to prosecution. Equipment can be identified through the use of indelible ink which labels the property of the owner in which it is invisible and ultra-violet sensitive ink. CCTV (Closed circuit television) This involves cameras used 24/7 in monitoring people or events. There are several advantages to its use for instance, central centres that are centralised can be monitored, a record of 24/7 events are maintained, and lastly mentioning that CCTV is at present to prevent bad behaviour to occur. Intrusion detection systems intrusion detections are used by many organisations which can detect human presence in many ways. The operate through various ways for instance, body heat is sensed by passive infrared, detect many movements through the use of microphones, doors and windows have circuit breakers for access etc. Staff visitor identification systems many from small to large organisations have systems that can identify staff or visitors in order to prevent unknown people to access. People can be identified through the use of identity cards in which it is a must for everyone in the premises to wear them. Biometrics Biometrics involves the use of finger printing to recognise, retinal scans and voice recognition. Fingerprint recognition this biometric form is commonly used in detecting in crime scenes. Our fingers contain a water solution which enables the detection on finger printing to work. There are several scanners that finger prints by detecting ridges in our fingers. Finger printing can also work in identification for passports and visa. Retinal Scans The retina is located at the rear of the eye and it is very similar to a finger print as it contains unique configuration. However, there is a difference between them as a finger print can be changed when the skin is removed through cuts or burns whereas it is impossible for the retina to be changed unless someone attempts to tamper with the eye bow which is highly unlikely. Iris scanning This is another unique identification eye method which is the iris. The difference between the retina is that the iris can be scanned when the recipient is wearing glasses or contact lenses. Voice Recognition This form of biometric is not being commonly used as voice can change due to various reasons for instance if someone is ill, stressed or has a throat infection that can affect someones voice. Software and network security Organisations all need to have security, techniques to manage data and technologies in order to combat intrusion and superverion of computers that are networking to prevent data being damaged or resources being affected. Encryption Encryption involves the conversion text, images and media information in to a format. RSA encryption is a Ron Rivest, Adi Shamir and Len Adleman in they are mathematicians who enforced the public/private key encryption through the use of prime numbers. In encryption there are many ciphers that exist for instance Caesar cipher, in which relies on simple key of changing one letter with the letter a fixed number of places down the alphabet. The operation of this works by using shift of four places meaning A becomes E and B becomes F etc. DES (Data Encryption Standard) is a cipher uses key 56 bits in length in which this can be mathematically explained. A public/private key can be used by RSA encryption; with an example of how the security certificate is issued by a website. As the creation of a key is done the certificate is a public key part of the exchange. Call back Dial up systems use call back where remote workers or network administrators are able to dial into a network or devices that have network and it will then call them back. In order to call back the number is pre-configuared. Users are unable to connect from any location but only the ones which are trusted and registered lines. Handshaking When data is being sent through a medium in WAN systems it in which it is not trusted, in order to obtain the trust the devices are each tested in a challenge as it carriers username and password in order to indentify the device. Diskless networks There are common ways data is stolen for instance when data is transferred from a computer to a mobile device storage. Backups Backing up data is important in order to restore critical data to assure that it is safe and secure, if data is not backed up very frequently will result the organisation loosing data in which that can be costly. Audit logs Audit logs are used for the purpose to keep records of network and database activity to also have a record of who has done what, when they did it and where. There are various purposes for instance, to maintain records that are detailed on how many systems are being used. Syslog is a commonly used system that is able to store simple, auditable records system activities. Firewall Configuration This enables users to be able to remove filters depending on various conditions: IP Addresses: Every machinery running of the internet each has an assigned address called the IP address. The IP addresses consist of 32 bit number and can be understood as octets in number which is decimal dotted. Domain Names: The sequence of numbers that produces the IP addresses can be hard to be remembered since a change of IP addresses tends to occur. Norton Security has a firewall as well as the Norton 360. How to check your FIREWALL settings Windows has a firewall that can be configured through control panel by opening it. The exceptions tab need to be selected and you will view a list of automatically configured expectations. You then select the add pot option. Virus Protection software Firstly, computers can be a victim of virus, worms and Trojan attack from the internet access as well as emails. There are various ways of protecting the computer from such things which are sadly created by virus writers A virus scanner can only be used when the user initiates it. There is a virus start up scanner that begins to run as soon as the booting process begins by checking for sector viruses. A memory resident scanner software checks for incoming emails as well as browser document by doing an automatic check on the environment of the computer. There are various types anti viruses all ranging with different abilities and some are much more secure than others and can be downloaded on the internet. These anti viruses can work through doing file emulation, file analysis, Heuristic-based detection, Malicious activity detection and Signature based detection. An anti virus basically examines the files for known recognisable viruses through the virus dictionary as well as to identify unrecognisable activities of behaviour in the computer to see if an infection may be occurring. A virus dictionary consist of list of viruses known and to be put by the producer of the software and so when an anti virus detects a virus it then refers to the dictionary to confirm, then initiates the deletion of the infection or it can quarantine the virus in order for it not to be accessible to other programs as well as stopping it from spreading or the attempt re-creating its self. Anti viruses also consist of suspicious alert in which it immediately alerts the user if it is suspecting or has suspected of a threat occurring then it ask the user if they want to proceed or what to do. The most destructive and spreads widely is argued to be the macro viruses, and mostly affects Microsoft as they need to overcome their security flaws in the out look in order to pr event this destruction occurring to the documents. A common way how viruses normally access the computers is through networking of local networks even through the internet by going through unprotected security patches which can be holes in the software or having an infected sent thought the use of email, downloads or disk sharing. Some of the viruses may set in to Excel or word file or has been created to initiate through email, and as soon as the computer it is infected it can carry on its destruction to other computers without the awareness from the user. Anti virus software updates are highly vital as new viruses can be created and the older softwares may not be able to protect you from it. VIRUS It is called a virus because it spreads everywhere and enables data to be deleted as well as corrupt files. WORM Worms have a process of forwarding through the use of emails from the data of your contact list. TROJANS Trojans are programs with a hidden identity and seem to look as a program or a file in which it can be normal or harmless to your PC. POLYMORPHING This is a clever ability a virus has for when changing its appearance, size, signature for every turn it attacks the computer because it makes it difficult for a virus software to recognise it. Software Utility Purpose Screenshot VIRUS PROTECTION Anti-Virus Protection Anti-Spyware E-mail Scanner ID Protection Link Scanner Resident Shield VIRTUAL PRIVATE NETWORKS (VPNs) Organisations are able to communicate from site to site in a public system through the use of VPN for instance the internet, via tunnel in which that is the route for all encrypted traffic. VPNs have a trusted connection on a system that has not been trusted. Passwords Managing passwords is very essential, organisations must ensure that the protection of the password is very safe to prevent troublesome. If the password is forgotten will lead to many problems. The password must not be written down Change the password for at least every 3 months Put a very strong password Software Update Software update is very important as it ensures that the system is safe from possible faults and vulnerabilities from various application. When the software updates it is an automatic update in order to remove the need of worrying on the update of the system. REFERENCES USED BTEC National Information Technology Practitioners Book 1 by Jenny Lawson

Saturday, January 18, 2020

Swot Analysis †Wal-Mart

Strengths †¢Best positioned global retailer †¢Established business objective & philosophy that is understood organization wide †¢Firm focus on the strategy of cost leadership by offering everyday low prices (EDLP) through everyday low costs (EDLC) †¢Efficient procurement and logistics system †¢Strong and stable financial performance and positive cash flows for reinvestment in improving operations Weaknesses †¢Significant dependence on the US market to maintain strong sales performance †¢Wal-Mart’s mass market approach as a retailer creates opportunities for ‘market nichers’ to capture specific market segments which may be overlooked. Wal-Mart’s extensive range of products limits its ability to give direct attention to understanding all its customers as opposed to its more focused competitors. †¢FIFO method of accounting for inventory, in the international markets, may not effectively support the strategy of everyday l ow prices. Opportunities †¢There are opportunities to expand in countries with emerging economies †¢There are also opportunities to resuscitate growth in the US market †¢Innovations in technology present the opportunity to further integrate the value chain for increased efficiency to drive EDLC. Threats †¢The unstable economic climate in the USA will continue to negatively impact on Wal-Mart’s performance †¢Wal-Mart can lose customers to more focused competitors if they (competitors) are able to develop a value proposition greater than the simple offering of everyday low prices. †¢Wal-Mart’s global exposure exposes the organization to currency risk, political influences, and other uncertainties that can affect its operations. †¢Wal-Mart’s cost leadership strategy creates intensive price competition which poses a serious risk to profitability if operational costs are not ffectively managed. Wal-Mart is a large retailer that is keenly focused on the business philosophy of saving people money so they can live better. This philosophy drives the organization-wide quest of achieving EDLCs which are leveraged in delivering EDLPs. Based on corporate information, Wal-Mart has a total of 9700 retail units spread across 28 countries, as at Augus t 2011. This represents approximately 985 million square feet of retail space from which sales are generated. This broad network of superstores, discount stores, neighbourhood markets, suppliers, and customers are interconnected in a value delivery network fuelled by information technology. In this system, suppliers are able to track Wal-Mart’s inventory levels in real-time to ensure that products are available on time, in the right quantities, best quality, and at the lowest possible price. Simultaneously, Wal-Mart is able to track purchasing patterns, brand preferences, register customer feedback, and capture other related information for their sales and marketing programme. When it is all put together, Wal-Mart’s use of information technology empowers it to consistently deliver on its promise of everyday low prices, a reliable supply of its vast range of products, and capture an understanding of its customers and members that it serves over 200 million times per week. This, in turn, drives customer satisfaction and loyalty which is reflected in Wal-Mart’s strong financial performance compared to other global retailers. For the 2011 financial year, Wal-Mart’s sales grew by 3. 4% to US$419b and operating income grew by 6. 4% to US$25b. EPS grew by 12% to US$4. 8 and a total of US$19. 2b was paid out to shareholders through dividends or share repurchases. Between the 2009 and 2010 financial years, Wal-Mart has maintained a ROI of 19. 3% falling slightly to 19. 2% in 2011 due mainly to economic challenges within the US market. For comparison, Wal-Mart’s closest global competitor, Carrefour Group, generated a USD equivalent of app roximately $158b in sales for the 2010 financial year (latest full year results available). At the close of the second quarter of their 2011 financial year (August 31, 2011), Carrefour experienced a 2. % increase in sales at the USD equivalent of $58. 3b. However, underperformance in France, Greece, and Italy, due to struggling economies, resulted in a 22% reduction in operating income at a USD equivalent of $1. 1b. These results cements Wal-Mart’s position as the world’s largest and best positioned retailer with respect to sales revenue. On the flip side, Wal-Mart appears to be dependent on its dominance in the US market which showed a flat performance by generating US$260b in sales for the 2011 financial year, compared to US$259b in 2010. Despite expanding during the year to create more retail space, there was reduced customer traffic due to rising unemployment and a 2. 3% reduction in the income of the middle class according to the US Census Bureau. A 1% increase in the poverty rate to 15. 3% also had a negative impact on Wal-Mart’s performance and highlights the challenges within the US economy. In the international segment, the FIFO approach at inventory management and accounting may not entirely support its established strategy of everyday low prices as it does not allow for cost savings to be quickly passed on to its customers. It may also distort the true picture of the company’s financial performance. Putting it all together, the assessment of Wal-Mart’s strengths, weaknesses, opportunities, and threats identifies the need for a strategic approach towards achieving its objective of 4-6% growth in sales revenue for the 2012 financial year and beyond. Given its dominance in the US market, the company should strategically move to hold/defend its market position by continuing to leverage IT for EDLCs and EDLPs. Aggressive sales promotions, especially through eCommerce, should be used to improve on the flat sales performance for 2011. Wal-Mart should, however, look to the emerging economies for further growth and expansion as they show a faster rate of economic recovery and a growing middle class. China, India, Pakistan, Indonesia, and Saudi Arabia are ranked in the top five on the market potential index for emerging markets with respect to market growth rates. China, India, Russia, Brazil, and Indonesia are ranked in the top five based on market size. Pending further PESTEL Analysis, these emerging markets could potentially hold the key for Wal-Mart’s future expansion.

Friday, January 10, 2020

Africville by Maxine Tynes Essay

Examples of personification include â€Å"We are Africville† and â€Å"I am Africville†. This is personification because they cannot really be â€Å"Africville†; this is because Africville is not a person, or an adjective usually appropriate to be paired with humans. However in this case the author does it quite well. For example comparing â€Å"I am tired† to â€Å"I am Africville† one can quickly tell that this is a personification on Africville, in the sense of making Africville an adjective describing who they/she are/is respectively. To be Africville, in this case would be someone conveying their sense of pride and attachment to their beloved former town, to carry with them the unforgettable, unforgivable past that was eviction of their town. An example of a metaphor would be: â€Å"No house is Africville. No road, no tree, no well. Africville is man/women/child in the street and heart of Black Halifax, the Prestons, Toronto.† No house, no tree, or no well can be Africville because there are these things everywhere. The trees aren’t what makes Africville special, it is the people in it and their stories and history. The section goes further to explain how even post-dispossession the people of Africville are still together in black Halifax and Toronto. This implies that this town was so unified that even widespread eviction cannot break their bonds. However, the concrete metaphor in this passage is â€Å"Africville is man/women/child† because this is an unlike comparison without using like or as. These literary devices (personification and metaphor) create a pseudo-atmosphere where readers cannot take anything literally. However, I overlooked the pseudo-atmosphere because of the great depth it adds to the poem. The recurring personifications and metaphors also show point of view quite easily, as seen here: â€Å"We are Africville† and â€Å"I am Africville†. This is clearly stating who the speaker is. In an addition to the atmosphere and point of view the literary devices show, they also sharpen the overall message of the poem which I believe to be that the people of Africville are literally detached from each other’s lives they all share the same story and are therefore still connected. I think that Africville was a town in which Maxine Tynes (the author) was born in, during the year of 1949. It was settled by Black Loyalists and was in Nova Scotia, Canada. It was a very connected town, as seen here: â€Å"so black with community† â€Å"with life† â€Å"with pride† â€Å"with memories†. However, everyone in this town was evicted, as seen here: â€Å"we are the dispossessed Black of the Land† â€Å"creeping with pain away from our home†.

Thursday, January 2, 2020

The World Outside And The Pictures - 876 Words

Broken Pictures After the death of more than nine million soldiers and over seven million civilians, World War I came to end with the signing of The Treaty of Versailles. US President at the time Woodrow Wilson offered his vision for world peace with his Fourteen Points. Influential journalist and political commentator Walter Lippmann assisted the drafting of this blueprint for world peace through a League of Nations. Perhaps Lippmann is best known for coining the term â€Å"stereotype† in his 1922 book Public Opinion. In the first chapter, â€Å"The World Outside and the Pictures in our Heads† Lippmann supports that reality does not always correspond with the perception that the mind creates. These perceptions aids in fashioning what Lippmann calls a â€Å"pseudo-environment.† Through a medium of fictions, the mind shapes these environments. Lippmann argues that public opinion is shaped and defined by perceptions of reality and influenced by the pseudo-environment molded by fictions. To demonstrate the pictures in our head do not always match the world outside Lipmann tells a story about an isolated island that only receives news updates every sixty days or so by steamer ship. The story takes place in September 1914 some six weeks after the start of WWI and a couple months since the last steamer ship bringing the latest news. On the island Englishmen, Frenchmen, and Germans worked and lived together in harmony. Their most anticipated news story was not concerning world turmoil,Show MoreRelatedThe Use of Imagery in Preludes by T.S. Eliot Essay707 Words   |  3 Pagesthe world as a dark and depressing with no future. His Imagery is sharp and clear and he exercises many techniques. He uses literal imagery, which is a clear description of what something is, so it can pictured it in the mind. His word choice is a big factor in that he uses words that bring a certain picture to the mind, he also describes humans by their body parts or their presen ce. His unique syntax and use of rhythm also heighten the effects of his poetry. His attitude towards this world is summedRead MoreHow the Advertiser Presents the Product to the Consumer and Comparing the Adverts in Mercedes-Benz and Chrysler Voyagers Ads783 Words   |  4 Pagescomparing them to each other. The advert for the Mercedes-Benz is very personal, and is constantly putting the reader in the driver’s seat. It is laid out like a cinema screen, and that comparison continues throughout the advert. The picture is very passive and immediately places the reader at the centre of the advert, and the whole layout is calming. In comparison, in the Chrysler Voyager advert the attention of the reader is not immediately drawn to the car. Instead, itRead MoreA Photo Can Be Very Misleading Essay examples641 Words   |  3 Pagestaken, shown, and spread all over for the world to see. But the real question that should be on everyones mind is, what do they really capture? Is it the essence of reality or what you want to believe? Knowledge and opinions of mankind are made from these simple pieces of paper. Yet, having this in mind, we educate our children and future generations to come that we should not judge a book by its cover. Opinions not only limit us from the outside world but they give us an â€Å"incalculable effect† ofRead MoreThe Picture Of Dorian Gray Literary Analysis1029 Words   |  5 PagesThe Picture of Dorian Gray: What’s the meaning? The famous and well-renowned saying â€Å"do not judge a book by its cover† is something we have all heard ever since we were little children. In the novel, The Picture of Dorian Gray, this advice is crucial. This idiom expresses that someone should not judge something based on its appearance. A book, or in the case of this novel, a person, might actually be very different from the image portrayed on its cover or their outside appearance. This could notRead MoreAnalysis Of The Diary Of Anne Frank1348 Words   |  6 Pages Osceola Fundamental High School Anne Frank outside Looking in, the Diary of Anne Frank, and â€Å"Holland1945† Chloe McCaffrey English 4 Mr. Taylor March 17, 2015 In Brett Kaufman’s painting, Anne Frank outside looking in, he is implying how Frank never got to have a chance to live her life due to having to hide away from the war going on all around her. Kaufman is relating his 1995 painting to the way she lived. Anne lived in the annex above her father’s work until her and her family got caughtRead MoreWithin Our Expansive History Lies Many Infamous Moments1248 Words   |  5 Pagesknow about, this picture is a great representation of the emotions that captures the global war. This photograph features Himmler and other Nazi officers observing detainees and prisoners of war during World War II. Himmler, one of the leading members of the Nazi party, is visiting the Shirokaya Street Concentration Camp in Minsk, Belarus during an inspection tour of the facility. I picked this picture because my roommate was watching a WW2 documentary and it was one of the pictures that popped upRead MoreThe Biographical Approach to History: Stren gths and Weaknesses in the Context of Bismarck’s Germany891 Words   |  4 Pagespolitics during the latter half of the extended nineteenth century, particularly from 1848 onward to the First World War, is as much about the European political climate as a whole as it is about the key figures within this climate. For example, one cannot fully understand the multitude of independence and nationalist movements in the Balkans during this time without first understanding the outside pressures placed on these movements by the three competing empires of the Russians, Habsburgs, and Ottomans;Read MoreHuman Perception Of The World890 Words   |  4 PagesThe world is a representation that our bodies and our minds construct within ourselves to represent the outside world. In other words, human perception of the world is subjective to the individual. We pick and choose the experiences that we want to remember and how we want to remember them while we unconsciously forget the majority of our life experiences. We see and acknowledge what we want to see and ignore what we think is not related to us. The way we see, understand and interpret the outsideRead MoreDescartes and the Metaphysical Doubt1235 Words   |  5 PagesDescartes proves that God exists in his third meditation. He proves that God exists because he wants to be certain about things outside of himself. But, he cannot be certain of these things if he is ignorant about the existence of God. This is because if a supreme God exists, he could cause Descartes to be mistaken in the one avenue to certainty that he has. This avenue is known as clear and distinct perception, and, according to Descartes, it is what is necessary to be certain about a thing. HoweverRead MoreHow Does Our Brain Communicate? Essay935 Words   |  4 Pagesbrain respond to the love of other person? Will external factors change the way our brain responds to love or do our brain actually ignore these outside things and only focus on the inside activities only? I would like to start the discussion with Dr. Lieberman’s perspective. According to Lieberman, we human has both the ability to connect to the social world, and it is the basic needs for us to survive (Lieberman, 2013). Dr. Lieberman explained everything in the society at neurological perspective-