Monday, January 27, 2020

Ginger and Turmeric: History and use

Ginger and Turmeric: History and use Ginger and Turmeric Introduction Ginger Ginger and turmeric are categorize in the same family, Zingiberaceae, along with cardamom (White 2007)(Leal 2003). The most frequently used herbal supplement is Zingiber officinale, which is the scientific name for ginger (White 2007). The scientific name of ginger, Zingiber officinale , was created by Linaeus a Swedish botanist from the 18th century. Linaeus named ginger after Singabera, or shaped like a horn, which is an Indian Sanskrit (Hoffman, 2007).Ginger is known for its overpowering smell and taste and also for its medical use to reduce nausea (White 2007). The well-known aroma of ginger is from the ketones, one of these ketones is gingerol (White 2007). The strong taste that ginger possesses is from phenylproanoids, non pungent fats and waxes (Hoffman 2007).Gingers taste is known when its hydrocarbon tails unite with its receptors (Hoffman 2007). Ginerols and zingerone are the non-volatile phenylpropanoids that contribute to gingers taste (Hoffman 2007).The dehydrated form o f these molecules are gingerols and shogals which has a lot stronger taste (Hoffman 2007). The rhizome, which is a steam, is normally consumed but is referred to as the â€Å"ginger root† (White 2007). Ginger can be consumed in many forms of which are as juice, dry power, syrup or even in pill form for easy digestion (Hoffman 2007). Fresh ginger does not contain zingerone but once cooked the zesty sweet flavor of zingerone appears from ginerol converting into zingerone (Hoffman 2007). Turmeric Curcuma longa, or turmeric, is known for being an Indian spice (Jurenka 2009). Turmeric is located in South Asia, Southwest Asia, China, the Caribbean Island and South America (Leal et al., 2003). Turmeric is known for the particular reign of Asia and the Middle Eastern countries (Tayyem et al., 2006). In India, the average consumption of turmeric is around 2 to 2.5 grams, this means that the consumption of curcumin is anywhere from 60 to100 mg a day (Chainani-Wu 2003). Turmeric is used in foods for its yellow color and flavor (Leal et al., 2003).Turmeric has been used in laxatives and as a pesticide (Negi etal., 1999).In 1910, Lampe and Milobedzka, discovered what made the famous yellow color in turmeric, which is curcumin (Jurenka 2009). Medically turmeric is known for its anti-oxidant, anti-cancer, antimutagenic and anti-inflammatory activities (Leal et al., 2003). When curcumin is taken by mouth it has a low bioavailability (Tayyem et al., 2006). Turmeric has many effects on the DNA by inhibiting the destruction, lowering the mutations and helping repair DNA (Krishnaswamy 2007). It was also shown that the level of detoxifying enzymes increase with the amount of turmeric (Krishnaswamy 2007). Turmeric is indigenous to the topical region of South and Southeast Asia (Krishnaswamy 2007). The way that turmeric is used in food in India is that it is fried or it is boiled and at these elevated temperature this still did not affect turmerics ability to prevent mutants (Krishnaswamy 2007). Historical Usage Ginger Ginger has been historically used for colds, fevers, digestive problems and to increase the appetite (White 2007). Ginger has been referred to in the ancient passages in countries like China, Ancient Rome, India, Arabia and Greece (Olgoli et al., 2009). Ginger has been utilize in numerous of ways because of its aroma and also in culinary ways by adding it to jams, drinks, breads and sweets (Olgoli et al., 2009). Ginger has been used for diarrhea, gastritis, and nausea for thousands of years in Asian medicine (Olgoli et al., 2009). In China and Thai ginger has been used in controlling nausea and vomiting in pregnant women (Olgoli et al., 2009). For thousands of years, ginger has been used for medical purposes as wells as a culinary spice added to food for its color and flavor (Hoffman 2007). Ginger has been discussed in many ancient Indian, Arab, Chinese, Greek and Roman medical text on the medical used of it and was referred to as the universal medicine in India (Hoffman 2007). Ginge r has been used for problems related to the respiratory and digestive tracts as well as a tonic for the heart and a paste to help with headaches and aching joints due to arthritis (Hoffman 2007). The gastrointestinal tract has been benefited a great deal from ginger by inhibiting gastric ulcers, increasing digestion enzymes, and improving the secretion of bile (Chen et al, 2007). There is a wild ginger located in Hawaii that is used for cuts, bruises, sores, fungal skin infections, painful joints, sprains, headaches, stomachaches and toothaches (Hoffman 2007). Turmeric Turmeric was used as a treatment for diseases related to inflammation in Ayurvedic medicine (Jurenka 2009). Turmeric was used in historically in Indian medicine for rheumatic disorders, gastrointestinal disorders, for wound healing and even for removing worm from people and animals to cosmetics (Krishnaswamy 2007). Turmeric in paste form has been used on chicken pox, small pox, and measles (Krishnaswamy 2007). In India there is land that is set aside for the growth of spices and condiment; 60 percent of that land is used for the growth of turmeric (Krishnaswamy 2007). For religious ritual turmeric has been used as dyes for not only fabric but also used on the skin (Funk et al., 2006). Bioactive Ingredient Ginger Two bioactive ingredients of ginger are shogaols and gingerols which act like antioxidants (Leal et al., 2003). There are additional compounds in ginger extract that stop the growing of microorganisms and effect the growth of specifically Mycobacterium tuberculosis and Mycobacterium avium (Leal et al., 2003). Another bioactive ingredient of ginger is zingerone, it helps with the prevention of diarrhea due to pathogens (Chen, 2007). The bioactive ingredients of ginger, that make ginger known for its function of being an: antioxidant, anti-angiogenesis, anti-cancer, anti-atherosclerotic, and anti inflammatory are gingerol, shogoal, and paradol (Hanim et al., 2008). The way these molecules are able to posses all of these properties is by reducing the number activity of nuclear factor-kappa B. Nuclear factor-kappa B is important in the ability for the cell to multiply and form new blood vessels. When nuclear factor-kappa B inhibited it hinders the formation of new blood vessels and the c ells ability to rapidly multiply (Hanim et al., 2008). Saponins, alkaloids, and flavonoids are all found in ginger (Ghayur Gilani, 2005). (Hoffman 2007) Tumeric Curcuminoids are a bioactive ingredient in turmeric that has antioxidant properties (Leal et al., 2003). In a reaction that requires polykedtide synthase, two p-coumaroyl-CoA molecules are joined together with a malonyl-CoA molecule to release a water molecule and form curcuminoids (Ramirez-Ahumada et al., 2006).There are three types of curcuminoids, they are curcumin, demethoxycurcumin, and bisdemthoycurcumin (Jurenka 2009). Turmeric has the largest amount of curcumin compared to other spices; turmeric is 3.14 percent curcumin and can be up to 9 percent curcuminoids (Tayyem et al., 2006)(Krishnaswamy 2007). The carbonyl group in curcumin has been related to how turmeric may help with preventing cancer (Leal et al., 2003). Curcumin is virtually water insoluble because its a lipophilic polyphenol molecule (Jurenka 2009). In addition, curcumin can survive the acidic content of the stomach (Jurenka 2009). Another important group of ingredients in turmeric are the volatile oils; rumerone , zingiberone, and atlantone (Jurenka 2009). (Ahmed Gilani, 2008) Modern Use Ginger Related to Nausea, Vomiting, and Diarrhea The way that ginger prevents vomiting is not a known mechanism (White 2007). But what is considered is that ginger stops the binding of serotonin receptors and has an effect on the gastrointestinal system along with the central nervous system to prevent vomiting (White 2007). Ginger has shown to have a positive effect on reducing nausea and vomiting related to both pregnancy and post operation (White 2007). Pregnant women taking ginger by capsule have shown to experience positive results by having a decrease in nausea and vomiting (Ozgoli et al., 2009). Women who are pregnant and experiencing nausea and vomiting should take 250 mg of ginger four times a day (White 2007). In China, United Kingdom, and Thailand ginger is listed on the pharmacopeias list for being an important drug for pregnant women because of its ability to decrease nausea and vomiting (Ozgoli et al., 2009). In a study with pregnant women, 77 percent of the women had a major improvement in the severity of nausea and 6 7 percent had a decrease in frequency of vomiting when using ginger syrup (Ozgoli et al, 2009). When ginger is taken by either capsule or syrup there was a positive result in reducing nausea (Ozgoli et al., 2009). Levine et al. found that nausea was slowed down during chemotherapy treatments when ginger was combined with protein (Levine et al., 2008). In a recent study done by Chen et al., they found an additional benefit to ginger, that it prevents diarrhea (Chen et al, 2007). The way ginger stop diarrhea is by inhibiting the B subunit of heat-labile enterotoxin from attaching to the ganglioside GM1 (Chen et al., 2007). Ginger and Arthritis There are varied views on whether ginger has any effect on relieving pain from arthritis (White 2007). There was a study that showed a significant difference in reducing arthritis symptoms in the knee with the uses of ginger extract but another study said that it may only be in the first phase of treatment that symptoms are reduced (White 2007). Patients taking ginger in the powder form have noticed a decrease in swelling and pain (White 2007). There has not been much research on the use of ginger rubbing oil but it is an option to ease the pain from inflamed joints (White 2007). In a study performed on rats, the subjects were injected with polyarthritis which is like redness and irritation to the skin, rheumatoid arthritis, and osteoarthritis and each rats knee was measured before inflammation (Levy et al., 2006).One group of rats was given 6.2 mg/kg of 6-shogaol per a day, this group had much lower amount of swelling in the knee compared to the control group (Levy et al., 2006).Aft er twenty-eight days of the trial, the swelling of the 6-shogaol group was almost as low as the circumference of the knee measurement before the trial began (Levy et al., 2006). The way that 6-shogaol reduced the inflammation was by keeping monocytes, macrophages, leukocyte, and lymphocytes in the blood and inhibiting the movement of them into the synovial cavity (Levy et al., 2006). Ginger and Heart Disease One of gingers known properties is effect on cholesterol, which is known as hyocholesterosterolamic, having low total cholesterol and low density lipoprotein are to important components in reduce risk for heart disease (A1-Amin et al., 2006).Ginger may lower the risk of heart disease by lowing cholesterol and thinning the blood to prevent clots from forming (Hoffman 2007). In a study performed on rats, when taking ginger daily the blood cholesterol of the rats was reduced but had an inverse affect on blood sugar by increasing it in the rats (Srinivasan 2005) High blood pressure is another risk factor in having an increase risk for heart disease. The ginger root has been shown in studies using rats to be lower high blood pressure but there are very few studies done with humans (Chen et al., 2009). The two ingredient of ginger that has a lower effect of blood pressure are 6-shogaol and 6-gingerol but the mechanism of how they do it is unknown (Chen et al., 2009). When rats were given g inger there was a 44 percent decrease in blood cholesterol levels. After seven weeks of ginger treatment there was a 41 percent decrease in triglycerides in these same rats (Al-Amin et al., 2006). Ginger and Anti-inflammatory agents Ginger can be consumed as tea or you can inhale the vapors through steam, this is a method use to decrease inflammation in upper respiratory infections like flu, sinusitis, colds and bronchitis (Hoffman 2007). Ginger has also been beneficial in women who experience painful menstrual cycles (Hoffman 2007). Ginger and Antimicrobial Activity Ginger extract slows down the growth of two bacteria, Mycobacterium tuberculosis and Mycobacterium avium. This is a very significant finding due to the increase of tuberculosis the past few years and the increase in drug resistant Mycobacterium tuberculosis (Leal et al, 2003). Patients who are immune compromised benefit from the antimicrobial activity of ginger (Leal et al., 2003). Ginger and Diabetes There have been mixed reviews on if ginger has blood glucose lowering effects and if it beneficial to diabetics. Some studies show that it lowers blood glucose in both diabetic and non-diabetic animals but it also shows that ginger has increased blood glucose levels (Al-Amin et al., 2006). In a trail with rats that had been experimentally induced with diabetes they found that ginger could help in the treatment of diabetes (Al-Amin et al., 2006). The group of rats that had diabetes that were treated with ginger had a 52 percent decrease in their blood glucose levels (Al-Amin et al., 2006). The non-diabetic rats did gain weight through this trial and the control diabetic group lost weight (Al-Amin et al., 2006). The diabetic rats that were treated with ginger, at the end of the trial had maintained their weight (Al-Amin et al., 2006). The protein levels present in the urine of the rats that were given ginger had decrease by 60 percent (Al-Amin et al., 2006). In the diabetic rats that w ere administrated ginger, there was a reduction in both urine excretion as well as water consumption (Al-Amin et al., 2006). Ginger enhances the release of insulin from the beta cells in the pancreases; this is one of the few mechanisms that result in a beneficial outcome on people with diabetes (Al-Amin et al., 2006). Ginger and Cancer The initiation of nuclear factor-kappa B is stopped by ginger root, which will inhibit the growth of the tumor cell and the ability of new blood vessels to supply blood and nutrients to the tumor (Rhode et al., 2007). Ovarian cancer cells have shown to slow down and even stop growth in the presences of 6-shagoal, a component of ginger (Rhode et al., 2007). After one to five days of ovarian cancer cells being in the presence of ginger the growth of the cells slowed down. With the dose ranging as high as 50 micrograms/ul to as low as 30 micrograms/ul of ginger there was evidence of slowing down of the cell growth of the cancer cells (Rhode et al., 2007). Prostate cancer, colon cancer, gastrointestinal cancer, and breast cancer has been reduced in occurrence with the increase of ginger and other functional foods (Rhode et al., 2007). With the stopping of nuclear factor-kappa B, this shows that another benefit to ginger is that it is anti-neoplastic (Rhode et al., 2007). There was a decr ease in the spreading of cancer in the lungs when a bioactive ingredient of ginger, 6-gingerol, was administrated to mice ( Yance Sagar et al., 2006). Turmeric and Anti-inflammatory The inflammatory diseases that benefit from turmeric are inflammatory bowel disease, pancreatitis, arthritis, certain cancers and chronic anterior uveitis (Jurenka 2009). There are many ways that curcumin, in turmeric, decreases inflammation for example the down regulation of cyclooxygenase-2 (COX-2) and lipoxygenase (Jurenka 2009). Another way that inflammation is reduced is to stop the formation of inflammatory cytokines. Some of these cytokines are interleukin -1,-2,-6,-8 and -12, migration inhibitory protein, tumor necrosis factor-alpha (TMF-alpha) and monocyte chemoacttractant protein (MCP) (Jurenka 2009). Nuclear factor kappa B (NF-kB) is inhibited by curcumin, which prevents the action of inducible nitric oxide syntheses and cyclooxygenase-2 (Jurenka 2009). Nuclear factor kappa B is affects inflammation, the growth of a new tumor, cell growth and division, and transformation (Jurenka 2009). When taking 50 to 200mg/kg of curcumin, in mice, there was a smaller occurrence of edem a and at 48mg/kg there was an even smaller occurrence of edema by 50-percent (Jurenka 2009). When there has been damage to the mucosal cells, for example Ulcerative Colitis, curcumin is shown to reduce the inflammation (Jurenka 2009). When giving curcumin to rats with Ulcerative Colitis, that was induced experimentally, there was a decrease in inflammation and progress in reducing severity of symptoms; this was also true in rats that had experimentally induced pancreatitis (Jurenka 2009). When comparing curcumin to phenylbutazone and a placebo, which was lactose powder, 400mg of curcumin showed the best results in decreasing inflammation in patient after surgery (Jurenka 2009). A study done on patients with an inflammatory eye disease, anterior uveitis, there showed a positive result from the use of curcumin. There were two groups, one took 375 mg of curcumin alone and the other group took the 375mg of curcumin combined with antitubercular therapy. Following two weeks of these therapies, the group that took just curcumin there was a 100 percent improvement but the group with the combination of curcumin with the antitubercular therapy only had an 86 percent improvement (Jurenka 2009). In animals, curcumin has slowe d down multiple sclerosis (Fahey et al., 2007) Turmeric and Gastric Ulcers When a study was done, on patients diagnosed with peptic ulcers, curcumin showed an absence of ulcers at their check up. Patients were told to take 600mg of curcumin 30 to 60 minutes prior to eating a meal , then at 4:00 pm and once again prior to going to bed, so about five times a day. This study was conducted for twelve weeks and in a third of the way through the study 48 percent of the patients did not have any ulcers. When the twelve weeks were over 76 percent of patients were absent of ulcers (Jurenka 2009). Turmeric and Arthritis When rats were given 4mg/kg of curcuminoids per a day four days before arthritis inducted injection there was a 75 percent decrease in joint inflammation in a rats with acute arthritis and a 68 percent decrease in joint inflammation in rats with chronic arthritis (Jurenka 2009). Due to low levels of absorption, they decided to see if oral curcuminoids would decrease joint inflammation. Four days before given the arthritis inducted injections the rats were given a high oral dose of curcuminoids, by the third day there was a 48 percent decrease in joint inflammation. This showed that the oral intake of curcuminoids can still lower joint inflammation in regards to arthritis (Jurenka 2009). There was a reduction in swollen joints and stiffness in the morning and an increase in walking time for people with rheumatoid arthritis when taking 1200 mg of curcumin a day (Jurenka 2009). Four days before the injection, the rats were given 23mg/kg/day of curcuminoids (Funk et al., 2006). In an acu te inflammatory state, there was an inhibition of 64 percent and an even better result with chronic arthritis with a 72 percent inhibition (Funk et al., 2006). Funk et al. found that whether it is a large amount of fraction turmeric or a small amount of curcuminoids that are have been purified, they both have shown to have benefits to arthritis and help suppress it (Funk et al., 2006). However they do think that the more harmless and more successful form is purified curcuminoids (Funk et al., 2006). Turmeric and Cancer The ability to prevent rapid cell growth and the ability to cause signaling that will result in cell death are two important ways curcumin has show to stop the growth of cancer (Fahey et al., 2007). When curcumin stops the actions of signal transducer and activator of transcription 3, this promotes the death of the cancer cell (Fahey et al., 2007). Curcumin has thought to have effect that can inhibit the growth of cancer and many studies have shown that curcumin has stopped the formation of cancer cells (Jurenka 2009). There are many mechanism of how curcumin decrease the risk of cancer. High levels of COX-2 have been related to cancer; therefore curcumin is beneficial by decreasing COX-2 and NF-kB (Jurenka 2009). Lipoxygenase is used to metabolize arachidonic acid, when this occurs scavenging free radicals are formed. The way curcumin has anti-cancer activity is it interferes with lipoxygenase to slow down the metabolism of arachidonic acid, which reduces the free radicals (Jurenka 2009). The growth of cancer cells is slowed down when curcumin reduces the occurrence of inflammatory cytokines IL -1B, IL-6, and TNF-a (Jurenka 2009). Protein kinase C is an intercellular signaling protein in which intervenes on the rapid growth and inflammation of the cells, curcumin down-regulates these enzymes to reduce the growth of tumors (Jurenka 2009). The anti-inflammatory and anti-oxidant actions of curcumin play a big role in its prevention of cancer (Tayyem et al.2006). In colon cancer present in animals, curcumin slowed down the growth of tumors (Tayyem et al., 2006). Turmeric and Irritable Bowel Syndrome (IBS) One of the most frequently experienced symptoms of Irritable Bowel Syndrome is abdominal pain. In an eight week study done on patients with Irritable bowel syndrome patients were divided into two groups and administrated 72mg of turmeric extract or 144mg of turmeric extract (Jurenka 2009). . Half way through the study the occurrence of IBS had decrease by 53 percent in patients taking 72 mg of turmeric extract and there was a 60 percent reduction in patient taking 144mg of turmeric extract. When the study was complete there was a 22 percent decrease in abdominal pain in patients taking 72mg and a 25 percent decrease in patients receiving 144mg of turmeric extract (Jurenka 2009). Turmeric and Blood Glucose Levels In some studies, they found that turmeric has a positive effect on glucose tolerance (Srinivasan 2005). In people taking curcumin, an active ingredient in turmeric, they were able to lower their fasting blood sugar levels, which resulted in their insulin dosage decreasing (Srinivasan 2005). In a study that looked at rats with diabetes, the rhizome extract exhibited lower levels of blood sugar levels (Srinivasan 2005). The conclusion, of the study was that people that are diabetic will benefit from 1 gram of turmeric power with a healthy diet (Srinivasan 2005). Turmeric and Heart Disease Turmerics anti-oxidant properties help in the combat against heart disease. When turmeric was from one to five percent of the diet within four weeks cholesterol and triglycerides had decreased while HDL had increased (Krishnaswamy 2007). In a sixty day trial, a group of people were given 20 mg of curcumin. At the end of the trial the levels of high density lipoprotein and low density lipoproteins peroxidation concentration had been reduced from anywhere between 25 percent to 50 percent (Bosca et al., 1997). Turmeric and Alzheimers Disease When looking at the population if India, there was a noticeable link between Alzheimers disease and turmeric. Turmeric is a greatly used spice in India and the prevalence of Alzheimers disease is lower in India when compared to the United States (Calabrese et al., 2003). There is not much scientific finding on turmeric inhibiting Alzheimers disease and the way it is done is unknown (Ahmed Gilani, 2008). When observing the activity of AChE and the curcuminoids, bisdemethoxycurcumin was the most powerful curcuminoid while curcumin was the least effective curcuminoid (Ahmed Gilani, 2008). In the test to examine memory retention, they used rats that had scopolamine-induced amnesia and the Morris water maze. After being injected with scopolamine, the rats were given either a mixture of curcuminoid or either bisdemethoxycurcumin, or curcumin. All curcuminoids, either the mixture or individually, showed inverse effects of the scopolamine-induced amnesia, which showed that curcuminoids cou ld be used for treating Alzheimers disease (Ahmed Gilani, 2008).In the brain, curcumin reduces the oxidative stress, lower the amount of plaque and inhibits inflammation. These actions are key components in preventing Alzheimers disease but this can also play a part in inhibiting the development of Parkinsons disease also (Lim et al., 2001). Turmeric and Antibiotics Activity One of well know functions of turmeric is its ability to inhibit the growth of bacteria. Turmeric has shown to inhibit the growth of many bacteria including, Staphylococcus aureus, Escherichia coli, and Pseudomonas aeruginosa (Negi et al., 1999). Other bacteria that is inhibited by ginger is Helicobacter pylori (De et al., 2009). Gram positive bacteria required a lot less quantity of turmeric oil than gram negative to inhibit bacteria (Negi et al, 1999). Gram positive only required 50 ppm to inhibit the growth of bacteria but 200 pm was require to inhibit the growth of gram negative bacteria (Negi et al., 1999). Safety/Toxicity Ginger Ginger is listed on the WHO monograph and the U.S. Food and Drug Administrations safe herb list (Ozgoli et al., 2009). Ginger may affect the gastrointestinal tract slightly and cause heartburn, diarrhea, and irritation to the mouth but besides these symptoms ginger does not cause any adverse effects (White 2007). In animals, ginger had inotropic effects which lead to arrhythmia (White 2007). It has been shown that 1,000 mg a day of ginger is safe and has had better results than the higher doses (Ozgoli et al., 2009). Ginger consumption should not exceed 4 grams a day and ginger should not be given to children under the age of 2 (Hoffman 2007). If someone is on warfarin they should check with their doctor about taking high dose of ginger (White 2007). Patients should talk to their primary care physician about taking warfarin and ginger they both having blood thinning effects(Hoffman 2007).There needs to be more research on adverse effect and drug interaction with ginger (White 2007). If someone has gallstones, they need to talk to their doctor about taking ginger as a medicine due to the ginger increasing the flow of bile (Hoffman 2007). Ginger has no adverse effects on the outcomes of pregnancy and is a safe and practical product to be used (White 2007). The potency of ginger increases when it is in powder form, so it is advised that pregnant women do not take ginger in powdered form (Hoffman 2007). Turmeric Turmeric has shown to be a very safe supplement. In a human trial that lasted for three months they were administrated 8 grams of curcumin a day and determined that it was safe (Chainani-Wu 2003). Studies have shown that it is safe to take up to 8 grams of curcumin, an ingredient in turmeric, on a daily bases (Jurenka 2009).The only concern with turmeric is hepatotoxicity; in two studies done with rats and mice hepatotoxicity was showing up in test (Chainani-Wu 2003). In one study, rat and mice were given a diet of 5 percent turmeric and turmeric extract for 90 days there were adverse effect of weight loss, change in the weight of the liver, and hepatotoxicity (Chainani-Wu 2003). Another study performed on mice, within 14 days of the study there were signs of hepatotoxicity (Chainani-Wu 2003). The diet was made of 0.2 percent to 5 percent turmeric and a .05 percent to 0.25 percent ethanolic turmeric extract (Chainani-Wu 2003). In human studies there seem to be no problem with hepatot oxicity and Chainani Wu believes this because humans metabolize curcumin more easily than rats (Chainani-Wu 2003). In the study done by Bosca et al., they had not adverse side effect on the liver from turmeric; they looked at liver enzyme and monitored the bilrubin levels (Bosca et al., 1997). If patients are taking chemotherapy drugs they should talk with their doctors (Jurenka 2009). Curcumin can inhibit as well as enhance chemotherapy drugs, so it is important to discuss the type of drug you are taking with your doctor (Jurenka 2009). Patients on anticoagulant and antiplatetlet medicines should talk to their doctors before taking high doses of curcumin; because of its ability prevent platelet aggregation (Chainani-Wu 2003). If patients are suffering from gallstone before taking large dose of turmeric they should discuss it with a doctor. The contractions of the gallbladder are increased when taking curcumin (Chainani-Wu 2003). Conclusion Both ginger and turmeric have been proven safe by many studies and have shown great benefits to the health of individuals. Turmeric and ginger both have shown to decrease negative effects of diabetes, heart disease, arthritis, and cancer. Both of these spices show antimicrobial and anti-inflammatory properties. There seem to be no detrimental side effect of taking ginger or turmeric, so there is no harm trying to add more into your diet. As with adding any supplement it best to take in moderation and contact your primary care physician.

Saturday, January 18, 2020

Ict Policy and Server Room Proposal for a Small Firm

INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT INTRODUCTION Information and Communications Technology Policy addresses security issues and how to effectively apply and maintain information systems, thereby facilitating protection of critical, valuable and confidential information together with its associated systems. Most people are likely to recognise the impact and severity of the loss or theft of confidential designs for a new product. However they do not always recognise the potential risk, and consequential result, of seemingly ‘innocent' activities, such as copying software or copying the corporate database onto their laptop computer or not documenting changes made to their systems. The purchase and installation of hardware and software requires those involved to consider carefully the Information Security issues involved in this process. Careful consideration of the company's business needs is paramount, as it is usually expensive to make subsequent changes. Analysis of user requirements versus the various benchmarks test results will establish the best choice of server/software to be purchased. Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the IT & T Policy issues are adequately covered. The issue of IT consumables is looked into. These are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. Valuable items should always be kept in a secure environment to avoid damage or loss. OBJECTIVES To develop an Information Communication Technology policy for KPLC Retirement Benefits Scheme that introduces efficient and effective use of IT systems and in turn facilitate the smooth running of the secretariat. MISSION STATEMENT To strive to provide nothing but the best means of data and telecommunications services to the secretariat as a whole. DEFINITION OF ICT POLICY A set of rules, regulations, procedures and plans of action for administration of equipment, resources, and services in the ICT section. TERMS OF REFERENCE The aim of this document is to; ) Analyse procedures and practices that are in use currently and identify those that can be reinforced or changed. ii) Work out a time plan for the smooth transition from the use of KPLC systems and resources. iii) Review implemented policies elsewhere to facilitate broad knowledge and adapt ideas suitable to our environment. TABLE OF CONTENTS INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT1 INTRODUCTION1 TABLE OF CONTENTS2 PREAMBLE4 IT & T SYSTEM DESCRIPTIONS4 1. 0 PROCUREMENT OF HARDWARE, PERIPHERALS & OTHER EQUIPMENT8 1. 1 Purchasing and Installing Hardware8 1. 2Cabling, UPS, Printers and Modems15 1. 3Consumables16 . 4Working off premises or using out-sourced processing18 1. 5Using Secure Storage20 1. 6Documenting Hardware23 1. 7 Telecommunications equipment25 1. 8Other Hardware Issues28 1. 9 Disaster Recovery Plans30 2. 0 CONTROLLING ACCESS TO INFORMATION & SYSTEMS IN THE SECRETARAIT32 2. 1Controlling Access to Information and Systems32 2. 1. 5 Controlling Access to Operating System Software38 Managing Passwords39 3. 0 PROCESSING INFORMATION AND DOCUMENTS46 3. 1Networks46 3. 2System Operations and Administration49 3. 3E-mail and the World Wide Web57 3. 4Telephones & Fax69 3. 5Data Management73 3. 6Backup, Recovery and Archiving75 . 7Document Handling78 3. 7. 3 Countersigning Documents79 3. 7. 5 Approving Documents before dispatch80 3. 7. 6 Signature Verification80 3. 8Securing Data83 3. 8 . 4 Maintaining Customer Information Confidentiality86 4. 0 PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE90 4. 1Purchasing and Installing Software90 4. 2Software Maintenance & Upgrade92 4. 3Other Software Issues94 5 COMBATING CYBER CRIME95 5. 1Combating Cyber Crime95 5. 1. 1 Defending Against Premeditated Third Party Cyber Crime Attacks95 5. 1. 2 Minimising the Impact of Cyber Attacks97 5. 1. 3 Collecting Evidence for Cyber Crime Prosecution98 5. 1. Defending Against Premeditated Internal Attacks99 5. 1. 5 Defending Against Opportunistic Cyber Crime Attacks100 6. 0 COMPLYING WITH LEGAL AND POLICY REQUIREMENT101 6. 1Complying with Legal Obligations101 6. 1. 2 Complying with General Copyright Legislation101 6. 1. 3 Complying with Copyright and Software Licensing Legislation102 6. 1. 4 Legal Safeguards against Computer Misuse103 6. 2Complying with Policies103 6. 3Avoiding Litigation106 6. 3. 3 Sending Copyrighted Information Electronically107 7. 1 E- Commerce Issues108 7. 2 Structurin g E-Commerce Systems Including Web Sites108 7. 3 Securing E-Commerce Networks109 . 4 Configuring E-Commerce Web Sites110 7. 5 Using External Service Providers for E-Commerce Delivery Channel111 8. 7Cost Considerations116 9. 0 DEALING WITH PREMISES RELATED CONSIDERATIONS118 9. 1 Physical Security of Equipment and Assets118 10. 0 NETWORK SECURITY MEASURES122 10. 1 Data Network devices122 10. 2 System administration123 10. 3 System Auditing129 10. 4 Email Policies130 10. 5 The Internet131 10. 6Computer desktop equipment133 10. 7Human Resource Aspects Policies141 10. 8Security Policy Auditing142 10. 9Incidence Management and Responses146 Reporting an Incident146 What is Cybercrime? 151 10. 0Movement of Telecommunications Equipment155 11. 1Setting Classification Standards157 12. 0 RETIREMENT OF OBSOLESCENCE OR OBSOLETE EQUIPMENT158 12. 1 Setting New Hardware Standards158 12. 2Methods of assessing old and inapt Software/hardware158 12. 3Hardware and software obsolescence160 12. 4RBS Depre ciation Factors for Defining Old Or Inapt Equipment161 13. 0 APPENDIX 1162 13. 1 LIST OF SPARES & ACCESSORIES162 14. 1 GLOSSARY & REFERENCES163 PREAMBLE It is necessary for one to be familiar with the various Information Technology and Telecommunications Systems that the company has acquired and installed over the years. This document provides the description of the systems as well as the policies formulated in regard to these IT & Telecommunications systems. IT & T SYSTEM DESCRIPTIONS 1. Telephony The telephone network for RBS consists of the public interconnected network using automatic branch exchanges (PABX) which connects us to the public network using telecommunication service providers and private branch network (PBX) which is housed in our commercial office premises which help us communicate in the premises through extension numbers. 2. Computer Data systems These are composed of data network hubs and switches which make the Local Area Networks (LAN) and the routers which interconnect the LANs. Each LAN is composed of passive data networks, servers and PCs that use the network thus realised to exchange information and data throughout the enterprise. 3. System Software and Data System software is the general term used to describe the many software programs, drivers and utilities that together enable a computer system to operate. One of the main components of system software is the operating system of the computer e. g. Microsoft Windows ® XP Professional. 4. Data Data in the language of information technology means the individual elements that comprise the information and can be processed, formatted and re-presented, so that it gains meaning and thereby becomes information. Here we are concerned with the protection and safeguard of that data/information which, in its various forms can be identified as Business Assets or Information Assets. The term data and information can be used somewhat interchangeably; but, as a general rule, information always comprises data, but data is not always information. ICT SYSTEMS DESCRIPTIONS DESCRIPTIONS THE OF SYSTEM RBS – Open Retirement Benefits Scheme System The system is used for the administration of employee and employer contributions into the RBS Fund. It has a database for member details together with their dependants. This is used when benefits are to be calculated for deceased persons and withdrawing members. The system also has a pensioners payroll used to pay all pensioners whether retirees or widows and orphans. Group Life for all employees and the issue of Last Expense is also maintained and administered in the system. Database Management Systems The secretariat database is managed using ORACLE database management systems(DBMS). Oracle databases are relational, thus data is stored in them in row-column (table) format. All the company data is stored and managed using ORACLE. WINDOWS NT ENVIRONMENT The Window NT environment operates in domains. A domain is a collection of computers and users defined by the administrator of a Windows NT Server network that share a common directory database. A domain provides access to the centralised user accounts and group accounts maintained by the domain administrator. Each domain has a unique name. Window NT Environment In the current WAN model of KPLC there is a single master domain called KPLCSTIMA. The KPLCSTIMA is also the main account domain and KPLCNET as Internet resource domain. A child domain known as RBS. KPLCSTIMA will be created from the master domain and will have trust relationship with it. This is will give us more control of our systems and semi-autonomy from the KPLC systems. It will be installed with Windows Server 2003 standard edition operating system which will provide the following services at RBS: 1. File and Print sharing. 2. Microsoft Exchange Services – host the resident Staff member’s mailboxes and enable efficient sending and receiving of internal/Internet mail and if need be provide also storage of the mailboxes. 3. Anti-virus Software. 4. Systems Management Server for Network management. 5. Internet Browsing. 6. To allow for faster downloads of the application updates. 7. To enable the efficient installation and periodic updates of the PC anti-virus in the local area network. 8. For faster and seamless primary logon of client PC’s to the network. Our application i. e. RBS system is already running in a stand alone server and will continue that way to ensure system stability and integrity. The new system will also run on its own stand alone server for the same reason. †¢The primary domain controller (PDC) tracks changes made to domain accounts. Whenever an administrator makes a change to a domain account, the change is recorded in the directory database on the PDC. The PDC is the only domain server that receives these changes directly. A domain has one PDC. A backup domain controller (BDC) maintains a copy of the directory database. This copy is synchronised periodically and automatically with the PDC. BDC’s also authenticate user logons, and a BDC can be promoted to function as the PDC. Multiple BDC’s can exist in a domain. Client PCs Currently there are four PCs and two laptops in the secretariat all running Windows XP as the desktop operating system and networked using Windows NT operating system of the K PLC master domain. All PCs have MS Office 2003 – 2007 as an office desktop application. The PCs have between 256 and 512 MB RAM. All the PCs are running on Microsoft TCP/IP protocol and use USER LEVEL access on the network. Microsoft Exchange Server Microsoft Exchange Server is used for electronic messaging in and out of the organisation. Exchange is organised into entities called sites each consisting of one or more servers containing mailboxes and public folders. Mailboxes are where a user’s messages are kept, each user having a single mailbox whereas public folders are like notice – boards, containing information that is shared between multiple users. Intra-site communication has to occur at high speed and with high reliability. Inter-site communication can occur at lower speeds. In addition to local messaging, there is Internet messaging, implemented via the Proxy Server. Anti-Virus Software McAfee’s Total Virus Defence Software is the current company guard against viruses. The software is loaded on all the Exchange server protects against viruses distributed. A group of computers and the server that manages them is called an Anti-virus Domain. The anti – virus server downloads new version automatically from McAfee Website on the Internet. Once the new software version is downloaded, the system administrator configures it for distribution. It also alerts the system administrator to ‘pull’ the latest versions to the Anti-virus Server. Internet Microsoft Proxy Server provides an easy, secure way to bring Internet access to every desktop in an organisation. The proxy server is a gateway between the company’s network and the Internet. A gateway is special software, or a computer running special software, that enables two different networks to communicate. The gateway acts as a barrier that allows you to make requests to the Internet and receive information, but does not allow access to your network by unauthorised users. [pic] 1. 0 PROCUREMENT OF HARDWARE, PERIPHERALS & OTHER EQUIPMENT 1. 1 Purchasing and Installing Hardware This Chapter deals with the Information Technology and Security issues relating to the purchase, use or maintenance of equipment through which information is processed and stored. 1. 1. 0 Procurement of Hardware, Peripherals and Other Equipment Policy Statement All purchases of new systems hardware or new components for existing systems must be made in accordance with Information Security and other organisation Policies, as well as technical standards. Such requests to purchase must be based upon a User Requirements Specification document and take account of longer-term organisational business needs. The purchase and installation of hardware requires those involved to consider carefully the Information Security issues involved in this process. This section covers the key areas to be considered. . 1. 1 Specifying Information Security Requirements for New Hardware The purchase of new computers and peripherals requires careful consideration of the business needs because it is usually expensive to make subsequent changes. |ICT Issues to consider |Action Required | |The system must have adequate capacity or else it may not be |Estimate the current and potential load on the system. | |able to process your data. For critical applications ensure t hat the system is reliable and of | | |high quality. | | |Select a supplier with a proven ‘track record', who is likely to be | | |in business for the life of the hardware. | |Data must be adequately protected; otherwise there is a risk |Determine the type of safeguards necessary for the information | |of loss or accidental / malicious damage. concerned and ensure that the hardware is capable of supporting the | | |required features, e. g. the type of operating system and attached | | |devices. See classifying information and data | |Where hardware maintenance is poor or unreliable, you greatly|Choose a supplier with a proven ‘track record', who is likely to be | |increase the risk to the organisation, because, in the event |in business for the life of the hardware. |of failure, processing could simply STOP. |Enter into a maintenance contract at the time of purchase with a | | |suitable response time in the event of a failure. See service level | | |agreement | |T he system must be sufficiently ‘resilient' to avoid |Determine your organisation’s tolerance to system non-availability | |unplanned down-time, which can have an immediate negative |(seconds, minutes, hours or days? , and approach the design of your | |impact on your organisation |hardware configuration accordingly. | | |Consider the use of mirrored disks to guard against disk failures; | | |duplicate processors in case of processor failure; duplicate | | |configurations; and the use of an Uninterrupted Power Supply (UPS) | | |and standby generators. 1. 1. 2 Installing New Hardware Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the ICT Policy issues are adequately covered. (See Premises for further detail. ) Policy Statement All new hardware installations are to be planned formally and notified to all interested parties ahead of the proposed installation date. Information Technology and Securi ty requirements for new installations are to be circulated for comment to all interested parties, well in advance of installation. ICT Issues to consider |Action Required | |The equipment must be located in a suitable environment otherwise|Adhere to the specifications and recommendations of the | |it may fail. |manufacturer or supplier, e. g. for operational temperature, | | |humidity etc. | |Adequate safeguards against fire, water and electrical failure | | |should be in place. See Premises | |Any disclosure of your network diagrams, security features, |Ensure that all persons on site, whether from your own | |locations and configurations etc. exposes potential |organisation or not, have completed a Non-Disclosure Agreement | |vulnerabilities, which could be exploited. Although a Non Disclosure Agreement paves the way for legal | | |redress, it cannot protect you against actual commercial damage. | |Leaving tools, utilities and developer's kits on your new system |All new syste ms should be configured for maximum practical | |endangers the confidentiality and integrity of your data |security by the removal of unnecessary utilities, developers' | | |programs, etc. a technique known as hardening. | |Without an installation plan for the new equipment, disruption to|Ensure that all special pre-installation requirements (e. g. air | |operational systems is more likely. |conditioning) have been met. | | |Identify the precise location for the equipment and ensure that | | |the power and network cables are ready. | | |Agree a detailed installation plan with the vendor. | |Anticipate what might go wrong and consider how to minimise the | | |risks. | |Where the installation plan does not include safeguards against |Agree a detailed installation plan and document it. See Project | |the (inevitable) increased security threat resulting from |Plan | |(relatively) ‘open access' to the systems area, accidental or |Monitor progress against the plan. |malicious damage can result. |Only allow authorised persons access to the systems area. | | |To protect all parties never allow engineers to work unattended. | | | | |Breaches of Health and Safety regulations endanger the well being|Ensure Health and Safety regulations are followed when locating | |of your staff and your organisation’s commercial activities. the equipment, peripherals and cables. | | |A periodic visual inspection is beneficial also. | 1. 1. 3 Testing Newly Installed Systems and Equipment Hardware should be tested when new to verify it is working correctly, and then further tests applied periodically to ensure continued effective functioning. Policy Statement All equipment must be fully and comprehensively tested and formally accepted by users before being transferred to the live environment or user sites. |ICT Issues to consider |Action Required | |Where new equipment is not tested for critical functions before |Ensure that all new installations are thoroughly tested after | |being used, it can lead to failure and hence damage to both data |initial set-up and prior to live use. |and other linked systems. |All such tests should be in accordance with a documented test | | |plan. | |Inadequate testing can threaten the integrity and availability of|Check the test outputs to confirm the results. Ensure that | |your data. |all-key components, e. g. hard disk subsystems are included in the| | |tests. | |Devices that are known to degrade with time, e. g. printers, | | |should be tested periodically | |Where testing is performed in a manner that does not simulate |Ensure that the test plan simulates realistic work patterns | |live conditions, the results of such testing cannot be relied | | |upon. | |Poor security procedures during equipment testing can compromise |Ensure that Non Disclosure Agreement have been obtained from all | |the confidentiality of your data. |third party staff involved in testing the equipment. | |Verify that the required security configuration and safeguards | | |have been implemented for the new hardware. | | |If live data is used in the testing process for the new hardware,| | |ensure that it is closely controlled. See Use of Live Data for | | |Testing | Explanatory notes NT servers The analysis of user requirements (client base and mail sizes expected) versus the various benchmarks test results will establish the best choice of server to be purchased. For file and print server only disk space is a key requirement. IT & T Issues |Key Actions | |CPU Board |Dual CPU, redundant system components in many aspects | |Disk & Disk space |Enough storage to cater for expected growth of mail database for the next| | |fiscal year | | | | | |Redundant and RAID-5 capable | |SPEC INT2000 |Compares CPU speeds for various servers. | | | |SPEC CPU2000 |To establish best processors and server performances. | | | | |(http://www. specbench. org/) |To establish best server as per RBS requirements. | | | | | |Do sample analysis based on databases expected or consult database | | |product vendor on system demands. |TPC-C benchmark |The TPC-C benchmark measures the ability of a server to process | | |transactions in a simulated business environment, calculating both the | |See guidelines at http://www. tpc. org/ for |performance of the System Under Test and real world scenario. | |transactions per server | | | |Mail servers should handle 1500 mail user traffic simultaneously in a | | |normal business environment. | | | | |Mail servers should be capable of storing all mails processed in a normal| | |working day. | Routers |ICT Issues |Key Actions | |Router basics |Dual CPU, all redundant system components installed at time of purchase | | |in many aspects | |IOS, RAM and ROM |Latest Cisco IOS e. g. ver 12. X. , 128 MB RAM and suitable flash memory to | | |store all features of IOS. | | | | |VPN and 3-DES features enabled | |IOS compatibility |New routers should Cisco compatible to integrate seamlessly with existing| | |IOS and equipment. | |Number of WAN ports |Decide by local needs e. g. | | | | | |Hub-routers should be preferred for small LANs | |User Management |Manageable by local o r by remote interface, RMON, SNMP or network user | | |interfaces. | Hubs and Switches Item |Action | |Hardware basics |Dual CPU, all redundant system components installed at time of purchase in many | | |aspects | |IOS, RAM and ROM |Latest Cisco IOS e. g. ver 12. X, VLAN and work grouping, bridging possible. | |IOS compatibility |Cisco compatible to integrate seamlessly with existing IOS and equipment. |Protocols |Ethernet enabled | |L | | |Number of LAN ports |Decide by local needs e. g. | | |Hub-routers should be preferred for small LANs | |User Management |Manageable by local or by remote interface, RMON, SNMP or html enabled network | | |user interface. | Modems Item |Action required | |Software Compatible |Supports HyperTerminal for Windows | | | | | |Should be configurable using AT commands | |V90 |Modems should be V90 standard and downward compatible with existing V54 & V42 | | |types, etc. |2 & 4 wire |Supports two wire dialup and 4 wire leased analogue line use. | Data cabinets Equipment cabinets should be properly chosen. The current 6U cabinet is too small for any future expansion or even good workmanship to be carried out. Vendors should provide cabinet of size equal or larger than 12U cabinet. |Item |Action | |Sufficient space for equipment |The cabinet should house all the equipment and accessories at the installation| |See http://www. datacabinets. om/ |time, leave room for future expansion and provide free space for proper | | |ventilation | |Aesthetically chosen for office environment |The cabinet aesthetically coloured to match with general looks in the vicinity| | |free standing or wall mounted and should be equipped with sufficient power | | |blocks. | |Proper ventilation and humidity |The cabinet must have sufficient cooling fans. The fans in these cabinets | | |shall be designed to give minimum noise level expected in a normal office | | |environment and must be designed to keep the humidity level low. | |Designed for equipment therein |The cabinets will be used to house all the active equipment and connection | | |accessories such patch panels, Light Unit Interfaces (LIU). | | | | | |Be lockable and be equipped with some trays. LIUs, cord organisers, cable | | |straps etc. |Grounding and ESD |All cabinet shall be electrically grounded to ensure electric noise and | | |electrostatic discharge is minimised. | Server Room The following items are useful in a server room construction. |Item |Action | |Backup supply |Installation of a central UPS to back up for at least 30 minutes after an | | |outage. | |Conditioned power supply |Installation of spike protectors is necessary to ensure well regulated supply | | |free of surges and dips. |Neat and extensive cable trays |Construction of a technical (false) floor and technical roof (false ceiling) | | |to house all types of cabling and utilities such as fire hydrants, smoke | | |detectors, etc | |No electrostatic discharge (ESD) in computer centre and |Proper grounding and use of anti-static PVC tiles on floor. Each tile must be| |equipment |grounded well. | |Maintain ambient temperature |Installation of a two way redundant air conditioning system. | | |Maintain 16 ? C via room wall. | |Guard against fires and similar hazards |Installation of an automatic fire-fighting system |Use effective extinguishers that are less hazardous to |Use most inert system e. g. Inergen | |human health. |See www. inergen. com/ | |Classify room usage |Partitioning of the computer room | |Proper lighting |Supply and installation of False Ceiling | |Protection against harmful effects of fire hydrants |Supply of Gas Masks | 1. 2Cabling, UPS, Printers and Modems Cabling For best of cabling the following international standards should be incorporated when carrying voice/data-cabling works. |Item |Action | |Scope |Systems Administrator to access scope of requirements. | |Design of cabling plant and premises consideration |According to ANSI/EIA/TIA 568B & 569 standards | | |See www. ansi. org, www. eia. org & http://www. tiaonline. rg | |Implementation and workmanship of cabling works and testing |According to ANSI/EIA/TIA 606 & 607 standards of installing and | | |maintaining data/voice cabling plant. | |Network Active devices |Different vendors have preferred methods of rolling out active | | |devices try this method: | | | | | |Develop | |high-level process flow diagram for deploying new solutions | | |solution hardware requirements | | |solution management platforms | | |solution validation by pilot project | | |full solution deployment | | |document all related information for management, maintenance and | | |future extensions | UPS The following formulas are useful in determining choice of UPS. The UPS are rated in terms of steady power out put and backup time. Steady power rate is given in watts= W Backup time is given in Hours or Ampere-hour of the batteries. = Ah Backup capacity in terms of Ampere-Hour is Ah = (Watt x time) and or is computed to be Ah =3. 6 Mega joules. Power x Time = Energy (joules) Translates to Time =Ah/power E. g. StimaEIS is 7. 2-kVA load. To backup for half an hour it requires (7200 x 30 x 60 x 60)/3. 6 x106 = 216 Ah Given that each small battery is 12V with 9 Ah each then the UPS will have 24 small batteries. Similarly for rest of the computers same formula can be used. 1. 3Consumables Introduction ICT consumables are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. This section deals with the Information Security aspects of IT consumables. 1. 3. 1 Controlling IT Consumables Policy Statement IT Consumables must be purchased in accordance with the organisation’s approved purchasing procedures with usage monitored to discourage theft and improper use. They must be kept in a well-designated store away from working area. Explanatory Notes Examples of consumables are printer forms, stationery, printer paper, toner & ink, ribbons, disks, diskettes, bar-code labels and other accessories. Item |Key Actions | |Pilfering of your consumables results in increased organisational|Safeguard Consumables against petty theft by locking cupboards, | |expense. |maintaining a register, written authorisation prior to removal of| | |items etc. Keys to be kept by the supervisor’s office. | |Consumables may be s tolen with the intent to defraud your |Take special measures to protect potentially valuable pre-printed| |organisation or customers. |forms and account for their usage. Store area should be a | | |restricted area, use gate-passes and authorisation. |Confidential data may be revealed to unauthorised persons from |Ensure that confidential information cannot be identified from | |discarded Consumables e. g. discarded draft printer output and |discarded Consumables, such as printer ribbons and floppy disks, | |test data printer output. |by destroying them. | | |Destroy or shred surplus printout / fiche containing data, | | |whether or not the data appears to be confidential – it may be! | | |See also Classifying Information and Data. | 1. 3. Using removable storage media including Diskettes and CDs Policy Statement Only personnel who are authorised to install or modify software, and staff who are authorised to transfer and update data shall use removable media to transfer dat a to / from the organisation’s network. Any other persons shall require specific authorisation. Explanatory Notes When using removable storage media, there are additional ICT Security risks associated with the portability of the media. Personnel authorised to install & modify software is the system administrator. Personnel authorised to transfer and update data shall be determined by the general manager and systems administrator. ICT Issues |Key Actions | |Loss or ‘disappearance' of disks, tapes, etc. can |Ensure that all media are stored safely and securely. | |compromise the confidentiality of the organisation’s |Make sure that all media are labelled clearly, whether physically and/or | |data. |electronically, and that they can be located easily when needed. | | |Designate key individuals to monitor the storage and use of removable | | |media. | |Damage to media compromises the integrity of your |Follow the manufacturers' recommendations when handling the m edia. | |corporate records. Take protective measures against environmental extremes of temperature, | | |humidity, dust, etc. , appropriate to the importance and sensitivity of the| | |data. | | |Consider carefully the safeguards required for any media being moved or | | |stored off-site; especially backup tapes / disks. | | |In the case of irreplaceable data, you should consider taking security | | |copies, each of which must be properly safeguarded. | |Consider using fire-resistant storage cabinets for such media. | 1. 4Working off premises or using out-sourced processing Working Off-Premises involves a broad range of Information Security risks. In addition to the obvious threat of theft of the equipment there are also significant risks to the information contained on portable equipment. It is necessary to use business centres with great care as confidential information or data can be input onto equipment that is not under your control. 1. 4. 1 Contracting or using Out-sour ced Processing The following issues should be considered if the organisation decides to utsource some or all of its computer processing. Policy Statement Persons responsible for commissioning out-sourced computer processing must ensure that the services used are from reputable companies that operate with accredited information security and quality standards which should include an appropriate Service Level Agreement. |ICT Issues to consider |Action Required | |Inadequate performance can threaten your organisation's |Determine the critical success factors for your organisation in terms of| |information processing and business operations. speed, reliability, response and ability to scale rapidly (if | | |necessary). | | |Document these factors in a Service Level Agreement with penalty clauses| | |for breaches. | |Poor reliability threatens the performance of your |Consider your organisation's tolerance to system non-availability in | |business. |seconds, minutes, hours or days? | | |Ensure that the service provider can meet these needs. | |Document these factors in a Service Level Agreement with penalty clauses| | |for breaches. | |Lack of direct control when outsourcing can compromise |Due diligence should be exercised to ensure that the outsourcing company| |data confidentiality. |is reputable and operates with adequate standards. | | |Obtain a Non Disclosure Agreement from the outsourcing company. | | |Insist on secure transmission methods between your organisation and | | |theirs, e. g. authenticated transmission with encrypted data. | 1. 4. 2 Issuing Laptop / Portable Computers to Personnel Laptops, Portables, Palmtops -or even electronic ‘organisers', which connect to and store your organisation’s data – are included within this topic. Throughout this topic we refer to them collectively as ‘laptops' Policy Statement Line management must authorise the issue of portable computers. Usage is restricted to business purposes, and users must be aware of, and accept the terms and conditions of use, especially responsibility for the security of information held on such devices |ICT Issues |Action Required | |Confidential data disclosed to unauthorised persons can |Be certain that the member of staff has a valid business reason for | |damage the organisation. |using a laptop. Maintain and update the Hardware Inventory with the | | |primary user's name and contact details | | |Ensure that you are always able to trace the physical location of the | | |laptop and that the type and sensitivity of any stored data is known and| | |properly secure. | | |Always use any ‘power-on' password feature as a simple deterrent to | | |opportunistic usage. | | |Ensure the confidentiality and security of backup files. |The use of unlicensed software can subject your |All software used on the laptop must be licensed and comply with both | |organisation to legal action |legal and organisational standards. | |Viruses, Worms, Trojans and other Malicious Code can |Scan the laptop for malicious code and viruses regularly. | |corrupt both data and the system files. |Always scan files before accepting them onto the laptop | |Theft of the laptop exposes the organisation to the threat|Ensure that the holder implements adequate safety procedures against | |of disclosure o f sensitive corporate data to competitors. |theft. | |Consider the use of securing wires or other security devices in open | | |offices. | | |Ensure that the Hardware Inventory contains relevant allocation details | | |of all computers. Insure the laptop against loss, theft and damage. | | |Be aware of any exclusion in cover. Prepare guidelines for issuing | | |portable computing equipment. |Inadequate backup and recovery routines can lead to the |Ensure that laptop computers can have their data safeguarded through | |loss of data. |regular backups. | | |Ensure that the primary user of the equipment recognises their | | |responsibilities in this regard. | Guidelines for Issuing Portable Computing Equipment Those responsible for issuing portable computer equipment must ensure that the following is complied with before issuing such equipment to employees. †¢ Ensure that adequate insurance cover is provided for the portable equipment for use in the home country and abroad. Ensure that suitable virus scanning software is present on the equipment. †¢ Supply suitable network connections and ensure that access procedures are applied if the equipment is to be connected to a network. †¢ Ensure that adequate capacity (hard disk and memory size) is available on the equipment to support business processing. †¢ Ensure that adequate backup and restore facilities and procedures are in place. †¢ Ensure that compatible versions of application software are in place. †¢ Ensure that software encryption and/or physical locking devices are in place. †¢ Ensure that adequate records of the equipment are maintained, and that the issue is authorised and receipted. Ensure that authorisation for use of portable computing equipment is received †¢ Ensure that the Terms of Use are issued and signed. 1. 5Using Secure Storage Introduction It is essential that valuable confidential or critical information or equipment is stored in a secure locati on. This section covers secure storage. Policy Statement Sensitive or valuable material and equipment must be stored securely and according to the classification status of the information being stored. Documents are to be stored in a secure manner in accordance with their classification status. 1. 5. 1 Using lockable storage cupboards & filing cabinets A lockable storage cupboard should be considered for storing sensitive or valuable equipment. A lockable filing cabinet should be considered for secure storage of paper-based files and records, or small but movable items. |ICT Issues |Key Actions | |Unsecured organisation sensitive material may be |Ensure that all sensitive material is secured in a lockable storage | |stolen from the department. |cupboard, cabinet or safe when not required. The more sensitive the | | |material, the more care must be taken in selecting the appropriate storage| | |method. | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a dual| | |control issues process in case the key holder is unavailable or the item | | |is required in an emergency. | |Securely locked organisation sensitive material may be|Ensure that highly sensitive material including computer discs and tapes | |stolen or damaged whilst in store. |are stored in a fire rated storage cupboard, cabinet, or sa fe. Beware that| | |the cabinet itself may survive the fire but the items inside may be | | |damaged irreparably. | | |Ensure that all sensitive material is secured in a lockable storage | | |cupboard, cabinet, or safe when not required. | | |Use a storage unit, which matches the sensitivity of the material. The | | |more sensitive the material, the more care must be taken in selecting the | | |appropriate storage method. | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a dual| | |control issues process in case the key holder is unavailable or the item | | |is required in an emergency. | 1. 5. 2 Using Fire-Protected Storage Cabinets & Safes A fire protected storage cabinet is a good way to protect sensitive material against the risk of being destroyed by fire and possible water damage from fire fighting activities. The use of safes for storage is to be en couraged. The security of the safe itself is just as critical. Policy Statement Items such as backup-tapes, microfiche, microfilm, archives, recovery diskettes, passwords, CDs for software installation shall be considered sensitive and valuable to the organisation and must be stored in fire-protected storage cabinets & safes. |IT & T Issues |Key Actions | |Sensitive data stored in fire-protected cabinets can |Ensure that all sensitive material is secured in a Fire protected | |nevertheless be damaged beyond use. Due to their possible |cabinets & safe when not required. Yearly & Monthly system & database | |additional weight, siting is a key consideration |backups should be kept away from the building | | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a | | |data control issues process in case the key holder is unavailable or the | | |item is required in an emergency. | |Sensitive data may be lost if stolen or during transit. |Copies of archives should be kept separate from actual database backups. | |A physical log file to control backup data movement to various safe | | |locations to be kept up-to-date both with signature of security personnel| | |and person moving the backups. | | |Data Library to be up-to-date with details of backup date, type, | | |location, type & expiry date | 1. 6Documenting Hardware Introduction This section deals with hardware documentation and manuals, and also hardware inventory. It is es sential that hardware documentation is kept up to date and made available to all users as appropriate. 1. . 1Managing and Using Hardware Documentation ‘Documentation' refers to both the operator manuals and the technical documentation that should be provided by the supplier / vendor. Policy Statement Hardware documentation must be kept up-to-date and readily available to the all staff that may need it. |ICT Issues |Key Actions | |If equipment is operated incorrectly mistakes and |Ensure you receive all operational and technical manuals for each piece | |damage may result. |of equipment. | | |Store the documentation accessibly but safely. | |Systems users must be trained according to the supplier's manuals | |A failure to follow the recommended schedule of |Ensure all regular maintenance is carried out and monitored. | |maintenance runs the risk of system malfunction, which |Adopt procedures which ensure that your operators complete all | |could possibly jeopardise your busines s operation. |maintenance for which they are responsible according to the | | |manufacturer's recommendation | |Failure to operate equipment in accordance with the |Ensure you receive all operational and technical manuals for each piece | |instructions can invalidate the warranty. |of equipment. | |Ensure that such manuals are readily available and form the basis of all | | |training. | |Failure to complete and return the manufacturer's |Complete the warranty card in time and record the details in your | |warranty card may invalidate the warranty and hence |Hardware Inventory Register. | |limit the manufacturer's liability | | ] 1. 6. 2 Maintaining a Hardware Inventory or Register Introduction A register / database of all computer equipment used within your organisation is to be established and maintained. Policy Statement A formal inventory of all equipment should be maintained and kept up to date at all times. ICT Issues |Key Actions | |Theft of equipment is most likely to result in additional |Establish inventory and implement procedures for updating it. | |cost to the organisation and could compromise data security. |Ensure that you have a procedure to advise the acquisition of new | | |hardware, the disposal of old items and any changes of location. | | |Periodically verify the correctness of the inventory by checking that | | |a sample of hardware is physically present. |Inadequate insurance could render your organisation liable |Establish inventory and implement procedures for keeping it | |to loss in the event of a claimable event. |up-to-date. | | |Ensure that you periodically review the adequacy of your insurance | | |cover. | |Shortcomings in the planning of equipment replacement can |Establish an inventory and, in conformance with your IT Plan, ‘ear | |make it difficult to plan ahead for new technology. |mark' equipment for replacement and plan accordingly. | 1. 7 Telecommunications equipment (Procurement, maintenance, practices and design t elecommunications) Procurement of telecommunications system †¢ Manufacturer maintenance (internal & external) †¢ Design criteria of systems †¢ Commissioning & Decommissioning of systems †¢ Fibre optic systems Introduction This chapter deals with the Information Communication Technology issues relating to the purchase, use, maintenance and the design of equipment through which information is processed and transmitted. The systems covered include, Telephony (PAX and PABX) Data Networks Fibre Network 1. 7. 1 System Design ( Engineering) Policy statement ICT system engineering will be based on tested and proven state of the art technology for a given ICT system. Explanatory notes The systems administrator shall from time to time update her/himself with new international standards for ICT systems. She/he shall be required to come up with flexible systems that will meet the company needs at the best. |ICT Issues |Actions | |Technology |System engineering shall be based on the latest technology in the | | |required field such as Telephony. | |Company's needs (Application) |The design shall address the company needs and applications for at least| | |the next ten years. |Flexibility |The system design shall address the equipment flexibility and upgrade. | |Redundancy |The design will state the expected loading and redundancy of the | | |equipment | 1. 7. 2 Procurement Policy Statement In addition to the public and company procurement procedures, the ICT departments will specify in details the functional and capacity requirements of system before any purchase is done. Explanatory notes Before any system acquisition is done, the system administrator will be requir ed to have evaluated the company's needs. This will include system performance; reliability ultimate capacity and staff abilities included proposed training requirements. This will be in the form of Request for Proposal (RFP) documents. |IC T Issues |Actions | |Tender document |Shall have detailed system/equipment description of the performance, | | |reliability and capacity of hardware. The system life expectancy shall be| | |required | |Spares and Support |The system spares will be stated. The system support and staff training | | |clearly be addressed | |Authorised dealership/partnership |The vendor shall be required to state and prove the partnerships with the | | |manufacturer | |Tendering |The type of bidders to be invited shall be stated | 1. 7. 3 Commissioning/ Decommissioning Policy Statement System commissioning will be carried out as stipulated in the manufacture's testing/commissioning sheets for any new ICT equipment. Tests should nclude all the RFP system requirements. System commissioning is necessary to ascertain system performance all the designed parameters will be tested. After the commissioning the system passwords should be immediately changed as a security measure, to protect any data manipulation or corruption from the vendor. |ICT Issues |Actions | |Performance |All tests as per system design and manufacturer's | | |specification/performance shall be carried out. |Drawings |All system drawings shall be submitted ( at least three copies)and kept | | |in safe custody | |Equipment Cabinet keys |The equipment cabinet keys shall be handed over to the functional head | |Decommissioning |System decommissioning shall be carried out once the equipment is no | | |longer in use. | | |Commissioning sheets and drawings shall be used to determine the current | | |connection (Circuit termination) of the system. | | |The decommissioned equipment shall be removed from the Telecom room and | | |all wires/cables not used shall be removed. | |The drawings for decommissioned systems/equipment shall be retired. | 1. 7. 4 Maintenance Practices Policy Statement All ICT systems shall be maintained regularly as per manufacture's recommendations. Where system are placed in harsh environments, system maintenance will be carried out as deemed by the systems administrator. Explanatory notes All system maintenance should be done in house as much as possible. Outsourcing of maintenance (Annual Maintenance Contracts, AMC’s) contrac

Friday, January 10, 2020

Blue Zuma Part 2

After further analysis and the additional resources made available by Mr. Martin to the Blue Zuma Project, we have determined the following recommendations be implemented immediately to ensure that our retailers have the product by February 1, as established by our Mr. Lane. The concern with the original project plan revolved around three activities not having enough resources to complete the project per the timeline identified above.Those three activities were: Detailed Product Design, Detailed Marketing Plan and Manufacturing Process. With the additional resources made available, we are confident we can improve the process within the three activities identified above. 1. Which additional personnel assignments would you choose to complete the project before the February 1st deadline? Explain your choices as well as the reasons for not choosing other options. It appears an additional marketing specialist would be best utilized for this job.The resource sheet depicts that the marketin g specialist is still overallocated; however the other resources appear to be allocated correctly when we added the additional resources provided by Mr. Lane. Cost would be an important factor in determining if any additional employees will/would be needed. However, we can approve overtime to address some concerns. 2. How have these changes affected the sensitivity of the network? Once the changes are in place, the duration of the project has been reduced from 290 days to 274 days.This improvement has reduced the overall length of the project, thus allowing the deadline set by the Mr. Lane (President). We are confident we can now complete the project by January 27. By allocating the additional and available resources, we were able to reduce the amount of critical paths to one. In doing so, we increase the slack in non-critical activities, thus reducing or decreasing the sensitivity of the network. One critical path is now identified in the project.

Thursday, January 2, 2020

How Would You Like It If You Were Continuously Told What

How would you like it if you were continuously told what to do ever since you were a little kid and you were bullied and made fun of because of something you like doing and are passionate about while growing up? It wouldn’t be pleasant, would it? Even getting older and becoming an adult and it’s still happening, it’s not nice, is it? How would you like it if you were earning 20% less than men for the exact same job? Good morning Ms Lewis and students, today I’ll be talking to you about how there are numerous causes for the countless components that are accountable for the upsurge of gender stereotyping in today’s society. Some of these issues are things like advertising based around kids and adults and the pay gap between genders. These†¦show more content†¦This is mainly because those ads have an audience, predominantly children because they are important demographic for advertisers. Did you know adolescents are watching approximately 20 hours of television a week and roughly 9 hours a day on their smartphone device? When they are targeted by strategic advertisements for that long, it has a significant impact on their views and opinions. Am I the only one who thinks these averages are extremely high for such a young age group? I mean, that is the age when we are most impressionable and vulnerable. When you see a commercial on television advertising children’s toys I’m 100% certain you’re repetitively going to see young female adolescents playing dress ups, nursing dolls, or cleaning a house with a pink cleaning set and boys playing with blue and green trucks, action figu res, playing computer games or sport etc. why is this so categorised? These ads operate on old stereotypes and cultural norms and manipulate the viewer’s beliefs. In fact, boys and girls are encouraged and praised if they pick on or bully a boy that plays with dolls instead of action figures or a girl that plays computer games instead of dress ups. What about the girls that want to play with trucks and action figures? Or the boys that want to play dress ups and dolls? Do they not have a say? Are they cared about? Society tells them they’re not allowed to play with them and that it’s not the norm or that it isShow MoreRelatedIs Softball Ruled Over My Life?1589 Words   |  7 Pagescoordination, and this pulled memories of watching my brother hit numerous home runs and make game-winning outs from his mind. On nearly all of the car rides home, he would tell me â€Å"You remind me so much of Dusty. I see him the way you throw, in the way you hit the ball, and the way you present yourself.† As a child, I couldn’t understand what would incline him to associate me that strongly with my older brother who reeked of masculinity, but now I can only hope that I share any of his brilliant qualitiesRead MoreThe Importance Of Leadership840 Words   |  4 Pagesthat I would drop art after year 10. So thats why I cant even begin to believe that I’m here today and even that i applied for this position. In year 10, I was pretty certain that if I dropped art I would have mo re time for other subjects due to the immense work load that art requires. However, I told my mum my plan, and she ran, right to Mrs flora and dobbed on me. I was then basically forced to do art. HOWEVER thanks to Mrs Flora and my mum I have had the best time. I have no clue what I was thinkingRead MoreThe Use of Secondary Sources in Bram Stokers Dracula637 Words   |  3 Pagesdoing this, he has helped the reader understand more about what is going on, almost as if they are getting a behind-the-scenes view on the story, emotionally and physically. If Stoker had only used a narrative point of view, the reader wouldn’t know the character’s thoughts, emotions, or anything they were feeling at that moment. The person telling the story wouldn’t be able to tell exactly what was going through the character’s head; they would only be able to give an overview. In â€Å"Use of the DiaryRead MoreThe Legacy Leader Of Influence Essay1550 Words   |  7 Pagespeopl e to what to do in their favor. They also influence and inspire others in many different ways. There are some leaders who influence me and inspire me so that I can exert my effort to become a better human being, Soldier and a better leader in my life. Especially I’d like to pick a individual whom inspired me most. He name is Command Sergeant Major (CSM) Charles Fitzpatric. In this passage I will explain how he motivated and inspired me with his leadership style. I will also describe how he coachedRead MoreLocking My Room s Door786 Words   |  4 Pages Locking my room’s door, I thought of my door and how the scars were on the inside. To visitors the front door indicated a household as normal as any in the neighborhood. I wondered what scars my childhood neighbors kept inside their homes as I walked across the parking lot to a truck stop dinner. The sign said Chet’s and below it was painted in cursive hand writing. You haven’t et yet if you ain’t et at Chet’s. The big black letters were painted on a white background and they made me smile. AfterRead MoreVegan People : An Interview With A Mexican Girl950 Words   |  4 PagesVegan People: An Interview with a Mexican girl. People tend to ask how it is life for Vegan people. The ones who decided not to eat any type of animal products including eggs, milk and cheese. Why does this happen? How they become when they decide to change their way to eat? How it is their routine, what they eat for breakfast, lunch and dinner? A Mexican student at the University of Tampa, Guadalupe Sepulveda helped to answer these and other questions I was curious about. Being an internationalRead MoreAds Playing Upon Peoples Insecurities are Unethical Essay1694 Words   |  7 Pagesjust begun to capture the imagination and attention of early consumers. One of the key tactics used during this time period was to pull the stresses and social limitations felt by consumers into the ads they viewed. Advertisers knew that consumers would place themselves inside of the ad and actually feel as though the ad is speaking directly to them if they showed a culturally perceived conception of the â€Å"ideal life.† They chose t o focus on elements of wealth, style, gender, appearance, and the newRead MoreLab Girl Short Story726 Words   |  3 Pages but also how important it is to work your way up to it. Growing up, Hope was just a young girl with big dreams of becoming a scientist. She grew up in a town where only men were the doctors, teachers and scientists. Lab Girl tells the story of Hope, all of her struggles and achievements.   Ã‚  Ã‚     Ã‚  Ã‚   While many people would automatically give up after being told they can not achieve something, Hope did not. She spent long and difficult hours in the laboratory continuously fighting for what she believedRead MoreMemories Of Childhood Memories702 Words   |  3 PagesIt is obvious that our childhood memories are not accidental. When you are a child every scent, every sound, every move, every toy, the first day of school, the first kiss, the first step. Everything together makes what is the personality of a man. All these are pieces of one whole entity. My childhood was filled with memories filled with emotion and meaning. But which of the memories I have is the brightest and most emotional for me? I then realized that the best childhood memory does not alwaysRead MoreThe Honorable Judge Fines1611 Words   |  7 Pagesthe most basic of ways, by not protecting her from the forces of evil. You see she had fallen for the gimmicks, gifts, and sweet talk abou t which I had not warned her sufficiently. Jay Nesmith came into our lives as a breath of fresh air in September 2013. He was going to teach my Jessica to play the oboe. He immediately told me she was one of his best students and could, within three lessons, make the oboe sound more like an instrument than a duck. A remarkable feat, he assured me. The compliments