Tuesday, May 19, 2020

Effects of the Bombing of Hiroshima - 779 Words

What is the purpose of an atomic bomb? It’s a weapon that when detonated, can produce massive amounts of heat and radiation, and dropping one of these devices on a city has the potential to kill and maim hundreds of thousands of people. An estimated 150,000 to 246,000 Japanese citizens from the cities of Hiroshima and Nagasaki died from two atomic bombs in 1945 (Frequently Asked Questions). Those who survived the bombings had a greater chance of developing various kinds of cancers and diseases, which many of those people suffered from for the rest of their lives. This can be attributed to the amount of radiation from the bombs they were exposed to. Because of the dehumanizing effects from the use of these bombs and powerful they truly are, and the fact that the primary target of these weapons are innocent civilians, atomic bombs should be outlawed from any further use or tests, and all remaining weapons should be deactivated. As time has passed since the end of WWII, several nations have shown that they no longer need to keep their nuclear arsenals, and they can still be secure on a foreign and domestic level without them. These countries that deactivate their stockpiles are only going to help make the world a more safe and more secure place to live in, without the threat of a global nuclear war. With the establishment of organizations such as NATO and the UN, the threat of global nuclear war has diminished. These organizations can find alternative ways to deal with severeShow MoreRelatedThe Bombing Of Hiroshima And Its Effects On The United States Essay1862 Words   |  8 PagesThe bombing of Hiroshima is one of the most controversial, and debated events in history, that is still contested today. During World War ll (1939-1946) in the year 1941, December 7th, the Japanese bombed Pearl Harbor, Hawaii, thus Japan declared war on the United States (U.S.). The Japanese were eager to take control of Asia, bu t the U.S wouldn’t allow it. Over a year prior to the bombing the U.S. imposed an embargo on aviation gasoline and scrap iron. Instead of backing down Japan invaded otherRead MoreThe Day That Shook the World667 Words   |  3 PagesPearl Harbor Bombing? How about the World Trade Center attack? All of these are major bombings that have happened in the U.S. Sadly, they aren’t the only ones. There have been numerous bombings that our world has survived, but that doesn’t mean we haven’t suffered from their outcomes. The devastation of war on our world is monumental. The atomic bombing of Hiroshima is an important event in history that has affected people greatly throughout the years since that tragic day. The effects of the HiroshimaRead MoreThe Bombing Of Hiroshima1096 Words   |  5 Pages The morning of August 6, 1945 in Hiroshima, Japan did not begin in any exceptional way; in fact the people had no idea that they were about to be part of one of the most significant mornings in all of history. At 8:15 am, the United States Army Air Forces dropped the first atomic bomb, ironically called, when one considers the enormity of the bombs significance, the Little Boy Three days later the U.S. dropped a second bomb nicknamed the Fat Man on the town of Nagasaki, Japan. HistoricallyRead MoreA Closer Look at the Bombings in Hiroshima and Nagasaki1485 Words   |  6 Pageschanged. Two atomic bombs were dropped on the Japanese cities of Hiroshima, and three days later, August 9, 1945, on Nagasaki that ended World War II. Japan had already been a defeated nation from conventional bombs and World War II. Many innocent lives were lost, psychological scars were left on the lives of the bomb survivors, and thus many lives were changed forever. The atomic bombings caused many peopl e to have genetic effects due to the radiation from the bombs. Revisionists have said theRead MoreWas The Bombing Of Hiroshima And Nagasaki Morally Justified?1736 Words   |  7 PagesWas the bombing of Hiroshima and Nagasaki ethically justified? – Why Truman decided to drop the atomic bombs on Japan – By Grace Kelsall World War 2 saw the emergence of America as a new world power on August 6th 1945, also internationally known as the traumatizing day for Hiroshima; after an American B-29 bomber dropped the world’s first atomic bomb. World War Two is considered a great turning point in modern history, it being one of the bloodiest and horrific wars; exposing all countries aroundRead MoreThe Utilisation Of Nuclear Weapons On The Japanese Cities Of Hiroshima And Nagasaki1580 Words   |  7 PagesThe utilisation of nuclear weapons on the Japanese cities of Hiroshima and Nagasaki is a hotly debated topic amongst historians. With the consent of the United Kingdom (UK) and the United States of America (USA) as outlined in the Quebec agreement, the United States of America dropped nuclear weapons on the Japanese cities of Hiroshima and Nagasaki in August 1945, during the final stage of World War II. These two bombings, which killed at least 129,000 men, women and children are considered a triumphRea d MoreHiroshima And Nagasaki Bombing Of Hiroshima1206 Words   |  5 PagesWorld War Two Hiroshima and Nagasaki Bombing The Bombing In 1945, the US dropped 2 atomic bombs on the cities Hiroshima and Nagasaki in Japan, causing hundreds of thousands civilian deaths. Some people say that this act helped to end the world war and save more lives, but others think that it was not needed and wasn t the cause of the Japanese surrender. Sequence of Events 5th August 1945 President gives approval to use bombs 6th August 1945 Bombing of Hiroshima 9th August 1945 Bombing of NagasakiRead MoreTaking a Look at Dropping the H-Bomb on Hiroshima and Nagasaki921 Words   |  4 Pagesbackground Before the bombing of Hiroshima, the United States of America had already mad plans to invade Japan with several operations in the process. While the war in Europe ended on May 8,1945 when Nazi-Germany signed the Instrument of surrender, the Pacific war continued. For many months, the U.S. had dropped as many as 63 million leaflets, intending to warn civilians of an air raid. USA called for surrender from the Japanese armed forces on July 26, 1945 with threats of prompt and utter destructionRead MoreAtomic Bombs And Its Effects On Japan1369 Words   |  6 Pagesimagine how many atomic bombs that have killed many Japanese during, World War II in Japan? On August 6, 1945, a new weapon with a significant explosive power known as the atomic bombs just has been dropped on Japan. The dropping of this weapon on Hiroshima and Nagasaki there were 262,020 civilians were killed. The United States to chose the atomic bomb in order for Japan to surrender and end the war quickly. Likewise, Presid ent Truman as the duty as president and Commander in Chief to protect AmericanRead MoreThe Unjustified Use of Atomic Bombs on Japan865 Words   |  4 Pagesatomic bombs called Fat Man and Little Boy on the Japanese cities of Nagasaki and Hiroshima. The U.S. was not justified in dropping the atomic bombs on Japan because of the locations that were bombed, the terms of the Potsdam Declaration, and the lack of previous bomb testing. Firstly, the bombings were unjustified because of the locations where the bombs were dropped. Neither cities were military or naval bases. Hiroshima was â€Å"†¦ on a river delta and had been a fishing settlement for centuries† (Lawton)

Wednesday, May 6, 2020

Fair Labor Standards Act ( Flsa ) Essay - 1841 Words

In 1996 the amendments to the fair Fair Labor Standards Act (FLSA) was created. This law was established to provide a 50 percent â€Å"tip credit† for tipped workers employers. It allowed tipped workers income from tips to count toward half the regular minimum hourly wage which was guaranteed to workers by the FLSA. Over the years, the federal tipped provision minimum wage dropped to at least 40 percent from 1980 to 1989. During that time period, the amount of tips received by workers has never exceeded half of the regular minimum wage that they should have received. Due to that problem, President Clinton in 1996 signed the Minimum Wage Increase Act. This law eliminated the FLSA provision that required tipped workers minimum wage to stay a certain percentage of the full minimum wage. When the bill signed by president Clinton passed the tipped credit stood at 50 percent. That year in October, the regular minimum wage went $4.25 to $4.75, but the $2.13 for tipped workers stayed the same, which brought the tip credit for employers to be above 50 percent. The federal minimum wage was raised in 2007, 3008, and 2009, but the wage for tipped workers still remain the same (Allegro Cooper, 2014). -When/how did the most recent proposed policy originate? In Bedford, Massachusetts when President Roosevelt was campaigning for reelection, a young lady passed him an envelope. He was unable to receive the note from her because a policeman threw her back into the crowd. President RooseveltShow MoreRelatedFair Labor Standards Act of 1938 (FLSA)758 Words   |  3 Pagesinto place fair employment for those in the workforce. In 1938, congress would pass and President Roosevelt would sign the Wages and Hours Bill, more commonly known as the Fair Labor Standards Act of 1938 (FLSA). This federal statute introduced a 44 hour, seven day work week, established the national minimum wage, guaranteed overtime pay in specific types of jobs at a rate of â€Å"time and a half†, and it defines oppressive child labor, which prohibits most employment of minors. The FLSA applies to thoseRead MoreThe Affordable Care Act Amends The Flsa ( Fair Labor Standards Act )1737 Words   |  7 PagesIntrod uction Section 4207 of the Affordable Care Act amends the FLSA (Fair Labor Standards Act)- Break Time for Nursing Mothers Provisions Breastfeeding is one of the best methods for providing infants with a healthy start to life. Breast milk helps the body fight off various bacteria and viruses that one’s child might be at risk for catching. Breastfed babies are thirty-six percent less likely to die from sudden infant death syndrome and are fifty-five percent likely to become obese later in lifeRead MorePatel V. Quality Inn South1328 Words   |  6 Pagesbenefits in the United States. Despite what individuals believe or disbelieve, under certain acts, codes, laws, and the U.S. Constitution, all aliens have rights, regardless of their immigration status. In this paper I will discuss an overview of the court case, Patel v, Quality Inn South, which deals with an undocumented alien who was able to recover funds from his former employer. I will explain the acts that impacted the case, whether I agree or disagree with the outcome of the case, and my personalRead MoreThe Fair Labor Standards Act Essay1747 Words   |   7 PagesThe Fair Labor Standards Act The Fair Labor Standards Act (FLSA) was passed by Congress on June 25th, 1938. The main objective of the act was to eliminate â€Å"labor conditions detrimental to the maintenance of the minimum standards of living necessary for health, efficiency and well-being of workers,†[1] who engaged directly or indirectly in interstate commerce, including those involved in production of goods bound for such commerce. A major provision of the act establishedRead MoreLabor Law and Human Capital1206 Words   |  5 PagesLabor Law and Human Capital Management Patti L. Jolicoeur Human Resource Management in the 21st Century HRM5004 – u03a1 October 30, 2010 Theresa Pavone Abstract There are many laws and regulations affecting HR Professionals and labor in the workplace. The U.S. Department of Labor oversees these and ensures organizational compliance. The relationship of labor laws and human capital management is a balance of analyzing workforce strengths and vulnerabilities and risk management toRead MoreEssay on Human Resources Analysis1329 Words   |  6 Pagesthere are many labor laws that the cooperate world must up hold by, these laws seem complicated but are actually quite simple once you break them down. For instance, the Fair Labor Standards Act (FLSA) of 1938, as amended, provides for minimum standard for that of both wages and overtime entitlements by employees, and spells out the administrative procedures that needs to be taken by which covered all work time must be compensated for. FLSA also includes provisions related to child labor laws, equalRead MoreThis American (Working) Life1053 Words   |  5 Pages teachers, managers and others are n ot required by law to receive overtime pay (U.S. Cong. Federal Labor). These and other professions are labeled exempt from the Fair Labor Standards Act. An exempt profession, when put on a salary, is not protected by the FLSA and can work as many hours as required with no extra compensation. According to a new bill, S. 1747 The Computer Professionals Update Act , legislators would extend these exemptions to other IT professions (27-31). In a time when it is hardRead MoreAnalysis Of OSHA And FLSA1512 Words   |  7 Pagespaper you will get a brief summary over Occupational Safety and Health Administration, as well as the Fair Labor Standards Act. Through professional experiences I have ran into many violations regarding unsafe work environments, retaliation, and not receiving the correct pay. Title VII, as well as OSHA prohibits retaliation against any employee, who has filed a complaint. The Lily Ledbetter Fair Pay Act of 2009 gives employees the chance to file a complaint of unfa ir pay, in hopes to receive their lostRead MoreMinimum Wage Laws And Labor Unions905 Words   |  4 Pagesthe Fair Labor Standards Act was created to establish a minimum federal wage to serve as a standard wage to reduce poverty and to secure economic growth is shared across the workforce. Today minimum wage is far below its historical levels and loses its value every year due to inflation. The minimum wage workforces are living close to poverty levels, and insist on the government raising the minimum wage. Sometimes the fight to raise the pay for workers goes unnoticed or unheard, so a labor unionRead MoreEssay Flsa Week 6612 Words   |  3 PagesDetermine whether the employee has a potential FLSA claim.  Explain the legal basis for your conclusion.  From an HR perspective list, explain and analyze five things an employer can do to ensure compliance with FLSA and avoid claims. After listening to the FLSA tutorial, Mike does not have a clam. In the tutorial, Mike cited that he was due 36 hours in overtime payment for working out because his work out were related to him building physical strength for work. He also cited that he was given workout

Disaster Recovery and User Authentication Policy in an Organization

Quesiton: Discussion on following points? 1.Disaster Recovery 2. User Authentication Answer: Introduction The aim of this report is to develop and present two procedure and policies on disaster recovery and user authentication in an organization. The focus is kept of an Information Technology Consultancy and how they develop a disaster recovery and a user authentication policy for their organization. For the user authentication policy, the focus will be on password based user authentication policy. 1. Disaster Recovery Policy Name of the Organization: ABC Information Technology Consultancy Disclaimer: This policy has been created for ABC Information Technology Consultancy. All or part of this policy is owned by the organization. No part of it is reproducible in any form. Last Update: 9th March 2015 Overview Disasters can happen anytime. But it is likely that disaster happens rarely. Sometimes management ignores considerations about disasters while managing their core business processes. But this should not be the case. A disaster recovery plan should be developed as early as possible, and the organization needs to follow the same. A disaster can be any event that can cause difficulties in providing service successfully, a disaster is not only the catastrophic environmental issues that may damage resources or hamper services. A contingency plan helps in gaining some competitive advantages on the face of disasters. The disaster recovery plan can be considered as a part of the business continuity plan. Purpose The disaster recovery policy provides a baseline to the disaster recovery plan. The plan is yet to be developed based on this policy. The plan will describe the process of recovering the Information Technology infrastructure including information systems, data, applications etc. It covers up all type of disaster that can cause a bigger outrage. Scope The disaster recovery policy is directed to the information technology management staffs of the organization. They are responsible for keeping the plan up to date and ensuring development and implementation of the disaster recovery plan. This policy will include all requirements that are needed for developing a disaster recovery plan. Policy It is recommended that the disaster recovery policy is reviewed annually for ensuring the relevancy of it. The planning team will be responsible for developing the policy. The planning team consists of personnel from upper management, IT, information security, sales, accounts, human resource etc. The planning team will have the following roles and responsibilities, Carrying out an initial risk assessment to identify the vulnerabilities in the existing information technology infrastructure. Carrying out an initial business impact analysis for documenting the identified interdependencies among the business processes and determining how an outage of the information systems will affect the business. An inventory of the information technology assets like data, information systems, and applications will be considered. The single points of failure present in the current information technology infrastructure will be identified. All critical systems, applications, data will be identified. The core business functions will be prioritized. The organization will follow the procedures described below to implement the disaster recovery policy across the organization. There will be data backup facilities on offsite along with some electronic vaults facilities. It will add redundancy to the IT infrastructure but will enhance reliability. All critical data, applications and systems will be placed is some easily accessible places and in such a way that a disaster cannot effect all resources easily. An incident response team will be created. The team will consists of personnel from IT, information security, legal, HR, marketing etc. The roles and responsibilities of the incident response team will be clearly defined. The contact information of all members of the incident response team will be obtained. A communication plan will be developed for communicating to the incident response team during some disaster. The plan will have all details of the communication methods to be followed for each member. A public relations plan will be developed for handling an incident effectively. A manager from the IT or information security department will be assigned and authorized to carry out the roles and responsibilities of talking important decisions. Testing standards will be developed. The disaster recovery plan will be documented and distributed. The plan will be distributed among all persons who are related to the organization. Extra copies will be kept for emergency use. These extra copies should be kept securely. There will be a succession plan that will describe the actions to be followed in absence of any staff. A detailed study of the data stored across the information systems and storage of the organization will be carried out. The confidentiality of the data will be checked and ensured. A list of the services provided by the organization, will be created. The list will be according to the importance of the services. The recovery plan include policies for short and long term recovery. There will be an equipment replacement plan. It will describe all required equipment for delivering services successfully and according to the service order list. Detailed features of the equipment and contacts for purchasing the same will also be part of the plan. A mass media management plan will be there. The disaster recovery policy will follow some continuous procedures as describe below. Data backup, storage etc. will be performed continuously. There will be some backup plan by categorize the backups weekly, daily, monthly levels. The test plans will be executed at least annually. The results will be reviewed and documented. The plans may be updated if needed. The plans will be analyzed regularly to ensure alignment of the plan to the business processes, objectives and requirements of the business. All team members will be frequently trained and educated by disaster recovery and security awareness educations. The network diagrams and information security policies will be updated regularly. Patching and bug fixing will be done regularly to ensure security of the critical applications and data used by the information systems. There will be regular information security audits and vulnerability assessment. After developing a disaster recovery plan, the management will test the implementation of the plan. It will help to uncover the cases where the plan may fail. And corrective options or extension of the plan can be developed. Policy Compliance There may be set of methods that will help to ensure compliances with the disaster recovery policy. For example, there may video monitoring, internal and external audits, reports from business rolls, feedback from the owner of the policy etc. The management should approve any exception to the policy during the early stage of implementation of the policy in the organization. The staffs, who may fail to comply with the disaster recovery policy, will be subjected to different disciplinary action. Even they may be terminated from their job. Other Standards, Policy or Procedure None Revision History Version Date Description of Changes 1.0 Creation of the policy 2. User Authentication Policy Name of the Organization: ABC Information Technology Consultancy Disclaimer: This policy has been created for ABC Information Technology Consultancy. All or part of this policy is owned by the organization. No part of it is reproducible in any form. Last Update: 9th March 2015 Overview Use authentication is a broad domain and applicable to many situation. This user authentication policy covers the simpler user authentication method based on user name and passwords. This policy will cover best practices to provide user name and password based authentication process, how to secure the passwords, what are needed to be avoided etc. Use name and password based authentication can be applied to different cases. For example, it can be used to secure user accounts, email accounts, access to computer, smart phones, tablet etc. ABC Information Technology Consultancy uses username and password based authentication process to secure their IT resources like computers, restricting access to database, securing email accounts of the users. Purpose This user authentication policy will provide a baseline for the user authentication plan and information security policy for the organization. The purpose is to secure information technology resources from unauthorized access and at the same time ensuring availability of the same to the legitimate users only. This policy is applicable to the computers, emails, accounts of the employees in the MIS system of the organization, user accounts to the database. (Heng, 2009) Scope The user authentication policy is directed to the staffs of the ABC Information Technology Consultancy. They need to adhere to the policy to ensure information security implementation and access policies to the information security resources. User authentication policy covers a significant part of the information security implementation at the organization. This policy will include all details to ensure user authentication process based on username and passwords, at different types of applications and scenarios at the organization. Policy The policy contains information about the password creation and management along with best practices to follow for ensuring the user authentication process. (Janulaitis, 2007) Creation of Passwords While creation of username and password, following factors are needed to be considered. There should be some password construction guidelines that will ensure the strength of the password. The strength of a password refers to the complexity in guessing the password by some third party. Password construction guidelines can ensure strong password constructions by limiting length and pattern of the password. A user is supposed to follow the guidelines. All system and user level passwords should be generated by following the password construction guidelines. Users must not use their name, birthdays, company names or other similar kind of personal or trivial information as a part of their username and password. Same username and password should not be used for more than one accounts like email accounts and database user accounts. (Kizza, 2015) There will be system level privileges to a group of users while granting access to the information technology resources of the organization. But users should change the default username and password as soon as possible. They should use some personalized username and password combination for the same. System administrators are responsible to grant access or revoking access rights. Thus a system administrator will have master password to unlock any account of the database system. But the master passwords should be complex enough and should be changed periodically. The password is also needed to be kept secure. It should not be shared with any persons other than the authorized entities. In the organization, wherever, SNMP or Simple Network Management Protocol has been used, then the community string should be different from the trivial or default private, public or system related information. Again the password construction guidelines are to be followed in constructing the community string. Changing Passwords There are several system level passwords. For example Root level, Admin level, administration level, applications etc. These passwords are needed to be changed periodically. At least after two months. (Khosrowpour, 2003) User level passwords like email, computers, websites, user accounts etc. are needed to be changed periodically, at least once in six months. There should be some checking by using different password cracking methods. This kind of checking will ensure to measure how stronger the passwords are in the face of some attack. The passwords that are cracked, should be changed immediately and some stronger password should be used. Protection of the Passwords Users must not share their username and passwords with anyone. Passwords are to be handled as highly confidential and sensitive information. If there is some legacy system that does not support proxy system then proper measurements should be taken. Passwords should not be written on some document on the system, email messages etc. if it is needed to be shared, then proper encryption should be used. And the password should be changed after that. Password should not be shared by telephonic conversation. Password should not be revealed in any form or questionnaire. Even there may be some scope to provide password hint but it is recommended not to provide some explicit hint or some hint at all. No staffs of the organization must share the system level passwords with any other. Passwords are not to be written on some hard copies or somewhere. Do memories the passwords. It is recommended not to use Remember me options on office computers. Dont save the username and passwords on web browsers. If any user suspect that his/her passwords and username have been compromised, then he/ she should contact to the information security department as soon as possible. He/ she is recommended to change all username passwords of all accounts belonging to him/ her. Development of Application Being an information technology consultancy, ABC Information Technology Consultancy works on application development. User authentication plays important roles in this domain also. Following factors are to be considered while ensuring implementation of user authentication policy in application development. The developed applications should have proper implementation of user authentication in those. All security measurements, policies and best practices are to be followed while developing the applications. The applications should have support for individual users. Groups can be used only where it is needed. Applications should not store passwords without encryption. It should not display the passwords in textual format also. If passwords are needed to be transmitted over some network or Internet, then encrypted version of the passwords should be shared instead of the raw password in text format. There should be implementation of role management in the applications. Users should be able to use functions of the application without any requirement to know passwords of others. Passwords and Passphrases This is a specific area of user authentication based on authentication by private and public keys. There should be a mathematical relationship between system and public key. Public key will be known to all. On the other hand, the private key will be known to the user only. User need some passphrase to gain access to the system and unlock the private key. (SANS Institute, 2014) A passphrase is a type of longer password containing multiple words. This is used to ensure security against dictionary attacks. There will be combination of upper and lower levels of alphabets, special characters etc. Compliance with the Policy There will be set of different methods and tools to ensure and check compliance with the user authentication policy. Some methods and tools are password cracking methods and tools, internal and external information security audits, feedback from the owner of the policy. The information security team can approve the user authentication policy in advance or along with the information security plan. If any staff does not comply with the user authentication policy then the staff may face legal issues or may be expelled from the job. Other Standards, Policy or Procedure Guideline for password construction Revision History Version Date Description of Changes 1.0 Creation of the policy References Apelbaum, Y., 2007. User Authentication Principles, Theory and Practice. s.l.:Fuji Technology Press. Cumbie, B. A., 2008. The Role of Information Technology in Effective Recovery and Aiding Sustainability of Coastal Regions After a Disaster. s.l.:ProQuest. Fallara, P., 2003. Disaster recovery planning. s.l., IEEE. Heng, G. M., 2009. A Manager's Guide to Implement Your IT Disaster Recovery Plan. s.l.:GMH Continuity Architects. Hiatt, C. J., 2000. A Primer for Disaster Recovery Planning in an IT Environment. s.l.:Idea Group Inc (IGI). Information Resources Management Association, 1999. Managing Information Technology Resources in Organizations in the Next Millennium. s.l.:Idea Group Inc (IGI). Information Resources Management Association, 2002. Issues Trends of Information Technology Management in Contemporary Organizations. s.l.:Idea Group Inc (IGI). Janulaitis, M. V., 2007. Disaster Recovery - Business Continuity Plan Template. s.l.:Janco Associates, Inc.. Khosrowpour, M., 2003. Information Technology and Organizations. s.l.:Idea Group Inc (IGI). Kim, T.-h. Fang, W.-c., 2010. Security Technology, Disaster Recovery and Business Continuity. Jeju Island, Springer. Kizza, J. M., 2015. Guide to Computer Network Security. s.l.:Springer. Kouns, J. Minoli, D., 2011. Information Technology Risk Management in Enterprise Environments. s.l.:John Wiley Sons. Management Association, 2013. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications. s.l.:IGI Global. Mattord, M. W. H. Green, A., 2013. Principles of Incident Response and Disaster Recovery. s.l.:Cengage Learning. Microsoft, 2013. Authentication Policies and Authentication Policy Silos. [Online] Available at: https://technet.microsoft.com/en-in/library/dn486813.aspx [Accessed 9 March 2015]. O'Gorman, L., 2003. Comparing passwords, tokens, and biometrics for user authentication.. s.l., IEEE. Ruiz-Martinez, A., 2013. Architectures and Protocols for Secure Information Technology Infrastructures. s.l.:IGI Global. SANS Institute, 2014. Disaster Recovery Plan Policy - SANS Institute. [Online] Available at: https://www.sans.org/security-resources/policies/general/pdf/disaster-recovery-plan-policy [Accessed 9 March 2015]. SANS Institute, 2014. Password Policy - SANS Institute. [Online] Available at: https://www.sans.org/security-resources/policies/general/pdf/password-protection-policy [Accessed 9 March 2015]. Senft, S., Gallegos, F. Davis, A., 2012. Information Technology Control and Audit. 4th ed. s.l.:CRC Press. Watters, J., 2013. Disaster Recovery, Crisis Response, and Business Continuity. s.l.:Apress.