Tuesday, December 31, 2019

Interaction between Political and Social Life in Ancient...

Interaction between Political and Social Life in Ancient Imperial Rome The interaction between political and social life in Ancient Rome has been accurately portrayed in the well researched novel, The Course of Honour, by Lindsey Davies. However as this is a fictional novel told as an interesting story instead of fact, the information given must be corroborated with several primary sources to correct any inherent biases. Lindsey Davies is an author who specialises in writing about life in Ancient Rome. Her novels are famous for the detective work of Marcus Didius Falco, with books such as Last Act in Palmyra, Venus in Copper, A Dying Light in Corduba and The Iron Hands of Mars winning her the Sherlock Holmes Award for†¦show more content†¦83) But when Vespasian, in the course of his general triumph, restored stable government to Britain... (Tacitus, p.68) As well as being a strong source of information about political life during this time, the novel also catalogues the struggles faced before and after marriage by Vespasians mistress, the freedwoman Caenis. Their forbidden relationship is threatened as Vespasian reaches the height of his political career. Caenis was but a footnote mentioned in history which Davies has sanctified into a wonder woman without whom Vespasians career could not have possibly succeeded. This obvious glorification of a story is an example of a bias used to make a tale more interesting, and the lack of historical sources commenting on Caenis only proves that she is nowhere near as important as Davis makes her out to be. Regardless, this novel achieves its aim as an interesting secondary source of information on Imperial Rome from two totally different perspectives- that of a slave and freedwoman, and that of an emperor. It showcases very suitably both the social and political struggles which are faced in upkee ping this unlikely relationship. There are different viewpoints on the way slaves were treated in Imperial Rome. Caenis in the story is first portrayed as a faithful and respectful slave, claiming I know how to keep my mouth shut, any sensible slave does! (Davies, p.17) This restricted form of life is backed up by this quote by a primaryShow MoreRelatedThe Important of Cities in Roman Provinces Essay1179 Words   |  5 Pageseconomic assemblies. The Roman cities were as much an arena for social and political interaction, as they were for economic exchange. By studying urban development in the Roman society, we are able to get an inside perspective of the powerful insight that have changed the ideals of the Roman cities. Early authors often measured cities to be centers of learning and culture, and a qualification for a civilized society. It was these ancient authors who believed that territories were an important and essentialRead MoreAp World History Units 1-3 Study Guide Essay4374 Words   |  18 Pagesduring the Paleolithic Age, social organization was characterized by * A rough social equality 3. The earliest metal worked systemically by humans are * Copper 4. The spread of the Bantu-speaking peoples over southern Africa can be best explained by their * Knowledge of agriculture 5. Characteristics of complex civilizations * Specialization of labor * Trade and cultural diffusion * Written languages * Complex political order and power 6Read More Rome: The Eternal City Essay2264 Words   |  10 PagesRome: The Eternal City Problems with format ?The history of Rome is shrouded in myth and legend.? Tales of glorious victories, conquering heroes, and vanquished foes color our perception of this legendary city.? Myth and reality are so closely intertwined that we would be remiss to examine the one without the other.? From a cluster of humble villages, arose a mighty people who would capture the admiration of the world for centuries thereafter.? To look at the history of Rome is to look atRead MoreWorld History AP8768 Words   |  36 PagesAll empires were brought together by conquest and funded in part by extracting wealth from conquered peoples. †¢ All empires stimulated the exchange of ideas, cultures, and values among the peoples they conquered. †¢ All empires sought to foster an imperial identity that transcended more local identities and loyalties. †¢ All empires ultimately collapsed. 2. In what ways did these empires differ from one another? What accounts for those differences? †¢ Some empires sought to rule through local elites;Read MoreAs The Barbarians Took Control Of Territory, The Greatest1849 Words   |  8 PagesAs the barbarians took control of territory, the greatest cultural change was in who held power at the highest levels of society. Eventually, the Roman Empire grew too expansive for the imperial bureaucracy to govern the Western regions (Hitchner, Jan-May 2016). Both the fact that the imperial bureaucracy was so intrinsic to the everyday running of the empire and the fact that elites had lost both their local influence and military authority would have meant that any breakdown within the administrationRead MoreThe Forum Pompeii3379 Words   |  14 PagesThe Forum Historians consider the Forum to be the ‘centre of Pompeian life’ therefore it is an important aspect to study as numerous buildings and many events occurred there. From the latest evidence, it is believed that the Pompeian Forum was undergoing a ‘comprehensive, vigorous and ambitious post-earthquake restoration.’ (Bradley. 2005, p.87). The Forum at Herculaneum, however, is still buried under the town of Resina and therefore there is not enough physical evidence to provide a great depthRead MoreChristianity in Rome2890 Words   |  12 Pagesï » ¿ Christianity and the Roman Empire Religion played a key role in the daily life and social system of Ancient Rome. Religion included the worship of many gods and more gods were often adopted from conquered areas. Because most religions were polytheist at the time, the Romans rarely disallowed a cult from a conquered region to continue. A few  cults ran into controversy and opposition from citizens or government, such as the cult of Deus Sol Invictus, and that of Isis. Romans were also not keenRead MoreBig Geography and the Peopling of the Earth Essay3366 Words   |  14 PagesMidterm Review 1.1 Big Geography and the Peopling of the Earth 1. Archeologists believe that the decisive differentiation between humans and apes occurred from 6 to 8 million years ago. 2. They have interpreted to different DNA analysis of bone fragments to show bipedalism. From the creature Ardepithecus ramidus, many different species of humans have developed from there. 3. Humans first appear on Earth in the Paleolithic Age where they inhabited all continents except for Antarctica. Homo sapiensRead MoreBusiness Environment of Pre-British India13645 Words   |  55 Pagesunique culture. Our project aims at understanding all these impacts in a consolidated way and help us understand our past. Our project covers the eras from the stone age man till the Mughal era and all the impacts, the technological advancements, the social system, the economic policies and the unique system of administration which has helped shaped our country today. Table of Contents Pre-Historic India ..............................................................................................Read MoreEssay about What is World History?4758 Words   |  20 PagesWhat is world history? Bruce Mazlish contends that world history, as opposed to global history, is the study of systemic processes of interaction among diverse peoples, best typified by the work of William H. McNeill. By contrast, global history is the history of globalization, a process that Mazlish argues did not begin to occur on a significant scale until at least the 1950s, and, more plausibly, the 1970s. Citing prominent economic historians, Nicholas Kristof asserts that globalization

Monday, December 23, 2019

Suicide Among Teen Victims Of Cyberbullying Essay - 890 Words

Suicide among Teen Victims of Cyberbullying Suicide among teens who were victims of cyberbullying has been an ongoing issue for quite some time. Legally, cyberbullying is very problematic not only for the victims and their families, but also the justice system. What is considered cyberbullying is and because cyberbullying is committed by school age children there is an ethical issue in what is considered as an appropriate legal punishment and which branch of the government should be the one to pursue justice for cyberbullying victims (MacKay, 2015). Mackay became advocate and joined the Nova Scotia Task Force on Bullying and Cyberbullying after an array of young teenage women committed suicide. The apparent links to their suicide was the constant physical and digital bullying. Background Social media is the ultimate platform for bullies. Using social media, perpetrators can bully their victims to the point of anxiety, fear, low self-esteem, suicidal ideations and in some cases to the committal of the suicidal act. Cyberbullying is defined as the deliberate repetition of hostility toward a group or persons with the intent to induce psychological, emotional, or physical harm through the use of digital communication (Niels, Menno, et. Al, 2013). A study conducted in 2014, stated that nearly 75% of school age youth have been the victim of cyberbullying (Giumetti, Kowalski, et al., 2014). Digital communication, although thrives on relationships, aids in a consequence freeShow MoreRelatedCorrelation Between Suicide Rates And Cyberbullying1292 Words   |  6 PagesEmily Gray Cervelloni Eng 121, Section 3 26 September 2016 Correlation Between Suicide Rates and Cyberbullying The 21st Century is roaring, and the use of technology sweeps across the nation like a pandemic. The American lifestyle is being consumed by electronics. Due to the increase of technology, childhood is rapidly transforming and evolving. No longer do children only thrive in fresh air and on playdates, but also with tech savvy gadgets and computers. Children are currently part of a digitalRead MoreEssay On Cyberbullying969 Words   |  4 Pages Cyberbullying is growing and becoming one of the leading causes of teen suicide. Cyberbullying occurs when a person posts or messages someone in a negative way online. It can include threats, harassment, and even smearing someone’s name by spreading lies. The web’s anonymity provides the perfect cover for bullies to harass classmates or even mere strangers. Cyberbullying is usually not a hit and run, bullies target one teen and insult or spread rumors about them, not realizing that if caught, theyRead MoreCorrelation Between Suicide Rates And Cyberbullying1332 Words   |  6 PagesCorrelation Between Suicide Rates and Cyberbullying The twenty first century is roaring, and the use of technology sweeps across the nation like a pandemic. The American lifestyle is being consumed by electronics. Due to the increase of technology, childhood is rapidly transforming and evolving. No longer do children only thrive in fresh air and on playdates, but also with tech savvy gadgets and computers. Children are currently part of a digital generation that has sprouted in a world immersedRead MoreArgumentative Essay On Cyber Bullying1705 Words   |  7 Pagesidea of cyberbullying is truly frightening, and the arrival of modern technology and the rise of social network make it even worst. With the invention of the Internet and its mass commercial use, some people might not have foreseen the issue of â€Å"cyberbullying† and how harmful it can really be. Cyberbullying is a real phenomenon that has been present for some time. Cyberbullying is defined as the use of the Internet and technology to purposely harm another pe rson in a hostile way. Cyberbullying has becomeRead MorePersuasive Essay On Cyberbullying1068 Words   |  5 PagesHow to Stop Cyberbullying First, I will explain how a student got cyberbullied and never reported it, Then I will explain how this girl was trying to commit suicide and tried, but it didn’t work (which is a good thing) Finally, I will describe how she got better and how she tried to stop it specifically how she did stop it. What is Cyberbullying? Cyberbullying is when someone uses of electronic to send messages of intimidating or threatening. Over half of teens worldwide have been cyberbulliedRead MoreCyberbullying And Its Effects On Our Society938 Words   |  4 PagesBullying in the Digital Time Cyberbullying is the use of electronic devices with the intent of inflicting harm on another. Cyberbullying has steadily increased with new technology. Many international organizations and campaigns have emerged to defend the victims of this crime. An anti-bullying organization came about by youth in Canada to address the issues surrounding bullying in our society. This advocates for bullying awareness online, insisting that not enough government attention has been givenRead MoreCyberbullying Is Becoming More Of A Problem Than Traditional Bullying998 Words   |  4 PagesCyberbullying is becoming more of a problem than traditional bullying, more kids are getting social media and bullying others each and every day. This type of bullying continues to grow with the amount of technology that is coming out into the world. Cyberbullying does not get taken as serious as traditional bullying. It is becoming a huge problem in this day in age and needs more attention than it is getting. Socia l media is a huge factor for this type of bullying to take place. Nobody takes itRead MoreCyberbullying: The New Form Of Bullying. When Sending Our1661 Words   |  7 PagesCyberbullying: The New Form of Bullying When sending our children to school we expect them to be able to learn without distractions, but bullying makes that impossible. Bullying has been recognized as a problem for school children globally. In fact, school bullying has proven to be a risk factor for suicide, which has been identified as one of the top causes of death among teens (Erick Messias, 2014). Now that bullying and its importance has been acknowledged as a critical concern, several preventionRead MoreCyberbullying And Its Effects On Society Essay1731 Words   |  7 PagesCyberbullying is a prevalent issue in our society due to the rise of technology. Teenagers and children are more connected to the internet than ever before and are in danger of cyber bullying. People can be bullied for a multitude of reasons, the number seeming to grow every year. Some children are cyberbullied because of their physical appearance, sexual orientation, for sexting, for their mental disabilities or for simply existing. This form of bullying is so dangerous because it is very difficultRead MoreThe Issue Of Teen Suicide1135 Words   |  5 PagesSouth and was asked to take a survey about teen suicide. At the time, I served as a volunteer in the emergency room, and as a member of the hospital, it was required to take these types of surveys about once every month. These surveys usually are composed of the main crippling diseases of America: Heart Disease, Diabetes, Obesity, etc. However, this survey concerned the topic of teen suicide. I wasn’t shocked by this topic matter. I knew that teen suicide has been rapidly increasing over the past

Sunday, December 15, 2019

Radicalism of the American Revolution Free Essays

Essay 1 â€Å"Radical†, a term generally defined by many as an event or action that fundamentally changes the political, cultural, and/or economic nature of a society. The American Revolution was a time of great change within the structure of society, greatly transforming certain parts of America, yet leaving other parts relatively unchanged over the course of the Revolutionary period. When asked whether or not I consider the Revolution to be â€Å"radical†, I can give no absolute yes or no response. We will write a custom essay sample on Radicalism of the American Revolution or any similar topic only for you Order Now Instead I will have to take more of a â€Å"grey area† approach to the question and say a bit of both yes and no, because although the revolution did change quite a bit, there were still areas it was unable to change. In my opinion, I would say the American Revolution was â€Å"radical†, but only to a point. Some of the most important changes that the Revolution did make in American society were focused heavily on expanding and redefining political freedom throughout the country, and establishing religious tolerance. One important way that the revolution did not change the American society was in social hierarchy. Prior to the American Revolution, politics consisted of many voting, but few actually holding any kind of political power, those who did have power not listening to voters, no parties, and few public political arguments. During the Revolution, however, many Americans had a much more powerful voice in politics. This newfound power was due to an ending of old governments and authority, and the fundamental â€Å"need to reinstitute legitimate governments†. Election campaigns also became very public arguments over what the government â€Å"should† be, this is very different than what the political scene was in post-Revolution Colonial America. Some of the most radical movements can be seen in the Revolution in Pennsylvania. In Pennsylvania, the pro-independence radical took control, abolishing such political offices as governor. The issue of voting rights was also a very contentious subject in politics. John Adams believed that the â€Å"common rabble† of men in the country had no â€Å"judgment of their own†, and the removal of a property qualification to vote would â€Å"confound and destroy all distinctions, and prostrate all ranks to one common level†. Pennsylvania, for one abolished the property qualification for voting, but retained the tax payment qualification, whereas other states did away with both. Prior to the Revolution, only a few colonies embraced religious tolerance, those being Rhode Island and Pennsylvania. Most of the colonies in the country still had established state churches. However, colonists began to regularly associate religious freedom with â€Å"liberty† and evangelicals particularly supported this movement towards religious liberty, having suffered much oppression, and believing that â€Å"government corrupted religion†. An assault on state churches developed with The Elites, a. k. a. , Founding Fathers agreeing that religion could be potentially dangerous when apart of government. This â€Å"Enlightened† religion argued that religion had often supported unjust governments. Most of them would have been Deists. Deism, a popular belief among elites in the 1700s, held belief in God, but that he was rarely and distantly involved in human affairs, and viewed many Christian beliefs as superstition. Thomas Jefferson in his Notes on Virginia, 1782 saying that â€Å"The whole history of these books is [the Gospels] is so defective and doubtful that it seems vain to attempt minute enquiry into it†. The Bill for Establishing Religious Freedom was a Virginia bill introduced by Thomas Jefferson in 1779. The bill eliminated religious requirements for voting and office-holding, eliminated government finance for religion, and barred the state from forcing participation in religion. One important way that the Revolution did not change the American Society was in social hierarchy. Although the American Revolution changed many things, it still left some unchanged, like the much higher sociopolitical power of the upper class aristocrats within the country. The social classes were arranged from highest to lowest as such: Upper class, merchants, tradesmen, farmers, working men, indentured servants, slaves, and finally Indians. Not much had changed since Colonial America with the wealthy upper class controlling much of everything from politics to religion. Slavery continued, women had no rights whatsoever, and the system was simply not open to all white men yet. Wealth always made a difference, as it usually does. They were the land owners, the voters, the senators and congressmen. Normal people couldn’t be or do any of these things without having the money and success. In conclusion, the American Revolution, in my opinion, can be seen as partly â€Å"radical† and partly not. Similar to many other revolutions, it could not have changed every single thing overnight, and in fact, it did not. But there is no denying that, at least then, it did radically change things in the country, but also left some the same. How to cite Radicalism of the American Revolution, Essay examples

Saturday, December 7, 2019

Deep Root Analytics and Data Breach †Free Samples to Students

Question: Discuss about the Deep Root Analytics and Data Breach. Answer: Introduction: Elections are always a tightly contested event, an attribute that facilitates a lot of scrutiny and tension. In todays world, this process has been marked by many technological advances which aim to improve the process through time and resource efficiency. Now, while these advances may facilitate better results, they also are associated with many problems because of the amount of data that is used. These problems have been well illustrated in 2017, where multiple hacks and data exposure incidences have occurred over electoral processes. This year alone countries such as Georgia, Philippines and Mexico have had extensive data leaks in their voter registration records, an outcome that has facilitated a great deal of speculation(Cappella, 2017). However, of all the incidences recorded, none has topped the recent leak in the American voter registration where over 198 million records were fairly exposed to the public at large. This incidence occurred in June and was subject to millions of records that dated back to a decade ago, accounting for a significant amount of the records held by the countrys electoral commission. Nevertheless, prior to the breach, the data was held by an independent data analytic company known as Deep Root. This company had been contracted by the Republican Party in order to conduct a research on the opinions held by the American voters. Therefore, at the time of the leak, thousands of records detailing names, addresses and personal opinions on political issues were held by the companys systems. Furthermore, the contracted company did not discover the problem by itself but was facilitated by an independent research group (Upguard) who through their researcher Chris Vickery found the data online(Halper Dave, 2017). How and why the leak occurred The Republican National Committee (RNC) had contracted the company at hand in order to conduct a general survey on the prevailing conditions of the country. Through this survey, Deep Root had collected and analysed data as given by the American voters. Now, at the time of the leak, the general public speculated that sophisticated tools and techniques were used to breach the companys systems in order to reveal the records. However, research conducted revealed a contrary observation as the leak was traced back to a negligent user within the contracted company (Deep Root). This employee had failed to implement critical security procedure needed to safeguard the information(Naylor, 2017). Data leak, how? To start with, the company either intentionally or unintentionally disabled its security protocols across its online platform. This failure inevitably facilitated any user to access clear text files that had the records of the voters. Moreover, the company had leased cloud facilities from the Amazon Web Service (AWS) which gave access to the stored data. Therefore, the data leak was as a result of negligent user behaviour which exposed a cloud infrastructure containing the data. Furthermore, following the leak, data experts verified the content exposed which highlighted the authenticity of the exposed information. This outcome outlined the level of access given to the third party member, who held sensitive records with minimal security procedures(Naylor, 2017). Why it occurred: To understand the root cause of the problem, one must examine the infrastructure used by Deep Root, RNC contracted Analytics Company. The company chose to host the data in an online system, specifically the Amazon S3 servers which like any other cloud service was associated with many risks as compared to in-house storage facilities. For one, it was supported by the internet which is well known for its extensive threats as propagated by malware and intruders attacks. Therefore, the company even without the data exposure placed the sensitive data at risk by applying a cloud infrastructure. Furthermore, the same structure required extensive security procedures to protect the data stored, which again was compromised based on the companys negligence(Digg, 2017). According to cyber security experts, cloud solutions are prone to many risks as they are facilitated by the internet. Moreover, the cloud infrastructure like any other IT system is subject to misconfigurations and deployment errors which unlike other in-house systems expose the services to the public. Therefore, as the first solution, the sub-contracted company should have used in-house facilities if they lacked the necessary skills to set-up a competent and secure cloud infrastructure. Secondly, the same company should have had better security procedures more so, when they dealt with the transmission and deployment of data(Assange, 2017). In addition to this, the leaked data was exposed in clear text format which highlighted the lack of encryption protocols. To avoid this problem, technical solutions including cryptographic techniques such as authentication and encryption should have been used to secure the data. In the future, the contracted company (Deep Root) should isolate the data from its other operations through these encryption methods. In essence, the voters records should be transformed into unreadable formats during their transmission. Moreover, the same data should be ferried via secure channels that are only accessible to the authorised members. Therefore, the site used by the company should have separate platforms for accessing the data, either through live portals that require access pins or through customised user applications (APIs). Finally, the company including the RNC should set a better security policy following a thorough risk assessment procedure. This procedure would identify the potential ris ks faced by the systems and facilitate the development of a procedural guideline of deploying data online(RBS, 2016). Throughout the years, many cyber-attacks have occurred across the world affecting multiple systems either individually or simultaneously. However, none has ever surpassed the intrusion level that was acquired by the now famous WannaCry attack. In general, the WannaCry attack was a malware intrusion that was classified as a ransomware as it forced its victims to pay money in order to access their files or data. In essence, the malware would block and deny users access to their computers until a certain fee was paid(News, 2017). Moreover, the attack was so intrusive that researchers changed its name to WannaCry from its initial name of WannaCrypt0r, a true testament to its actions that caused unprecedented pain. According to researchers, the WannaCry problem began in February when the National Security Agencys (NSA) systems were accessed which led to an exposure of its hacking tools. Now, this access or hack was conducted by a vicious cyber-criminal group known as Shadow Brokers who in past had succeeded to infiltrate some high-level cyber systems. Shadow Brokers through their access revealed a vulnerability in Windows systems which was heavily exploited to conduct the WannaCry attack. In all, the problems caused by the intrusion were experienced far and wide as countries such as United Kingdom, Russia, and Spain were forced to shut down their systems in order to contain it. Moreover, the attack infiltrated any system connected to the networks targeted by the intruders through the malware(Wattles Disis, 2017). Affected parties and how? At its best, WannaCry was the true definition of a cyber-weapon as it infiltrated thousands of online systems in a short period of time. In fact, at the start of the attack, more than 40, 000 computer systems were affected throughout the world. At the same time, more than 100 countries were affected as both their private and public sector systems were infiltrated. However, some countries faced the full force of the attack as evidenced by the damages exhibited by the aftermath of the attack. The United Kingdom (England) was one of these countries as it faced the biggest intrusion in the public sector after its healthcare industry was compromised through its national healthcare system (NHS)(McGoogan, Titcomb, Krol, 2017). In essence, the country used a single and common system to coordinate medical operations, a structure that was facilitated by the online infrastructure. Now, following the attack, medical practitioners and patients were subjected to a $300 ransom in order to access t heir files an outcome that halted the entire industry. The same outcome was experienced in Spain where the private sectors led by the telecommunication and electrical industry was compromised. Similarly, Russia had to deal with a possible economic meltdown after the banking industry was severely affected by the attack on its leading financial institutions. Furthermore, the same country was left helpless when it failed to secure its public sector after the attack took down two of its major ministries, health and interior governance. In addition to this, Russias state owned railway company was affected which for short while slowed down the transportation industry(McGoogan, Titcomb, Krol, 2017). All the independent observers and researchers involved highlighted the contribution of the NSA in the attacks. The NSA through their hacking tools had developed a vulnerability known as EternalBlue, this vulnerability exploited a major bug in Windows operating systems a component that was used in the attack. Now, the Windows system used a special communication protocol known as the Server Messaging Block (SMB) to conduct its networking operations. These operations were conducted within the application layer of the TCP/IP structure where they facilitated the sharing, reading and writing of computer files. Therefore, through the SMB, the users were able to share services and resources(Graham, 2017). WannaCry used this vulnerability within the SMB protocol to access its functionalities and spread the malware in networks. At first, the malware would detect network connections particularly those lacking secured ports to trigger the attack. After accessing unsecured ports, the intrusion would then proceed to plant the starter for the malicious program, an action that was termed as the transfer of the payload. This step was then followed by the activation of the program, an action that attacked the host machine and facilitated the spread of the malware as it proceeded to replicate in any other visible and unprotected networks/ports(McGoogan, Titcomb, Krol, 2017). Preventing the WannaCry attack Several prevention tactics would have been used to stop the WannaCry attack, including the most basic and obvious precaution of being offline. However, based on the demands and needs of the internet, the best solutions would have been related to an online connection. First, network isolation would have helped to contain the attack, a countermeasure that was readily available with firewalls and intrusion detection systems. Now, these firewalls through their servers would have implemented isolation DMZs (demilitarised zone). It is through these servers that the intrusion would have been detected and thus contained within them. Moreover, the same outcome could have been achieved if the victims networks were isolated based on their use(Newman, 2017). In addition to this, the networks and their access ports should have been secured to block all unauthorised users. This functionality would have been easily accomplished using access control and effective network authentication measures. However, of all the solutions and countermeasures highlighted, none would have surpassed the fix for the EternalBlue vulnerability. In essence, the attack was generally caused by the bug in the Windows systems, a problem that was later fixed using an update patch. Therefore, installing the patch to the Windows bug would have prevented the entire attack(RBS, 2016). References Assange, J. (2017). Deep Root Analytics behind data breach on 198 million US voters: security firm. DW, Retrieved 30 August, 2017, from: https://www.dw.com/en/deep-root-analytics-behind-data-breach-on-198-million-us-voters-security-firm/a-39318788. Cappella, N. (2017). 198 million voter records leaked by analysis firm. The Stack, Retrieved 30 August, 2017, from: https://thestack.com/security/2017/06/20/198-million-voter-records-leaked-by-analysis-firm/. Digg. (2017). If You're A Registered Voter, Your Personal Data Was Likely Exposed By A Data Firm . Digg, Retrieved 30 August, 2017, from: https://digg.com/2017/registered-voter-data-breach. Graham, C. (2017). NHS cyber attack: Everything you need to know about 'biggest ransomware' offensive in history. The Telegraph, Retrieved 30 August, 2017, from: https://www.telegraph.co.uk/news/2017/05/13/nhs-cyber-attack-everything-need-know-biggest-ransomware-offensive/. Halper, E., Dave, P. (2017). A Republican voter data firm probably exposed your personal information for days and you don't have much recourse. Los Angeles Times, Retrieved 30 August, 2017, from: https://www.latimes.com/politics/la-na-pol-gop-data-breach-20170619-story.html. McGoogan, C., Titcomb, J., Krol, C. (2017). What is WannaCry and how does ransomware work? The Telegraph, Retrieved 30 August, 2017, from: https://www.telegraph.co.uk/technology/0/ransomware-does-work/. Naylor, B. (2017). Firm Contracted By Republican Groups Left Millions Of Voter Files Unsecured Online. npr, Retrieved 30 August, 2017, from: https://www.npr.org/2017/06/19/533551243/firm-contracted-by-rnc-left-millions-of-voter-files-unsecured-online. Newman, L. (2017). The Ransomware Meltdown Experts Warned About Is Here. The wire, Retrieved 30 August, 2017, from: https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/. News, B. (2017). WannaCry ransomware cyber-attacks slow but fears remain. Technology, Retrieved 30 August, 2017, from: https://www.bbc.com/news/technology-39920141. RBS. (2016). Data Breach QuickView Report. 2016 data breach trends year in review, Retrieved 30 August, 2017, from: https://pages.riskbasedsecurity.com/hubfs/Reports/2016%20Year%20End%20Data%20Breach%20QuickView%20Report.pdf. Wattles, J., Disis, J. (2017). Ransomware attack: Who's been hit. CNN Tech, Retrieved 30 August, 2017, from: https://money.cnn.com/2017/05/15/technology/ransomware-whos-been-hit/index.html.