Saturday, December 28, 2019

Case Study The Mask - 1217 Words

Case Study: â€Å"The Mask† Stephen Doherty, a researcher and blogger for the Symantec Corporation, provides a case study that proves targeted attacks are growing and evolving. His case study entitled, â€Å"The Mask,† is a cyber-espionage group established in 2007 to hack, monitor and exfiltrate data from infected targets. Their method of breach uses intense spear phishing to lure the victims in using deceiving emails. In addition, The Mask coincidently enough specializes in tools that target Spanish speakers. The Mask is still present today, filled with professional hackers with an exuberant amount of resources. When targeting the victim, The Mask typically will send out an email to a recipient with what looks like legitimate PDF or Microsoft Word documents. However, this malware includes a Remote Access Trojan. This means that once the recipient opens the file, The Mask has full remote access to his or her computer. Furthermore, this tool provides full access to Word documents, encrypted files, mobile backup files and email archives, which then all the information is easily exfiltrated. Cyber-espionage is still expanding and their targets are increasingly becoming more diverse. The Mask is just one example of the accredited cyber groups with sophisticated capabilities, defense, and special tools to simply hack whomever they want. Case Study: Criminals Hit the ATM Jackpot In this case, cybercriminals discovered a new method called, Ploutus, a new way to steal money from anShow MoreRelatedCase Study : Mason Surgical Masks1465 Words   |  6 PagesModule 6 Case1 Chapter 14 Mason Surgical Masks The unique selling proposition of Mason Surgical Masks is that it offers protection from both particulate and gaseous hazardous materials. The unique selling proposition (USP) or unique selling point is an advertising notion first projected as a philosophy to clarify an arrangement in positive marketing movements of the premature 1940s. The USP states that such movements made exclusive proposals to clienteles that persuaded them toRead MoreEthical Dilemmas Of The United States1235 Words   |  5 Pageseveryone obeys the law, ethical cases form. In Springfield, Missouri, a holistic nurse got fired for fighting against Cox South hospital policies. Carla Brock has been a nurse at Cox South hospital and not only refused the flu shot, but also refused to wear a mask. She refused due to religious beliefs, she gets short of breath while wearing the mask, and she feels the mask is meant to intimidate and humiliate those who refuse the shot. The ethical question in this case study is to decide if Carla shouldRead MoreEssay on An Examination of Visual Agnosia1519 Words   |  7 Pagesquickly replaced with a feeling of des pair. Visual agnosia is a neurological disorder characterized by the inability to recognize familiar objects (Farah, 1990). Object recognition is the ability to place an object in a category of meaning. Most cases of visual agnosia are brought about through cerebral vascular accidents or traumatic brain injury typically inhibiting sufficient amounts of oxygen from reaching vital body tissues (Zoltan, 1996). There are a vast array of impaired abilities and deficitsRead MoreTraditions Transfigured : The Noh Masks Of Bidou Yamaguchi1392 Words   |  6 Pages Traditions Transfigured: The Noh Masks of Bidou Yamaguchi Name Institution Course Date This presentation concentrates on late figures by Bidou Yamaguchi that apply the structures, systems, transformative soul, and secretive style of Noh covers to famous female pictures from the European workmanship recorded standard, and to Kabuki performing artist prints of Sharaku, Japan s baffling 18th century picture expert. These works fundamentally develop Noh s change of souls crosswise over time andRead MoreEssay about Reader-Response to The Masque of the Red Death874 Words   |  4 PagesReader-Response to The Masque of the Red Death      Ã‚  Ã‚   Some major concepts of reader-response criticism, as discussed by Ross Murfin in The Scarlet Letter: Case Studies in Contemporary Criticism, are these: (1) reading is a temporal process in which the reader lives through the experience of the text and (2) the experience that the reader undergoes may mirror the subject of the story. One readers experience of The Masque of the Red Death by Edgar Allan Poe can exemplify these two conceptsRead MoreSmoke Exposure And Its Impact On Health1664 Words   |  7 PagesIn this case study, the environmental hazard of surgical smoke in a day-case operating theatre is explored by evaluating smoke exposure and its impact on health. The manager of an operating theatre raised concerns with the organisation’s OH adviser about the health and safety of staff and their exposure to surgical smoke. Incipient employees had highlighted this issue, which had not been raised aforetime. A jeopardy assessment of the electro-surgery equipment was undertaken, and protracted exposureRead MoreIntroduction:. â€Å"All The World’S A Stage† – Shakespeare1583 Words   |  7 Pagessituations within which social norms require us to present different versions of ourselves – what in this paper we shall call â€Å"masks† or â€Å"personas.† This paper will provide examples from old plays and stories in order to keep it more contemporary – even use pop culture as a reference, so as to create a deeper and more comprehensive understanding of how social personas and masks work in society, and whether they differ across cultures as well. Finally, certain concluding remarks will be made, which allowRead MoreShadows On The Skin : A Study Of Dually Randall And Paul Laurence Dunbar957 Words   |  4 Pagesthe Skin: A Study of Dually Randall and Paul Laurence Dunbar Dually Randall and Paul Laurence Dunbar are two African American writers living during the early twentieth century. These men did not know each other, however, they both encountered the same hardship of being an African American living before the civil rights movement. Both men use poems that emphasize sound, structure and imagery to express what they experienced during that harsh time. A careful analysis of â€Å"We Wear the Mask† and â€Å"BalladRead More The Lord of the Flies Essay1220 Words   |  5 Pagesexemplified in his book Lord of the Flies, in which he uses masks to represent . These masks come in many forms, and by careful study of events throughout Golding’s novel, one discovers their significance. Physical masks are used by many characters such as Jack and Piggy, and they are perhaps the least ambiguous forms found in the book. The idea of a mask encompasses more than just these literal interpretations, however. Metaphorical masks are used in abundance throughout the book, and much can beRead MoreCommedia Dell Arte and Influences on Modern Theatre1140 Words   |  5 Pagesthe history of theatre. During the 16th, 17th and 18th century, in the midst of the renaissance, there was a very delightful source of entertainment that people where privy too. This archaic form of acting was based around improvising and the use of masks. I am comparing this to modern day comedy since I have seen direct examples on television, which use this method of acting, in modern day shows. The fact that some of these performers were verging on genius is without dispute. Contemporary performers

Friday, December 20, 2019

Analysis Of The Book Breaking The Land - 932 Words

â€Å"Breaking the Land† discusses three major components throughout the book; cotton, tobacco, and the rice culture. Pete Daniel, the author, discusses the transformation of these three subjects throughout history. The different agriculture crops are described by explaining the environment that they are in and the difficulties they come across. The book explains how the crops and the environment have changed because of the difficulties they have faced. Diseases, race, inflation and deflation of crop prices, laws, and the economy are some of the main problems that helped transform the environment of the crop industry. The book explains in great detail the challenges that each crop undertook to become a more modern industry, along with the increase of technology. Technology plays a large role in creating a more modern life for the agriculture industries. Daniel goes on to explain the new technology that is used during the timeline of events for the development of agricultural c rops. In â€Å"Breaking the Land†, it is broken up into four different books. Each book is in chronological order to when events happened in history. Every book has several chapters contained in it that discusses the transformation of each crop. For example, book one: â€Å"Three Southern Commodity Cultures, 1880-1932†, contains three chapters. Each chapter discusses a specific crop and the transformation during that time period. Each individual chapter tells the story and background of that crop. Throughout eachShow MoreRelatedBlack Boy And The Grapes Of Wrath Analysis1728 Words   |  7 PagesThe bible is a pretty exhilarating book; tales of bearded men crossing deserts, talking snakes, talking bushes, forbidden fruits, floods, adultery, and pregnant virgins. What more could you want? Well, you might want to escape poverty. Logically, your next question is: can religion accomplish this task? And according to Richard Wright and John Steinbeck, the answer is a resoun ding â€Å"no.† Wright and Steinbeck, pump their books, Black Boy and The Grapes of Wrath, respectively, full of biblical allusionsRead MoreThe American Civil War: March By Sherman1403 Words   |  6 Pagesgoing to look into the march by Sherman and the tactic of Blitzkrieg. By consulting books that outline the tactics used in both events, I will be able to draw connections between the two and, also, be able to contrast the two. In studying the tactics, I will look at the troop size, the speed of the attack, and how the attacks took place. In addition, similarities and differences will be pointed out in the Analysis section. In stating the similarities and differences, I will be able to uncover connectionsRead MoreThe Leisure-Cruise Industry Porter Paper1329 Words   |  6 Pagessurroundings, duty, safety, protection and work increases. Regardless of these confronts, numerous cruise lines report record levels of productivity. This analysis will calculate the leisure-cruise industry and help come to the conclusion on if entering the market is a great idea. This report will focus on the Porter’s Approach to Industry Analysis. Each force will be identified in their separate sections as well as the power of each force to permit a new entire in the market. Porter’s Six Forces Read MoreThe Grapes Of Wrath By John Steinbeck1174 Words   |  5 Pagesdetailed story line but it was followed up by an Oscar nominated film directed by John Ford. The similarities and differences within the book and the film are very controversial and being able to break down what all happened in each will help a rhetorical analysis to take place in this paper. Rhetorically speaking this paper will be on the comparisons of the book versus the movie and also the contrasts of the two of them as well. Personally both the movie and the novel were very persuasive becauseRead MoreAn Inquiry Into The Nature And Causes Of The Wealth Of Nations986 Words   |  4 PagesIn 1776, Adam Smith, also known as the founding father of economic liberalism, changed the world with a historical document titled An Inquiry into the Nature and Causes of the Wealth of Nations. This book was intended to be an attack upon the economic system during the 18th century. Today, Smith is known as the inventor of the market economy because of this particular work. Although, the article has a built-in bias, having both fact and opinion. The Wealth of Nations is considered to be the bibleRead MoreAchebe and Fanon on Colonization and Decolonization1400 Words   |  6 Pagesextended to a certain group of people living in the same area, pride turns into nationalism. The residents not only feel like they geographically own the land, but their history of culture in that given area lends them an emotional connection as well. When people of elsewhere come to take the land from the native inhabitants, many changes occur. In his book The Wretched of the Earth, Franz Fanon gives his insight into how the process of colonization and decolonization happens, and the resulting physicalRead MoreA Summary On The Content Area Of Social Studies702 Words   |  3 PagesOur textbook analysis focuses on the content area of social studies within grade four. Our textbook is titled â€Å"S tates and Regions† and is published by Harcourt Brace and Company. It was copyrighted in 1997. The chapter we chose to study is chapter three which is titled â€Å"Looking at Regions.† Glancing at Attachment A, it can be noted that the book starts as a broad idea and narrows it down as the chapters progress. For example, the first few chapters focus on general information about the United StatesRead MoreMarco Polo s Travels Over The Maritime Route1009 Words   |  5 Pagesthe coastal trade, customs, and cultures he encountered through this journey. Provinces of India, the coastal islands of Southeast Asia, the Middle East, and China will be discussed, along with background information of Polo, his itinerary, and an analysis of his findings. II. Background Marco Polo was born in Venice in 1254 to a noble merchant family. His mother passed away when he was a child and his father, Nicolo, spent much of Marco’s childhood traveling. In 1260 Nicolo and his brotherRead MoreAnalysis Of Akwesasne : This Is Indian Land1253 Words   |  6 Pagesâ€Å"Akwesasne: This is Indian Land† is a documentary film created in 1969 and it is about the confrontation between the Mohawk of the St. Regis Reservation and the police. The events take place on Mohawk land near Cornwall, Ontario on a bridge that connects Canada and the United States. There are many differences between the two forms of political power in the movie. One relates to state-centered institutions, which in this case are represented by the police and the political power that is enforcedRead MoreBruno Bettelheims Fairy Tale Insight Essay1646 Words   |  7 Pagesis many times unknown, but their reputations have always remained the same. These tales not only attract children with their wondrous lands and magical charm, but they captivate the child by involving relatable characters with recognizable problems. While these stories provide mind-churning imagination, the lesson they provide does not cease to exist when the book is closed. Bruno Bettelheim, the author of Uses of Enchantment, has constructed an evaluation that fairy tale’s offer insight to the

Wednesday, December 11, 2019

Taxation of Dividend - Interest - and Capital Gain

Question: Discuss about the Taxation of Dividend, Interest, and Capital Gain. Answer: Introduction: The business conducted by the taxpayer is of providing lessons in dancing. For this, the taxpayer received the fees in advance and encouraged students for providing advance fees by providing discounts. The taxpayer created a suspense account to include the fees that are prepaid and named the account as Unearned deposit- untaught lessons account. The proportionate fees for which tuition has been provided is transferred from the suspense account and is recognized as income. The prepaid fees were received on the condition that the taxpayer will not refund the fees but generally, the fees are refunded for students that do not complete the lessons (Burkhauser et al., 2012). The advance fees were not recognized as income by the taxpayer until the dancing lessons are provided. The assessable income of the taxpayer did not include the advance fees but only the fees of students to whom the dancing lessons has been provided. The tax authority however included the advance fees received in asses sable income for determining the tax liability. The issue before the court is to determine whether the advance fees received by the taxpayer should be included in assessable income in the year the service is provided or in the year, the fees are received in advance (Burkhauser et al., 2015). In this case, the court held that the fees that are received in advance should be included in the assessable income of the taxpayer in the year the actual dancing lessons are provided. The judgment also referred to the general rule that advance fees received for the services that has not been provided should be treated as advance and not as an income (Atkinson Leigh, 2013). There advance fees received was not to be refunded as per agreement but in practice, taxpayer refunded the fees of students that did not complete the lessons. Therefore, the court held that, as there is a possibility that the taxpayer might have to refund the fees so the prepaid fees should not be included in the assessable income of the taxpayer (Markle, 2015). The incomes that are derived during the year are treated as assessable income by the taxpayer as per section 6-5 of the ITA Act 1997. The income derived is explained in the section 6-5(4) of the act and it states that it is to be taken as income derived if the income is received by someone on behalf of the taxpayer or directly by the taxpayer (Mares Queralt, 2015). The receipt method and the earning method are two most popular methods of recognizing income for the purpose of tax. The method that will reflect the income of the taxpayer in the most correct manner is considered as the appropriate method for recognizing income. The Para 19 and Para 20 of Taxation ruling 98/1 provides the general rule of recognizing the income. According to the Para, 19-receipt method is appropriate for income that are derived from non-business activity, investments and income derived by employee (Greenville et al., 2013). According to Para 20 of the ruling for income derived from business of trading and manufacturing the earning method is the most appropriate. The RIP Pty Ltd made a profit of $2.45 million by proving funeral and associated services during the income year 30 June 2016. The company collects the fees from customers under different options. It collected fees directly from customers after providing services by issuing a net 30 days invoice. The company also issued a net 30 days invoice and received fees from the external insurance companies (Tiley Loutzenhiser, 2012). The company also received fees from RIP Finance, which carried on the business of providing credit on installments. The company also conducted a scheme of easy future plan and received fees in advance as installments. The earning method best reflects the income derived by the business so according to this method the RIP Pty Ltd should recognize income as the service is provided. Therefore, company should not wait for the actual receipt income but should recognize the revenues when the 30 days invoice is raised (Lang, 2014). The company received fees as advance in stallments under the easy future plan. The fees received are non-refundable and in case a customer fails to complete all the installments then the company forfeits the fees. The analysis above shows that the company derives income as the funeral service is provided. Yes, the principles held in the case of Arthur Murray are applicable in the current situation of RIP Pty Ltd. It is because the circumstances under both the cases are almost similar. In the case of Arthur Murray, the court held that the taxpayer derives income in the year the service is provided. The court in this case also highlighted the general rule that advance fees that are received for providing a service is to be recognized as income in the year the service are actually provided. In easy future plan the RIP Pty Ltd receives fees in advance for providing a service of funeral in the future. The accounting treatment of the income received should be made based on the case of Arthur Murray (Cao et al., 2015). The prepaid fees received under this scheme should be treated as advance and should be transferred to income in the year the service is provided. The Taxation Ruling 98/1 mentions two methods of accounting of income for the purpose of tax. These two methods of determining income derived are receipt method and earning methods. The receipt method also known as cash basis or cash received basis considers income derived in the year the actual or constructive fees is received. It is also provided in section 6-5(4) of the ITA Act 1997 that it will be considered as income derived if the fees are received by someone else on behalf of the taxpayer. There is another method called earning method that is used for determine income derived for the purpose of tax. The earning method is also known as accrual method or cash and credit method (Krever Mellor, 2016). The earning method provides that the income is derived as the service is provided and the recoverable debt is created. The recoverable debt means the service that was required as per the agreement has been provided and the amount can be legally claimed and recovered. Then analysis p rovided above shows that the commissioner of tax and the taxpayer have two choices for accounting of income for the purpose of tax. The method that reflects the income derived correctly for the income year should be chosen for determining income derived. In the scheme of easy future plan the RIP Pty Ltd received fees in advance installments. The scheme provides that if not all the installments are paid by the customers then the fees received should be forfeited and the company will have no liability for providing the services. The fees that are forfeited are transferred to a separate account called Forfeited payment account (Tran-Nam et al., 2014). The balance in the forfeited payment account should be recognized as income because the fees are non-refundable and the company has no liability of providing e services in the future. The trading stock includes items that are produced, manufactured or acquired and is used by the business for the purpose of manufacture, sale or exchange. The meaning of trading stock is defined under section 70-10 of the ITA Act 1997. The nature of trading stock can be better understood if it is clear that trading stock does not include CGT assets and financial agreements. The amount that is incurred of capital nature should not be included in the trading stock as per section 70-250 of the ITA Act 1997. The RIP Pty Ltd has purchased caskets and accessories. The company use this items for proving general service to the customer so this items should be treated as stock. The amount that is paid for purchasing trading stock is deductible under section 8-1 as general expenses. The amount paid for the purchase of stock is allowed as deduction in the year the stock becomes part of the stock in hand of the company (Saad, 2014). The RIP Pty Ltd has paid an advance of $25000.00 for items to be delivered in August of the next income year. The general deductions can be availed by a taxpayer in respect of payments that are made for carrying on business with the intent of producing an assessable income as per section 8-1 of the ITA Act 1997. In this case the company has paid in advance for items of stock that are to be delivered in the next income year. Therefore, based on the provisos mentioned in section 8-1 of the act, the advance made has not produced any assessable income so such advances should not be included in the assessable income of the taxpayer. It is advised to treat $25000.00 as advance and not as expenses for the year 30 June 2016. The ordinary income is defined in section 6-5 of the ITA Act 1997 and it states that income received from any source by a resident Australian should be included in the assessable income. The RIP Pty Ltd is a resident company so the dividend received by the company should be included in the assessable income. The dividend received by the RIP Pty Ltd is fully franked so the company is allowed to take the franking credits. The CGT assets are defined under section 100-25 of the act and there is also a list CGT assets provided under that section. According to the meaning of CGT assets and the list provided under that section advance rent paid for rental storage space does not qualify to be a CGT asset. Therefore, it is advised that the amount paid should be treated as an advance and the rent of four months belonging to the current year should be treated as expenses (Harding, 2013). This four-months rent is allowed as general deduction under section 8 of the ITA Act 1997. The unused long service leave is to be included in the assessable income of the taxpayer as per section 83-80 of the ITA Act 1997. The Rip has paid an unused long service leave of three months in advance. This payment for long service leave should not be treated as advance but expenses for the tax purpose. The amount that is paid for producing assessable income can be claimed as general deduction under section 8 of the ITA Act 1997. The land and building is included in the list of CGT assets provided under section 100-25 of the ITA Act 1997. The expenses that are incurred for the purpose of land and buildings are the expenses of capital nature and should not be allowed as general deduction under section 8 of the act (Rimmer et al., 2014). The expenses incurred by the company during the year for the purpose of landscaping, constructing onsite parking and equipments are all of capital nature and should not be included as general deduction as per section 8-1 of the ITA Act 1997. Reference Atkinson, A. B., Leigh, A. (2013). The Distribution of Top Incomes in Five Angloà ¢Ã¢â€š ¬Ã‚ Saxon Countries Over the Long Run.Economic Record,89(S1), 31-47. Burkhauser, R. V., Feng, S., Jenkins, S. P., Larrimore, J. (2012). Recent trends in top income shares in the United States: reconciling estimates from March CPS and IRS tax return data.Review of Economics and Statistics,94(2), 371-388. Burkhauser, R. V., Hahn, M. H., Wilkins, R. (2015). Measuring top incomes using tax record data: A cautionary tale from Australia.The Journal of Economic Inequality,13(2), 181-205. Cao, L., Hosking, A., Kouparitsas, M., Mullaly, D., Rimmer, X., Shi, Q., ... Wende, S. (2015). Understanding the economy-wide efficiency and incidence of major Australian taxes.Treasury WP,1. Greenville, J., Pobke, C., Rogers, N. (2013).Trends in the Distribution of Income in Australia. Melbourne: Productivity Commission. Harding, M. (2013). Taxation of Dividend, Interest, and Capital Gain Income. Krever, R., Mellor, P. (2016). Australia, GAARsA Key Element of Tax Systems in the Post-BEPS Tax World.GAARsA Key Element of Tax Systems in the Post-BEPS Tax World (Amsterdam: IBFD, 2016), 45-64. Lang, M. (2014).Introduction to the law of double taxation conventions. Linde Verlag GmbH. Mares, I., Queralt, D. (2015). The non-democratic origins of income taxation.Comparative Political Studies,48(14), 1974-2009. Markle, K. (2015). A Comparison of the Taxà ¢Ã¢â€š ¬Ã‚ Motivated Income Shifting of Multinationals in Territorial and Worldwide Countries.Contemporary Accounting Research. Rimmer, X., Smith, J., Wende, S. (2014). The incidence of company tax in Australia.Economic Round-up, (1), 33. Saad, N. (2014). Tax knowledge, tax complexity and tax compliance: Taxpayers view.Procedia-Social and Behavioral Sciences,109, 1069-1075. Tiley, J., Loutzenhiser, G. (2012).Revenue Law: Introduction to UK Tax Law; Income Tax; Capital Gains Tax; Inheritance Tax. Bloomsbury Publishing. Tran-Nam, B., Evans, C., Lignier, P. (2014). Personal taxpayer compliance costs: Recent evidence from Australia.Austl. Tax F.,29, 137.

Wednesday, December 4, 2019

SDN Overview of Network

Question: Discuss about the SDN Overview of Network. Answer: Introduction Software Defined Networking makes the network administrator job to be easier, flexible to manage the high demanded traffic of today. The huge network traffic congestion issues can be well mitigated with the new architectural components. Every new technology brings huge benefits, along with potential challenges that need to be addressed, at higher priority level. Software Defined Networking Software Defined Networking (SDN) is a new networking approach that gives great flexibility to the network administrators to control and manage the services of the network, through high level functionality abstract. It provides emerging architecture that can be ideal for dynamic nature, higher bandwidth that suits the applications of today, by being manageable, adaptable, dynamic and cost-effective. ONF (Open Networking Foundation) group is associated with the standardization and development of the Social Defined Networking. So, SDN is, Directly Programmable Network control can be programmable directly, because of its decoupling from the forwarding functions. Centrally Managed In the SDN controllers, that are software based, Network intelligence is well centralized logically and network global view is maintained that could appear to the policy engines and applications as a logical and single switch. Agile The control can be abstracted, so that it lets the administrator able to adjust the traffic flow that is network wide, so that the dynamically changing needs could be met. Open standards-based and vendor-neutral SDN can simplify the design and operation of the network, as the instructions are proposed and given by the controller of the SDN, rather than vendor specific, multiple protocols and devices. Programmatically Configured SDN allows the managers of the network to configure, secure, optimize, manage the resources of the network very quickly through automated and dynamic programs of SDN, which can be easily written by the managers and these instructions are not dependent over the proprietary software. Architecture Figure: SDN System Architecture (Source, ONF) Key Concepts in SDN Architecture Business Applications Business applciations are the applications that are consumable by the customers, directly. These possibilities are supply chain managmenet, video conferencing and customer relationship management. Network and Security Services It is a functionality, through which the business applciations are enabled for perform securely and efficiently. Pure SDN Switch When a pure SDN switch is considered, traditional switch control functions are executed in the central controller. the switch functionality is entirely restricted to the data plane. Hybrid Switch When hybrid switch is considered, both the traditional switching protocols and SDN technologies can be operated and run simultaneously. The network manager can statistically configure the controller of the SDN so that the certain traffic flows can be identified, discovered and controlled, whereas the traditional and distributed networking protocols direct the remaining traffic is left directly. Hybrid Network Northbound API establishes the communication in between the business application layer and control layer. Southbound API The southbound API establishes communication in between infrastructure and control layer, through the OpenFlow, XMPP (eXtensible Messaging and Presence Protocol). Seurity Issues The security risks in implementing the SDN technology stand still in the state of infancy. Vectors for Attach There can be a security issue in the separation of forwarding plane and control plane. Usually, the archicture of SDN is divided into 3 different layers, called application, controller and infrastructure layers, while the last layer consists of the services and applciations that can configure and request the infrastructure of the SDN. These three are possible vectors fo attack and in addition to that, the security issue is further complex with the technology. Figure: SDN Security Attack Vectors The major issue with the SDN technology is that it relies over new encapsulation and overlay technique, for which many of the present tools of security cannot inspect and understand the traffic of the SDN. Data Layer, SouthBound There are many of the Southbound protocols and APIs, used by the SDN controller for communication over the network and each of them employs own securing communications, however, they are not developed with full security taken into consideration. The increased user-friendliness interface of the API created increased network surface attack of the network infrastructure. The network elements can be targeted and attacked right within the network itself. The attack can be by gaining unauthorized access, either virtually or physically to the network or even try to compromise the host to attack and the network elements and destabilize the networks. Controller Layer The SDN controller can be targeted for various intentions and purposes. The attack can be to instantiate new network flows by spoofing messages of either northbound or southbound messages towards better access to the network devices. When it is successful, then the traffic can be allowed to attack the SDN and can bypass the pre-defined policies for security. SDN Layer It is likely that the northbound protocol can be attacked. If the attack is possibly leveraged for the northbound APIs that are vulnerable, then SDN network will be in control of the attacker through the controller. the attacker can even create new and convenient policies for SDN to gain and access the environment of the SDN. Security Framework Securing Controller Layer Since the controller is considered as a key target attack, so it should be well hardened. Hardening the controller security posture, needs hardening of the host operating system. The best practices to harden the Linux servers public facing are made applicable. SDN systems should allow secure configuration and access that is authenticated by the administrator to controller. RBAC (Role-Based Access Control) policies are needed for administrators of the controllers. Audit trials and logging can be the best used to check for any possible unauthorized changes, performed by the administrators. In case, the controller is attacked for DoS, then High-Availability (HA) controller architecture can be beneficial. Redundant controllers of the SDN, though suffer from the loss, they still continue to function. It would definitely raise the expert level bar for the attacker, who tries to attack all of these controllers for DoS. In addition to that, the attacker wont be particularly stealthy and further aims of the attacker will remain undetected. Conclusion Software Defined Networks are as beneficial as security vulnerable. The technology of not only development of the SDN should be developed, but also make the security levels to be confident and hardened, otherwise the number of threats will be more than the benefits, yielding from the SDN. References B. McGillicuddy, "SDN security issues: How secure is the SDN stack?," SearchSDN, 2014. [Online]. Available: https://searchsdn.techtarget.com/news/2240214438/SDN-security-issues-How-secure-is-the-SDN-stack. Accessed: May 26, 2016. Benton, Kevin and Camp, L Jean and Small, Chris "Openflow vulnerability assessment".Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. 2013 Braga, Rodrigo and Mota, Edjard and Passito, Alexandre "Lightweight DDoS flooding attack detection using NOX/OpenFlow".Local Computer Networks (LCN), 2010 IEEE 35th Conference, 2010. Jin, Ruofan and Wang, Bing "Malware detection for mobile devices using software-defined networking".Research and Educational Experiment Workshop (GREE), 2013 Second GEN, 2013 Kreutz, Diego and Ramos, Fernando and Verissimo, Paulo "Towards secure and dependable software-defined networks".Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. 2013 R. Millman, "How to secure the SDN infrastructure," ComputerWeekly, 2015. [Online]. Available: https://www.computerweekly.com/feature/How-to-secure-the-SDN-infrastructure. Accessed: May 26, 2016. S. Hogg, "SDN security attack vectors and SDN hardening," Network World, 2014. [Online]. Available: https://www.networkworld.com/article/2840273/sdn/sdn-security-attack-vectors-and-sdn-hardening.html. Accessed: May 26, 2016. Scott-Hayward, Sandra and O'Callaghan, Gemma and Sezer, Sakir (2013). "SDN security: A survey".Future Networks and Services (SDN4FNS), IEEE SDN, 2013