Tuesday, December 31, 2019

Use of Cell Phones While Driving - 824 Words

If you are driving at 55mph for 5 seconds in that amount of time you could cross a football field. People don’t understand how dangerous distracted driving really is. All states should have some sort of legal parameters of what happens when you get caught using your cell phone while driving. People should get a stronger/ harsher punishment for the use of a cellular device while driving. People are way more impaired when you are distracted and driving than you are drinking and driving. The problem with this is that so many people do it and it is so unbearable hearing so many stories of how many people die every year because they make the mistake. So many people drive and use some kind of cellular device. In 2009 distracted driving caused†¦show more content†¦Drinking while driving laws are much, much harsher than distracted driving. The Arizona state laws sates â€Å" if you are under the age of 21 any trace of alcohol, illegal drugs or drugs that impair your ability to drive safely will result in stiff penalties and your license will be suspended for two years.† As you can see the laws have bigger consequences. In 2008 there was a girl named Amanda and she was in a very tragic accident and amazingly survived! Amanda was buried by a tractor-trailer and she is still alive and well. After having 20 surgeries, facial reconstruction and the loss of an eye she was very happy to be alive. Even though she looks different then what she used to look like, she realized that she was a very lucky girl to be alive. After what happened to her, she wanted to try to prevent other from making the same mistake that she did. In 2009 a lawyer Joel Feldman lost his 21year old daughter to a mistake of distracted driving. Ever since the accident he has been trying to educate others about the dangers of distracted driving. One day he happened to appear at the Massachusetts State House the day after a school bus had been in an accident with children and parents from PA. The bus had be driving and had hit an overpass that the bus was to low to go through. Apparently the bus driver was distracted by a GPS. On October 10 of 2010 a 5 year old boy named Xzavier was crossing the street when he got hit by someone who was on their cellphone. Xzavier wasShow MoreRelatedUse Of Cell Phones While Driving860 Words   |  4 PagesAmericans rely heavily on cell phones to perform daily activities. Cell phone are used for phone calls, email, sending text messages, surfing the internet, and performing other tasks. It is unfortunate that many of these daily activities occur while a person is driving. As a result, an increase of accidents and fatalities have occurred because of the use of cellular phones while driving. Using a cell phone while driving is an epidemic that has taken our nation by storm. Most drivers believe theyRead MoreCell Phone Use While Driving1503 Words   |  7 Pagesforth over the lines or driving at very inconsistent speeds. You wonder what could possibly be causing the driver to drive so erratically. Is the driver drunk? Is the driver preoccupied with eating his or her lunch? Is the driver busy attending children in the backseat? Once you pull along the side you realize that was not the case, instead you notice the driver has a cellular telephone up to her or his ear chatting away, or even worse you pass and see the driver holding a phone texting, you pass byRead MoreThe Use Of Cell Phones While Driving1817 Words   |  8 Pagesknowledge that the use of cell phones while driving decreases driver awareness and overall road safety, and in response to this knowledge, some states have passed laws that have prohibited the use of handheld devices. However, there are no laws bann ing hands free cell phone usage, despite research claiming hands free devices are just as dangerous handheld devices. But, does their usage distract drivers enough to the point where states should legally ban the total use cell phones while driving? The followingRead MoreCell Phone Use While Driving990 Words   |  4 Pages Cell phones are integral to people’s lives in Canada because they are vital communication and entertainment tools. However, the use of cell phones has remained contentious, because texting and talking on the phone are associated with distracted driving. Distracted driving is, â€Å"defined as the diversion of attention away from activities critical for safe driving toward a competing activity† (Klauer, Guo, Simons-Morton, Ouimet, Lee Dingus, 2013, p. 55). Although distracted driving is also associatedRead MoreCell Phone Use While Driving1114 Words   |  5 PagesToday, we use our cell phones for just about anything and everything to include; text ing, talking to our loved ones, and connecting with the rest of the world via social media. Cell phones have become a natural way of life to where we pick up our phones and use them like second nature. However, the dangers present themselves when we get behind the wheel of a car and carry these habits of cell phone addictions with us. If all states ban the use of cell phones while driving, then there would be a reducedRead MoreThe Use Of Cell Phones While Driving1843 Words   |  8 Pagesknown that the use of cell phones while driving decreases driver awareness and overall road safety, and in response to this knowledge, some states have passed laws that have prohibited the use of handheld devices. However, there are no laws banning hands free cell phone usage, despite research claiming hands free devices are just as dangerous handheld devices, but does their usage distract drivers enough to the point where states should legally ban the total use cell phones while driving? The follo wingRead MoreThe Use Of Cell Phones While Driving1509 Words   |  7 PagesSeveral states have enacted laws banning the use of cell phones while driving; an indication of the type of society America has become. These laws were put in place not only to keep drivers from taking phone calls, but also to deter them from posting their latest tweet or commenting on their friend’s latest picture. Social media is so ingrained in society today that many are unable to entertain a world that is devoid of such technology. With usage at an all-time high, the psychological effects ofRead MoreCell Phone Use While Driving Essay1816 Words   |  8 PagesThe study was attempting to determine the thoughts and behaviors that African American freshman college students in regards to cellphone use while driving. They wanted to know how the students thought cellphones (independent variable) impact driving skills (dependent variable). Research suggests that cellphone use correlates to higher likeli hood of accidents. The study used 331 (195 females and 136 males) freshman students who held a driver’s license. The students were then given a questionnaireRead More Cell Phones And Driving: Dangers Involved with Cell Phone Use While Driving1036 Words   |  5 Pagesoften. Talking on the cell phone and driving has become a very popular thing these days. Technology is coming out with the newest phones that can do everything for you and people are attracted to that. There are people that don’t have hands free and drive their car with only one hand, people that text and totally take their eye off the road and type conversations to each other. Bluetooth is another technological breakthrough where you wear an ear piece and can receive phone calls by one touch ofRead MoreStop the Use of Cell Phones While Driving854 Words   |  4 Pages13 2013 Many people driving don’t know that they can be so many wrongs they can be doing without realizing it. Plenty talk on the phone while driving, drink, text and drive. A lot of people even innocent people as well have had accidents involving one of those. Out of the three there has been one that has become more common, and it’s only increasing if people don’t put a stop to it themselves. A usage of a cell phone should not be displayed at any point while driving. It can wait many have had

Sunday, December 22, 2019

Greed Is All Right, By The Way - 3154 Words

To an audience of students at the University California, Berkley, Ivan Boesky at once stated, â€Å"Greed is all right, by the way. I think greed is healthy. You can be greedy and still feel good about yourself (Homans, 2012, p.1; Kay, 2003, p.1).† Greed is what lead Boesky to Insider Trading and ultimately huge illegal profits and the scam he created was hidden in plain sight. Boesky wanted everyone to believe that he was doing the world a service, but he was actually stealing (Homans, 2012). Ivan Boesky was considered to be a leading man on Wall Street during what James Stewart called the â€Å"Greed Decade† of the 1980’s, and Boesky’s specialty was insider trading (Stewart, 1991, p. 15). Ivan Boesky and the insider trading cases of the 1980s are very significant white-collar crimes as companies and communities were directly impacted; they were torn apart due to the leverage buyout era Boesky orchestrated with the help of his corporate raiders. (Meserve , 2012) In addition, the cases of the 1980s would be the first time the SEC got tough on insider trading, and Ivan Boesky was the window into the securities frauds of the era (Stewart, 1991). Ivan Boesky was an arbitrageur that made over $200 million dollars by betting on corporate mergers and acquisitions. Debra Ross in the Encyclopedia of White-Collar Crime defined arbitrage as: â€Å"(1) a transaction that generates a risk-free profit; (2) a leveraged speculative transaction; and (3) the activity of engaging in either of the aboveShow MoreRelatedGreed Is All Right, By The Way3072 Words   |  13 Pages Ivan Boesky at an audience of students at the University of California, Berkeley once stated, â€Å"Greed is all right, by the way. I think greed is healthy. You can be greedy and still feel good about yourself (Homans, 2012, p.1)(Kay, 2003, p.1).† Greed was what lead Boesky to Insider Trading and ultimately huge illegal profits; the scam he created was hidden in plain si ght. Boesky wanted everyone to believe that he was doing the world a service but he was actually stealing (Homans, 2012, p.1). AccordingRead MoreGreed Is The Most Driving Force Of Our Modern Society880 Words   |  4 PagesGreed manages to be possibly the most driving force in our modern society. It fuels a multitude of things: hate, need for power, many peoples’ reasons for attending higher level schools, etc. Whether we notice it or not, greed is there. It is always there. It hides itself behind false courtesy and kindness. It is a dark horse. Greed affects us all both negatively and positively. We can rarely change this effect. If greed were a person, it would be the person you see not assisting anyone. ItRead MoreGreed – does it Destroy or Benefit the Society? love of ones neighbour , giving something back to800 Words   |  4 PagesGreed – does it Destroy or Benefit the Society? love of ones neighbour , giving something back to the community or Charity or are considered the virtuous motivations. According to me, these certainly are noble motivations, but greed is one of the most powerful motivations for human action. For me greed is the noblest form of human motivations. I dont mean fraud, tricks or theft. By greed I mean individuals being mostly anxious with getting the all they can for themselves and not essentiallyRead MoreImpact Of Age And Wealth On Respect And Greed1525 Words   |  7 PagesWhat is the impact of Age and Wealth on Respect and Greed? – Impact of Norm and Value Some may describe age as a number however, age is a term that is generally a representation of the amount of experiences a person has had throughout their lives and an older person is therefore termed as older because of the number of experiences they have had. Same is the case with wealth. People may have different definitions of wealth like a person who has achieved what he/she aimed to may be termed as wealthRead MoreBlood Diamond Film Analysis1495 Words   |  6 PagesStatement of intent: This report will focus on the theme greed for diamonds in the film ‘Blood Diamond’ demonstrating this by the use of film techniques. The film I chose to analyse was ‘Blood Diamond’ directed by Edward Zwick. In the film the theme greed is shown by the Revolutionary United Front (RUF) threats of killing Solomon and Danny unless Solomon shows them where he hid the huge pink diamond he found while mining as a slave. Danny’s greed for money and diamonds led him to work for Colonel CoetzeeRead MoreAnalysis Of The Movie Baby Driver1595 Words   |  7 Pagesof sinful behavior that never ends up paying off for any character. Although the majority of the movie takes place in this sinful environment, certain individuals still exhibit morality and ethical actions in some prominent scenes. In the same way that all humans are incapable of not sinning, this vague concept of sin plagues the lives of every character in the movie. As the movie proves though, just because someone sins does not necessarily mean he or she is a bad person. Although this movie takesRead MoreThe Great Old Vision Of The American Dream742 Words   |  3 Pagessociety always wants more. In today’s society the great old vision of The American Dream is dead. It has been abandoned by the American society because society no longer values contentment. In the 21st century technology has gained the world a great new way of socializing, but technology has just as many advantages as disadvantages. Civilians crave the desire for more and it has increased with social media, seeing others accomplishments can cause an effect of jealously in society. With this society tendsRead MoreThe Primary Doctrine Of Corporate Personhood1174 Words   |  5 Pagesinvolved the challenging of a California railroad tax, contingent on an insistence of the Fourteenth Amendment and the equal rights protection it includes. Corporate personhood applies to the ability of organizations to be distinguished, by law, as an individual which includes the particular protections, abilities and rights that all individuals are entitled to. The most useful rights these organizations benefit from are the capacity to sue or to be su ed in a court of law and to be able to enter intoRead More Greed - Vital to Human Welfare Essay1128 Words   |  5 PagesGreed - Vital to Human Welfare Whats the noblest of human motivations? Some might be tempted to answer: charity, love of ones neighbor or, in modern, politically correct language: giving something back to the community. In my book, these are indeed noble motivations, but they pale in comparison to a much more potent motivation for human action. For me the noblest of human motivations is greed. I dont mean theft, fraud, tricks, or misrepresentation. By greed I mean people being only or mostlyRead MoreIs Greed Good? Essay example925 Words   |  4 PagesStreet and the ultra-wealthy. â€Å"Greed, for lack of a better word, is good. Greed is right, greed works. Greed clarifies, cuts through, and captures the essence of the evolutionary spirit. Greed, in all of its forms; greed for life, for money, for love, knowledge has marked the upward surge of mankind.† This dramatic speech was given by Gordon Gekko (played by Micheal Douglas) a wealthy businessman, who through this speech is trying to convey the message that greed leads to overall personal, and economic

Saturday, December 14, 2019

Gulf Refinery Fire Free Essays

In the early hours of August 17, 1975, a tragic disaster occurred on the Gulf Oil refinery in Philadelphia, Pennsylvania. This horrific disaster took the lives of eight firefighters, and potentially could have taken more lives if it wasn’t for the help of many surrounding fire stations. The cause of the fire was the overfilling of Tank 231. We will write a custom essay sample on Gulf Refinery Fire or any similar topic only for you Order Now While no crude oil escaped from the tank as a result of being overfilled, large quantities of hydrocarbon vapors were trapped above the surface of the tank’s crude oil. As the quantity of crude oil increased, these hydrocarbon vapors were forced out of the tank’s vents and into the area of the No. Boiler House where the initial flash occurred. The overfilling of the tank resulted from a failure of the tanker’s personnel to properly monitor the quantity of crude oil being pumped to the tank. This whole disaster could have been avoided by just double checking the amount of crude oil in Tank 231. At 12:45 a. m. on the morning of Sunday, August 17, 1975, the tanker â€Å"M/T Afran Neptune,† tied up at a Gulf Refinery dock, began pumping reconstituted Venezuelan crude oil with additional 5 percent naphtha into Gulf Refinery Tank No. 31. Tank No. 231, built in 1929, of riveted seam construction, had a capacity of 75,000 barrels and had recently been renovated with an internal floating roof. Within the refinery, the tank was located at Avenue â€Å"Y† and 4th Street. Located just west of Tank No. 231 was Boiler House No. 4, the site of a four-alarm fire on April 22, 1967. A brick chimney arose from Boiler House No. 4 and this stack was a familiar sight to westbound motorists on the Penrose Avenue Bridge as th e word â€Å"GULF† was painted in large, white letters. Hydrocarbon vapors, emanating from Tank 231, accumulated in the area of the boiler house and were ignited by an unknown ignition source. A flame front followed the vapors back to Tank 231 causing fire at the tank’s vents and an explosion within the outer shell of the stack. These events began to unfold at 5:57 a. m. Shortly thereafter, a second explosion occurred within Tank 231. Burning petroleum spilled from the tank’s vents into a diked area surrounding the tank. Within the diked area a second tank, No. 114, just north of Tank 231, containing No. 6 grade fuel oil, also ignited as pipelines within the diked area began to fail. The initial explosion also damaged the pipe manifold outside of the dike wall and petroleum pouring out under pressure ignited. At 6:04 a. m. , upon receiving the report of fire from the Gulf Refinery, the Philadelphia Fire Department transmitted the refinery’s fire alarm box: Box 5988, Penrose and Lanier Avenues. Upon leaving their station, Engine 60 could see fire and smoke conditions at a distance, and before arriving at the refinery, Engine 60 ordered the second alarm at 6:09 a. m. First arriving companies had large clouds of heavy black smoke emanating from Tank No. 31, fire on top of Tank No. 114, and fire showing from the 150-foot stack at Boiler House No. 4. The third and fourth alarms were ordered in quick succession by Battalion Chief 1, Arthur Foley, at 6:11 a. m. and 6:14 a. m. Acting Assistant Fire Chief Dalmon Edmunds ordered the fifth alarm at 6:34 a. m. The sixth alarm was ordered by Fire Commissioner Joseph Rizzo at 6:52 a. m. Over the next several hours, fire fighters utilized deluge guns and master streams to cool down surrounding exposures, and applied foam directly to the burning tanks and piping in an effort to extinguish the fire. By 8:44 a. m. it appeared that the fire was well contained and the situation sufficiently stabilized to declare the fire under control. As the firefighting operation progressed, it became apparent that the refinery’s sewerage system was not up to the task of properly draining the foam, water and petroleum-naphtha product mixture that was accumulating on the ground along Avenue â€Å"Y,† between 4th Street and 5th Street to the east, running in front of the refinery’s administration building. These drainage problems were further exacerbated by a decision by refinery personnel to shutoff drainage pumps. Three members were attending to the apparatus and wading in the foam-water-petroleum mixture which was accumulating on the ground. Commissioner Rizzo and Gulf Refinery manager Jack Burk were on an overhead catwalk nearby observing the fire fighting operation. Without warning the accumulating liquid surrounding Engine 133 ignited, immediately trapping the three firefighters working at Engine 133. Instinctively and without hesitation other nearby firefighters dove into the burning liquid to rescue their comrades, not aware of the danger to themselves. Five more firefighters would be consumed by the advancing fire. The flames just engulfed them,† said Commissioner Joseph Rizzo, describing how he escaped the first of dozens of explosions but looked back to see three of his men sealed in flames. â€Å"They were trying to get under the foam, but to no avail,† he said. â€Å"They were human torches. † The fire quickly spread eastward along Avenue â€Å"Y† towards 5th Street. Viewing the unfolding horror before him, Commissioner Rizzo ordered two more alarms, five additional rescue squads, and the recall of all companies which had previously been released from the fire grounds throughout the day. On these orders the fire alarm room transmitted the seventh and eighth alarms. As the fire had been placed under control nearly eight hours earlier, firefighters in stations across the city knew that the unthinkable had occurred as these additional alarms were struck. At 4:46 p. m. Commissioner Rizzo ordered the ninth alarm and notification of Philadelphia Managing Director Hillel Levinson as a major disaster was now unfolding at the Gulf Refinery. As the fire swept rapidly eastward along 5th Street, Philadelphia’s foam pumpers, Engines 160 and 133, and the Gulf Refinery foam pumper, were rapidly destroyed in the fire’s advance. At 5th Street, where Engines 16 and 40 had been assigned to improve drainage, their pieces were also destroyed in the fire’s path, although their pump operators were able to escape. Upon reaching 5th Street, the fire traveled two city blocks north along 5th Street, now threatening four additional storage tanks and the 125-foot Penrose Avenue Bridge. At 5:37 p. m. , Commissioner Rizzo ordered the tenth alarm as the fire was now traveling southward and engulfing the refinery’s administration building, which was located on the south side of Avenue â€Å"Y† between 4th and 5th Streets. The tenth alarm companies were ordered to report to Gate 24 at Penrose and Lanier Avenues, to set up deluge guns and leave the area. As the situation continued to deteriorate at the Gulf Refinery, Commissioner Rizzo ordered the 11th alarm. By seven o’clock, the involved tanks and pipelines were gushing flames and nearby streets in the complex were burning streams of oil and other petroleum products. The courageous men of the Philadelphia Fire Department kept with the fire, retaking 5th Street, 4th Street, and finally Avenue â€Å"Y. † At 1:00 a. m. Commissioner Rizzo left the fire grounds to visit the injured firefighters in the hospital. Rizzo then gave command to Deputy Fire Commissioner Harry T. Kite who placed the fire under control at 5:38 a. m. on Monday, August 18, 1975. The tragedy that occurred on the hot august day in 1975 could have been avoided all together if the refinery personnel in charge of Tank 231 simply monitored the amount of crude oil being pumped into the tank. Mistakes do happen, but unfortunately this mistake took the lives of eight firefighters. As of now we can only take th is disaster into consideration and make sure this doesn’t ever happen again in the future. In remembrance of the firefighters who perished in the blaze: John Andrews, 49, Engine 49. How to cite Gulf Refinery Fire, Papers

Friday, December 6, 2019

Basic Principles and Theory of Cloud Security Exploits - Free Solution

Question: Describe about the Basic Principles and Theory of Cloud Security Exploits? Answer: Cloud computing majority comprises of delivering computing resources like applications, storage, infrastructure as services provided by service providers to the end users. All kind of services are accessed by web browsers which is like on demand. The cloud service providers offers service based on requirement and ensure good quality. Basically cloud computing is three types Infrastructure as service (IaaS): Here servers, networking devices, memory and storage are provided as service to the end users. Computational resources like more number of cores and fast instructions per cycle are made available for users as on-demand services. IaaS uses the virtualization technology to provide virtual machines to the end users on demand this allows clients to build complex network infrastructures. This will easy the deployment and administration of networking devices becomes easy. This makes the business more easy. Platform-as-a-Service (PaaS): It provides the development platform for the user to design of their own applications depends on their need. This kind of service model provides implemented libraries, tools and frameworks to develop the applications for the end users. This gives the end users to control the application deployment and configuration settings. Because of this developers are not required to buty any software just get the platform required from the service provider and design and build application. GoogleApps is an example of PaaS; it is a suite of Google tools that includes Gmail, Google Groups, Google Calendar, Google Docs, Google Talk, and Google Sites. Software-as-a-Service (SaaS): This provides the application for need of the requirements. Rent the application instead of buying it. Suppose excel is required to prepare some statics then just barrow the application from service providers and use it for required amount of time instead of buying the software. These three services provides the different services to the end user and at the same time provides the information on security issues and risks of cloud. DOS attack: Denial of service attack is to make user not able to access the host or network by disrupt their state so that its service not reached to user. These kind of issues comes depends on the kind of service. Flooding is the common type of attack any heckers use for DOS attack, here flood the victim system or service host with bogus requests which are as legitimate requests so that service is stopped because of heavy load. In cloud services these kind of flood attacks are differentiated as two types direct DOS and indirect DOS. Large volume of requests flooded into service provided by cloud server in this cloud provider is responsible for providing the load balancing to service so busy in providing that to the one user whose provided service is over loaded while other users won't get good service from service provider as it is busy, this is called direct DOS. If the victim server is doing load balancing and part of it offloaded to other servers as part of load balancing strategy which make other servers also vulnerable to DOS attack, this is called indirect DOS. Malicious insider: Companies and organizations can't trust the people inside when it storing the users data, so it is very important to store user data even insiders can't access without proper protocol. In cloud while moving all users data which is maintained by organization into some private cloud which is maintained by some third party, is it safe to trust the third parties over the data. Rouge kind of administrators has privilege to steal the unprotected data and can do brute force over the passwords and get the customers data on demand. The insiders who knows the cloud operational capabilities can identify the cloud vulnerabilities and attack on it to get the sensitive information. Cyber Theft Online: Storage service provided by the cloud computing makes the business organization very cost effective and no need of administration overhead over the sensitive data. This will reduce cost in buying new servers and maintaining them. So many companies are storing data using cloud. One major cloud service provider do maintain all the sensitive data of business organizations. Consider example of Netflix use the amazon web service for storing data of TV episodes and movies, Dropbox storage service to many user for their personal information. These kind of Cloud services are as daily part of every ones life. So all the sensitive information stored at single place so single target for attackers which gives huge information at little cost compare traditional way. These days many people using the social networking sites for interaction with the friends and shares profiles and personal information also. According to survey 35 percent people are using social sites have accounts in all sites which makes the attackers to grab the attention to get the information. Recently linkedln the worlds largest professional networking website has 175 million users has breached and approximately 6.4 million stolen hashed passwords dumped into russian website and more than 200 thousand passwords are cracked. Stolen username and password from one website can be used to access the other websites as it is very successful for many users. Recently dropbox found some logins are malicious who used the login details obtained from other social website. Wrapping Attack: Web browser used to send service request by client and the service communication uses the Simple Object Access Protocol messages and transmit them using HTTP with format of Extensible Markup Language. One security mechanism WS-Security is used for the confidentiality and data integrity of SOAP messages transmitted between the clients and servers. Data integrity maintained by using digital on the message and for Confidentiality message encryption is used to protection on eves dropping. This makes the client authenticated and the server can validate that the message is not tampered with during transmission. Web servers validating the signed requests at that time attackers by using the XML signature wrapping and exploit the weakness, attack launched when SOAP message exchanged between the legitimate user and the web server. Attacked duplicates the users login session and added the bogus elements into message which will wrapped, it makes the original body message under the wrapped and malicious code is replaced on top of the contents of the message, this modified message sends to server and the server validation fine because the original body not changed so the server is tricked and authorize the message that has been altered. Because of this hacker gain the unauthorized access to the protected resources and process intended operations. All cloud computing services via web browser so wrapping attacks can be launched easily on to the cloud service provider servers, which makes the users as victims. In 2008 discovered cloud service provider who is vulnerable to the wrapping attack. This is because later identified as bug in validation process done by amazon cloud. It is vulnerability in SOAP message security validation algorithm. Interception and modification can be done to legitimate user SOAP request, as a result hackers could take unprivileged actions on victims accounts in clouds. The same XML signature wrapping technique can be used to heck the account in amazon AWS just by altering the authorized signed SOAP messages and hacker get the permission to access, delete, create user account. Counter measures: Malware injection security methods The major security concern in cloud computing is malware injection attack. These kind of attacks can be nullified using File Allocation Table kind of system architecture. In the FAT table instance of all customers will be there so in advance can be recognized them using FAT table. Now the old instance and new instance are there to compare to determine the validity and integrity of the instances so that malware injection can prevented like this. In other way of nullifying the malware injection is storing the hash value of the original service instance image file and by performing the integrity check between the original and new service instances images to identify the malwar injection instance. In this malware injection can be identified. Data Protection Insiders may do stealing of data intentionally or accidentally but lose of data can happen in any case. So policies have take care of the data stealing by the insiders. It is very difficult identify the behavior of insider who steals data. Need deploy better security measures for the insider threats. Tools like data lose prevention and malicious behavior patterns identifications encrypting of sensitive information while storing it self, decoy technology for authentication and authorization. Policy Amendment Cloud service registration can be done by who has credit card and utilize the service which is giving advantage to hackers to get the fraud credit cards and get the access of service and getting computing power of cloud based solutions and exploit the user data. They are doing all malicious activities such as spamming and attacking the other computing systems. By Doing blocking of users who are publicly announced by some investigations teams and monitor the credit card fraud and changes the policies such way that cloud computing power can't be utilized by the attackers via weak registration policy. Mange and administration of networks in proper way so that least vulnerable to attackers. For example, Amazon re defined user policy like isolate any offending instance which is raised like spam or malware coming through Amazon EC2. Control access Private and sensitive data of end users is stored in cloud users can get the access to their data under the given access control mechanisms. For the physical computing systems continuous monitoring on the request coming and response served to it and analyzing the traffic makes the security techniques more efficient. Many security tools like firewalls and intrusion detection are used to restrict the illegal access and grant the legal access to the data. Majority all traffic is monitored to catch hold of illegal access of data. Future Work: Cloud computing is major important developments for giving service to different level where every service can offered via browser in just one click away. As the more benefits, more security vulnerabilities are there and bringing more challenges for all service providers and more vulnerabilities still exist in cloud so hackers are exploiting those security holes. For providing best quality to the end user required to nullify these security flaws at the best possible level. Recently more news regarding the NSA eye on the information which is been leaking from third parties and going into the hands of NSA which is something like you are not the one who is looking into your data. Scott Hazdra said in the news that U.S and many companies keeping eye on the data stored in the internet and clouds and transmitting as it is to the required sources which is not good for the users who uses the cloud. It is big security risk and may be threat to the users who store the information on the internet. This kind of one risk can't be avoided in the wolrd of internet and increases more with cloud features. At any point privacy is always big concern with the cloud which is like companies or third parties and insiders who can breach into cloud to steal the information and big threat is intrusion of the government also. Confidentiality is big threat to the companies who store information as because competitors try to steal the information, so all companies store the information in encrypted form irrespective of competitor. This is costly for hackers when compare to advantage they get from information so less attacks but now in cloud everything stores there one shot many pots. One compromises all compromised which is big plus for the hackers to try and steal data with little extra cost. This is one of the big problems in the current cloud industry. Cloud makes life of users completely into internet which makes their more explored and into internet. Every user try store irrespective of type of data as it is more friendly so at any stage Any information can be observed over internet about any person. This gives advantage to the hackers to crack the accounts of very far distance people so that unable to trace if any personal information is compromised. Security of data and privacy protection of data is major issues and they are basic important issues which are separation of sensitive control of access. It is very important for cloud solution providers to provide kind of security which is like levels of organization while providing protection to the users. Some frameworks and utilities are required to build while accessing the cloud and data so that privacy to users can be provided. Mobility of companies is very common in industry so customer service to users while activating and deactivating the account should be done veryquick and good service is needed. Previous employees should not able to get the insides of the organizations cloud as is it quite natural that inside people get clarity on the vulnerabilities on the cloud and where to exploit and when to exploit these details gives advantages for the employees who leaves the organization and try to attack on the cloud for their personal needs. So it is very essential that cloud o rganization takes required steps while removing any employee. Cloud organization suppose to be very transparent about their agreements with the government so that people aware what to keep what not. It is very offensive that organizations provide data to government without any information to the user. This kind of leaks gives advantage to government officials so that they try get the required users private information to full fill theirpersonal needs. This is completely illegal. References: 1) CSA cloud security alliancelink: https://cloudsecurityalliance.org/2) Adam Greenberg, Mar 06, 2015, top concern regarding cloud adoptionlink: https://www.scmagazine.com/study-financial-firms-cite-data-security-as-top-concern-regarding-cloud-adoption/article/402201/3) Charles Badcock, Mar 03, 2014, Cloud Threatslink: https://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085 4) Security ascepts of cloudlink: https://cloudsecurity.org/5) Cloud Security Fundamentalslink: https://www.sans.org/course/cloud-security-fundamentals6) IBM cloudlink: https://www.ibm.com/cloud-computing/in/en/security.html7) Ted Samson, Feb 25th 2013, cloud securitylink:https://www.infoworld.com/article/2613560/cloud-security/cloud-security-9-top-threats-to-cloud-computing-security.html?null8) Victoria Ivey, Dec 16th 2014, cloud-securitylink:https://www.cio.com/article/2380182/cloud-security/5-tips-to-keep-your-data-secure-on-the-cloud.html9) https://www.sa fenet-inc.com/data-protection/virtualization-cloud-security/10) https://www.porticor.com/11) https://www.symantec.com/cloud-computing-software/12) https://www.mcafee.com/in/solutions/cloud-security/cloud-security.aspx13) https://www.vormetric.com/data-security-solutions/cloud-data-security14) https://www.cloudcredential.org/certifications/pcs/15) https://www.gov.uk/government/publications/cloud-service-security-principles/cloud-service-security-principles16) https://www.csoonline.com/category/cloud-security/17) https://www.alertlogic.com/resources/cloud-security-report/18) https://www.zdnet.com/article/cloud-security-reports-slam-data-protection-national-internets-access-myths/ 19) https://www.bitdefender.com/business/small-office-security.html20) https://www.intel.com/content/www/us/en/enterprise-security/processors-with-built-in-cloud-security.html21) https://www.cloudschool.com/certifications/security22) https://www.imfacademy.com/areasofexpertise/information_technology/cloud_sec urity.php23) https://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html24) https://www.websense.com/content/cloud-web-security-features.aspx