Tuesday, December 31, 2019

The Canadian Charter Of Rights And Freedoms - 1635 Words

The Supreme Court of Canada uses the Canadian Charter of Rights and Freedoms to limit the scope of legislation and administrative power by implementing section one of the charter; which results in an open dialogue between the government and the courts on various legislation deemed unconstitutional. In this essay I will discuss the extent in which section one of the Canadian Charter allows the Supreme Court of Canada to dictate legislation, how they go about narrowing legislation and administrative power through the Oaks test, and the history of the Supreme Court from 1982 – present day will be analyzed resulting in an understanding of the legitimacy the courts play with such a role. To understand how the Charter allows the courts to dictate legislation first we must understand the properties surrounding section one of the charter. This section opens up a dialogue between the courts and the government attempting to pass legislation. If said legislation is deemed unconstitutional, the courts challenge the legislation and request a justification on the infringement(s) of the rights in question. For an infringement to be found within an act it must fail to meet certain criteria which includes the values that are essential to the rule of law. First governments should now act in arbitrary ways; meaning that if laws will limit a right found in the charter they must not be contradictory, unclear, secret, or vague, or you undermine the reason we have law. These results in the courtsShow MoreRelatedThe Canadian Charter Of Rights And Freedoms1617 Words   |  7 Pages Since its inception in 1982 the Canadian Charter of Rights and Freedoms, very much like its primary architect Pierre Trudeau, has been one of the most celebrated yet controversial elements of Canadian politics and governance. Revealing how this dynamic emerged requires a nuanced understanding of the motivation behind the Charter and the techniques it employed to succeed. The Canadian Charter of Rights and Freedoms, like the entire patriation process, was motivated by and mobilized support throughRead MoreThe Canadian Charter Of Rights And Freedoms1613 Words   |  7 Pages The Canadian Charter of Rights and Freedoms simply referred to as the â€Å"Charter†, is a significant document in regards to the Canadian constitution. Its primary aim is to uphold individual rights and freedoms and promote equality in administering justice. However, its passage in 1982 has led to increased controversies given that the Charter gives courts more power in interpreting its provisions while sidelining the legislature (Boyd 118). This means that the advent of this Charter was the end ofRead MoreThe Canadian Charter Of Rights And Freedoms840 Words   |  4 PagesThe Canadian Charter of Rights and Freedoms is an important milestone in Canadian history. An effort through rigorous debate and compromise gave birth to this document that defines our collective values and principles by guaranteeing and protecting the fundamental rights of its citizens. Prior to the Charter, there was no gurantee in Canada that rights and freedoms would not be taken away by legislation. T he Charter also allows courts to render the constitutional duty so that any decisions made areRead MoreCanadian Charter Of Rights And Freedoms1888 Words   |  8 PagesThe Canadian Charter of Rights and Freedoms protects the rights of Canadian citizens and provides them with assurance that all Canadians will be treated equally under the law. The Charter claims to guarantee rights and freedoms, fundamental freedoms, democratic rights, mobility rights, equality rights, language rights, legal rights, and enforcement rights, and Aboriginal rights. Although the Charter claims to guarantee the rights and freedoms of Canadian citizens, the government is still able toRead MoreThe Canadian Charter Of Rights And Freedoms1258 Words   |  6 PagesThe Canadian Charter of Rights and Freedoms was established in 1982 and was put into place by the Trudeau government. The purpose of the Charter was to protect the rights of Canadian individuals and to establish independence from Britain. However, o ne section of the charter sparked much controversy, this was section 33, also known as The Notwithstanding Clause. The purpose of this clause was to allow the state to override a right protected by the charter, for various reasons. These reasons includeRead MoreThe Canadian Charter Of Rights And Freedoms1531 Words   |  7 PagesBasing the Basics on a Belief in Something Bigger The Canadian Charter of Rights and Freedoms, implemented in 1982 outlines the rights and freedoms that Canadians have as citizens of this country. In this paper I will ask whether we need such a charter, whether we can trust the interpretation of the Charter by the Supreme Court and how the Charter balances power in a democratic way. I will then contemplate the foundational place morality holds in the lawmaking process. In all of this I argue thatRead MoreThe Canadian Charter Of Rights And Freedoms1386 Words   |  6 Pagesprinciple by entitling an accused of even the most heinous crimes to civil liberties and processes as not to compromise the criminal trial process. A fair trial is an intrinsic right of all members of society making it fundamental to our being, and is ergo ensured to us all under s.11 of the Canadian Charter of Rights Freedoms. Provided with other preemptive measures to guarantee justice is achieved in the criminal trial proceedings. Additionally, the courts help facilitate an understanding of theRead MoreThe Canadian Charter Of Right And Freedom1225 Words   |  5 Pagescriminal and family justice system has become very complicated, slow and extremely expensive for majority of Canadians. These issues are particularly glaring to low income earners, people with disabilities and other minorities. Canadian justice system have become incapable of providing solutions that can addressing problems brought to it. With the creation of the Canadian charter of right and freedom, access to justice became more of an equality issue. It moved from simply being the capacity to litigateRead MoreThe Canadian Charter Of Rights And Freedoms1504 Words   |  7 PagesThe Canadian Charter of Rights and Freedoms(CCORAF) Guarantees a Free and Democratic Society The Charter of Rights and Freedoms upholds the individual rights of all Canadians. Agree or disagree with the following statement. The Charter is part of Canada’s constitution; the highest law of Canada, which sets out the framework for how Canada is to be governed. The CCORAF sets out those rights and freedoms that Canadians feel are necessary to maintain Canada as a free and democratic community. The CharterRead MoreThe Canadian Charter Of Rights And Freedoms883 Words   |  4 PagesRainbow Nation of South Africa in 1994, the first democratically elected government was tasked with drawing up a new constitution that would properly enshrine the human rights that had so long been denied the majority of citizens. One source drawn upon in developing the new constitution was the Canadian Charter of Rights and Freedoms, itself then little more than a decade old. It is not necessary to be a constitutional scholar to detect many similarities between the two; indeed, Canada’s pride in this

Monday, December 23, 2019

A Farewell To Arms By Ernest Hemingway Analysis - 1087 Words

In 1914, one of the worst wars in history started -- World War I. During this time, Italy suffered about 460,000 to 650,000 casualties of both military soldiers and citizens. Most of the people in Italy did not want to fight, but their lives were endangered as if they had no value or purpose. In the novel, A Farewell to Arms, Ernest Hemingway explores the hardships of the war through an ambulance driver in World War I referred to as Lieutenant Henry. Lieutenant Henry sees and experiences many things in his war experience, but overall comes back to the same realization: there is not much meaning in life. Throughout the novel, Hemingway teaches the reader that life is meaningless through the character’s relationships with each other, their†¦show more content†¦Even if a man is injured, the officers will still send him out into the war as soon as he can walk and hold a gun again. Men are thrown into battle with no way to change their situation, making the effort to live pointless. To recapitulate, life’s meaningless is represented through characters’ relationships. An additional way Hemingway shows the meaninglessness in life is with the characters’ views on the war. First, the ambulance drivers’ views on the war prove that life has no meaning. Passini, one of the ambulance drivers, says â€Å"‘When people realize how bad it [the war] is they cannot do anything to stop it because they go crazy’† (41). He points out that the war is despised by everyone, yet no one can rectify its corruption; they just have to deal with the war. After fighting an unwanted war, it takes the meaning of life away and life becomes pointless. Another reason that life is without purpose is that the priest has very little hope for the war. The priest says, â€Å"‘I had hoped for something†¦ now I don’t know’† (137). The priest is normally the most hopeful and sacrosanct person in a town, but the war is so bad that even he has a hard time holding onto faith. No one has hope for this war, showing that the m eaning in having faith is completely gone. A final reason life is so meaningless is that soldiers are willing to harm themselves to escape the war. AllShow MoreRelatedAnalysis On The Farewell Of Arms By Ernest Hemingway1101 Words   |  5 PagesThe book I chose to do my analysis on was A Farewell to Arms, written by Ernest Hemingway in 1929. It has a first person narrative and is told by American ambulance driver Frederic Henry who finds love in the form of a nurse named Catherine Barkley all while the first world war is happening in the background. The story almost serves as a biographical piece on Hemingway himself as many of the events and experiences in it are inspired by real life ones that affected him. He did fight in World War 1Read MoreA Farewell To Arms By Ernest Hemingway Analysis747 Words   |  3 PagesSchmidt †¢ A Farewell to Arms, Ernest Hemingway (born on July 21,1899 and died on July 2,1961) He was raised in Chicago, and he moved to Paris after marriage. Hemingway contributed to literature during his time by writing for his high school newspaper and later became a journalist for Kansas City Star. He also became a companion of a lot of successful writers with Gertrude Stein teaching him. (â€Å"Ernest Hemingway† Biography.com) †¢ Original publication- September 1929 (â€Å"Ernest Hemingway† BiographyRead MoreA Farewell To Arms By Ernest Hemingway Analysis1694 Words   |  7 Pageslives the way they wish they could. One example of this is in Ernest Hemingway’s novel, A Farewell To Arms. The brave World War One ambulance driver, Frederic Henry, shares many traits with the esteemed author. It’s almost like he’s the Batman to Hemingway’s Bruce Wayne. Hemingway often wrote from experience, whether it was drawing upon his experience at a bullfight or even writing about his time spent on the Italian front (Ernest Hemingway Biography ~ World War I 1). He shares several experiencesRead MoreAnalysis Of Ernest Hemingway s A Farewell Of Arms 1369 Words   |  6 Pagesof courage, glory, and selflessness. A Farewell to Arms, written by Ernest Hemingway, is a recollection of his war experiences. The protagonist, an American Lieutenant named Fredric Henry, struggles to find the middle ground between his affair with the beautiful and radiant Catherine Barkley and pursuing heroism in the Great War. The lovers’ lives are turned upside-down once they realize they are infatuated with each other. Like Lieutenant Henry, when Hemingway was â€Å"serving at the front, he was woundedRead MoreAnalysis Of Ernest Hemingway s A Farewell Of Arms 1219 Words   |  5 Pageswar cannot overcome the bond between lovers. However, Ernest Hemingway c ontrasts this version of war and love in his novel, A Farewell to Arms. He utilizes his past experiences in World War I to illustrate warfare from the perspective of a soldier on the front lines. His novel portrays romance in a negative light, showing an alternative result of love, rather than the clichà © â€Å"happily ever after† endings. In A Farewell to Arms, Hemingway suggests that love can only serve as a temporary haven inRead MoreAnalysis Of Ernest Hemingway s The A Farewell Of Arms 988 Words   |  4 PagesA Farewell to Arms - Modernism In the A Farewell to Arms, Ernest Hemingway incorporates a literary style known as Modernism. Literary Modernism, or Modernist literature, had its origin in the late 19th and early 20th centuries. The horrors of World War I perceived, were taken into consideration by Modernists as the prevailing assumptions about society were reassessed. Thinkers such as Sigmund Freud began questioning the rationality of mankind. Hemingway includes perspectivism, impressionism, andRead MoreNot Only Did The Effects Of War Negatively Influence Henry’S1282 Words   |  6 PagesNot only did the effects of war negatively influence Henry’s actions, the theme of tragedy and the horrors of war also influence the entire Italian Army. For example, in Moddelmog’s literary analysis, the author refers back to novel to discuss the temptations that are depicted by Hemingway to give an accurate representation of the daily lives of the soldiers and the author hints at a justification for their actions: â€Å"It might sound sordid, but during war who can blame soldiers for seeking pleasurableRead MoreThe Sentimental Education of Frederic Henry (Hemingway’s Other Possible Title)975 Words   |  4 Pages Ernest Hemingway’s protagonist Frederic Henry says A Farewell to Arms with a double meaning. The novel title is word play reflective of first, Frederic’s desertion of the war. His second farewell is to the arms of his beloved, Catherine Barkley after her death in childbirth. Wandering stoically through life, looking for some natural progression, Frederic lets one circumstance lead him to the next. At first, Frederic exhibits the hedonistic aspirations of a college fraternity pledge, motivatedRead MoreCoping with War: A Comparison Between Slaughterhouse Five and A Farewell to Arms1630 Words   |  7 PagesEarnest Hemmingway once said Never think that war, no matter how necessary, nor how justified, is not a crime. (Ernest Hemingway: A Literary Reference) War is a gruesome and tragic thing and affects people differently. Both Vonnegut and Hemmingway discus this idea in their novels A Farewell to Arms and Slaughterhouse Five. Both of the novels deal not only with war stories but other genres, be it a science fiction story in Vonnegut’s case or a love story in Hemingway’s. Despite all the similaritiesRead MorePsychoanalytic and Femisnist Theories in A Farewall to Arms by Ernst Hemingway2059 Words   |  9 Pagesâ€Å"A Farewell to Arms† written by Ernest Hemingway in 1929 attracted much critical acclaim and theoretical interpretation helping to understand the author’s message to the readers the overall importance of the literary work in the world. The events of the novel took place during the First World War in Italy revolving around Frederic Henry, an American ambulance driver working for the Italian Army and being wounded on the front. Another very important character in the novel was Catherine Barkley, the

Saturday, December 14, 2019

Live Theatre Review Free Essays

The actors and director of The â€Å"Woman In Black† had complete power and control over the audience’s reactions and emotions. For our Drama GCSE we went to see â€Å"The Woman in Black†, on Monday 1st December 2003. The play was showing at the Fourtune theatre and was based on a book by Susan Hill; which was adapted by Stephen Mallatratt. We will write a custom essay sample on Live Theatre Review or any similar topic only for you Order Now The â€Å"Woman In Black† is about a middle aged solicitor called Arthur Kipps, who years earlier had lost an infant son following some eerie incidents in an English town. In hopes of getting rid of his personal demons and ghosts, he approaches a young actor to turn his written account into a theatre piece (re-enactment.) It shows all of the happenings with a recently deceased woman called Alice Drableau and her remote, mysterious house. The play explores the issues of the supernatural and things beyond the human world, such as ghosts and things that are invisible to the human eye; created by mime and the actors and audience’s imagination. I think that the play and the actors explored these issues very well, but I am not sure if they were explored in a believable way. I thought that the first half of the play was quite slow, tedious, and we weren’t drawn in so there wasn’t any control over us whilst watching it. However, when the play reached the second half the pace started to pick up, and tension was created, which drew us in and gave the actors control over our reactions. It was remarkable how far people in the audience were willing to go with their imaginations. They seemed to be really involved with the performance; I think that to a certain extent we all were. The play was structured with flashbacks and crosscutting which gave us a more in depth understanding of what had happened in the past to effect the future. The actors took us on a journey with them in whichever time they were in. We knew what time they were in, as the actors clicked their fingers towards the lighting technician each time. At first it didn’t seem to be part of the performance, later on when it occurred again it was clear that this was a repeated action and was necessary to the play. When actually thinking about it they were actors, acting as though they were acting a re-enactment. Quite confusing I thought. The lights changed from being bright when in the present, to being dim; and almost seemed like sepia tones to give that more ancient feel when in the past. I don’t think that this was done as well or creative as it could have been. The clicking to me just seemed odd and something that didn’t belong in the play, even though I can understand what they were trying to do. The lighting technician brought us back to reality and removed us from the performance; it drew us back out from the tense gripping story. The tension that was built up before these points suddenly dropped and then tension tried to build up again after that point. The actual changes between times eras was very fast, it was almost like there was a sudden change in tempo for that spilt second. The structure of the stage also affected the amount of space used by the characters. In the first half of the play we only saw half of the stage. The basic layout of it was rather boring. There wasn’t much space for anything and the layout just wasn’t interesting or eye-catching at all. As the play moved into the second half, the other part of the stage was revealed to us. It was an exciting change that spiced things up a bit. They suddenly had so much more space to work with. The â€Å"Woman in Black† has two main characters. Arthur Kipps played by Paul Stewart and the young actor who is actor Matt Holland. There was also the shadowed â€Å"Woman in Black† (Who is Alice Drableau the deceased,) although she didn’t have a huge role in the play. The two main actors portrayed many characters, with the usage of costume and their vocal techniques and tones of voices. I thought that they portrayed the different characters quite well but it definitely wasn’t believable for me personally. The actors changed costume in front of us (the audience), which once again drew us away from the drama. In my eyes. Once again, I realise that this was part of the piece, and if you think of it as an actual play, it was a great technique to use. I just found it rather off putting when I was actually getting into the drama; I realised that we weren’t seeing the story, we were seeing people tell us and re-enact the story. Some of the two men’s movements were very interesting and engaged us in the performance. Mr Kipps didn’t really use much movement when narrating. On the other hand when he took on the role of other characters and the young actor played a younger version of Mr Kipps, they used movement to the best of their ability. An example would be a simple motion of a horse and cart. The two characters mimed this very well in a believable way, showing how they would be when on a real horse. A great bit of movement that I found really effective, was when they pretended to be on a train. The actors were really aware of the space and objects around them. For example they used 2 briefcases as doors and a couple of chairs as seats, when walking through the imaginary train and we could tell instantly what it was. One of the men walked sideways along to show the compact space on a train, the two men also sat diagonal from each other which gave us the impression that there could have been mo re people on the train. The woman in black definitely had the ultimate power over the other characters reactions, and over us. She moved silently in and out drifting along in an almost Godley fashion and She made it look as though the dark stage was her shadowed sky; she was swooping down and scaring the prey. We were the prey, and we were shocked, in fact some people did let their emotions get the better of them. She wore pinnacled headgear, under a black veil. The black costume seemed as though it was to symbolise death and possibly evil. I would say that the actors had partial control over the audience and controlled the tension and atmosphere. The blackouts and lighting also helped create the woman in black’s fast movement on the rocking chair; she was furious, focused and very creepy in a psychotic sort of way. This drew us in further. A rocking chair normally moves slowly and contains a nice old person maybe knitting. It came as a huge shock when this happened, because it was such a huge contrast. There were two moments where there was a huge amount of control on the audience. The young actor approached a door this was concealed before and as it is now in light we are intrigued to know what is behind it. There was a lot of tension at this point and the use of pauses made the intense slow hand movements towards the door quite nerve-wracking. It was surprising how much this affected people. A great moment of tension which created a really strong atmosphere was when the young actor who was pretending to be Mr Kipps was sleeping. There was a long empty silence and a complete blackout. This was a moment that was really tense, we the audience were also in a total blackout, so they were putting us in the same situation. We were under control, as we couldn’t see anything, so we didn’t really know what was going on or what was going to happen. We were really involved. The actor also used a torch in the audience, whilst the whole room was black. The light was shone all around the audience, kind of like a spotlight. This whole moment, reminds me of childhood and being scared of the dark. Set, lighting, props and special effects I feel were all necessary to create a real sense of atmosphere. There were quite a few sound effects, to try and make the play seem as real as possible. Not only that, but some of the sound effects seemed to be symbolic. The sound of crows at the Graveyard, I’m sure this is a bad omen, death and a sign of evil. The sound of a rocking chair, which sounded like a heartbeat racing, to build tension and suspense. A double use. A music box in the Childs room, so innocent, yet the music seemed quite creepy when in the dark. Lots of them seemed to symbolise childhood, the innocence, and good. Because we knew what was going on and it was dark and tense, that goodness seemed almost possessed by evil. I thought that the sets were great and were concealed very well behind the gauze. It helped them to change the environment and setting quite efficiently without us knowing. From a graveyard which was furniture covered in white sheets maybe to symbolise ghosts, or when a person is dead them being covered in a sheet to be concealed. A sense of age and death. We saw the old house, which was covered in sheets again, kind of like an old house that hasn’t been lived in for years, derelict. They created long stairs for the characters to run up and down, that for me seemed to create a gradual build to something. There must have been something at the top of the stairs. Also a child’s room. A sweet little room, distorted from the innocence of it as soon as the woman in black steps in it. The play ended at a climactic cliff-hanger and it was gradually built up to a high point of tension. I personally didn’t find it a fear-provoking piece of drama although I know others did, and I can understand how it happened. People were sucked into the drama and its world and certain things didn’t remove them from it. I felt that all of the clicking and the people in the audience screaming just distracted me too much for me to actually enjoy it. I thought that they made a great effort with only two actors, it must have been a lot of hard work, and it used lots of great techniques. They definitely used role play a lot, when becoming different characters and acting out their situations. Marking the moment, using sound and light to emphasis something, such as the immensely tense movement towards the door; will he open it won’t he? Clear usage of crosscutting to show us different times they also used different lighting to show this. Narration, this kept informing u s of what was going on, Mr Kipps was telling us the story. I think that the playwright wrote the play to make the audience think about death, how it is a time of isolation. Maybe to make us remember a time when we were scared, something that everyone can relate to. Fear. I think he also wanted to tell a story that would excite people and to bring the typical ghost story to the 2lst century. People enjoy being scared because they get to use their imagination. Most of the play just really reminded me of childhood memories, something that everyone in the audience could relate to. Being scared of the darkness, that children’s room with the music coming from a doll, the excitement of discovering something, bag loads of curiocity.This was why we felt so involved, small parts of the play would have related to us as the audience. We all know it is safe environment/ atmosphere, and that the play isn’t real life, but there is still that sense of danger. The thrill of not knowing something. The idea that we have all been scared in our lives, something that we can relate to. The thing is that I thought most things were just too predictable. We knew something was going to happen, we could kind of guess what would happen; we just didn’t know when it would happen. How to cite Live Theatre Review, Papers

Friday, December 6, 2019

Defense in Depth

Question: Discuss about theDefense in Depth. Answer: Introduction The computer network and systems in todays world is becoming increasingly prone to the threats of various kinds of attacks that are sophisticated in nature and has been recognized as a matter of concern in the information industry today. There is a need to create stronger defenses against these attacks and this is accepted by the corporate organizations as these attacks contain multiple exploits (Ahmad and Maynard, 2013). These security organizations are on a constant lookout for counter measures in order to improve their defensive potential. A defense in depth is a military principle using multiple security counter measure in a coordinated manner that helps to protect the probity of the information in an organization. It is a strategy which makes it difficult for an enemy to tackle a system that is multi layered in nature instead of single barrier (Rocha, Gros and Moorsel, 2013). Various Components of Defense and their Importance: The core idea behind the defense in depth is to combine various components of technology in order to build up a management of good security which would in turn form many layers of defensive mechanism for the protection against external intrusions. Before forming the component parts of a defensive mechanism one needs to follow certain procedures like a setting up a team of security professionals who are experienced led by a security chief who would be behind the engineering of a defense in depth formula .(Wilkinson, Batke, Hall and Jasper, 2011). The policies that define clearly the uses of the corporate computer networks and resources should be well communicated so that it enables the users to clearly understand the potential threats to the vulnerable information assets. Finally, training happens to be important for the people who would be the first ones to respond if an incident occurs (Wilkinson, Batke, Hall and Jasper, 2011). The defense in depth consists of various components and it is these components that help it to function effectively and smoothly. Each component is interconnected to one another and complements each other in such a way that a complete security scenario is created. Going by the broad categories the defense in depth primarily entails the internal network, the perimeter and most importantly a human factor (Liu and Cheung, 2012). These together consist of many components of their own without which it would not be sufficient to secure networks of computers. The components that are going to be discussed below, used for defense in depth are primarily: Firewalls which are found in both hardware as well as software The anti-spyware programs for software Hierarchical passwords Biometric verification in hardware or software Intrusion detection system both in hardware or software. Along with these, there are some other components which include physical protection and personnel training, both being external in nature. Both these components are related to the people who are handling the computers and they must be well trained to comply with the defense mechanisms (Jajodia, Noel and Kalapa, 2011). Firewalls: This is a kind of software that is used for protecting the personal computers from any hacking attacks or malware. This can be accessed easily by the masses and can be also downloaded from any security companies that are trustworthy. The two kinds of firewalls that a usually found are the hardware firewalls that uses the computer like an appliance enabling to run the software that helps in blocking the traffic from outside that is unwanted (Mensch and Wilkie, 2011). Furthermore the firewall appliance can be updated with new regulations to prevent threats that are evolving or direct malware or hacks. If the new rules are updated then this software would help to protect all the machines that are attached to the computer network. The software firewall makes use of modern techniques like port filtering, application level filtering and stateful packet inspection in a combined manner. This software is made a part of the operating systems, for example, in case of Windows it is presented as an application that helps to run a stand-alone computer which helps in guarding the entire network (Chen and Zhao, 2012). The firewall software is capable of detecting new connections that is not present in the set of regulations provided and one can either accept or reject the new connection request on this basis. Anti-spyware programs: This is a kind of program that is created to defend and detect any spyware programs that are, if in case installed in the computer and are unwanted in nature. This program may also help in removing these programs if they are already installed. Spyware is a kind of malware that could be installed in the computer without the user even knowing it. These spyware collect information about the user without their knowledge. Lavesson , Boldt and Davidsson , 2011).The anti-spyware programs helps in monitoring any incoming data via any emails or from websites or for that matter from any files that are downloaded on the computer. This in turn helps to prevent the spyware programs to invade the operating system of the computer. Anti-spyware programs can be useful in blocking not only spyware but also viruses (Seybert and Loof, 2010). Hierarchical passwords: This program is designed in such a manner where a set of passwords are computed in a hierarchical structure where the password that is present at the higher level in hierarchy has greater autonomy in giving permission that the passwords that a present in the lower level of the hierarchy. This security system is also known as multilevel password protection. This is a special security feature that helps to protect the computer, its network or any database from any unauthorized usage. The password set in the linear order enable the users to have control over the host machine at various levels (Main and Johnson, 2010). When a password identifies the entry of a password in the system of hierarchy, the access to all applications in the application group that is associated with that password is automatically activated. The same process is followed in the lower hierarchy of password as well. Biometric verification: A technology that helps in identifying a person in any system with the help of his distinguished biological characteristics. This is a full proof and unique system of identifying any person and the identifiers generally include signatures, fingerprints, iris and retina patterns, DNA, geometry of the hands or ear or even the voice waves of a person (Vacca, 2012). The system that is locked with the help of biometric verification can be only accessed when the same person puts forward the pattern be it the fingerprint or any other traits. When the password is set using such biological characteristics, it is stored in the database of the computer, which helps in identifying this analog data afterwards. With the beginning of computerized databases and the digitization of the data the personal identification with the help of biometric verification has become almost instant. (Horng , Su , Chen , Kao and Chen , 2011). Intrusion detection (ID): This system is a security management technique which could be used in both networks as well computer. Intrusion detection helps to identify security breaches that are possibly present in the network or the computer which includes both the misuse that could be from within the organization itself or external intrusions. It collects data and gathers information about these possible breaches. ID makes use of vulnerability assessment, often called scanning, a technology that is utilized for the assessment of computers and its networks. Potential Risks of these Components: As already discussed that all the various components together form the defense in depth and even if one goes missing, it can pose a threat to the security of the organization. If the firewalls be it hardware or software is missing from the component then it is likely that the security risk is likely to increase. If the operating system does not have firewall of its own it is prone to malware and other external hackings. As anti-spyware programs are equally important as an anti-virus system in the computer, if they are not used it would make an organizations computers available to the outside world. This means that the data contained in these computers also become vulnerable (Liao, Lin, Lin and Tung, 2013). If not installed, the detection of any spyware present in the computer without the knowledge of the user becomes impossible thus making posing a threat to the computer as well the identity of the user and the organization. The hierarchical password if not designed and included in the security of the organization, makes the networks and computer systems vulnerable to risks related to password authentication. It makes is easier to capture the network traffic and gain control over the networks. The password as they are encrypted would have made it almost impossible to attain it and thus capture the traffic. Furthermore is not something that is stored by the clients, thus if not installed, makes the network easily accessible. As the biometric verification cannot be easily copied or duplicated, if not set up makes it very easy for hackers to access and gain control over the data that might be sensitive in nature. This would also increase the risk of identity swapping or undocumented access or even credential replacement in an organization (Vacca, 2012). Lastly, if intrusion detection is not installed, the malicious entry of any unknown attacks would not be detected by the computer network. The analysis of the on-going traffic or any other transaction would not be possible. Also the distinction between the baseline behaviour andon-going activities was near to impossible if not for the intrusion detection. Conclusion: The defense in depth seeks to minimize the possibilities of vindictive hackers to get hold of vulnerable information. Defense in depth is such a mechanism that would provide security to the computer network in a manner that even if one of the defensive mechanisms fails to succeed, the other will in the position to tackle the attack. References: Ahmad, A., Maynard, S. B., Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Horng, S. J., Su, M. Y., Chen, Y. H., Kao, T. W., Chen, R. J., Lai, J. L., Perkasa, C. D. (2011). A novel intrusion detection system based on hierarchical clustering and support vector machines.Expert systems with Applications,38(1), 306-313. Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J. (2011, November). Cauldron mission-centric cyber situational awareness with defense in depth. InMilitary Communications Conference, 2011-MILCOM 2011(pp. 1339-1344). IEEE. Lavesson, N., Boldt, M., Davidsson, P., Jacobsson, A. (2011). Learning to detect spyware using end user license agreements.Knowledge and Information Systems,26(2), 285-307. Liao, H. J., Lin, C. H. R., Lin, Y. C., Tung, K. Y. (2013). Intrusion detection system: A comprehensive review.Journal of Network and Computer Applications,36(1), 16-24. Liu, C., Cheung, L. C. (2012).U.S. Patent No. 8,261,337. Washington, DC: U.S. Patent and Trademark Office. Main, A., Johnson, H. J. (2010).U.S. Patent No. 7,797,549. Washington, DC: U.S. Patent and Trademark Office. Mensch, S., Wilkie, L. (2011). Information security activities of college students: An exploratory study.Journal of Management Information and Decision Sciences,14(2), 91. Rocha, F., Gross, T., van Moorsel, A. (2013, March). Defense-in-depth against malicious insiders in the cloud. InCloud Engineering (IC2E), 2013 IEEE International Conference on(pp. 88-97). IEEE. Seybert, H., Lf, A. (2010). Internet usage in 2010Households and Individuals.Data in focus,50, 2010. Vacca, J. R. (2012).Computer and information security handbook. Newnes. Wilkinson, J., Batke, B. A., Hall, K. H., Jasper, T. J., Kalan, M. D., Vitrano, J. B. (2011).U.S. Patent No. 7,966,659. Washington, DC: U.S. Patent and Trademark Office.