Saturday, May 23, 2020

The Civil Rights Movement Essay - 891 Words

The 1960’s were a time of freedom, deliverance, developing and molding for African-American people all over the United States. The Civil Rights Movement consisted of black people in the south fighting for equal rights. Although, years earlier by law Africans were considered free from slavery but that wasn’t enough they wanted to be treated equal as well. Many black people were fed up with the segregation laws such as giving up their seats on a public bus to a white woman, man, or child. They didn’t want separate bathrooms and water fountains and they wanted to be able to eat in a restaurant and sit wherever they wanted to and be served just like any other person. During the Civil Rights Movement a lot of the white people who wanted†¦show more content†¦This site was created by Charles Moore, a freelance photographer who seemed to always be at the right place at the right time. All of the pictures on this web site were taken by Charles Moore who was especially found of Dr. Martin Luther King Jr. and what he stood for. There are pictures from the freedom march of 1963 and the Selma March of 1965. Pictures here show Dr. King marching non-violently with both black and white supporters. There is a picture of Andrew Young leading marchers through Selma in prayer. Governor George Wallace was against the Marches and wanted to stop them no matter what, but later he apologized for his segregationist views and actions during the 1960’s. During the march a picture was taken of police beating marchers with billy clubs. Another section on this page is voter’s registration, they showed black people explaining how to vote to other blac ks. People like Medger Evers who was fighting for the right to vote was shot down in his drive way as he was coming home from work one night because of what he believed. This page is formed so people can understand through the art of photography that human beings had to go though a lot to be treated equal. This page is very effective in getting the message across because of the graphic nature and up close (realness) of the pictures. When looking at the pictures used to tell the story in this site you can’t help butShow MoreRelatedThe Rise Of The Civil Rights Movement1179 Words   |  5 Pagessegregations. Out of the numerous elements that arose in the 1960s, there are three movements that truly affected the American society. Firstly, the rise of the civil rights movement was greatly influenced by racial discrimination of colored people in the South. Secondly, the women’s movement aimed to convince the society that women are capable of achieving and maintaining higher waged job like males. Lastly, the gay rights movement aimed to gain acceptance and stop discrimination of homosexuality. The mostRead MoreThe Folk Music Of The Civil Right s Movement1208 Words   |  5 PagesResponse Paper #4 The folk music of the Civil Rights Movement â€Å"came out of tradition, common experience, and generations of resistance† (Dunaway 2010: 140). The songs used throughout the movement derived from the shared experiences and struggles of African Americans while connecting â€Å"the gentle, idealistic world of folk music and the integrationist world of civil rights† (Dunaway 2010: 145). Songs, such as â€Å"We Shall Overcome†, were put through the folk process, where a song is passed on and alterationsRead MoreThe Great Leaders Of The Civil Rights Movement1563 Words   |  7 Pages They seem to be forgotten until they are highlighted once again. Another example of a person that was not really highlighted for their actions is Nina Simone. She made an impact on the Civil Right Movement that not many other artist or celebrity would have done. When you think of the Civil Rights Movement the first three that come to mind of course are, Martin Luther King Jr., Malco m X, and Rosa Parks. So, when someone hears the name Nina Simone the two most common responses might be â€Å"Who’sRead MoreSocial Movements : Black Civil Rights2647 Words   |  11 PagesSocial movements are vital to the establishment of our societies, and they way we are governed. Social movements help the less privileged band together to create a stronger voice among a sea of political correctness and unlawfully rule that the public supposedly have to abide by without question. Movements create this new form of platform that, if done successfully, are able to create a worldwide frenzy where people from across all walks of life, including politicians, academics, the less fortunateRead MoreThe Civil Rights Movement911 Words   |  4 PagesThe Civil Rights Movement: Martin Luther King Jr. Martin Luther King Jr. changed history not only for African American’s, but for all who live in the United States. Martin was born on January 15, 1929, in Atlanta, Georgia. As a child Martin attended many public segregated schools throughout Georgia until he graduated at the age of fifteen. Following high school, Martin Luther King Jr. attended many colleges such as, Morehouse College, Crozer Theological Seminary, and Boston University. While studyingRead MoreCauses Of The Civil Rights Movement954 Words   |  4 Pagesquote was very much true. Post civil war times were hard on African Americans. Even though at the time they were considered free, they were often criticized and discriminated against. Finally, shootings, brutality, and unfair treatment were enough. In an effort to end racial segregation and discrimination against African-Americans all over the country, they took a stand. This was known as the Civil Rights Movement. There were many interesting events that cause d this movement. The three main causes thatRead MoreThe Civil Rights Movement Essay1601 Words   |  7 PagesThe Civil Rights Movement â€Å"I have a dream that my four little children will one day live in a nation where they will not be judged by the color of their skin but by the content of their character.† This was a speech by Martin Luther King Jr. Even one hundred years after slavery was banned, African Americans were still being treated unfairly. Martin Luther King Jr. was one of the most famous leaders of the Civil Rights movement in the 1960’s. The Civil Rights movement was a movement of AfricanRead MoreThe Civil Rights Movement Essay1259 Words   |  6 Pages The civil right movement refers to the reform movement in the United States beginning in the 1954 to 1968 led primarily by Blacks for outlawing racial discrimination against African-Americans to prove the civil rights of personal Black citizen. For ten decades after the Emancipation Proclamation, African-Americans in Southern states still live a rigid unequal world of deprive right of citizenship, segregation and various forms of oppression, including race-inspired violence. â€Å"JimRead MoreThe Civil Rights Movement Essay1190 Words   |  5 Pages The Civil Rights Movement The 13th amendment, passed on the first of January, 1865 abolished slavery throughout America. Although African Americans were considered free after this amendment was approved, they still had a long and arduous struggle to absolute freedom. Before the Civil Rights Act of 1964, segregation in the United States was frequently used throughout many of the Southern and Border States. Schools, bathrooms, libraries, and even water fountains were segregated. Though there wereRead MoreCivil Rights Movement Essay797 Words   |  4 PagesThe Civil Rights Movement, also known as the American Civil Rights, was a mass movement during the 1950s and 1960s. It was one of the most intricate social movements of mankind. The Civil Rights Movement was a period where African Americans did not have the same equal rights or treatment as the whites. Instead, African Americans were segregated from whites by not going to school together, having to sit in the back of the bus, not being able to move freely, or not having the right to vote. Over the

Monday, May 11, 2020

The Economy Is Making Progress Because Of The Mass...

The economy is making progress because of the mass production of technology. Due to globalization, innovations of technology has created an economic growth and made communication easy. A challenge that humanity must face, is the skill of cultural diversity. These conditions are altered because of the renewed dialogue among cultures and civilizations. (Ogohi) Many people in the 21st century benefit because of accessibility, whereas the Romans during the 1st century received information from being lectured and reading a book. Today, people depend on technology for; Information, Communication, Pleasure and Business. If catastrophic effect occurred that shut down all operational systems, society would be lost in confusion and dependant on our intelligence. (Business Insider) The Positive and Negative Effects of Globalization The negative effects of economic globalization are the loss of employment. The inefficient uncompetitive industries and loss of the monopoly power of local industries occurred because of businessmen and traders who exploit consumers by charging them higher prices for imported goods and supplying lower quality products, compared to internationally available quality. Other negative impact of globalization in a social-cultural aspect is that cultural values are lessoning in the western parts of the world. The most positive effects of globalization are elimination of local monopolies, elimination of inefficiency, and access to opportunities available allShow MoreRelatedUsing the four passages and your own knowledge, assess the view that the impact of the First World War was the main reason for the booming economy in the USA in the 1920’s1661 Words   |  7 Pagesreason for the booming economy in the USA in the 1920’s (40 Marks) I believe that the First World War did not have as much of a significant impact on the American economy as mass production, infact i however see that instead of benefiting the economy the War in fact had the reverse effect to that of which interpretation A and C suggest that the war was the most important factor of the 1920’s American economic boom. Firstly, the biggest reason as to why mass production was the main reason forRead MoreHydrogen And Hydrogen As A Fuel1518 Words   |  7 Pagesmost efficient furl because of its abundance and the production of harmless bi-products as compared fossil fuel. Despite the abundance in its natural existence, Hydrogen can also be obtained through processes such as the electrolysis of water and methanol steam conversion. Hydrogen as a fuel is capable of the replacement of most of the other sources of energy. However, Hydrogen faces numerous obstacles to its entry into the economy and the utilization by human beings. The technology to contain and manageRead MoreEssay about Great Britain and the Industrial Revolution830 Words   |  4 Pagesearly stages of factory production. In addition, Britain was situated at a critical point for international trade. Its position between the United States and the rest of Europe allowed them to have a serious impact in all matters of trade. Likewise, a multitude of navigable waterways, easy access to the sea, and a mild climate all contributed to the onset of industrialism. Britains topography was conducive to industrialism because its diversity allowed for the production of many agricultural productsRead MoreThe Impact Of Cyber Physical Systems On The Manufacturing Environment1242 Words   |  5 Pages warehousing systems and production facilities in the shape of Cyber-Physical Systems (CPS). In the manufacturing environment, these Cyber-Physical Systems comprise smart machines, storage systems and production facilities capable of autonomously exchanging information, triggering actions and controlling each other independently. I4 holds huge potential. Smart factories allow individual customer requirements to be met, whilst efficiency obtained in automated production is maintained. Meaning thatRead MoreNew Era Greed Of The Grocery Store Essay924 Words   |  4 Pagestrust is slowly diminishing with online grocery shopping. B. A once personal task is becoming impersonal as we progress. Globalization and the technological advancements have made it it difficult for the consumer to actually know what they are getting and changing the idea of the grocery store all together. C. Consumer food demands has made a corner mom- and – pop grocer to a fast, mass, and globally producing supermarket and there is a price to pay. II. Background A. Chain grocery stores startedRead MoreThe Great Depression Of The 1920 S1706 Words   |  7 PagesAt the beginning of the 1920’s, the United States was beginning to recover the economy now that World War I was over. During this decade, America became the richest nation in the world. The 1920’s, also referred to as the roaring twenties, was a period of dramatic and social change. More Americans during this era lived in the city rather than on a farm. The nation’s wealth doubled throughout the roaring twenties, and lead the Stock Market Crash of 1929 where the Great Depression followed after thisRead MoreThe Relationship Between Art And Commerce1420 Words   |  6 Pagescreativity as a vehicle for economic interest, while others view it as pure dedication for personal creative needs. The world as we live in today sees the creative industry, including visual and performing arts, sound recording, book publishing, and movie making, a highly commercialized global enterprise. People constantly buy and sell art products in a highly active market. Although it is difficult to conclude whether art and commerce is perfectly compatible or mutually exclusive, one thing is true, thatRead MoreResearch Paper Henry Ford1111 Words   |  5 PagesRodriguez English 10 Mrs. Toman March 29, 2011 Research Paper: Henry Ford Imagine how life would be if our society did not have cars. Today, our society is dependent on cars for our daily routines. From transporting our food, clothes, and technology to just going to the store across the street, cars are a very important part of our society. In the 19th century, only the wealthy and upper middle class had access to automobiles, and they only used cars for fancy transportation and to show offRead MoreThe Increase Of A High Unemployment Rate1287 Words   |  6 Pagesin the fact that they both can be exchanged for currency, which is a necessity in life. Arendt explains that both the need for work and labor in our society has decreased rapidly. She states, â€Å"Whatever we do, we are supposed to do for the sake of ‘making a living’; such is the verdict of society, and the number of people, especially in the professions who might challenge it, has decreased rapidly† (127). Tying this into the detriment of a high unemployment rate, we curre ntly have a 5.5% rate of unemploymentRead MoreNon Market Strategy Recommendation For Foxconn1542 Words   |  7 PagesTO: Foxconn Technology Group (Hon Hai Precision Industry Co., Ltd.) FROM: Kavon Baradaran and Julia Yang, Poka -Yoke Consulting DATE: October, 25, 2015 SUBJECT: Non-Market Strategy Recommendation for Foxconn Foxconn Technology Group is the number one firm among Electronics Manufacturing Services (EMS) providers since 2005, and is a global firm that goes beyond China and Taiwan. However, recent market research and analysis show that Foxconn is facing a rather unfavorable publicity regarding its

Wednesday, May 6, 2020

Written Analysis Final Project Free Essays

Getting along with same sex marriage by EYE written Analysts Ms. Bawd I have read a few articles. I have had many discussions with some of the very conservative religious students I work with. We will write a custom essay sample on Written Analysis Final Project or any similar topic only for you Order Now I have been trying to figure out if the main front of the opposition to same sex marriage has a logical argument or if it is just a knocker reaction because religious conservatives think everyone that participate or even allows it is going to hell. I had the chance to interview Mr.. James, a student of a local Baptist college on his viewpoint of the subject. He indicates he eels that it is a sin and against Gods will, but that God gave man free will and he can choose his own fate. And, while he feels the need to try to help and educate homosexuals, if they disagree with those ideas, forcing the issue will only drive them further away. In his words, â€Å"forcing the Bible down someone’s’ throat is no way to build a flock†. The impacted population of the opposition to same sex marriage is all of the gays and lesbians of our country, studies estimate around 3. % or roughly 9 million people. Monsoons) Studies suggest lower general health among same sex peoples, one theory is this is due to one partner who has health insurance from their employer that cannot cover the other because they are not married and therefore not legally related. (Miller) Why we have this issue is because many people, notably Christians, feel that homosexuality is a conscious decision rather than an emotional attraction, because God said it was a sin. Leviticus 20:13, states, â€Å"If a man also lie with mankind, as he elite with a woman, both of them have committed an abomination: they shall surely be put to death† (KAVA). This was reaffirmed by the Pope, leader of the arrest group of Christians, who ironically dresses like Liberace stunt double. The problem here is 79. 5% of the U. S. Is Christian. Or close to 247 million people. (Fairchild) This seriously outnumbers the numbers of homosexuals looking to marry. Some feel it as a personal attack on their beliefs; others feel the need to save the homosexuals from the impending doom of eternity in hell. Although they are probably taking things out of context, I feel the bible was written to speak to the people of the day, and customs were different; there was less understanding of the perversity of the world then. Conservative folks back off the legal tactics. Laws that target only one group are unconstitutional. Former President Bill Clinton recently made a statement, â€Å"When I signed the bill, I included a statement with the admonition that ‘enactment of this legislation should not, despite the fierce and at times divisive rhetoric surrounding it, be understood to provide an excuse for discrimination. Reading those words today, I know now that, even worse than providing an excuse for discrimination, the law is itself discriminatory. It should be overturned. (Weber) Our First Amendment protections on the freedom of speech and religion, apply to all. By all means speak your minds, tell others how you feel about the issue. This is what is so great about this country, you ca n do that. Realize though, that same law that gives you the right to speak your mind, also give others the right to not listen. Please, the same law that protects you also protects everyone else. While you have the right to speak your mind, most will agree your rights stop at interfering with others’ rights. Christian conservatives, you are so intent on having our way, but the more you push your views upon everyone the more you push them away! Remember Mr.. James, the Baptist student ministers’ statement about forcing the Bible down someone’s throat is no way to gather a flock. Yes, convey your ideals, but you cannot educate someone if they do not want to listen. And, offending them is a good way to close their ears and minds. In the argument about everyone’s rights there was a compromise offered of a â€Å"civil union†. This gave same sex couples some of the rights they were looking for, becoming a family making health insurance extendable to the partner, child custody between partners, survivorship of property in the event of one partner’s death. This was not upheld at the federal level, only a handful of states accommodated. Somehow this was not enough; you had to have â€Å"marriage† and not a â€Å"civil union†. (GLAD) Same but separate somehow. It is not so much the word as it is the idea. I was hung up on why â€Å"marriage† was so important; the civil unions were on the right track. But if you were to say to me that Which was not a real religion, I would very likely go off on the discrimination of conservatives. Like many things, though, it takes time. The Thirteenth Amendment was ratified December 1865 to abolish slavery. There are still pockets of racists who would chain up blacks if they could. â€Å"Only’ two years ago, Which was recognized by the Veterans Administration, then the rest of the government as a legitimate religion. Still there are evangelical types who still get in my face and try to save me from imaginary (to me) monsters. I was raised in a catholic household. Since the majority against this are Christians and I know what it means to be Christian, I want to know how you can UT this much energy into complaining about same sex marriage when there are still homeless people, starving children, all over our country and the planet to take care of. How can you put complaining about homosexuals on a higher priority than starving children? I think even Jesus would say homosexuality is wrong, but spend his time feeding the children, preach but not force. Homosexuals, Offer a compromise, take the unions and get your foot in the door. Even though one law wiped out slavery, the civil rights movement took a long time, and it came in stages. Even when other regress was made, interracial marriages still had to be overcome. Get the civil unions, push to get it to the federal level, get more equal footing, then when it is almost the same, push to call it marriage. I think you have to work on people a few at a time. Pushing against that many people all at once isn’t going to get you far. Logically, why should same sex marriages be outlawed? How many religions are out there, and how many claim to be the one true way to God? There are a few that don’t recognize only one god, then there are the atheists who believe there is no god. If we re not going to dictate a religion, we cannot endorse any religions views on marriage. If our laws state that government and religion must be separate, why then, are we even debating the notions that the marriage defined in the bible is the only acceptable definition, when marriage is a legal institution? Unfortunately humans are an emotional creature. Some people so believe there is going to be hell to pay for homosexuality, those people have that right. Others believe that first group is out of their minds, they are within their rights. People are beginning to realize the ideals of he past don’t hold up to intellectual scrutiny. Some, well many, people are trying to hold on to a tradition, one that they have believed in since they can remember. Every step we move away from that as a society, chips away at the foundations of their beliefs. Change is hard for some; they may have to accept the changes reluctantly. We are getting there though, these same people who are trying to hold on to outdated ideas, which are thousands of years old, have accepted women are out of the kitchen and the colored are out of the fields and the earth is round and goes round the sun. How to cite Written Analysis Final Project, Papers

Friday, May 1, 2020

Security And Privacy Of Biometric Recognition

Question: Research into the different types of biometric systems which are currently available for access control systems. Briefly describe the techniques and technologies used for each type and discuss the advantages and disadvantages for the three types below. Give an example application when each type could be used. Answer: The biometric sensors or the gain access to control systems usually are classified into two kinds these are physiological Biometrics and the Behavioral Biometric.The physiological biometrics might include the following; face recognition, palm and gait recognition as well as the Iris recognition (Myers, 2017, pp. 43). On the other hand the behavioral biometric include the signature, voice recognition. Physiological biometrics Palm and gait recognition When it comes to the palm recognition there is a three dimensional image of the hand which is collected and compared to the stored sample. This device performs a great amount of the identification within a short time. These technologies are installed in the situations where there is a large number of individuals such as the airports (Prabhakar, Pankanti Jain, 2003, pp. 33-42). On the other hand this technology is expressed not only by the way an individual looks or sounds, but also the manner in which a person walks. The technology is applied to moving perambulatory subjects. This technology is useful especially in the surveillance (Ross Jain, 2004, pp. 134-145). Advantages They could be utilized in a range of the environment. They can perform a great amount of identification within a short period of time (Ross Jain, 2004, pp. 145). Disadvantage The performance of the technology could deteriorate over time. They have the added difficulty of having to sample and identify the movement especially for the gait recognition. Face recognition This kind of biometric computer application that is capable of identifying as well as verifying a individual from the digital image through comparing as well as analyzing the patterns. These kind of biometric systems are used in the security systems (Prabhakar, Pankanti Jain, 2003, pp. 33-42). The application works with the face prints and the systems are capable of recognizing 80 nodal points on the human face. Advantages The technology is capable of searching against the static image such as the driver license or even the passports. It is the only biometric which is capable of operating without the cooperation of the user. Matching of the accuracy is reduced as a result of the acquisition environment. Disadvantages Matching of the accuracy is reduced as a result of the reduced changes especially in the physiological aspects. Most of the devices are unable to enroll some percent of the users as well as performance could be deteriorated over time. Iris recognition In this kind of bio-metric the method used in identifying individual depends on the single patterns in the region of the ring shaped encircled the pupil of eye (Prabhakar, Pankanti Jain, 2003, pp. 33-42). Furthermore, it includes a blue, gray or brown color with the hard patterns which are recognizable when one looks closely. Advantages There are high levels of accuracy with this biometric This biometric technology can maintain stability of the features over some time. Disadvantage The disadvantage of iris biometric is that it has a propensity for the false rejection. The acquisition of the images entails some moderate attention as well as training. Behavioral Biometric Voice recognition This is a technology that is utilized to produce speech patterns via combining both behavioral along with physiological aspects which are captured through processing the speech technology. The significant properties that are utilized to authenticate the speech is the nasal tone (Ross Jain, 2004, 140). This biometric could be separated into the various categories based on the type of authentication domain such as fixed text method, text independent method or even the conversational techniques. Signature recognition This type of biometric method is used in analyzing as well as measuring the physical activity of signing the pressure utilized, the order of the stroke and the speed. A number of the biometric are utilized to review the visual images of the signatures. This biometric might be operated into alternative ways for example the static and the dynamic. Advantages and disadvantages of the biometrics Advantages Increased security: Biometric technology could offer a higher degree when it comes to the security as compared to the other traditional authentication methods. Increased convenience: the use of the biometric authentication allows higher levels of the rights and the privileges with a much success to the authentication (Myers, 2017, pp. 49). They allow an increase convenience since they can protect the data without any need for the human intervention. Increased accountability: the deployment of the biometric application to secure access to the computers as well as other facilities eliminate any occurrences such as the buddy punching, thus offer a higher level of certainty on who to access the system. Disadvantages There is tendency of privacy abuse due to the non-cooperative enrollment as well as identification capabilities. (b) Privacy-enhancing technologies (PETs) used on the Internet Communications anonymizers: These technologies usually hide the real online identity such as the IP address and the email address and then replace them with the non-traceable identity. These technologies could be applied to the email, web browsing, as well as the instant messaging. Enhanced privacy ID: It is a digital signature algorithm supporting anonymity. It provides a typical grouping public verification crucial related to lots of the unique private signature keys. The application was made to permit prove a device to the external party what type of the device it is without necessary revealing the exact identity. Access to personal data: This service providers provides the infrastructure that allows the users to inspect, correct or perhaps remove all the data that is stored at the service provider. Different types of threats and vulnerabilities which can be used to attack the WSN Denial of service attack (DoS) These occurs when the attacker continuously bombards the Access point which is targeted or even a network with the bogus requests, failure information, as well as the commands (Alam De, 2014, pp. 67). DoS attack is an event which diminishes or even eliminate the capacity of the network in performing the expected function through the failures of the hardware, bugs in the software, exhaustion of the resources, as well as the malicious transmitting of the higher energy signals . The communication techniques could be jammed entirely in case such attacks might be successful (Lupu, Rudas, Demiralp Mastorakis, 2009, pp.54). Other denial of the services attacks is much possible such as inhibiting communication through the violation of the MAC protocol (Lupu, Rudas, Demiralp Mastorakis, 2009, pp. 59). These might result in authentic end users to manage to get to the network and might cause the network in crashing (Ghildiyal, Mishra, Gupta Garg, 2014, pp. 1163). This attack generally rely on the abuse of the protocols for instance the Extensible Authentication protocol. How to mitigate the threat The technique which is used to prevent this attack includes the payment for the network resources, push back as well as a strong authentication along with the identification of the traffic. Moreover, there are some other techniques which are used in securing the reprogramming process such as the authentication flows (Lupu, Rudas, Demiralp Mastorakis, 2009, pp. 65). The choice for the DoS is to rekey the request packet. Therefore, it comes from the node only when two consecutive keys have been invalidated or lifetime of the key has expired. Sybil Attack: Wireless sensor network is vulnerable to the Sybil attack. In this case the node could be more than one node which is utilizing various identities of the legal nodes. A given single node could present multi identities to the other nodes which are in the network (Lupu, Rudas, Demiralp Mastorakis, 2009). Sybil attack it tries to degrade the integrity of the data, security as well as the utilization of the resource which the distributed algorithm attempts to achieve. Figure 1: The diagram show the Sybil attack How to mitigate the vulnerability This vulnerability could be mitigated through authentication as well as encryption mechanisms which prevent the outsiders from launching the attack to the wireless sensor networks (Ngo, Makihara, Nagahara, Mukaigawa Yagi, 2014, pp. 228-237). Moreover, the use of the public key cryptography could be used to avoid the insider attack. This method could be very costly especially to the resource constructed sensor networks. Identities need to be verified through use of the public key cryptography (Fragkiadakis, Angelakis Tragos, 2014, pp. 78). Other ways to prevent the vulnerability would be through use of the radio resource testing, verification of the key sets especially to the random pre-distribution of the key and the registration and position verification particularly in the sensor networks. Software attacks When it comes to the software program dependent attacks on the WSNs, the attacker might try making adjustment to the software code in the memory or perhaps exploiting the known vulnerabilities when it comes to the code of the software (Galbally, Marcel Fierrez, 2014, pp. 710-724). Example of a well known attack is the buffer overflow attack. In this attack the method attempts to store the data beyond the boundaries of the set length of the buffer, therefore results to overwriting extra data on the adjoining locations of the memory. How to mitigate the vulnerability/threat There are various countermeasures which could be employed to secure the WSN software and prevent it against software attacks they are follows: Authentication and validation of the software through remote software based attestation especially to the sensor networks. Defining accurate trust of the boundaries to the various components and users. Utilizing of the restricted environment for example the Java Virtual Machine (Rao, Rai Narain, 2017, pp. 4-8). Attestation of the hardware: It is the trusted computing group platform as well as the next generation acquire computing base that provides this kind of attestation. A more equivalent model might be utilized in the sensor networks (Kumar, Jain Barwal, 2014, pp. 859-868). Dynamic runtime encryption and decryption for the software program. This really is much like encrypting or even decrypting the data except that the code is running on the device which is being decrypted (Wu, Ota, Dong Li, 2016, pp. 416-424). This could prevent any kind of malicious user from exploiting this particular software. References Alam, S., De, D. (2014). Analysis of security threats in wireless sensor network. arXiv preprint arXiv:1406.0298. Fragkiadakis, A., Angelakis, V., Tragos, E. Z. (2014). Securing cognitive wireless sensor networks: a survey. International Journal of Distributed Sensor Networks, 2014. Galbally, J., Marcel, S., Fierrez, J. (2014). Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition. IEEE transactions on image processing, 23(2), 710-724. Ghildiyal, S., Mishra, A. K., Gupta, A., Garg, N. (2014). Analysis of Denial of Service (DOS) Attacks in wireless sensor networks. IJRET: International Journal of Research in Engineering and Technology, 3, 2319-1163. Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues,challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), 859-868. Lupu, T. G., Rudas, I., Demiralp, M., Mastorakis, N. (2009, September). Main types of attacksin wireless sensor networks. In WSEAS International Conference. Proceedings. Recent Advances in Computer Engineering (No. 9). WSEAS. Myers, S. A. (2017). U.S. Patent No. 9697409B2. Washington, DC: U.S. Patent and Trademark Office. Ngo, T. T., Makihara, Y., Nagahara, H., Mukaigawa, Y., Yagi, Y. (2014). The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication. Pattern Recognition, 47(1), 228-237. Prabhakar, S., Pankanti, S., Jain, A. K. (2003). Biometric Recognition: Security and privacy concerns. IEEE security privacy, 99(2), 33-42. Rao, J D. P., Rai, M. S., Narain, B. (2017). A study of Network Attacks and Features of Secure Protocols. Research Journal of Engineering and Technology, 8(1), 04-08. Ross, A., Jain, A. (2004, May). Biometric sensor interoperability: A case study in fingerprints. In ECCV Workshop BioAW (pp. 134-145). Wu, J., Ota, K., Dong, M., Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416-424.