Wednesday, August 14, 2013

School around the corner

Getting your child ready for school includes many things such as getting new clothes and school supplies. We would like to add one more thing to the list of things to do before school starts. Get your child’s library card in working order to assure that they will have access to computers or study materials that they may need. Check with the library to see if your child has any overdue books out or fines to pay and give them a clear card to start the school year. If they have lost their card a replacement can be purchased for $1. Call us today at 936-829-5497 for your library card check-up.

Join us for Movie Day at the library on Friday, Aug. 23, at 6 p.m. Our theme for the summer is hunger, so we are asking you to bring one can of tomatoes, tomato sauce, Rotel tomatoes, or spaghetti sauce per family, Hands free access, to be donated to Diboll Christian Outreach. Popcorn will be available. We encourage you to bring your own snacks and drinks to add to your fun. You may also bring pillows and blankets and sit on the floor to watch the movie. Come bring the family and join in the fun! Our movie license will not allow us to publicize the movie title so please call us for more information at 936-829-5497. Children under 12 must be accompanied by a parent or guardian.

“The Discovery,” by Dan Walsh – When aspiring writer Michael Warner inherits his grandfather’s venerable Charleston estate, he settles in to write his first novel. But within the confines of the stately home, he discovers an unpublished manuscript written by his grandfather, a literary giant whose novels sold in the millions. Though he had kept this novel hidden, he clearly intended that Michael should find it. As Michael delves deep into the exciting tale about spies and sabotage, he discovers something that has the power to change not only his future but his past as well.

“Daybreak,” by Shelley Shepard Gray – When Viola Keim starts working at a nearby Mennonite retirement home, she strikes up an unlikely friendship with resident Atle, whose only living relative, son Edward, is a missionary in Nicaragua. Viola understands the importance of mission work, but she can’t imagine leaving her father in the hands of strangers. It’s not in keeping with her Amish sensibilities. Though she doesn’t know Ed, Viola judges him for abandoning his father. When Ed surprises his father with a visit, both Viola and Ed are surprised by the attraction they have for each other. Despite her feelings, choosing Ed would mean moving to a far-off country and leaving her family behind – something she couldn’t possibly do. Her twin sister, Elsie, is going blind; her family is reeling with the recent discovery that her grandmother hid her past as an Englischer; her father seems forgetful and distracted and seems to be harboring some secrets of his own. Will the demand of family ties mean that her one chance at love slips away?

“Ambush,” Creek by Phil Dunlap – When U.S. Marshal Piedmont Kelly is asked by Cochise Sheriff John Henry Stevens to look into the suspicious activity of three unsavory bounty hunters, he rides into what looks like a battle’s aftermath. Bullet holes riddle a ranch house, but there’s no sign of those engaged in the gunplay. Nor is there any sign that the mysterious resident of the ranch house fits the description of the bounty hunters’ quarry. There’s nothing he can do but go looking for the missing man. Enlisting the tracking skills of his old friend Spotted Dog – the Chiricahua Apache whose life he once saved – the pair follow four horses from the rancher’s house all the way to Desert Belle, a dusty town that holds grim memories for Kelly. They ride straight into a deadly game where $50,000, several lives, and the survival of the Gilded Lily Mine are at stake.

Coverage of cyber attacks has typically focused on the dangers posed by foreign governments, or on the high-visibility strikes of social “hacktivists” like Anonymous or LulzSec. Yet many incidents stem from the work of corrupt inside officials or real time Location system, often abusing their privileged access to networks or using low-tech methods like dumping data to personal USBs and selling them for financial gain.

Defence ministries and companies make particularly attractive targets. For such institutions, the security of confidential information is vital, and any cyber breach can have serious implications for defence plans or costly procurement projects.
In March 2010, Michael Mitchell, a former marketing executive for Kevlar body armour at DuPont, was sentenced to 18 months in prison for selling trade secrets to Kolon Industries, a South Korean competitor, in exchange for consultancy work. A U.S. jury went on in September 2012 to award DuPont damages in the amount of $919.9 million.

The temptation to blame outside actors, however, remains strong across all industries. China and Russia are favourite targets. In 2011, Renault was forced to withdraw allegations of Chinese involvement in a data theft that proved to be an attempt by the firm’s own computer protection officer to fraudulently create work for a friend’s cybersecurity consulting business.

More widely, governments are acting to boost their resilience to cyber attacks. On July 30, the U.S. Senate Commerce Committee unanimously passed a new draft cybersecurity bill, despite concerns it waters down a number of changes proposed by the industry and the White House. In India, similarly, the director general of Army Signals HQ called for a vision of cyber as the “fifth dimension of warfare”, amid new worries that the country will not be able to deliver the infrastructure and expertise pledged in its National Cyber Security Policy.

Too little, however, is being done to incorporate anti-corruption efforts into cybersecurity planning, especially in the sensitive area of national defence. This is a mistake. Ensuring strong anti-corruption standards – through clear ethical leadership, risk assessments, internal training and other such good practice – is a key part of securing confidential assets.

The success or failure of defence companies to integrate such measures into their everyday practice also informs whom exactly governments choose to do business with. After all, defence contracts involve the sharing of privileged designs and information. This requires a relationship of mutual trust – especially on the cybersecurity front – which can be greatly undermined if one or more sides cannot be sure of possible corruption in the ranks.
Balance, however, is needed. The traditional focus of cybersecurity is on the restriction and protection of data. Yet such measures must also be paired with opportunities for safe, legitimate exposure of information by whistle-blowers. Employees encountering evidence of corruption in a company with fair, transparent systems for handling whistle-blower complaints will not have to resort to the messy process of leaking incriminating data to “hacktivists” or to the press.

Real cybersecurity, then, means protecting insiders from the corrupt actions of institutions, as much as protecting institutions from corrupt insiders.

It is important to get this nuance right, and to act now. Unveiling plans for a new cyber partnership between the UK Ministry of Defence, intelligence agency GCHQ and companies such as BAE, BT and Lockheed Martin, British minister Philip Dunne described the current cyber environment as a “gunpowder moment” – a potential game-changer, which, like the invention of gunpowder, could have profound security ramifications for us all.

Only organisations free of corruption can best weather this moment of transformation, guarding against external hacker threats, while also empowering whistle-blowers to protect against internal misdeeds. Cyber networks can, like gunpowder, prove a volatile material – a powerful tool in the right hands, but prone to explode spectacularly in the wrong conditions. If defence and industry leaders are not proactive in dealing with insider ethical issues, corruption might just provide the fateful spark.

Read the full products at http://www.ecived.com/en/.

No comments:

Post a Comment