Saturday, December 28, 2019

Animal Extinction - 2994 Words

Animal Extinction - the greatest threat to mankind In the final stages of dehydration the body shrinks, robbing youth from the young as the skin puckers, eyes recede into orbits, and the tongue swells and cracks. Brain cells shrivel and muscles seize. The kidneys shut down. Blood volume drops, triggering hypovolemic shock, with its attendant respiratory and cardiac failures. These combined assaults disrupt the chemical and electrical pathways of the body until all systems cascade toward death. Such is also the path of a dying species. Beyond a critical point, the collective body of a unique kind of mammal or bird or amphibian or tree cannot be salvaged, no matter the first aid rendered. Too few individuals spread too far apart, or too†¦show more content†¦The actual annual sum is only an educated guess, because no scientist believes that the tally of life ends at the 1.5 million species already discovered; estimates range as high as 100 million species on earth, with 10 million as the median guess. Bracketed between best- and worst-case scenarios, then, somewhere between 2.7 and 270 species are erased from existence every day. Including today. We now understand that the majority of life on Earth has never been - and will never be - known to us. In a staggering forecast, Wilson predicts that our present course will lead to the extinction of half of all plant and animal species by 2100. You probably had no idea. Few do. A poll by the American Museum of Natural History finds that seven in 10 biologists believe that mass extinction poses a colossal threat to human existence, a more serious environmental problem than even its contributor, global warming; and that the dangers of mass extinction are woefully underestimated by almost everyone outside science. In the 200 years since French naturalist Georges Cuvier first floated the concept of extinction, after examining fossil bones and concluding the existence of a world previous to ours, destroyed by some sort of catastrophe, we have only slowly recognised and attempted to correct our own catastrophic behaviour. Some nations move more slowly than others. InShow MoreRelatedAnimal Extinction Paper1574 Words   |  7 PagesAnimal Extinction Preventing Extinction Not much is thought about extinction in today’s society. One might argue that it is a small problem, and completely irrelevant; but according to statistics of scientific research, extinction is an important issue nationwide. Extinction of a species over time is undisputable, and inevitable; however, the burden of mankind on animals and their environment has caused extinction to increase severelyRead MoreAnimal Extinction And Its Effects On The Human Race Essay1692 Words   |  7 PagesTehilla Silverberg English College Writing Research Paper Animal Extinction and its Effects on the Human Race Animal extinction is a tremendous problem in our society. Every year, more and more animals are going extinct. If we don’t do something to stop it, we could see a massive animal extinction in our lifetime. Many people believe the extinction is irrelevant to human life. They are wrong. Every species in our universe is part of a web. If one specie on the web goes the whole thing slowly startsRead MoreHabitat Destruction and Extinction of Animals Essay2055 Words   |  9 Pageseach day within the world we live in, an immeasurable amount of animals are becoming extinct or endangered of becoming extinct because of the activities of civilization. Why should we care about habitat destruction and animal extinction? Thomas Jefferson once stated, â€Å"For if one link in nature’s chain might be lost, another might be lost, until the whole of things will vanish by piecemeal† (â€Å"Problem†). Countless number species of animals hunt smaller creatures, for example, frogs eat the mosquitosRead MoreZoos Are Saving Endangered Animals From Extinction1332 Words   |  6 Pagesessay) Zoos Are Saving Endangered Animals From Extinction Many thought zoos were just for attraction, but they are meant for more than just that. Several zoos that we go to nowadays with our families are not only there for the sightseeing of the animals, but they are they’re for their safety. Endangered animals are now the priority of practically every zoo in the world. There have already been six species around the world saved from extinction by zoos. One may wonder, what doRead MoreA Brief Note On Animal Extinction And Its Effect On Society Essay1569 Words   |  7 PagesTehilla Silverberg Ethics In Business Research Paper 2   Ã‚  Ã‚   Animal extinction is a tremendous problem in our society. Every year more and more animals are going extinct. If we don’t do something to stop it we could see massive animal extinction is our lifetime. In nearly 100 years from now we could lose about 50% of the world s species. The next generation won t experience the wildlife that is still out there if we don t make a change. Every species in our universe is part of a web. If one specieRead MoreImpact Of Biodiversity On The Extinction Of Plant And Animal Species1570 Words   |  7 PagesReview of Literature Issue: The rapid increase in the extinction rate of plant and animal species has proven to be a massive issue regarding biodiversity loss. Anil Markandya, from the Basque center for Climate Change and author of The Economic Feedbacks of Loss of Biodiversity and Ecosystems Services says, Globally, terrestrial biodiversity is projected to decrease by a further 10% by 2050. As with biodiversity, the planet has also experienced major losses in the services derived from ecosystemsRead MoreZoos : The World s Fifth Mass Extinction Of Animal Species874 Words   |  4 Pages Species of wildlife are facing global extinction on a massive scale. In the past 40 years alone, 52 percent of the world’s wildlife has disappeared from the face of the earth due to habitat loss, poaching, and climate change (Henn, 2015). Many scientists believe we have single-handedly caused the world’s sixth mass extinction of animal species. They believe that this extinction crisis is caused entirely by humans. Zoo believe that they can help the animals and the excitation rate by holding themRead MoreDefense, Protection from Extinction, and Intelligence Can Be Essential for All Animals828 Words   |  3 Pages Recently, there have been many articles relating to animals and their su rvival skills. Also, many researchers have been focusing on the daily life of a species and how well they can cooperate with both their neighbors and the wildlife surrounding them. Many have found that animals are much smarter than they are thought to be. They have a lot of potential which most species use to the fullest of their ability. For example, Allegra Staples wrote an article explaining how some spiders haveRead MoreExtinction Of Animal Extinction1024 Words   |  5 PagesThere have been five well known extinctions on this earth. The one most well known is the mass extinction that ended the dinosaurs. Mass extinction is often described as the elimination of a large number of species in a short period of time. Despite what many think, the elimination of species is almost commonplace at this point. The Earth is currently in the middle of a sixth mass extinction, and it’s been caused by the human race. It’s clear that a great extinction is coming from the evidence ofRead MoreAnimal Endangerment And Extinction Of Habitat925 Words   |  4 PagesI. Animal Endangerment/Extinction II. Abused/Abandoned Animals III. Over Farming/Land Misuse IV. Environmental Pollution V. Deforestation I. Animal Endangerment/Extinction A. Destruction of Habitat B. Pollution C. Hunting and Fishing II. Abused/Abandoned Animals A. Confined, Major Culprit Climate Change B. Huge Amounts of Manure, Pollutes Soil C. Dead Animals, Pollutes the quality of life for individuals who live close. III. Over Farmed/Land Misuse A. Soil Erosion B. Land Degradation C

Friday, December 20, 2019

Affirmative Action For College Admissions - 990 Words

Affirmative action in college admissions continues to be heatedly debated. In 2003, the Supreme Court had ruled in Grutter v. Bollinger that diversity was a compelling interest for colleges to use race in admissions. In the amicus brief that the American Sociological Association et al. provided to the Supreme Court, sociological evidence was presented to elucidate the value of affirmative action. Yet in 2006, Proposal 2 was passed in Michigan to ban affirmative action in public education (Levitsky). Based on the information in the amicus brief, the correlation between race and socioeconomic status of the minorities, and the negative effects of banning affirmative action, admissions officers at the University of Michigan should consider†¦show more content†¦Thirdly, they point out that a diverse student body better prepares college students to interact and work with individuals of diverse backgrounds in the future. By creating an environment where students can be exposed to a racially diverse group of people, their interactions further reduce prejudice and misconceptions about race (Grutter v. Bollinger, 2003). The amicus brief reveals that race is an inseparable component of an applicant s’ experiences and should not be excluded from the admission officers’ consideration. For some students, race is a central part of their identity. The struggles they face with it determines the achievements that they can present to the admissions officers. Despite the current ban on the usage of race in college admissions in Michigan, admissions officers should not ignore any part of a student’s unique circumstances, which may be related to one’s socioeconomic status, race, or both. In the article, â€Å"Still Separate, Still Unequal: America’s Educational Apartheid,† Kozol argues that the ongoing racial segregation and the lack of funding in schools consisting primarily of blacks and Hispanics are putting the poor and minority children at an disadvantage by not providing them a chance to have good teachers, classrooms, and other resources. While universities use scores to assess the academic ability of a student, minorities who attend schools segregated based on race or socioeconomic status may excel at what they are given, have the

Thursday, December 12, 2019

Reflective Journal on Creating Sustainability in Organization

Questions: Q1 Week 1st slide Introducing sustainability. Why is sustainability a complex and controversial concept? Q2 Week 2nd slide The business case for sustainability In your view, what is the most compelling business case for sustainability? Why is this so? Q3 Week 3rd slide Leadership for sustainability Cavagnaro and Curiel (2012) propose that sustainability leadership starts with the individual. Do you agree with this statement? Please justify your answer. Q4 Week 4 slide. Sustainability models to think with Why do existing sustainability models emphasis systems thinking? Answers: Week 1: Introducing Sustainability As referred to in the given presentation, I learn that the sustainability concept is thoroughly based upon the context that individuals along with their communities comprise of social, economical, and environmental systems which remain in constant interaction and balance in order that the community continues functioning for benefits of the inhabitants. I agree to the fact that a society is said to be sustainable if it operates in a balanced way based on its strengths and endurance into the future, thereby providing a decent lifestyle to the members (Pinnington, 2011). The presentation stresses that the concept may be interpreted differently but uniquely it is a developmental approach which aims at balancing competing needs against environmental, economic, and social limitation awareness that a society faces. I have learnt that living with the existing environmental limits has been one of the key principals of sustainable development. One outcome of not abiding by it is climate change . But the focus of sustainability concept encompasses wider zone. It includes building of strong, potential, and healthy society. This refers to the need to satisfy diverse needs of all individuals in present or future communities, social cohesion, enhancement of personal wellbeing, and developing scopes for equal opportunities. I consider that sustainable development refers to the development which satisfies the necessity of the current community without sacrificing the capability of future generations for meeting own needs. It acknowledges me that sustainability is interpreted as triple bottom line such as economic, environmental, and social (Peter and Swilling, 2014). I gather knowledge that the way we approach development impacts everyone. The effects of our decisions as a society give real outcomes for lives of societal people. For instance, ineffective planning of communities may result in reduction the quality of life of societal people. The presentation teaches me that in or der to maintain sustainability at all the three levels, it is to be bore in mind that this would have a significant impact upon the lives of the communal people. Social sustainability encompasses aspects such as social justice, social capital, social responsibility, ethics, gender equality, cooperation, participation, social cohesion, trust, etc. Week 2: The Business Case for Sustainability The slide under this topic reflects upon the corporate sustainability concept. From the given presentation about the given topic, I learn that drivers for business sustainability includes greater visibility of social injustices or environmental damage, increased public awareness of social issues, societal needs for sustainability, governmental legislative mechanisms, and emergence of global mechanism for governance (Osbaldiston, 2013). I learn that some institutions are intensively dedicated to global sustainability like that of United Nations Environment Program, Center for Sustainable Economy, Institute for Business and Professional Ethics, etc. Some resistances exist in the path of sustainability like that of skepticism and suspicion of academic researchers. I completely agree that for realizing sustainability, initiatives are to be honed to particular situations of firms in distinct industries. Sustainability benefits corporate organizations in a number of ways, such as it reduce s risks as well as costs, increases legitimacy as well as reputation, stimulates innovation, creates competitive advantage, values, and also promotes financial performances. Some examples can be given in this regard. Lack of commitment of James Hardie towards sustainability had led him to pay $1.5 billion as penalty to the asbestos victims. Organizations like Ikea, Westpac, and 3M pays greater emphasis on the corporate sustainability. I can reflect the positive impacts of sustainability upon organizations like Forbes, Fortunes, Dow Jones, etc. I have witnessed the wider outline of an innovative way of interpreting corporate sustainability matters taking shape at considerable time(Newman-Storen, 2014). I have gained knowledge and thinking about the significant relationship amidst environmental management as well as corporate performance, particularly in relating environmental management enhancements to financial value. As depicted in the presentation, the extra leverage brought about by active involvement of financial market players has been responsible in shifting the investment world towards alignment of objectives of corporate sustainability. The key elements identified in the process of attaining sustainability are active involvement of CEO, Board and Executive Team, etc. The presentation also emphasizes upon the need to inculcate positive culture and effective strategies to bring about assured sustainability in the organizations in the long run. It is also important to define improved efficiency within the value chain of an organization. Week 3: Leadership for Sustainability As depicted in the presentation, a leader is an individual who is solely responsible for crafting a definite vision as well as inspires people for achieving desired objectives of an organization against all those challenges arising along the way. A leader is one who inspires his members as well as supports them towards a better world. From the presentation, I learn that that the key attributes and styles of an effective leader for ensuring sustainability are that the leaders need to be systematic, understanding, and interdisciplinary. He needs to have emotional intelligence as well as caring attitude (Marshall, 2011). He needs to have a strong vision for making a difference. I learnt that the transition for sustainable operation is the greatest challenge a business will ever face. However, leadership is the key to bring about a positive change within the organization. Some of the leadership theories that are depicted in the presentation are Trait theory, behavioral theory, transactio nal leadership, participative leadership, situational theories, great man theory, and transformational leadership. Each of the type of leadership theories has been highlighted upon the presentation. I learn from the presentation that path to sustainable leadership involves cognitive intelligence, emotional intelligence, and systematic intelligence. Emotional intelligence refers to the type of social intelligence which involves the capability of monitoring own as well as others feelings for discriminating among them and using the information for guiding thoughts as well as actions. Systematic intelligence is the ability to perceive the whole as sum of sub parts that are interconnected. A society or an organization cannot achieve sustainability without thinking systematically. Some other leadership styles as depicted in the presentation are authentic leadership, ethical leadership, and servant leadership. Thus, it has been rightly stated by Cavagnaro and Curiel (Cullen, 2013) that sus tainability leadership initiates with an individual. An individual is responsible for the way he inculcates the leadership qualities or executes them. I totally justify with the statement as an individual must understand the need to be a leader in the organizational set up. Leadership qualities may be learnt but the best practice is to inculcate the qualities from within. In order to be an organizational leader, an individual needs to understand the urgency of the situation and act according to it. This refers to the need to satisfy diverse needs of all individuals in present or future communities, social cohesion, enhancement of personal wellbeing, and developing scopes for equal opportunities. I consider that sustainable development refers to the development which satisfies the necessity of the current community without sacrificing the capability of future generations for meeting own needs. Week 4: Sustainability models to think with Why do existing sustainability models emphasis systems thinking? Systems The main aim of sustainability models to emphasize upon systems thinking through modeling is to promote the results as well as process of visioning for moving the system successfully to a desired position. Models are said to focus techniques for creating visions which are viable as well as resilient, and are thereby crafted to continue with the sustainability principles. Sustainability models have certain attributes of models in general with constraints of resources based on which the system is built(Bottery, 2012). These models are likely to be heuristic and not predictive on account of the dependence upon normative interpretations of the specific system. System thinking or models produce static snapshots of the present system state or even dynamic representation of future cases which are anchored during the present situation. System thinking is greatly emphasized by sustainability models because of some key concepts that are core to those models. These are: All systems comprise of inter-connected parts since all the parts are connected to each other, hence any change in any part may affect the whole system. The system structure determines the respective behavior as because the attributes are specific to the system System behavior is an emergent phenomenon (Bullough and de Luque, 2014) Feedback loops control the dynamic behaviors of a system I learn from the presentation that path to sustainable leadership involves cognitive intelligence, emotional intelligence, and systematic intelligence. Emotional intelligence refers to the type of social intelligence which involves the capability of monitoring own as well as others feelings for discriminating among them and using the information for guiding thoughts as well as actions. Systematic intelligence is the ability to perceive the whole as sum of sub parts that are interconnected. References Bottery, M. (2012). Leadership, the Logic of Sufficiency and the Sustainability of Education.Educational Management Administration Leadership, 40(4), pp.449-463. Bullough, A. and de Luque, M. (2014). Women's participation in entrepreneurial and political leadership: The importance of culturally endorsed implicit leadership theories.Leadership, 11(1), pp.36-56. Cullen, J. (2013). Judi Marshall, Gill Coleman and Peter Reason, Leadership for sustainability: An action research approach,.Leadership, 9(2), pp.305-308. Marshall, J. (2011). En-gendering Notions of Leadership for Sustainability.Gender, Work Organization, 18(3), pp.263-281. Newman-Storen, R. (2014). Leadership in Sustainability: Creating an Interface between Creativity and Leadership Theory in Dealing with Wicked Problems.Sustainability, 6(9), pp.5955-5967. Osbaldiston, R. (2013). Synthesizing the Experiments and Theories of Conservation Psychology.Sustainability, 5(6), pp.2770-2795. Peter, C. and Swilling, M. (2014). Linking Complexity and Sustainability Theories: Implications for Modeling Sustainability Transitions.Sustainability, 6(3), pp.1594-1622. Pinnington, A. (2011). Leadership development: Applying the same leadership theories and development practices to different contexts?.Leadership, 7(3), pp.335-365.

Wednesday, December 4, 2019

Destructively Counter Striking Against Attackers - myassignmenthelp

Question: Should Private Companies And Governments Be Able To Mitigate Cyber Attack By Destructively Counter-Striking Against Attackers? Answer: Introduction It is an unanswered question whether counter attacking the hackers is just another method of ensuring that security hacks are prevented. It is observed that the IT security professionals and the lobby groups are demanding for fresh laws that would give weightage and room for the private entities to fight against the hackers. They are basically wanting to hack back at the states and corporates rather than depending upon the government to react to such attacks. It has been argued by many that the corporates should now undertake an active defence attitude which would help them fight the online security hacks. Although in the legal parlance, the same is yet to be dealt with the law part of it, yet it is construed that the same would not be considered as unethical if these private entities made efforts to halt the various hacks on their IP. It is very crucial to understand the phenomena cyber crime before heading towards safeguarding mechanisms that should be adopted by the private compan ies and the governments. A cyber crime is defined as a heinous crime wherein the information and communication technologies may be the main victim or the target of the crime and it may comprise of a single event or a number of events. Those who conduct such crimes are basically swayed by negative motivations such as thrill, profit making or vengeance. The said paper discusses about the fact whether the private companies and the government are able to fight a cyber attack by destructively counter striking against those who attack the cyber space. Unfortunately the cyber crimes are not only being conducted by the hackers but also by employees of a company past or present, as they enter the structures of the organization which otherwise they are suppose to protect. How Private Companies And Governments Be Able To Mitigate Cyber Attacks By Counter Striking The past four years has witnessed high profile cyber attacks in companies like JP Morgan Chase, Sony Pictures and Fiat Chrysler, which has toppled down the trust of the consumers as well as the staff members of the corporates so much that these companies are now drooling over spending huge amount so as to be able to improvise upon their presently active defence mechanisms against these attacks. However, the series of such attacks has been beneficial for the businesses, since they have allowed the companies to adopt a new procedure of protection against the attackers commonly known as active defence. As the name suggests it is a more aggressive methodology of fighting the crime rather than simply depending upon the age old methodology of applying pass-codes and firewalls (Sexton 2016). The owner of Black Hills Information Security, John Strand, uses such ways and means which would attract the attackers in a manner so that they would also fall into his trap or to be able to outline the steps taken by the attackers so as to be able to find out the origin of their attack. Unfortunately some of the victims use such methods which are illegitimate such as hack back against such a crime of the cyber world. As per the notion of many, even though hacking back may not be within the legal boundary, yet it becomes necessary at times to counter attack the criminals in their pattern only. After a flurry of destructive hacks, the private companies and the governments are trying to voice it back by strengthening their counter attacks thus looking more active methods so as to mitigate the threats from such cyber hacks. But ultimately, the first movers advantage with regards technological advancement rests with the attackers, wherein the lawful and political deliberations restrict t he area of counter attacks by victims. The increase in the number of cyber attacks has proved how weak the various sectors are such as the banking, retail, healthcare givers etc. Thus such attacks, eventually forced the companies to cater to such active defence methodologies. An active defence technique can be successfully used to trace hackers. One such took place in the year 2013, wherein the demonstrator has entre the cloud services which was being used by the hackers, got hold of their contact details and also was able to locate their office building with the help of GPS . However locating these criminals was easier but in spite of them stealing away millions of data and money, they have not been taken into custody and will never be. Simple reason for the same is that most law are national despite cyber crime conventions, while the internet is borderless and international by definition. (Kuchler, 2015) The fact is still debatable that whether counter-attacking the cyber criminals is acceptable and legal or not. However, the US alone, the Department of Justice names hacking back as likely illegitimate. However the same has not been defined as unlawful. It is the ethics which is guiding the hacking back. The issue here is that even if the law authorities are taking steps to punish the attackers, but the same is not deterring them from attacking further. If the judicial system is punctured due to the system in vogue, then it may not be considered vigilantism to take action against the attackers. Part of our public bond to produce and abide by government is to surrender our ordinary powers to take integrity into our control, in exchange of a more dependable and acceptable legal system. A person or entity is always entitled to defend oneself ad it does not wade off even if there is law to help him. However, the biggest risk in the hack back policy is that it may at times lead to hacking back the offender who actually was innocent simply because it is very difficult to identify the actual attacker at times. Thus even if the private companies and governments may be able to mitigate a cyber attack by counter attacking at the hackers, there still lies a possibility of counter attacking the innocent which is very devastating in nature. For instance in a DDoS attack, if one thuds out all the systems that were unsuspectingly attacked and were used to throng against ones system, the question being asked here is whether the innocent are being attacked due to the same and is it acceptable ethically. The owners of the systems may not be harmful and had no intention to act maliciously although they may be inattentive in updating their system against malicious attack. However the said type of attack against the attackers connotes that it is not important t prove a person or a group of persons guilty before one can act against a possible threat. If not done then most of the tim e the results and the outcomes may be devastating. Therefore keeping the guilt aside, one should ensure that if a person poses to be a threat then the same should be counter attackers in defence (Paganini, 2013). The critics about hack back system have questioned the mitigation policies of cyber attacks by counter attacks. As per them, the hacking back may lead to destruction of proofs which would else be available and required at the time of prosecution of the earlier stages of the attack. However the same criticism is counter attacked by the fact that it is acceptable to destroy the evidences, if that would ensure the prevention of the cyber attacks causing losses. The fact that if the private companies and government are able to mitigate the cyber risks via counter attacks, then the same if made lawful and legitimate would ensure deep rooted loss of those hackers who are involved in the IP theft. The counter attacks would lead to an increase in their cost in terms of the IP thieves thus ultimately deterring them from such a conduct. It is said by all that the government has not been able to implement laws which would help private companies safeguard themselves from such cyber attacks. However, the then US president, Barack Obama, noticed those calls in the month of March 2013, by entering into an agreement on signing the executive order that would ensure that the various government agencies would share data on the various cyber security related matters to those private entities. This order will help the entities become aware of the expected terrorization to their existing systems with the help of national intelligence. But unfortunately, the s aid arrangement will not help to vaccinate the companies who share data with the government agencies (Smith, 2013). There still lies a apprehension with regards the expected implications of allowing the private entities to counter attack. It is quite commonly used phrase the best defence is a strong offence also fits to some extent to the attacks caused by these cyber hackers. In cyber space the most apt defence is a strong defence, i.e the best solution is to defend oneself since the idea of retaliating someone else is senseless. If the hacker is being attacked back that will cause them damage too, then they would end up finding recourse into something else via the existing law prevailing and the channels of government. Hence applying a hack-back solution shows that the retaliators have not been able to understand the situation (Hutchinson, 2013). Hence it can be rightly construed that counter attack is a mere hack-back vigilantism and not any proactive policy which would help the problem to be insulated. Incidentally there lies three fold stage of defence- prevention, management of the occurrence of the attack and management of the situation. First, it states that the system should be designed in such a manner that it is safe from all ends from being attacked by any hacker. If the same is possible or done successfully, then all such attacks would be futile a preventive measures are already in place (Watkins et.al. 2016). Unfortunately, till date applications are designed but without considering security issues as a main issue to cater to. Mainly the active defence is expected to be conducted by governments. The intergovernmental co-operation will most probably act as a momentum for future developments of such active defence strategies in fields such as the exchange of intelligence. But unfortunately, in such a situation, many private entities are mistakenly construed as cyber criminals. Second, is the management of such attacks occurrence i.e. to make the staff and the others aware of the happening of such an attack which seems to be a better option than ultimate prevention. For ensuring that the attack is managed at the occurrence stage itself, various hurdles are installed. This management helps to protect the important data while such an attack is occurring. Further, it is more easy to handle the attack at this stage since prevention also may have various unmanageable loopholes unlike this stage (Rid, Buchanan, 2015). The last stage comprises of the management of the situation and the ultimate consequence of the attack. It has further two stages i.e. recovery and response. The recovery stage is an age old one wherein the organization which has been attacked tries to reinstate the entire operation to such an extent so as to construe as earlier situation. However, the second stage is a relatively newer one which calls for a more active defence strategy. If the attack is planned vigilantly with a lot of thought behind the same, then recovering from the same may become difficult. Thus the various tasks which can be categorised under the second category of response comprises of, getting hold of the correct attacker, measured counter attacks, asymmetries which discusses about what to do about the attackers which comprises of lesser number of IT assets and weaknesses and escalation which enables rating of the attack so as to decide whether the victim wishes to send a strong message o the attacker so that they are made aware for any such attacks again in future (Romanosky Goldman, 2016). Conclusion Thus on a concluding note it can be said that the cyber space is diseased by a number of attacks by these hackers. It is the fasting growing area of nuisance and the number of hackers have also been multiplying which each passing phase. The number and the type of crimes are so dangerous such as involving even luring the kids for meeting up with strangers and ultimately leading up to kidnapping and molestation that it has become a necessity to counter attack them rather than wait for the government and the law agencies to formulate laws and reinforce them. It is true that the said issue is a diplomatic one which cannot be resolved until the intervention of the government. It cannot be denied that practicality and the effectiveness are lawful alarms about hacking back. However, fi the same is legalised then the opportunities are huge. The fact that there still lies some intuitions against the hack-back method such as the risk of misidentifying the actual attacker and by mistake get hol d of an innocent person. Therefore it can be rightly said counter attacking can be used as a stop gap approach until and unless the cyber security and the law enforcement agencies are being able to find out better means to identify and punish these attackers. The said method of hack back is swinging like a pendulum between proactive policy and vigilantism. References: Geers,K., (2011), Strategic Cyber Security, CCD COE Publication : Estonia, Available at https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/papers/reading/Geers.pdf (Accessed 09th May 2017) Goodman,S.E., (2017), Cyberterrorism and Security Measures, Available at https://www.nap.edu/read/11848/chapter/6 (Accessed 09th May 2017) Glosson, A.D., (2015), Active Defence : An Overview of the Debate and a Way Forward, Mercatus Working Paper, Mercatus Center at George Mason University: Arlington, Available at https://www.mercatus.org/system/files/Glosson-Active-Defense.pdf (Accessed 09th May 2017) Hutchinson, J., (2013), Companies should hack back at cyber attacks : security experts, Available at https://www.afr.com/technology/enterprise-it/companies-should-hack-back-at-cyber-attackers-security-experts-20130527-j0rqm (Accessed 08th May 2017) Iasiello,E., (2016), Is the Best defence a strong defence in cybersecurity? Available at https://fabiusmaximus.com/2016/03/13/is-offense-best-defense-in-cybersecurity-94550/ (Accessed 09th May 2017) Kuchler,H., (2015), Cyber Insecurity : Hacking Back, Available at https://www.ft.com/content/c75a0196-2ed6-11e5-8873-775ba7c2ea3d (Accessed 08th May 2017) Lin,P., (2016), Forget About Law and Ethics Is Hacking Back Even Effective? Available at https://www.forbes.com/sites/patricklin/2016/09/26/forget-about-law-and-ethics-is-hacking-back-even-effective/#32ed84ac47d8 (Accessed 09th May 2017) Melancon,D., (2015), Should Companies Strike Back at Hackers? Available at https://www.tripwire.com/state-of-security/security-data-protection/should-companies-strike-back-at-hackers/ (Accessed 09th May 2017) Messmer,E., (2011), Is retaliation the answer to cyber attacks? Available at https://www.networkworld.com/article/2199010/malware-cybercrime/is-retaliation-the-answer-to-cyber-attacks-.html (Accessed 09th May 2017) Paganini,P., (2013), The Offensive Approach to Cyber Security in Government and Private Industry, Available at https://resources.infosecinstitute.com/the-offensive-approach-to-cyber-security-in-government-and-private-industry/#gref (Accessed 09th May 2017) Rid,T., Buchanan,B., (2015), Attributing Cyber Attacks, Journal of Strategic Studies, 38(1) and (2), pp. 4-37, Available at https://sipa.columbia.edu/system/files/Cyber_Workshop_Attributing%20cyber%20attacks.pdf (Accessed 09th May 2017) Romanosky,S., Goldman, Z., (2016), Cyber Collateral Damage, Procedia Computer Science, vol.95, pp. 10-17, Available at https://ac.els-cdn.com/S1877050916324590/1-s2.0-S1877050916324590-main.pdf?_tid=b09abc7c-3544-11e7-83f5-00000aacb35eacdnat=1494395659_f0cb6430e118607b25d1dca5d65428f2 (Accessed 09th May 2017) Rid,T., Buchanan,B., (2015), Attributing Cyber Attacks, Journal of Strategic Studies, vol. 38, nos. 1-2 Smith,G., (2013), Hacking back Could Deter Chinese Cyberattacks, Available at https://www.huffingtonpost.in/entry/hacking-back-chinese-cyberattacks_n_3322247 (Accessed 09th May 2017) Sexton,M., (2016), U.K. cybersecurity strategy and active cyber defence Issues and risks, Journal of Cyber Policy, vol.1, no.2. Tsagourias,N., (2013), Cyber Attacks, Self Defence and the Problem of Attribution, Journal of Conflict and Security Law, vol.17, no.2, pp. 229-244 Waxman,M.C., (2011), Cyber Attacks and the Use of Force, The Yale Journal of International Law, vol.36, pp. 421-459. Available at https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1403context=yjil (Accessed 09th May 2017) Watkins,LA., Hurley, J.S., Xie, S., Yang, T., (2016), Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications, Journal of Information Warfare, vol.15, no.3, pp. 35-45