Monday, May 25, 2020

Hitler s Downfall Of The Weimar Government - 1262 Words

In November, Hitler was trying to get more power and support, and a way he did this was by trying to take advantage of how bad the condition of the Weimar government was. He did this by instigating a major riot throughout Weimar. It seemed like a full proof plan and situation, but miscalculations made it a flop and Hitler ending up in jail. At first, the Nazis were not taken seriously and had little to no power. Then, Hitler brought a group of young mean without jobs to become soldiers for him, and he would call them storm troopers, or the SA. During the Weimar crisis, Hitler made a plan with nationalist political images, Kahr and Lossow, to over take Munich in a riot. Hitler had a giant army of SAs, but knew that the loss of control would come if he didn’t give them anything to do, so that’s when he prepared them to rebel, but suddenly, Kahr and Lossow cancelled the rebellion. It was difficult for Hitler because he had 3,000 troops ready to go to battle. On November 8th, Hitler and 600 SAs crashed a meeting that Kahr and Lossow were hosting at a Beer Hall. Threatening them, Hitler made them agree to rebel. The SA then took over army headquarters and offices of newspapers. The next day, November 9th, The Nazis, including Hitler, went to Munich thinking that would be a victory march to take over, but Kahr called in the police and army, and there was a brief brawl, which involved the police killing 16 Nazis. During that situation, Hitler ran away, but was found and sentShow MoreRelated The Flaws of the Weimar Constitution Essay1195 Words   |  5 PagesThe Flaws of the Weimar Constitution The majority of people believe that it was the Weimar constitution which was fundamentally flawed and that this damaged the long term prospects of the Weimar republic, although strong points can be identified in the constitution which support the argument that the constitution wasnt to blame for the republics downfall. From this some historians have determined that the role of the constitution in the downfall of the republic isRead MoreThe Rise And Fall Of The Third Reich1193 Words   |  5 PagesThe Weimar Constitution was a genuine attempt to create a perfect democratic country. In his book The Rise and Fall of the Third Reich (1960), American historian William L. Shirer described the Weimar Constitution as on paper, the most liberal and democratic document of its kind the twentieth century had ever seen ... full of ingenious and admirable devices which seemed to guarantee the working of an almost flawless democracy.† The constitution guaranteed equal rights to the German people, yet alsoRead MoreModern History Germany 1918-19451618 Words   |  7 PagesEssay Question B To what extent did the weaknesses in the Weimar Republic account for the growth and rise to power of the Nazi Party to 1933? The Weimar Republic was created in 1919 with the abdication of Wilhelm II. The new government was the body that signed the Treaty of Versailles, and to many, this was a betrayal. The consequences of Versailles were severe to Germany, and many were looking for someone to blame, the government was the ideal scape goat. Communists and the right saw an opportunityRead MoreFailures Of Adolf Hitler1616 Words   |  7 PagesAdolf Hitler is one of the most notorious villains in all of history for his unspeakable crimes against humanity, but how he came to be so powerful is not often known. He effectively attained utmost power through both self-activation, and his ability to acclimate to the social conditions posed in Germany at this time. Hitler rose to sovereignty on the strength of his personality and vision, and through a tactic called coercive power. His followers swore allegiance to him and no one else. Adolf HitlerRead MoreHitler s Rise Of Power1716 Words   |  7 Pagesstate that Hi tler could not have risen to power in any other than Germany, implying that he was nothing more than a product of German culture. From others perspective they believe that Hitler made himself dictator by means of his political genius. And yet still theirs others that profess it was the weak democratic government of the Weimar Republic or Germany’s social and economic scene in the 1930’s that made the people restless and prepared for a dictator to come to power. Hitler s rise to powerRead MoreIb Contemporary World : The Economic, Political, And Religious Polarization Of Society1164 Words   |  5 Pageseconomic polarization Beginning with Zollverein (1833) By abolishing tolls, the Zollverein made Germany a common market. Industrialization was much farther behind than the rest of Europe → Germany tried to catch up, but did not succeed in doing so. Weimar Republic Several misjudgements in WWI that brought Germany farther down in terms of economics War on two fronts- Russia and France. Without being defeated by the military, Germany expected some kind of leniency in terms of reparations Treaty of VersaillesRead MoreTo What Extent Was the Rise to Power of the Nazis Due to the Wall Street Crash?2028 Words   |  9 Pagesinconceivable that Hitler could have come into power had not the Weimar Republic being subject to the unprecedented strain of a world crisis, thus he thinks that the Wall Street Crash was the cause of problems in Weimar leading to the rise of the Nazis. In 1933 the Nazi party took control of Germany, installing Hitler as chancellor. Evidence would suggest that the Wall Street Crash was a major factor in the Nazis rise to power, however there were other factors such as the fall of the Weimar Republic andRead MoreThe War Guilt Clause And Reparations2609 Words   |  11 PagesThe mandate of Article(s) 231 and 232 , (respectively titled â€Å"The War Guilt Clause† and â€Å"Reparations†) of the Treaty of Versailles on June 28th, 1919 served as unintentional catalysts for the arise of revisionism in post-war Germany, and its fall out of the international order following the Paris Peace Conference. These two articles politically, socially, and economically ravaged Germany, and created societal circumstances in which a totalitarian dictatorship (the National Socialist German WorkersRead MoreThe Rise Of Nazism By John Maynard Keynes3444 Words   |  14 Pages1930’s which enabled a gross mediocrity to rise to national prominence is an absurd hypothesis’ Although it could be said that economic problems in Germany played a bigger and more important role in enabling the Nazi’s rise to power and that the problems were important to allowing the party attack its political opposition and empower their political message. In 1929 the American stock market collapsed. The crash had caused the collapse of 11 large German industries. 3 major banks and 100’s of smallRead MoreHitlers Rise to Power1749 Words   |  7 PagesZahra Lahgazi The Causes of Hitlers Rise to Power The 30th of January, 1933 marks the day in which Germany and to a greater extent the world was rocked forever. Why? Because the leader of the Nazis, a nationalist and socialist party was signed in as the chancellor of Germany. His name, Adolf Hitler, has grown to be recognised as one of the most hated in history to this day. How did this malicious man grasp the power of Germany? It turns out that some of the causes sprouted from some of the darkest

Friday, May 15, 2020

Counterculture - Research Paper - 3180 Words

Counterculture of the Sixties in the USA Causes and Effects by Johanna K. Weisz Preface If the Sixties was the decade of rebellion in America, the preceding two post-WWII decades were characterized by social conformity and trust in the system. â€Å"In that era of general good will and expanding affluence, few Americans doubted the essential goodness of their society† (Haberstam 10). However, this trust in the system changed radically in the Sixties. Many of the numerous youth born during the post-WWII baby boom became teenagers who questioned the cultural values of their parents and refused to assimilate into the established social and moral system. They created their own counterculture that was in opposition to the established culture of†¦show more content†¦5 One example of their use of non-traditional means was the nomination of a pig for president at the Democratic National Convention in Chicago in 1968 in order to protest against the Vietnam War. Their slogan declared â€Å"They nominate a president and he eats the people. We nominate a president and the people eat him†. (Patterson n.p.). The protests during the Democratic National Convention led to a violent confrontation of demonstrators and the Chicago police. Hoffman and Rubin were among eight activists who were arrested and accused of conspiracy. (Gitlin 342). Civil Rights Movement, hope and assassinations Young activists had more to fight for than foreign wars. In the early Sixties, there was still racial segregation by law in the Southern states of the U.S. President John F. Kennedy promised to end segregation, but was shot in 1963. Even though the Civil Right Act of 1964 eventually was signed by President Lyndon B. Johnson, the fight for equal rights continued. Segregation was not abolished immediately due to the new law, especially not in the South. (Anderson 211). While there were militant activists on each side, the main leader of the Civil Rights Movement, Martin Luther King, Jr., encouraged peaceful disobedience instead of violence, which was right in the heart of the hippie philosophy: There are two types of laws, just and unjust. I would be theShow MoreRelatedCounterculture - Research Paper3195 Words   |  13 PagesCounterculture of the Sixties in the USA Causes and Effects by Johanna K. Weisz Preface If the Sixties was the decade of rebellion in America, the preceding two post-WWII decades were characterized by social conformity and trust in the system. â€Å"In that era of general good will and expanding affluence, few Americans doubted the essential goodness of their society† (Haberstam 10). However, this trust in the system changed radically in the Sixties. Many of the numerous youth born duringRead MoreThe Existence of Different Types of Cultures1092 Words   |  5 Pagesincludes knowledge, belief, arts, morals, law, custom, and any other capabilities and habits acquired by man as a member of society (Tylor, 1958, p. 1). Culture is learned through enculturation and commonly shared by the members of the society. In this paper, three types of culture are briefly discussed which include dominant culture, subculture and counter-culture.      The first type of culture is dominant culture. Quite often, the dominant culture is reflected as orthodox and universal in society. TheRead More The History Of Lsd And Its Effects On The American Counterculture1458 Words   |  6 Pageson to set up his own research clinic in New York, where he continued his experimentation of LSD. Throughout the 1960s, Dr. Leary was one of the most well know activists for LSD use in America. He traveled around the US, going to concerts and speaking about the spiritual benefits of LSD. Through is philosophical speeches and active participation in LSD experimentation; Dr. Timothy Leary helped lead the American counterculture movement of the mid sixties. The counterculture movement was born atRead MoreThe Purpose Of This Essay Is To Provide An Argument For1952 Words   |  8 Pages2013), but it did not just lay the groundwork for future laws when it came to cannabis it stared an entire counterculture. â€Å"The Counterculture and Drug Scene In the late ‘60s, amid the growing counterculture and drug proliferation, marijuana use becomes a mainstay of the hippie lifestyle. A fierce debate emerges over whether to legalize the drug.† (MOORE, 2013), and this counterculture would lead to some very possive laws concerning cannabis in the latter future, but also would lead to some veryRead More Ginsbergs Howl: a Counterculture Manifesto Essay4130 Words   |  17 PagesGinsbergs Howl: a Counterculture Manifesto Allen Ginsberg dives into the wreck of himself and of the world around him to salvage himself and something worth saving of the world. In this process, he composes Howl to create a new way of observation for life through the expression of counterculture. Protesting against technocracy, sex and revealing sexuality, psychedelic drugs, visionary experience, breaking the conventions of arts and literature; all basic characteristics of counterculture are combinedRead MoreArgumentative Essay On Ishmael1391 Words   |  6 Pagessave the world. After throwing away the newspaper, the narrator seems upsetted by the advertisement for a teacher seeking a pupil interested in saving the world. He had lost hope after failing to find such a teacher in his youth as part of the counterculture. Although certain it is a scam, he decides to go to the address. He walks into a building to find only a gorilla behind a window of glass. The gorilla speaks telepathically after a few moments of fearful sil ence and caution telling the narratorsRead MoreDominick10 Tb Ch08 1 1005 Words   |  5 Pagesrecord  companies  desires  to  increase  profits.   Ans:  T            6.  Although  some  American  recording  artists  were  prominent  during  the  1960s,  the  music   scene  became  dominated  by  the  British  Invasion.   Ans:  T            7.  Heavy  metal  music  emerged  as  rock  became  part  of  the  counterculture.   Ans:  T            8.  Downloading  ring  tones  is  big  business  Ã¢â‚¬â€œÃ‚  Billboard  magazine  even  has  a  chart  listing   the  most  popular  ring  tone  downloads.   Ans:  T            9.  The  music  industry  can  be  divided  into  three  main  segments:  Ã‚  production,  distributionRead MoreNuclear Weapons Of Mass Destruction1057 Words   |  5 PagesKarla Ximena Leyte Though Paper #3 Weapons of mass destruction and their ability to challenge security and create large-scale obliteration have become the most significant threat in international politics, causing vast concern of the consequences that may arise if they were to emerge in the hands of dangerous non-state actors. Chemical, nuclear, and biological weapons not only possess the ability to end the life of many but also pose negative effects on the environment and global economy. WhileRead MoreShould Marijuana Be Legalized?1436 Words   |  6 Pagesand more progressive with marijuana. Quite recently, a few states have went forward and legalized marijuana for recreational use, and even Canada has taken its first step towards marijuana legalization. According to a survey conducted by the Pew Research Center, a nonpartisan organization that provides information about the issues, attitudes, and trends changing America, as of 2015, the support for marijuana is finally outpacing the opposition. In 2012, the Nation al Survey on Drug Use and HealthRead MoreHow the Hippies Counterculture Transformed Music Essay2277 Words   |  10 Pagescharge when young adults voiced displeasure over the country’s entrance into the Vietnam War and the use of nuclear weapons. One group within this movement was coined the â€Å"hippies†. This paper will discuss the beliefs of the hippies of Haight-Ashbury in San Francisco, California and illustrate how the hippie â€Å"counterculture† transformed into an evolution of music, in the making of protest songs and the new â€Å"psychedelic† sound. It will elaborate on the musicians who found fame in responding to the call

Wednesday, May 6, 2020

Analysis of Robert Frosts Mowing - 763 Words

Fred White Analysis of Robert Frost’s â€Å"Mowing† As the speaker labors in his farm field on a quiet, hot day, he can’t help but notice that his scythe seems to be whispering as it works. He can’t exactly hear what the scythe is saying, and he admits that there is a chance that the whispering sound is simply in his own mind because of the quietness of the day or perhaps due to the heat of the sun playing tricks on him. The speaker realizes that the scythe is teaching him a lesson about the value of work and happiness in the world. Instead of dreaming about inactivity or reward for its labor as a person would, the scythe takes its sole pleasure from its hard work. It receives satisfaction from its dedicated and hard work in the field. As the†¦show more content†¦Works Cited DiYanni, Robert. â€Å"Robert Frost in Context.† Literature: Approaches to Fiction, Poetry and Drama. DiYanni, R. 2nd ed. New York: The McGraw–Hill Companies, Inc. 2008. 666 - 672. Frost, Robert. â€Å"Mowing.† Literature: Approaches to Fiction, Poetry and Drama. DiYanni, R. 2nd ed. New York: The McGraw–Hill Companies, Inc. 2008.Show MoreRelatedEssay about The Life of Robert Frost1404 Words   |  6 PagesROBERT FROST â€Å"Two roads diverged in a wood and I- I took the road less traveled† How did Robert Frost take the road less traveled in his life? Frost was a poet who lived a hard life. With 6 kids and a wife, he had a lot of people to provide for. He was a man who wore many hats, being a dad, husband, poet, and farmer. Robert was an incredibly gifted man who wrote many famous poems. Robert Frost, a great American poet lived a humble life and changed the world with his profound writing abilityRead MoreRobert Frost : A New England Poet3698 Words   |  15 PagesRobert Lee Frost Known for being a New England poet Robert Frost was born in San Francisco, California on March 26th, 1874. Born to a New England father William Prescott Frost Jr. and a Scottish mother Isabelle Moodie who moved to the west coast from Pennsylvania after marriage (Bailey). Both his parents were teachers and poets themselves, but his father later became a journalist with the San Francisco Evening Bulletin (Bailey). Frost spent 12 years of his life growing up in San Francisco, until

Tuesday, May 5, 2020

Deep Root Analytics and Data Breach †Free Samples to Students

Question: Discuss about the Deep Root Analytics and Data Breach. Answer: Introduction: Elections are always a tightly contested event, an attribute that facilitates a lot of scrutiny and tension. In todays world, this process has been marked by many technological advances which aim to improve the process through time and resource efficiency. Now, while these advances may facilitate better results, they also are associated with many problems because of the amount of data that is used. These problems have been well illustrated in 2017, where multiple hacks and data exposure incidences have occurred over electoral processes. This year alone countries such as Georgia, Philippines and Mexico have had extensive data leaks in their voter registration records, an outcome that has facilitated a great deal of speculation(Cappella, 2017). However, of all the incidences recorded, none has topped the recent leak in the American voter registration where over 198 million records were fairly exposed to the public at large. This incidence occurred in June and was subject to millions of records that dated back to a decade ago, accounting for a significant amount of the records held by the countrys electoral commission. Nevertheless, prior to the breach, the data was held by an independent data analytic company known as Deep Root. This company had been contracted by the Republican Party in order to conduct a research on the opinions held by the American voters. Therefore, at the time of the leak, thousands of records detailing names, addresses and personal opinions on political issues were held by the companys systems. Furthermore, the contracted company did not discover the problem by itself but was facilitated by an independent research group (Upguard) who through their researcher Chris Vickery found the data online(Halper Dave, 2017). How and why the leak occurred The Republican National Committee (RNC) had contracted the company at hand in order to conduct a general survey on the prevailing conditions of the country. Through this survey, Deep Root had collected and analysed data as given by the American voters. Now, at the time of the leak, the general public speculated that sophisticated tools and techniques were used to breach the companys systems in order to reveal the records. However, research conducted revealed a contrary observation as the leak was traced back to a negligent user within the contracted company (Deep Root). This employee had failed to implement critical security procedure needed to safeguard the information(Naylor, 2017). Data leak, how? To start with, the company either intentionally or unintentionally disabled its security protocols across its online platform. This failure inevitably facilitated any user to access clear text files that had the records of the voters. Moreover, the company had leased cloud facilities from the Amazon Web Service (AWS) which gave access to the stored data. Therefore, the data leak was as a result of negligent user behaviour which exposed a cloud infrastructure containing the data. Furthermore, following the leak, data experts verified the content exposed which highlighted the authenticity of the exposed information. This outcome outlined the level of access given to the third party member, who held sensitive records with minimal security procedures(Naylor, 2017). Why it occurred: To understand the root cause of the problem, one must examine the infrastructure used by Deep Root, RNC contracted Analytics Company. The company chose to host the data in an online system, specifically the Amazon S3 servers which like any other cloud service was associated with many risks as compared to in-house storage facilities. For one, it was supported by the internet which is well known for its extensive threats as propagated by malware and intruders attacks. Therefore, the company even without the data exposure placed the sensitive data at risk by applying a cloud infrastructure. Furthermore, the same structure required extensive security procedures to protect the data stored, which again was compromised based on the companys negligence(Digg, 2017). According to cyber security experts, cloud solutions are prone to many risks as they are facilitated by the internet. Moreover, the cloud infrastructure like any other IT system is subject to misconfigurations and deployment errors which unlike other in-house systems expose the services to the public. Therefore, as the first solution, the sub-contracted company should have used in-house facilities if they lacked the necessary skills to set-up a competent and secure cloud infrastructure. Secondly, the same company should have had better security procedures more so, when they dealt with the transmission and deployment of data(Assange, 2017). In addition to this, the leaked data was exposed in clear text format which highlighted the lack of encryption protocols. To avoid this problem, technical solutions including cryptographic techniques such as authentication and encryption should have been used to secure the data. In the future, the contracted company (Deep Root) should isolate the data from its other operations through these encryption methods. In essence, the voters records should be transformed into unreadable formats during their transmission. Moreover, the same data should be ferried via secure channels that are only accessible to the authorised members. Therefore, the site used by the company should have separate platforms for accessing the data, either through live portals that require access pins or through customised user applications (APIs). Finally, the company including the RNC should set a better security policy following a thorough risk assessment procedure. This procedure would identify the potential ris ks faced by the systems and facilitate the development of a procedural guideline of deploying data online(RBS, 2016). Throughout the years, many cyber-attacks have occurred across the world affecting multiple systems either individually or simultaneously. However, none has ever surpassed the intrusion level that was acquired by the now famous WannaCry attack. In general, the WannaCry attack was a malware intrusion that was classified as a ransomware as it forced its victims to pay money in order to access their files or data. In essence, the malware would block and deny users access to their computers until a certain fee was paid(News, 2017). Moreover, the attack was so intrusive that researchers changed its name to WannaCry from its initial name of WannaCrypt0r, a true testament to its actions that caused unprecedented pain. According to researchers, the WannaCry problem began in February when the National Security Agencys (NSA) systems were accessed which led to an exposure of its hacking tools. Now, this access or hack was conducted by a vicious cyber-criminal group known as Shadow Brokers who in past had succeeded to infiltrate some high-level cyber systems. Shadow Brokers through their access revealed a vulnerability in Windows systems which was heavily exploited to conduct the WannaCry attack. In all, the problems caused by the intrusion were experienced far and wide as countries such as United Kingdom, Russia, and Spain were forced to shut down their systems in order to contain it. Moreover, the attack infiltrated any system connected to the networks targeted by the intruders through the malware(Wattles Disis, 2017). Affected parties and how? At its best, WannaCry was the true definition of a cyber-weapon as it infiltrated thousands of online systems in a short period of time. In fact, at the start of the attack, more than 40, 000 computer systems were affected throughout the world. At the same time, more than 100 countries were affected as both their private and public sector systems were infiltrated. However, some countries faced the full force of the attack as evidenced by the damages exhibited by the aftermath of the attack. The United Kingdom (England) was one of these countries as it faced the biggest intrusion in the public sector after its healthcare industry was compromised through its national healthcare system (NHS)(McGoogan, Titcomb, Krol, 2017). In essence, the country used a single and common system to coordinate medical operations, a structure that was facilitated by the online infrastructure. Now, following the attack, medical practitioners and patients were subjected to a $300 ransom in order to access t heir files an outcome that halted the entire industry. The same outcome was experienced in Spain where the private sectors led by the telecommunication and electrical industry was compromised. Similarly, Russia had to deal with a possible economic meltdown after the banking industry was severely affected by the attack on its leading financial institutions. Furthermore, the same country was left helpless when it failed to secure its public sector after the attack took down two of its major ministries, health and interior governance. In addition to this, Russias state owned railway company was affected which for short while slowed down the transportation industry(McGoogan, Titcomb, Krol, 2017). All the independent observers and researchers involved highlighted the contribution of the NSA in the attacks. The NSA through their hacking tools had developed a vulnerability known as EternalBlue, this vulnerability exploited a major bug in Windows operating systems a component that was used in the attack. Now, the Windows system used a special communication protocol known as the Server Messaging Block (SMB) to conduct its networking operations. These operations were conducted within the application layer of the TCP/IP structure where they facilitated the sharing, reading and writing of computer files. Therefore, through the SMB, the users were able to share services and resources(Graham, 2017). WannaCry used this vulnerability within the SMB protocol to access its functionalities and spread the malware in networks. At first, the malware would detect network connections particularly those lacking secured ports to trigger the attack. After accessing unsecured ports, the intrusion would then proceed to plant the starter for the malicious program, an action that was termed as the transfer of the payload. This step was then followed by the activation of the program, an action that attacked the host machine and facilitated the spread of the malware as it proceeded to replicate in any other visible and unprotected networks/ports(McGoogan, Titcomb, Krol, 2017). Preventing the WannaCry attack Several prevention tactics would have been used to stop the WannaCry attack, including the most basic and obvious precaution of being offline. However, based on the demands and needs of the internet, the best solutions would have been related to an online connection. First, network isolation would have helped to contain the attack, a countermeasure that was readily available with firewalls and intrusion detection systems. Now, these firewalls through their servers would have implemented isolation DMZs (demilitarised zone). It is through these servers that the intrusion would have been detected and thus contained within them. Moreover, the same outcome could have been achieved if the victims networks were isolated based on their use(Newman, 2017). In addition to this, the networks and their access ports should have been secured to block all unauthorised users. This functionality would have been easily accomplished using access control and effective network authentication measures. However, of all the solutions and countermeasures highlighted, none would have surpassed the fix for the EternalBlue vulnerability. In essence, the attack was generally caused by the bug in the Windows systems, a problem that was later fixed using an update patch. Therefore, installing the patch to the Windows bug would have prevented the entire attack(RBS, 2016). References Assange, J. (2017). Deep Root Analytics behind data breach on 198 million US voters: security firm. DW, Retrieved 30 August, 2017, from: https://www.dw.com/en/deep-root-analytics-behind-data-breach-on-198-million-us-voters-security-firm/a-39318788. Cappella, N. (2017). 198 million voter records leaked by analysis firm. The Stack, Retrieved 30 August, 2017, from: https://thestack.com/security/2017/06/20/198-million-voter-records-leaked-by-analysis-firm/. Digg. (2017). If You're A Registered Voter, Your Personal Data Was Likely Exposed By A Data Firm . Digg, Retrieved 30 August, 2017, from: https://digg.com/2017/registered-voter-data-breach. Graham, C. (2017). NHS cyber attack: Everything you need to know about 'biggest ransomware' offensive in history. The Telegraph, Retrieved 30 August, 2017, from: https://www.telegraph.co.uk/news/2017/05/13/nhs-cyber-attack-everything-need-know-biggest-ransomware-offensive/. Halper, E., Dave, P. (2017). A Republican voter data firm probably exposed your personal information for days and you don't have much recourse. Los Angeles Times, Retrieved 30 August, 2017, from: https://www.latimes.com/politics/la-na-pol-gop-data-breach-20170619-story.html. McGoogan, C., Titcomb, J., Krol, C. (2017). What is WannaCry and how does ransomware work? The Telegraph, Retrieved 30 August, 2017, from: https://www.telegraph.co.uk/technology/0/ransomware-does-work/. Naylor, B. (2017). Firm Contracted By Republican Groups Left Millions Of Voter Files Unsecured Online. npr, Retrieved 30 August, 2017, from: https://www.npr.org/2017/06/19/533551243/firm-contracted-by-rnc-left-millions-of-voter-files-unsecured-online. Newman, L. (2017). The Ransomware Meltdown Experts Warned About Is Here. The wire, Retrieved 30 August, 2017, from: https://www.wired.com/2017/05/ransomware-meltdown-experts-warned/. News, B. (2017). WannaCry ransomware cyber-attacks slow but fears remain. Technology, Retrieved 30 August, 2017, from: https://www.bbc.com/news/technology-39920141. RBS. (2016). Data Breach QuickView Report. 2016 data breach trends year in review, Retrieved 30 August, 2017, from: https://pages.riskbasedsecurity.com/hubfs/Reports/2016%20Year%20End%20Data%20Breach%20QuickView%20Report.pdf. Wattles, J., Disis, J. (2017). Ransomware attack: Who's been hit. CNN Tech, Retrieved 30 August, 2017, from: https://money.cnn.com/2017/05/15/technology/ransomware-whos-been-hit/index.html.