Wednesday, May 13, 2020

An Analysis Of PoBoy Blues By Langston Hughes - 768 Words

The poem â€Å"Po’ Boy Blues† was composed by Langston Hughes during 1926, his early writing era. His poetry was inspired by his family’s history, a history full of abandonment, betrayal, and violence. His father abandoned him seeking to find a life less confrontational to a black man, leaving Langston Hughes to face being raised by his grandmother in the very same hostile environment his father sought to escape. His mother betrayed him as she never embraced him with a mother’s love not only once leaving him as a young child, but twice when he came to live with her after his grandmother died. His grandmother immersed Langston in his family’s dark history, sometimes laying the â€Å"bullet ridden shawl† on him from where his grandfather died†¦show more content†¦Just repeating these words causes the reader to feel the â€Å"weariness† and heavy burden pressing upon the speaker. Often when the lines are repeated the image is cem ented in the readers’ mind as words like â€Å"Sunshine seemed like gold† (line 2) are identifiable to everyone as a picture of happiness. Symbolism can be found in the lines â€Å"Since I come up North de / Whole damn world’s turned cold† (5-6), referring to his expectations of success not coming true. Inferring the North was a wonderful place to live until he arrived. (frag..must fix) The poem, â€Å"Po’ Boy Blues† uses rhyme in the fourth and sixth lines of each stanza. In the first stanza(,) rhyme is used to point out the emotional state of the speakers outlook, â€Å"Sunshine seemed like gold,† (line 4) and â€Å"Whole damn world’s turned cold,† (line 5). The poet used this method again in stanza 3 to compare his experience in love; â€Å"A gal I thought was kind,† (line 16) and â€Å"An’ almost lose ma mind.† (line 17). Finally he shows us his complete despair in stanza 4; â€Å"Early, early in de morn† (line 22) and â€Å"I wish I’d never been born† (line 24). This rhyme helps to flow the emotion from the speaker to the reader. The reader senses the speaker’s complete lack of hope(,) he has given up on life. Hughes’s use of alliteration throughout his poem, â€Å"Sunshine seemed like gold. / Since I come up North de /

Wednesday, May 6, 2020

Foundation and Empire Acknowledgments Free Essays

The date was August 1, 1941. World War II had been raging for two years. France had fallen, the Battle of Britain had been fought, and the Soviet Union had just been invaded by Nazi Germany. We will write a custom essay sample on Foundation and Empire Acknowledgments or any similar topic only for you Order Now The bombing of Pearl Harbor was four months in the future. But on that day, with Europe in flames, and the evil shadow of Adolf Hitler apparently falling over all the world, what was chiefly on my mind was a meeting toward which I was hastening. I was 21 years old, a graduate student in chemistry at Columbia University, and I had been writing science fiction professionally for three years. In that time, I had sold five stories to John Campbell, editor of Astounding, and the fifth story, â€Å"Nightfall,† was about to appear in the September 1941 issue of the magazine. I had an appointment to see Mr. Campbell to tell him the plot of a new story I was planning to write, and the catch was that I had no plot in mind, not the trace of one. I therefore tried a device I sometimes use. I opened a book at random and set up free association, beginning with whatever I first saw. The book I had with me was a collection of the Gilbert and Sullivan plays. I happened to open it to the picture of the Fairy Queen of lolanthe throwing herself at the feet of Private Willis. I thought of soldiers, of military empires, of the Roman Empire – of a Galactic Empire – aha! Why shouldn’t I write of the fall of the Galactic Empire and of the return of feudalism, written from the viewpoint of someone in the secure days of the Second Galactic Empire? After all, I had read Gibbon’s Decline and Fall of the Roman Empire not once, but twice. I was bubbling over by the time I got to Campbell’s, and my enthusiasm must have been catching for Campbell blazed up as I had never seen him do. In the course of an hour we built up the notion of a vast series of connected stories that were to deal in intricate detail with the thousand-year period between the First and Second Galactic Empires. This was to be illuminated by the science of psychohistory, which Campbell and I thrashed out between us. On August 11, 1941, therefore, I began the story of that interregnum and called it â€Å"Foundation.† In it, I described how the psychohistorian, Hari Seldon, established a pair of Foundations at opposite ends of the Universe under such circumstances as to make sure that the forces of history would bring about the second Empire after one thousand years instead of the thirty thousand that would be required otherwise. The story was submitted on September 8 and, to make sure that Campbell really meant what he said about a series, I ended â€Å"Foundation† on a cliff-hanger. Thus, it seemed to me, he would be forced to buy a second story. However, when I started the second story (on October 24), I found that I had outsmarted myself. I quickly wrote myself into an impasse, and the Foundation series would have died an ignominious death had I not had a conversation with Fred Pohl on November 2 (on the Brooklyn Bridge, as it happened). I don’t remember what Fred actually said, but, whatever it was, it pulled me out of the hole. â€Å"Foundation† appeared in the May 1942 issue of Astounding and the succeeding story, â€Å"Bridle and Saddle,† in the June 1942 issue. After that there was only the routine trouble of writing the stories. Through the remainder of the decade, John Campbell kept my nose to the grindstone and made sure he got additional Foundation stories. â€Å"The Big and the Little† was in the August 1944 Astounding, â€Å"The Wedge† in the October 1944 issue, and â€Å"Dead Hand† in the April 1945 issue. (These stories were written while I was working at the Navy Yard in Philadelphia.) On January 26, 1945, I began â€Å"The Mule,† my personal favorite among the Foundation stories, and the longest yet, for it was 50,000 words. It was printed as a two-part serial (the very first serial I was ever responsible for) in the November and December 1945 issues. By the time the second part appeared I was in the army. After I got out of the army, I wrote â€Å"Now You See It-† which appeared in the January 1948 issue. By this time, though, I had grown tired of the Foundation stories so I tried to end them by setting up, and solving, the mystery of the location of the Second Foundation. Campbell would have none of that, however. He forced me to change the ending, and made me promise I would do one more Foundation story. Well, Campbell was the kind of editor who could not be denied, so I wrote one more Foundation story, vowing to myself that it would be the last. I called it â€Å"-And Now You Don’t,† and it appeared as a three-part serial in the November 1949, December 1949, and January 1950 issues of Astounding. By then, I was on the biochemistry faculty of Boston University School of Medicine, my first book had just been published, and I was determined to move on to new things. I had spent eight years on the Foundation, written nine stories with a total of about 220,000 words. My total earnings for the series came to $3,641 and that seemed enough. The Foundation was over and done with, as far as I was concerned. In 1950, however, hardcover science fiction was just coming into existence. I had no objection to earning a little more money by having the Foundation series reprinted in book form. I offered the series to Doubleday (which had already published a science-fiction novel by me, and which had contracted for another) and to Little-Brown, but both rejected it. In that year, though, a small publishing firm, Gnome Press, was beginning to be active, and it was prepared to do the Foundation series as three books. The publisher of Gnome felt, however, that the series began too abruptly. He persuaded me to write a small Foundation story, one that would serve as an introductory section to the first book (so that the first part of the Foundation series was the last written). In 1951, the Gnome Press edition of Foundation was published, containing the introduction and the first four stories of the series. In 1952, Foundation and Empire appeared, with the fifth and sixth stories; and in 1953, Second Foundation appeared, with the seventh and eighth stories. The three books together came to be called The Foundation Trilogy. The mere fact of the existence of the Trilogy pleased me, but Gnome Press did not have the financial clout or the publishing knowhow to get the books distributed properly, so that few copies were sold and fewer still paid me royalties. (Nowadays, copies of first editions of those Gnome Press books sell at $50 a copy and up-but I still get no royalties from them.) Ace Books did put out paperback editions of Foundation and of Foundation and Empire, but they changed the titles, and used cut versions. Any money that was involved was paid to Gnome Press and I didn’t see much of that. In the first decade of the existence of The Foundation Trilogy it may have earned something like $1500 total. And yet there was some foreign interest. In early 1961, Timothy Seldes, who was then my editor at Doubleday, told me that Doubleday had received a request for the Portuguese rights for the Foundation series and, since they weren’t Doubleday books, he was passing them on to me. I sighed and said, â€Å"The heck with it, Tim. I don’t get royalties on those books.† Seldes was horrified, and instantly set about getting the books away from Gnome Press so that Doubleday could publish them instead. He paid no attention to my loudly expressed fears that Doubleday â€Å"would lose its shirt on them.† In August 1961 an agreement was reached and the Foundation books became Doubleday property. What’s more, Avon Books, which had published a paperback version of Second Foundation, set about obtaining the rights to all three from Doubleday, and put out nice editions. From that moment on, the Foundation books took off and began to earn increasing royalties. They have sold well and steadily, both in hardcover and softcover, for two decades so far. Increasingly, the letters I received from the readers spoke of them in high praise. They received more attention than all my other books put together. Doubleday also published an omnibus volume, The Foundation Trilogy, for its Science Fiction Book Club. That omnibus volume has been continuously featured by the Book Club for over twenty years. Matters reached a climax in 1966. The fans organizing the World Science Fiction Convention for that year (to be held in Cleveland) decided to award a Hugo for the best all-time series, where the series, to qualify, had to consist of at least three connected novels. It was the first time such a category had been set up, nor has it been repeated since. The Foundation series was nominated, and I felt that was going to have to be glory enough for me, since I was sure that Tolkien’s â€Å"Lord of the Rings† would win. It didn’t. The Foundation series won, and the Hugo I received for it has been sitting on my bookcase in the livingroom ever since. In among all this litany of success, both in money and in fame, there was one annoying side-effect. Readers couldn’t help but notice that the books of the Foundation series covered only three hundred-plus years of the thousand-year hiatus between Empires. That meant the Foundation series â€Å"wasn’t finished.† I got innumerable letters from readers who asked me to finish it, from others who demanded I finish it, and still others who threatened dire vengeance if I didn’t finish it. Worse yet, various editors at Doubleday over the years have pointed out that it might be wise to finish it. It was flattering, of course, but irritating as well. Years had passed, then decades. Back in the 1940s, I had been in a Foundation-writing mood. Now I wasn’t. Starting in the late 1950s, I had been in a more and more nonfiction-writing mood. That didn’t mean I was writing no fiction at all. In the 1960s and 1970s, in fact, I wrote two science-fiction novels and a mystery novel, to say nothing of well over a hundred short stories – but about eighty percent of what I wrote was nonfiction. One of the most indefatigable nags in the matter of finishing the Foundation series was my good friend, the great science-fiction writer, Lester del Rey. He was constantly telling me I ought to finish the series and was just as constantly suggesting plot devices. He even told Larry Ashmead, then my editor at Doubleday, that if I refused to write more Foundation stories, he, Lester, would be willing to take on the task. When Ashmead mentioned this to me in 1973, I began another Foundation novel out of sheer desperation. I called it â€Å"Lightning Rod† and managed to write fourteen pages before other tasks called me away. The fourteen pages were put away and additional years passed. In January 1977, Cathleen Jordan, then my editor at Doubleday, suggested I do â€Å"an important book – a Foundation novel, perhaps.† I said, â€Å"I’d rather do an autobiography,† and I did – 640,000 words of it. In January 1981, Doubleday apparently lost its temper. At least, Hugh O’Neill, then my editor there, said, â€Å"Betty Prashker wants to see you,† and marched me into her office. She was then one of the senior editors, and a sweet and gentle person. She wasted no time. â€Å"Isaac,† she said, â€Å"you are going to write a novel for us and you are going to sign a contract to that effect.† â€Å"Betty,† I said, â€Å"I am already working on a big science book for Doubleday and I have to revise the Biographical Encyclopedia for Doubleday and -â€Å" â€Å"It can all wait,† she said. â€Å"You are going to sign a contract to do a novel. What’s more, we’re going to give you a $50,000 advance.† That was a stunner. I don’t like large advances. They put me under too great an obligation. My average advance is something like $3,000. Why not? It’s all out of royalties. I said, â€Å"That’s way too much money, Betty.† â€Å"No, it isn’t,† she said. â€Å"Doubleday will lose its shirt,† I said. â€Å"You keep telling us that all the time. It won’t.† I said, desperately, â€Å"All right. Have the contract read that I don’t get any money until I notify you in writing that I have begun the novel.† â€Å"Are you crazy?† she said. â€Å"You’ll never start if that clause is in the contract. You get $25,000 on signing the contract, and $25,000 on delivering a completed manuscript.† â€Å"But suppose the novel is no good.† â€Å"Now you’re being silly,† she said, and she ended the conversation. That night, Pat LoBrutto, the science-fiction editor at Doubleday called to express his pleasure. â€Å"And remember,† he said, â€Å"that when we say ‘novel’ we mean ‘science-fiction novel,’ not anything else. And when we say ‘science-fiction novel,’ we mean ‘Foundation novel’ and not anything else.† On February 5, 1981, I signed the contract, and within the week, the Doubleday accounting system cranked out the check for $25,000. I moaned that I was not my own master anymore and Hugh O’Neill said, cheerfully, â€Å"That’s right, and from now on, we’re going to call every other week and say, ‘Where’s the manuscript?'† (But they didn’t. They left me strictly alone, and never even asked for a progress report.) Nearly four months passed while I took care of a vast number of things I had to do, but about the end of May, I picked up my own copy of The Foundation Trilogy and began reading. I had to. For one thing, I hadn’t read the Trilogy in thirty years and while I remembered the general plot, I did not remember the details. Besides, before beginning a new Foundation novel I had to immerse myself in the style and atmosphere of the series. I read it with mounting uneasiness. I kept waiting for something to happen, and nothing ever did. All three volumes, all the nearly quarter of a million words, consisted of thoughts and of conversations. No action. No physical suspense. What was all the fuss about, then? Why did everyone want more of that stuff? – To be sure, I couldn’t help but notice that I was turning the pages eagerly, and that I was upset when I finished the book, and that I wanted more, but I was the author, for goodness’ sake. You couldn’t go by me. I was on the edge of deciding it was all a terrible mistake and of insisting on giving back the money, when (quite by accident, I swear) I came across some sentences by science-fiction writer and critic, James Gunn, who, in connection with the Foundation series, said, â€Å"Action and romance have little to do with the success of the Trilogy – virtually all the action takes place offstage, and the romance is almost invisible – but the stories provide a detective-story fascination with the permutations and reversals of ideas.† Oh, well, if what was needed were â€Å"permutations and reversals of ideas,† then that I could supply. Panic receded, and on June 10, 1981, I dug out the fourteen pages I had written more than eight years before and reread them. They sounded good to me. I didn’t remember where I had been headed back then, but I had worked out what seemed to me to be a good ending now, and, starting page 15 on that day, I proceeded to work toward the new ending. I found, to my infinite relief, that I had no trouble getting back into a â€Å"Foundation-mood,† and, fresh from my rereading, I had Foundation history at my finger-tips. There were differences, to be sure: 1) The original stories were written for a science-fiction magazine and were from 7,000 to 50,000 words long, and no more. Consequently, each book in the trilogy had at least two stories and lacked unity. I intended to make the new book a single story. 2) I had a particularly good chance for development since Hugh said, â€Å"Let the book find its own length, Isaac. We don’t mind a long book.† So I planned on 140,000 words, which was nearly three times the length of â€Å"The Mule,† and this gave me plenty of elbow-room, and I could add all sorts of little touches. 3) The Foundation series had been written at a time when our knowledge of astronomy was primitive compared with what it is today. I could take advantage of that and at least mention black holes, for instance. I could also take advantage of electronic computers, which had not been invented until I was half through with the series. The novel progressed steadily, and on January 17, 1982, I began final copy. I brought the manuscript to Hugh O’Neill in batches, and the poor fellow went half-crazy since he insisted on reading it in this broken fashion. On March 25, 1982, I brought in the last bit, and the very next day got the second half of the advance. I had kept â€Å"Lightning Rod† as my working title all the way through, but Hugh finally said, â€Å"Is there any way of putting ‘Foundation’ into the title, Isaac?† I suggested Foundations at Bay, therefore, and that may be the title that will actually be used 1. You will have noticed that I have said nothing about the plot of the new Foundation novel. Well, naturally. I would rather you buy and read the book. And yet there is one thing I have to confess to you. I generally manage to tie up all the loose ends into one neat little bow-knot at the end of my stories, no matter how complicated the plot might be. In this case, however, I noticed that when I was all done, one glaring little item remained unresolved. I am hoping no one else notices it because it clearly points the way to the continuation of the series. It is even possible that I inadvertently gave this away for at the end of the novel, I wrote: â€Å"The End (for now).† I very much fear that if the novel proves successful, Doubleday will be at my throat again, as Campbell used to be in the old days. And yet what can I do but hope that the novel is very successful indeed. What a quandary! How to cite Foundation and Empire Acknowledgments, Essay examples

Tuesday, May 5, 2020

Security Threats And Its Ranking According â€Myassignmenthelp.Com

Question: Discuss About The Security Threats And Its Ranking According? Answer: Introduction In this era of information and communication technology, security is an essential requirement for any type of organization whether private or public. Government is responsible for tackling different types of data and must be taken care of without any problem. Data breach of any type of sensitive data can cause problems. VIC government is the government of the state Victoria in Australia. It deals with different types of data and must be taken care of in a proper manner. This report discusses about the types of security threats that VIC government faces and it also ranks the various category of risks based on their degree of exposure. This report also points out the various types of exposure in high, low, medium risk exposure category. There are several types of risk under which the deliberate and accidental risks are mainly important. This report compares and contrasts both the risk in a comprehensive manner. This report also discusses about the several challenges that VIC government faces while deciding about the internal and external risk advisors. A brief difference between risk and uncertainty is also mentions in this report. The risk management and assessment of the VIC government is also discussed in this report. Illustration of Security Risks and Threats in VIC Government The diagram below shows the risks and threats of the VIC Government. Figure 1: Factors of Risk and Threats in information system of VIC Government (Source: Created by the author in Ms-Visio) Explanation of the Diagram and Categorization of Risk Factors Description of the components of diagram The diagram given above shows the different security threats faced by the VIC governments. The diagram shows that the VIC government has a code of practice along with the information system. There are four main categories of risks shown in the diagram. They are accidental, deliberate, internal and external risks or threats. This diagram also shows the risk management and assessment system of the VIC government. VIC Government: VIC or the Victoria Government is the state government of the state of Victoria in Australia. This government has several type of information in the system of the government. The information is sensitive in nature and if these data are lost or manipulated then this can lead to severe trouble for the entire state and even the country (Von Solms Van Niekerk, 2013). This government has the control and rights over the information of the user. The members of the VIC government are the users of the information system of the government. Information System: The information system in the government is the information management system that consists of the software and database that stores several sensitive data of the members of the government. The VIC government is responsible for the handling the data and information present in the system of the government (Bommer, Crowley Pinho, 2015). Only authorized users are not able to access the VIC government data. Effective and efficient management of the system allows the government to work in a proper and well planned manner. Code of Practices: A set of norms that is followed in order to maintain a proper working of the government is called the code of practices. This code of practices is well integrated and complies with ISO, IEC.AC, and AZS 17799:2001 that is declared by the code of ethics. This code of ethics states and tells the only authorized people will be able to access information in the database and information system present in the organization. This would not allow the non users of the organizations to access information that are sensitive in nature. Unauthorized access can lead to misuse as well as deletion of information. Threats and Risks: Threats are very severe issue for an organization as well as the government. Government is responsible for managing a state. In this case study the VIC state government of the Victoria state of Australia is responsible for managing the entire state of Victoria (Bommer, Crowley Pinho, 2015). The risks and threats of the government are discussed in this report in details. The risks and threats are the most important factors that affect the information flow of the organization. Accidental Threats: These are the types of threats that do not have any wrong motive. These threats take place in an accidental manner (Alcorn, Good Pain, 2013). It does not affect the information flow in the system due to accidental flow. There can be failure of communication due to this type of threat. There can be technical error and unseen situations that can take place in the future. There can also be transmission errors. Deletion of information due to some mistake of the employees is a good example of accidental threat. Accidental threats are not much harmful because this can be rectified after identification. Deliberate Threats: These are the types of threats that are dangerous in nature. These deliberate threats are done purposely by any hacker or malicious software (Von Solms Van Niekerk, 2013). These are done for the purpose of harming the organization or government. These threats do affect the operation of the government. It is very difficult to rectify these types of problems. These types of threats take place due to theft and fraud. Eavesdropping, unauthorized access, malwares, software piracy and denial of services are some of the type of deliberate threats. External Threats: These are the types of threats that are not under the control of the government. These are external to the government (Lam, 2014). These threats take place due to external forces like political instability and environmental policies. There are other main types of external threats like competition among the several organizations and parties. These threats cannot be controlled by the government as these are extrinsic in nature. Internal Threats: These are the types of threats that are intrinsic in nature. There are several types of internal threats like problem among the employees, technological obsolescence, lack of resources and financial limitations. These threats are under the control of the government and they can take necessary steps to overcome such threats (Man et al., 2013). There will not be much harm due to these types of threat as the employees are quiet aware of the situation and then the employees can find a method of rectifying the issues (Alcorn, Good Pain, 2013). Internal threats are the cause of internal combustion. There can be failure of communication due to these types of threats. Classification of Risk Exposure Areas Risks can be classified in terms of various exposures due to its impact on the government. These types of exposures are classified according to the degree of impact into high risk exposure area, medium low risk area, medium risk area and low risk area (Lam, 2014). High Risk Exposure: This is a type of threat that has great impact on the operations of the government. This is a type of threat where the government will be affected in a serious manner and that cannot be rectified. This type of risk cannot be controlled by the government. The external and deliberate risks are under this category. These are the types of threats that are not under the control of the government. These are external to the government (Lam, 2014). These threats take place due to external forces like political instability and environmental policies. These threats cannot be controlled by the government as these are extrinsic in nature. There are other main types of external threats like competition among the several organizations and parties. . The deliberate threats are done purposely by any hacker or malicious software (Von Solms Van Niekerk, 2013). These are done for the purpose of harming the organization or government. Eavesdropping, unauthorized access, malwares, so ftware piracy and denial of services are some of the type of deliberate threats (Zargar, Joshi Tipper, 2013). These threats do affect the operation of the government. It is very difficult to rectify these types of problems. These types of threats take place due to theft and fraud. Medium Risk Exposure: The medium risk exposure means that the impact is moderate on the government. These types of threats affect the operation and flow of information in the government in a moderate manner. These are generally the internal type of risks. The technical errors that take place are rectifiable in nature and can be classified under this category (Bommer, Crowley Pinho, 2015). These are the types of threats that are intrinsic in nature. These threats are under the control of the government and they can take necessary steps to overcome such threats (Man et al., 2013). There are several types of internal threats like problem among the employees, technological obsolescence, lack of resources and financial limitations. Internal threats are the cause of internal combustion. There can be failure of communication due to these types of threats. There will not be much harm due to these types of threat as the employees are quiet aware of the situation and then the employees can fi nd a method of rectifying the issues (Alcorn, Good Pain, 2013). Medium Low Risk Exposure: These are the types of threat whose impact is medium to low in nature. Consider a situation of spamming that goes on in the environment. They can take place at any time. Low Risk Exposure: These types of threats do not have any great impact on the flow of operations and information of the government. These types of threats are not deliberate in nature. They are accidental threats. These are the types of threats that do not have any wrong motive. These threats take place in an accidental manner (Alcorn, Good Pain, 2013). It does not affect the information flow in the system due to accidental flow. There can also be transmission errors. Deletion of information due to some mistake of the employees is a good example of accidental threat. Accidental threats are not much harmful because this can be rectified after identification. There harmfulness degree is less. Comparison and Ranking of Accidental and Deliberate Threats Accidental Threats: These are those kinds of threats that occur because of unwanted errors committed by the employees. There are no malicious intentions behind such types of risks (Man et al., 2013). The exposure level of this threat is low as this does not affect the government in a severe manner. These threats take place in an accidental manner (Alcorn, Good Pain, 2013). It does not affect the information flow in the system due to accidental flow. There can be failure of communication due to this type of threat. There can be technical error and unseen situations that can take place in the future. There can also be transmission errors. These are the types of threats that do not have any wrong motive. Rank: This threat is given 2nd position. Example: Wrong entry of data by the employees, deletion or modification of data due to some mistake. Reason for the rank 2: This type of threat does not have any specific wrong motive behind the act. Here the employees are unmindful and careless and does some mistake by their own fault. Deliberate Threat: These threats take place due to hacking or other malware that have wrong intention in harming the operation and information of the entire organization or the government. It is very difficult to rectify these types of problems. The deliberate threats are done purposely by any hacker or malicious software (Von Solms Van Niekerk, 2013). These are done for the purpose of harming the organization or government. Example: Malicious software or malware (Green, Payne Wood, 2013), hacking, denial of service attack, virus, Trojan horses. Reason for Rank 1: There are specific wrong motives behind this type of threat. It attacks and harms the government in a dangerous way. The problems faced b y the government due to this type of threat is extremely in nature. Security or Risk Management Challenges of VIC Government Several challenges are faced by the government in deciding and selecting a risk management method among the two. Internal Security Management: These types of management techniques involve the employees or members of the government to participate in the organization in order to manage security related issues (Lam, 2014). The benefit of this plan is that the money spent will be less. The challenges will be conflict of roles. There will be competition among the employees as to who is powerful and this will indirectly affect the productivity of the organization. External Security Management: The benefits of hiring external agents for managing risk will help the government in many ways. They will be able to gather satisfactory information and solve the problem in a proper way (Ali et al., 2014). There can be issues related to loss of control and misunderstandings leading to more chaos (Rakow, Heard Newell, 2015). There can be problems like mislead also. Risk and Uncertainty Risk is known to be the winning or losing probability of anything that is worthy of consideration. It has an extremely uncertain nature (Rasmussen, 2013). VIC considers the security related threats to be the risks that are associated with the government. Risks can be controlled by taking specific procedures (Silbey, 2013). Risk can never be eliminated but it can be minimized to some extent. Any situation whose future happenings are not known can be considered to be uncertain. The future of any event will not be visible to the VIC government leading to tremendous risk of the operations (Covello et al., 2013). Uncertainties cannot be controlled by the government of Victoria. Uncertainty is the base of risk. Risk Control and Mitigation of VIC Government The VIC government can take massive steps to mitigate risks. They need to select the right people for the right task (Perera Nand, 2015). The analysis approach of risk management chooses the best option among several options. The strategy approach on the other hand makes up various strategies to overcome the risks. The investigation approach examines and scrutinizes various ways to find out the best way to deal with risk in the government. The initial step involves planning followed by risk assessment and handling (Nowak, 2013). Proper identification needs to be done before the analysis phase. Then is the procedure of risk mitigation and risk evaluation (Cheng, Liu Yao, 2017). These types of approaches can be used by the VIC government in order to overcome and prevent any breach of security. Conclusion This report concludes that the several threats of security that are faced by the VIC government can be resolved by a procedural risk management approach. The risks are categorized into several categories of high risk, medium, medium low and low risk exposure area depending on their impact on the government of Victoria, Australia. This report also described the challenges of the internal and external risk advisors along with their benefits and challenges. Risks and uncertainty are two different things and these are also explained in a brief manner. The report finally concludes that risks can be mitigated by following certain approaches that are well suited for the government. References Alcorn, A.M., Good, J. and Pain, H., (2013, July). Deliberate system-side errors as a potential pedagogic strategy for exploratory virtual learning environments. InInternational Conference on Artificial Intelligence in Education(pp. 483-492). Springer Berlin Heidelberg Ali, E., Denis, A. F., Kujur, F. E., Chaudhary, M. (2014). Risk Management Strategies for Accidental Risk Occurrence on Construction SitesA Case Study of Allahabad.Journal of Academia and Industrial Research (JAIR),3(2), 89. Bommer, J. J., Crowley, H., Pinho, R. (2015). A risk-mitigation approach to the management of induced seismicity.Journal of Seismology,19(2), 623-646. Cheng, L., Liu, F., Yao, D. D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions.Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery,7(5). Covello, V. T., Lave, L. B., Moghissi, A. A., Uppuluri, V. R. R. (Eds.). (2013).Uncertainty in risk assessment, risk management, and decision making(Vol. 4). Springer Science Business Media. Green, D. E., Payne, R., Wood, T. (2013).U.S. Patent No. 8,402,529. Washington, DC: U.S. Patent and Trademark Office. Healey, A. N. (2016). The insider threat to nuclear safety and security.Security Journal,29(1), 23-38. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Mans, R. S., van der Aalst, W. M., Vanwersch, R. J., Moleman, A. J. (2013). Process mining in healthcare: Data challenges when answering frequently posed questions. InProcess Support and Knowledge Representation in Health Care(pp. 140-153). Springer Berlin Heidelberg. Nowak, B. (2013). A 5-step strategy for harnessing global information growth.Information Management,47(4), 42. Perera, R., Nand, P. (2015, April). A multi-strategy approach for lexicalizing linked open data. InInternational Conference on Intelligent Text Processing and Computational Linguistics(pp. 348-363). Springer International Publishing. Rakow, T., Heard, C. L., Newell, B. R. (2015). Meeting Three Challenges in Risk Communication Phenomena, Numbers, and Emotions.Policy Insights from the Behavioral and Brain Sciences,2(1), 147-156. Rasmussen, S. (2013). Risk and uncertainty. InProduction Economics(pp. 163-180). Springer Berlin Heidelberg. Silbey, S. S. (2013). Organizational Challenges to Regulatory Enforcement and Compliance A New Common Sense about Regulation.The Annals of the American Academy of Political and Social Science,649(1), 6-20. Spring, J. (2014).Fall 2014 SEI Research Review: Malware Analysis. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST. Steinberg, A. N. (2016). A model for threat assessment. InFusion Methodologies in Crisis Management(pp. 313-340). Springer International Publishing. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102. Zargar, S. T., Joshi, J., Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.IEEE communications surveys tutorials,15(4), 2046-2069.