Thursday, December 26, 2019

Information Security And The Security Systems - 715 Words

In the past few decades, personal privacy information is one of the world biggest things that people pay attention to it. With today modern technology, information security has become one of the most significant careers in the industries, and organizations assets, which appropriately need to protect the information. It has created different types of positions in the organizations and companies that can fit in a global business as a professional career. By using the operating systems through the internet, especially computer networks, security systems, or cellphones, business relies on Information Security or Information Technology to conduct in companies. So, the careers in the computer science or IT field are very a world wide spread use. The organizations are working and practicing together to ensure that IT can understand the requirement of business needed for the security systems. With the growth of using information system, it increases the concerns and attention about informat ion security based on the perspective theory that views this profession in many different perceptions. Therefore, the approaches of this field is targeting from different perspective that provide insights about the technology systems can go through businesses, becoming more importance and need the protection from this profession. In the article, â€Å"Making information security strategic to business† written by Arthur Corvielle.† The author is comparing about how our current world is quickly movingShow MoreRelatedInformation Security And Utilization Of Information System Security1067 Words   |  5 Pagestesting IT security regulations and defenses, organizations would not be able to successfully evaluate their organization information systems security levels. Businesses must have the capacity to recognize IT cybersecurity related issues and be able to follow important information safety practices and standards. Yearly cybersecurity awareness courses and practice test should be required to be executed and uphold safe computing requirements and enforce compliance guidelines in employees. Information sharingRead MoreInformation Systems Security1081 Words   |  5 PagesNT2580 – Introduction to Information Systems Security | Project Part 2 Student SSCP ® Domain Research Paper | Michael RyanNov. 27, 12Oyvind â€Å"OJ† Boulter | Mobile devices such as smartphones and tablets have allowed major productivity in the field and in the office and are starting to become an integral part of the business lifestyle. Although their intelligence allows greater productivity, it also makes them vulnerable to attack. A network is only as secure as its weakest link. PersonalRead MoreQuestions On Information Security System1271 Words   |  6 PagesQuestion 1: What is information security? Answer: Information Security is the practice of defending (guiding) information by considering the CIA Triad Principles which are Confidentiality (Authorize access), Integrity (Accuracy and Completeness) and Availability. Question 2: How is the CNSS model of information security organized? Answer: The Committee on National Security System (CNSS) is organize by considering the secure system attributes known as CIA triangle which extend the relationship amongRead MoreSecurity And Risks Of Information Systems Essay1268 Words   |  6 Pages Most significant IS security and risk issues Information systems have developed rapidly over time and are being relied by more people. With the increasing reliability of Information Systems, businesses have adopted them a lot. Companies or businesses using Information System have an advantage in competitiveness and efficiency (Hilton, 2013). AIC uses an IS in its activities to enhance communication and collaboration. Due to the wide use, Information Systems have become an important part of everydayRead MoreAccounting Information System Security1574 Words   |  7 Pagesbusiness, the management of company’s information online has developed into an issue to be concerned. AIS, which is short for Accounting Information System, is not merely related to accounting information management as the business develops around the world. In the various explanations of AIS in the Lecture 1, p12130 Accounting Information System, presented at the University of Nottingham Ningbo by Trevor Bayley, Vaassen (2002) defined AIS as provides inf ormation for decision-making and accountabilityRead MoreInformation System Security Plans For Information Systems1848 Words   |  8 PagesINFORMATION SYSTEM SECURITY PLANS HENRY KASIBANTE PROFESSOR: MARGARET LEARY UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE 10/05/2014 â€Æ' Contents 1- Introduction 2- Purpose 3- Scope 4- Security Plans for Information Systems 4.1 Rules of the System 4.2 Training 4.3 Personnel Controls 4.4 Incident Response Capability 4.5 Continuity of Support 4.6 Technical Security 4.7 System Interconnection 5- Guide for Developing Security Plans for Information Systems 5-1 System name and identifier 5-2 SystemRead MoreApplication Of Information Systems Security1210 Words   |  5 PagesCustomers are happy when they feel secure and relay on their business transaction with a company. Hence, information system security must be applied to insure a livelihood of the business. Systems security helps in avoiding or handling threats, vulnerability and disaster that can break the business lifecycle. Applying information systems security to an organizations’ IT infrastructure helps maintain CIA (Confidentiality, Integrity and availability), identify potential risk that could damage the businessRead MoreInformation Systems Security and Control2534 Words   |  11 Pages4550 Information Systems Security and Control When a computer connects to a network and engages in communication with other computers, it is essentially taking a risk. Internet security involves the protection of a computers Internet account and files from intrusion of an unknown user. Internet security has become an alarming issue for anyone connected to the net. This research paper argues the need for security over corporate intranets that have been dealing with the lack of security withinRead MoreSecurity Layout Of An Information System Essay2355 Words   |  10 Pages Name: Ben. W. Nyagah. Title: Security layout in an information system Course: ISC 6120 Lecturer: Dr. Namuye. Date of Submission: 5/02/15 TABLE OF CONTENT: A†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Objectives 1. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.Introduction: 2. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Software Security at Mr. Price a. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Customized malware. b. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Education. c. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Containment. d. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Monitoring. e. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ CryptographyRead MoreInformation Systems Security Review3002 Words   |  12 PagesInformation Systems Security Review Introduction Information systems have three parts which include hardware, software and the communications aspect. This view of Information systems is useful in applying industry standards for protection as well as prevention at all layers (Spagnoletti and Resca, 2008). Procedures will tell the personnel operating, or the administrators, how the products would ensure organizational information security. Information System implies information that requires protection

Wednesday, December 18, 2019

Human Torture SHOULD Be Legal Essay - 1837 Words

Despite the unconstitutionality of the practice, torture has had a presence throughout our nation’s history. From the Salem witch trials of 1692, in which Giles Corey was pressed to death, to the twenty-first century waterboarding of terrorist suspects, the United States has not always lived up to the ideal that torture should never be used for any purpose. The popular culture image of a man being beaten by police officers in a locked room away from public view is not just fiction but a semi-officially accepted means of ‘getting the job done.’ Alan Dershowitz refers to the specific example of â€Å"†¦ a case decided in 1984, [in which] the Court of Appeals for the 11th circuit commended police officers who tortured a kidnapper into†¦show more content†¦Once you agree that, however distasteful it may be, torture may be an acceptable option under certain circumstances, you must then concern yourself with the practicality of its application. Fir st, it must be determined when it would be acceptable to use torture in an official capacity. It should not be used as a deterrent towards future heinous acts, although this may be a beneficial side effect. To torture someone simply to send a message to our nation’s enemies would not only be counterproductive but also an act of evil. While torture itself may be seen as evil by many, there are situations where it would potentially be more evil to do nothing at all. Creating a set of guidelines also mitigates the possibilities of greater harm done in the heat of the moment. Torture is already being employed by authority figures but without a clearly defined set of official guidelines. Michael Levin states that â€Å"[he] is advocating torture as an acceptable measure for preventing future evils (549).† The situations in which torture could be allowed must be emergent in nature, with the clearly defined possibility of death or injury to the innocent. Beating a confession out of a suspected murderer would not be an authorized use of torture, because the terrible event has already taken place. No one’s life is immediately at risk ifShow MoreRelatedTorture Is Not Always Protect The Vulnerable1672 Words   |  7 PagesTorture is not always used to protect the vulnerable; historically it has been used to extract information about the enemy, to bring terror especially during conflicts and to punish the defeated. Despite the fact that it might seem morally justifiable, it is morally unethical. Torture in this form of practice is uncontrollable; people lose their lives or became damaged for lifetime. There is not much control over that practice, it can start from occasional, non-leaving physical permanent injuryRead MoreTorture and Ethics1604 Words   |  7 PagesTorture and Ethics Paper Alfreepha Williams AJS/532 July 21, 2013 Patricia DeAngelis Torture and Ethics There are many views or definition of the word â€Å"torture†, which is often debated by many individuals. According to â€Å"International Rehabilitation Council For Torture Victims† (2005-2012), â€Å"torture is an act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes as obtaining information or a confession, punishing him for anRead MoreThe Legal And Ethical Perspective Of The World War II1354 Words   |  6 Pages Throughout the course of human history, enemy combatants of the defeated forces were generally taken as war prisoners, often expected to confront brutal tortures or agonizing executions. Such trend managed to steer its way into recent human history. Some of the most atrocious crimes committed against mankind were witnessed during the second World War where prisoners of war underwent unthinkable torture procedures either to give confessions or for the purpose of human experimentation. Hence, participantsRead MoreTorture As An Intelligence Gathering Tool For Gaining Information938 Words   |  4 Pageswhether or not the government should be able to make a human endure extreme pain and suffering in order to gain information. Whereas some are convinced that torture is inhumane and unethical and the information that is gained is at times inaccurate and a waste of time to rely on, others maintain that torture is a good way to retrieve information that is crucial to prevent future devasta ting events that may end many American lives. With that being said, I agree that torture is a fundamental tool for gainingRead MoreWheel of torture1724 Words   |  7 PagesWHEEL OF TORTURE Ten (10) Philippine National Police officers have been discharged after revelations that they played a game called â€Å"wheel of torture† at a secret detention facility. The Commission on Human Rights is looking into the supposed maltreatment of up to 41 detainees in the Philippine National Police facility in Bià ±an, Laguna. The facility is a 200-square-meter bungalow being rented by the Laguna police intelligence branch first district unit composed of 12 staffs. At the kitchen areaRead MoreTerrorism And The International Humanitarian Law Essay1329 Words   |  6 Pagesinternational humanitarian law cannot be used to â€Å"humanize war† and that they may impose states to create â€Å"effective humanitarian limits on the conduct of wars† (Jochnick, 51). They also outline the importance of understanding the events of â€Å"past legal effort to regulate war† in an attempt to reassure that mistakes are prevented and that outcomes in regards to protecting c ivilians can be better predicted (51). Consequently, many nations were not relatively happy at the outcome of the war on terrorRead MoreDoes The United States Have A Right For Torture Suspected Terrorists?988 Words   |  4 PagesDoes the United States Have a Right to Torture Suspected Terrorists? Torture is known as the intentional infliction of either physical or psychological harm for the purpose of gaining something – typically information – from the subject for the benefit of the inflictor. Normal human morality would typically argue that this is a wrongful and horrendous act. On the contrary, to deal with the â€Å"war on terrorism† torture has begun to work its way towards being an accepted plan of action against terrorismRead MoreIs Torture Morally Wrong?1265 Words   |  6 Pagesbelief that torture is morally wrong. Popular culture, religious point of views, and every other form of culture for many decades has taught that it is a wrongdoing. But is torture really a wrong act to do? To examine the act of torture as either a means or an end we must inquire about whether torture is a means towards justice and therefore morally permissible to practice torture on certain occasions. â€Å"Three issues dominate the debates over the morality of torture: (1) Does torture work? (2) IsRead MoreArgumentative Essay On Torture1025 Words   |  5 Pagesand damage. We know torture these days to get information from captives, especially in the war against terrorism. With all the research, I did for this argument in this class I change my belief as against torture where I was for it in the beginning. With the research, I did it just seems as an unreliable tool to extract information from captives because under extreme pain the human mind will say anything to make it stop no matter if it’s true or false. Therefore, torturing should not be permissibleRead MoreTorture Should Not Be Justified By Dr. Martin Luther King1320 Words   |  6 Pagesconsider that torture could be justified even if it is to help save lives because torturing does not solve the larger problem at hand, and that is to create permanent peace. The topic of torture should not be debatable because there are international laws set in place to prevent such barbaric trea tments against any human. Furthermore, torture is fundamentally wrong from a moral perspective because it is causing harm to another person. Instead of torturing terrorists for information we should utilize in

Tuesday, December 10, 2019

Kathleen McGhee

Kathleen McGhee-Anderson: categorical denial Essay Playwright Kathleen McGhee-Anderson actively defies categorization. She has written successfully for theatre, film and television, crossed with ease the line between drama and comedy, and created an unusual literary voice which combines pure theatricality with poetic flourish and cinematic technique. Mothers her latest stage effort, presented last spring at New Jerseys Crossroads Theatre Company under the direction of Shirley Jo Finney confirmed McGhee-Andersons gift for gracefully combining seemingly disparate elements. Enthusiastically received first during readings at Los Angeless Mark Taper Forum, and then at Crossroads 1992 Genesis Festival of New Voices, Mothers became McGhee-Andersons second mainstage production at the New Brunswick theatre in as many seasons. Her first was 1992s Oak and Ivy, a lyrical work which dramatizes the lives and marriage of African-American poets Paul Laurence Dunbar and Alice Ruth Moore. Mothers deals with the parallel stories of Jean, a tough Kentuckian, and Mariko, a Japanese-American, whose lives correspond in crucial ways: each resides in a 1960s Chicago tenement, has been abandoned by an African-American husband, and is dedicated to raising a mixed-race, teenage daughter. The project was commissioned by Bill Cosby and based largely on interviews McGhee-Anderson conducted with two women Cosby met during his travels. The playwright (herself the mother of a 15-year-old son) was also inspired by her own mother. I was raised in a family where there was a mandate to work politically, to raise controversial issues and to fight, McGhee-Anderson says. Both of her parents had been noteworthy civil rights activists; her grandparents, with Thurgood Marshall as their attorney, fought a groundbreaking equal-housing case in the 1940s. I was always expected to continue in that tradition, she adds, and, in my own way, I think I have. Literary rebel   Although dedicated to writing about issues of political and social importance, McGhee-Anderson is also something of a rebel when it comes to literary form. Her work utilizes monologue and poetry, manipulation of time and space, verbal duets and live musical accompaniment, melded into a dense, seamless flow of storytelling. The distinctive style comes from years of study and practice in writing for both stage and screen. When I wrote my first play as an undergraduate at Spelman College, a professor remarked that it was highly cinematic, she recalls. At that time, I didnt even know what that meant, but I had of course been influenced by movies, as was everyone from my generation. After a brief stint as a journalist with the Detroit Free Press, McGhee-Anderson combined her interests in theatre and cinema by earning an M.F.A. in directing at Columbia Universitys Film School, and went on to become a film editor and cinema professor at Howard University. During these years, her writing for the stage grew more and more reliant on cinematic techniques like cross-cutting and parallel story structure. I found the effect of cutting together different images incredibly potent, McGhee-Anderson recalls. Its like alchemy. I dont think in a straight line. Words flow for me in a kind of impressionistic weave. It was only when I threw away all of the structural expectations I had been taught in writing class that I began to find my voice. No matter how resistant people may be to an intellectual argument, she continues, they respond to the emotional experience of theatre. Though I love experimenting with form, its always in an attempt to drive the point home or to work the emotions. In Mothers, McGhee-Anderson deals simultaneously with race issues, sexual politics, single parenthood and multiculturalism. The America depicted in the play is a country in which racism is part of the social fiber, a daily reality for the characters. As the newly Americanized Mariko is told by a fellow Army wife, becoming an American means learning what not to like. .u47e0c5f16d6855d6ef2e7a39e8e826f1 , .u47e0c5f16d6855d6ef2e7a39e8e826f1 .postImageUrl , .u47e0c5f16d6855d6ef2e7a39e8e826f1 .centered-text-area { min-height: 80px; position: relative; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 , .u47e0c5f16d6855d6ef2e7a39e8e826f1:hover , .u47e0c5f16d6855d6ef2e7a39e8e826f1:visited , .u47e0c5f16d6855d6ef2e7a39e8e826f1:active { border:0!important; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .clearfix:after { content: ""; display: table; clear: both; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u47e0c5f16d6855d6ef2e7a39e8e826f1:active , .u47e0c5f16d6855d6ef2e7a39e8e826f1:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .centered-text-area { width: 100%; position: relative ; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u47e0c5f16d6855d6ef2e7a39e8e826f1:hover .ctaButton { background-color: #34495E!important; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u47e0c5f16d6855d6ef2e7a39e8e826f1 .u47e0c5f16d6855d6ef2e7a39e8e826f1-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u47e0c5f16d6855d6ef2e7a39e8e826f1:after { content: ""; display: block; clear: both; } READ: Alexander meets with theatre professionals at forum EssayMy concern is to tell the blunt, terrible truth about the damage done to |others in this country, McGhee-Anderson says, to examine how many feel rejection and hatred and indifference on a daily basis. I would love for my work to stand for itself, she continues, and not be filtered through reactions to the fact that I am black, female, of a certain age or even that Im a light-skinned black person, which, for those theatres mainly wanting a minority to fill some sort of quota, might be interpreted as my not being |black enough.' Another kind of bias she has encountered, McGhee-Anderson explains, is from theatre directors whose vision of her has been tainted because she has made a living writing for series television. Its often difficult to do more than one thing, she says, but Ive always resisted that kind of categorization because Ive been so narrowly and negatively defined by it all my life. My job is to keep tapping into my own vision in whatever way it presents itself to me.

Monday, December 2, 2019

Socrates And Ethics Why One Should Be Moral Essays - Ethics

Socrates And Ethics: Why One Should Be Moral Why should one be moral? Epistemology deals with truth versus opinion. Questions include what is truth, and what is its source? Is truth absolute or relative? Lastly, Ethics deals with right and wrong. It also deals with the interactions between people and their society. Students of Ethics might ask What are our obligations to ourselves and society? and Why should one be moral? I will attempt to answer this question. I think it is important to define morality and ethics, as I understand them. Morals are a set of rules passed to us through social and religious experiences that serve to govern our independent actions. Moral beliefs rest only on our sense of right and wrong. It is important to note that morals only apply to individual action and consequence. Ethics, however, apply to the actions of two or more people. Ethics are meaningless unless applied in a social context. Ethics serve to define the acceptable actions of the individual within the social structure. Ethics are established through the consensus of many people and with the guidance of human experience. With morality, ones behavior is held to an ideal code of conduct. Ethics, however, deals with an imperfect, but attainable set of practices. It is left to the individual to take a decision that is moral, regardless of its ethical standing. Socrates held that To know the good is to do the good. By this, he meant that no man knowingly acts against his own interest. Socrates believed that no man could consciously do wrong if that person truly knew the right course of action. Socrates defines moral as being the logical result of rational thought. Through reason, one will know morality. Plato, a student of Socrates, held a similar view. Plato taught that moral values are absolute truths and thus are abstract perfect entities. He called this the Idea of the Good. The Idea of the Good is the supreme source of all values. Plato felt that this was the fulfillment of truth and reality. He also defines this good as unachievable. This good is something to be sought after, but never achieved. Aristotle held that there were two kinds of virtue: moral and intellectual. He felt that morals are the tempering of mans natural desires and appetites. Intellect, he says, is the development of acceptable habits through repetition. He believed that We become just by doing just acts. Aristotle argues that most virtues fall at a mean between more extreme character traits. According to Aristotle, it is not an easy task to find the perfect mean between extreme character traits. In fact, we need assistance from our reason to do this. Additionally, Aristotle disassociated morality from God. He taught that God is too pure to bother with such trifles. He states that God is Thought thinking thought. Through my discussions with several other people, I have come to the conclusion that morality and ethics are closely interrelated. I propose the idea that a person can be moral and ethical. I further believe that a person can be moral and unethical. I think, however, that a person cannot be immoral and ethical. I believe that ethical behavior is a direct result of morality. I will restate my definition of morals and ethics: morals are perfect and unachievable, and ethics are imperfect and achievable. It may seem odd that a person must first be perfect (moral), before he can be imperfect (ethical). I posed several questions to my friends and family. They included the question Can a lecherous president who performs all his political duties be considered moral and/or ethical? Each person interviewed felt that neither was possible. Cited examples were that this president could propose laws concerning equal rights for women. His actions, however, would demonstrate that he did not in fact believe in the laws he mandated. His deeds (lechery) would be immoral and would therefore invalidate his laws. It would be a demonstration of the adage Do as I say, not as I do. The Golden Rule is a classic example of this. We should do unto others what we would have others do unto us. Since I do not want