Free Essay

Access Granted

In:

Submitted By wes2222
Words 452
Pages 2
Jordan Desai
Professor Mayes
Planetary Science 200
23 September 2015
Comparing three Mars rovers
Mars is not easy to reach or explore. Nearly two-thirds of all missions have failed. However, in recent years, the United States has had more success landing rovers. Of recent missions, two rovers essentially crash-landed in a cocoon of airbags and one soft-landed.
The first lander, Sojourner, part of the Mars Pathfinder mission, was about the size of a milk crate and weighed 33 pounds. It landed using airbags on July 4, 1997, and stayed active 10 times longer than scheduled (NASA, Chronology of Mars Exploration 1).
The next missions were the twin rovers Spirit and Opportunity, which were launched a few weeks apart and landed on opposite sides of the planet in the summer of 2003, also using airbag technology. They both were the size of golf carts and outlasted their scheduled missions many times over.
Curiosity landed in August 2012 and is the largest and most ambitious rover. The size and mass of a Mini Cooper, it survived a complex soft landing. Curiosity also supports the most complex science, containing drills, lasers, and a small analytical laboratory (Gibson 289).
Curiosity can communicate with Earth in three ways. First, Curiosity can engage in direct communication from the rover to Earth’s Deep Space Network. Second, Curiosity can use a fast relay via the orbiting Mars Odyssey spacecraft. Finally, Curiosity can utilize a slow relay to communicate via the Mars Reconnaissance Orbiter.
The scientific missions have focused on whether Mars once harbored flowing water. Specifically, the science studies Martian geology to determine how the rocks and soils formed (Jones 46-47). Based on how they form on Earth, many Martian discoveries appear to have followed a similar path, such as a long exposure to water or geology formed by intense heat and water.
NASA has engagegod in a few popular public relations efforts with the rover missions. One has been to invite students to name its rovers by submitting a short essay. Each naming invitation generates over 10,000 entries. Recent winners are listed below. * Sojourner, submitted by a 12-year-old boy * Spirit and Opportunity, submitted by a 9-year-old girl * Curiosity, submitted by a 12-year-old girl * The winner was also invited to see the launch.

Works Cited
Bibliography
Gibson, Susan. "From Sojourner to Curiosity: A Brief History of Mars Spacecraft." Mars Science Labratory (2015): 277-295. Print.
Jones, Tyson. The Geology of Mars: A World of Wonder. Boston: Cengage Learning, 2014. Print.
NASA. Chronology of Mars Exploration. n.d. Web. 15 Aug. 2015.
—. Chronology of Mars Explroation. Nasa, 2015.

--------------------------------------------
[ 1 ]. Some rovers even have Twitter accounts to engage the public.

Similar Documents

Premium Essay

Bill French

...GOVERNMENT REGULATION IS GOVERNMENT MONOPOLY: THE EXAMPLES OF BRITISH AGRICULTURE AND THE BRITISH STOCK EXCHANGE SEÁN CRONIN Pretty much everyone agrees that monopolies — government-run or government-backed, coercive controls over the production, distribution or purchase of particular categories of product or service — are bad for society, i.e. for pretty much everybody. One only has to remember the record of British Leyland — a government industrial monopoly that did considerably more damage to the British motor industry than the Luftwaffe — to see that monopolies are harmful.1 The only exception to this generally agreed belief seems to run along the lines of “all monopolies are bad except when I or my friends are in control ”, which helps to explain why monopolies are so popular with governments. So this essay will not attempt to argue that monopolies are bad, any more than it will attempt to argue that the earth is round. The point I wish here to make is that monopolies, because they are so much more numerous, are accordingly causing much more harm, than is commonly thought. I will focus on two examples, both of which show a monopoly in action and doing great harm, even though at first glance there doesn’t appear to be any monopoly at all. EVERY GOVERNMENT REGULATORY AGENCY IS A MONOPOLY The first example is the long running saga of BSE. Bovine Spongiform Encephalopathy is a disease suffered by British beef cattle during the nineteen eighties and nineties, which is believed...

Words: 2724 - Pages: 11

Premium Essay

Business

...points that the company should follow. Their main purpose was to make textbooks affordable and available for online access to all students and save them paying lots of money for hard copy books. After many professors and college teachers adopted this way of textbook access, it shows how successful their planning is and work on it to make it more convenient. 2. What competitive advantages does Flat World Knowledge possess? Flat World Knowledge possesses many competitive advantages. One of them is the ability to offer a huge variety of textbooks in an online version with unlimited access to all of the students. Doing so will exclude the factor of lack of supply of the textbook at the book store and eliminate waiting time to have the book. In addition, the fact that they are providing these textbooks at a reduced cost from the actual manufacture cost gave FWK a huge advantage against their competitors in the textbook market. 3. What are Flat World Knowledge’s key strengths, weaknesses, opportunities, and threats? Talking about FWK strengths is represented by its easy access, up-to-date revisions, personalized learning strategies and cheap access. With respect to its weakness, we should mention that FWK will no longer have free access to the books online due to the 30 million dollar investment. With respect to the opportunities, students find online access as more convenient and such a cheap alternative. Also it makes it better with the variety of versions...

Words: 680 - Pages: 3

Premium Essay

Tft2 Task 1

...Heart-Healthy Insurance Information Security Policy 1.0 Overview HHI provides access to authorized individuals that are employed and have the appropriate training for PCI DSS standards. Access to network and any software, hardware, business related assets will be managed by roles and responsibly. HHI promotes training for policies and procedures to ensure the integrity of our customers. 2.0 Purpose The purpose of the Access Control Policy is to ensure that sensitive financial information is kept secure and available to those who have the authorizations to access information. 3.0 Scope The scope of this policy is for all employees to protect the integrity of access to accounts. 4.0 User Policy This policy displays user’s access on a need to know roles to provide integrity and confidentiality to customers and employees of HHI. They will also be given Unique ID’s to access the computer systems. This policy pertains to new and existing users. Dept. Mgr: will oversee all employees and ensure that candidates are properly trained. Customer Mgr: will oversee operations from costumer services and cashiers. Customer Service officer: will be in charge of cashiers and customer service. Cashiers/Agents: trained to handle PCI DSS and company policies. Marketing: with limited remote access to authorized information. | Network | Application | Remote | Financial | Dept. Mgr | * | * | | * | Customer Mgr | * | * | | * | ...

Words: 932 - Pages: 4

Premium Essay

It/244 Final

...goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals; issues relative to having multi-site facilities; and employee accountability for protecting the company assets and network operations. Introduction XYZ Energy...

Words: 1790 - Pages: 8

Free Essay

Mobile Policy

...Policy for Remote Access Richman employees, and authorized third parties (customers, vendors, etc.) may, under some circumstances, utilize remote access to access Richman computing resources for which they have been granted access. Regular, full-time the staff employees that have a valid Domain User Account may request remote access to the th network by completing a Remote Access Request Form. A letter of justification must accompany the request. The letter should address, in sufficient detail, what resources will be accessed and how they cannot be accessed by conventional means. Guidelines for Access: * Departmental Accounts shall not be granted remote access due to lack of accountability. These accounts are typically shared among several users and there is no way to trace a specific user back to the account at any given time. * Temporary Accounts shall not be granted remote access. * Authorized accounts shall not be granted remote access. * Clerical or Support accounts shall not be granted remote access without prior telecommuting approval (VP endorsement required). * Administrative accounts may be granted remote access. * Vendor Accounts may be granted remote access. Vendor accounts are setup specifically for vendors to access the resources for support purposes. Vendor accounts must be sponsored by an employee. The account sponsor bears responsibility for the account and its use by the vendor. If the vendor account does not already exist...

Words: 607 - Pages: 3

Premium Essay

Is3230 Unit 1 Assignment 1

...ITT TECHNICAL INSITITUTE Access Security / IS3230T Unit 1 Assignment 1.1 Identification, Authentication, and Authorization Techniques. Access Security / IS3230T There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a networks resource. There are many diverse techniques that are obtainable to accomplish this task. First of all we need to define what authentication accurately is. Authentication is the ability to verify the identity of a user or a computer system on a computer network. (Barker, 2013) There are many forms or variations that authentication can manifest itself depending on the requirements as outlined in the Security Policy published by the business. Most commonly these would include one, two, or three factor configurations to verify the identity of the person requesting access to a resource. If everything associated with the authentication factors are valid and correct for the claimed identity, it is then assumed that the accessing person is who they claim to be. (Stewart, 2011) Some of the most common authentication factors would be something you know such as a password, something you have such as a smart card, and something you are such as a fingerprint. Identification is the act of claiming an identity using just one authentication...

Words: 642 - Pages: 3

Premium Essay

Nt1310 Unit 1 Network Security Management System

...• an attempt to access a file or resource is denied due to insufficient privilege. • the permissions of a user or group are changed. • a new processes is created and the system activity related to the process. • a user changes their level of privilege. • when the host-based firewall denies a network connection. • all significant application events. For each audit event logged the system includes sufficient information to investigate the event, including related IP address, timestamp, hostname, username, application name and/or other details as appropriate. System logs are written to a different remote system in such a way that they cannot be altered by any user on the system being logged. Network Security The various departments have both intranets and extranets that are used to share information with...

Words: 913 - Pages: 4

Free Essay

Final Project Part One and Two

...purpose of this policy is to define the restrictions that are placed on the company’s Internet connection and what steps will be taken to ensure that employees follow the guidelines set forth by this policy. This policy applies to all Richman Investments’ employees, contractors, consultants, temporary workers and third parties who have worked with or will work with Richman Investments. This policy applies to all equipment, networks, systems, workstations, internet, intranet, LAN-WAN, BlackBerrys that are belong in part or whole to Richman Investments. In each of the branches that you have there are always certain areas, such as accounting/finance, billing, personnel, and customer accounts. Only the users who belong to those areas will be granted access to those systems. The user will be verified by both a smart card which will be inserted into the smart card reader provided by the company as well as a 4-10 digit PIN which will be changed every 30 days to ensure PIN integrity. When the users try and enter the system using wireless devices they will be required to use a RSA token and use the PIN provided. Mobile...

Words: 1024 - Pages: 5

Free Essay

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Free Essay

Tft2 Task1

...3. GLBA (Gramm-Leach-Bliley Act) 4. HITECH (Health Information Technology for Economic and Clinical Health Act) 5. HHS (US. Department of Health and Human Services) New Users: The current directive for new users from the standing security policy states: “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.” In evaluating the current policy this standard creates a lot of overhead and administration works for the users and the admins. The new users who are not already familiar with the systems must provide a list of machines that they require access too. Being so new they may not know all of the systems they would need on a day to day basis. This also rolls over to the admins who have to one by one grant access to the new machines for every new user and when changes are needed. Having to keep track of what access was already granted and what would be needed would become too cumbersome to maintain day to day. In addition, this may grant too much access which would not be needed by some users and would violate HIPAA Standard 164.312(a)(1) which...

Words: 1129 - Pages: 5

Premium Essay

Security Policy

...McBride Financial Services has a policy for the security of the information that is shared trough these networks. Employees must ensure that they: * Comply With the current IT Security policy, * Use information technology networks in an acceptable, safe, and responsible manner, and * Do not create unnecessary risk to McBride Financial Services by their misuse of information technology networks. II. POLICY STATEMENT All members, employees, guests, and individuals are responsible for adhering to this IT policy and maintaining the security of proprietary information shared on the information technology networks of McBride Financial Services. This IT Security Policy is applicable to individual or entity that gains access to the information technology services of McBride Financial Services. III. RESTRICTIVE INTERNET USES In particular, the following is deemed inacceptable use or behavior by members, employees, and guests of information technology networks: * Visiting internet sites that contain obscene, hateful, pornographic or otherwise illegal...

Words: 711 - Pages: 3

Premium Essay

Term Paper Sample

...Sample Essay for termpaper Presented Problem   After examining the incident, there are some key things that stick out as major risks, these include:   • Accounts existed before EHR system was deployed. • Accounts were undocumented. • Non Authorized remote users had access to the EHR application. • Undocumented account was created/added to a new system. • Method or Vulnerability to gain privilege escalation outside of change control policy.   This led me to propose three policies, each address some of these key issues from separate fronts. The three policies include a Remote Access Policy, Application Deployment, and a Routine Maintenance policy. The Remote Access policy aims to correct the issue that non-authorized users were able to access the EHR system. HIPAA has included provision in the Security Rule that allows for remote access, but with certain limitations. I have included provision that restricts remote access based on Job Role and Job Necessity(ISO 27002:2005, 7.1.1), and restricted to assets that are owned by the hospital which have enhanced security (ISO 27002:2005, 7.1.1) (NIST, 164.312(a)(1))(ISO 27002:2005, 11.4.2). The Application Deployment policy aims to close security loop holes that appear to have been open for months before the EHR system was even deployed. There were no check on accounts when importing, and no alerts when permissions were escalated. Some of the key standards that I see as aiding in creating this policy is better change management...

Words: 1204 - Pages: 5

Premium Essay

Business Case 2

...Business Case Kevin Bowman, Richard Sebastian, Joy Harrison, Kevin Bouchard, Clarrisa Houle, Joel Belew CMTG/445 September 30, 2013 Charlie Neuman Business Case Prototyping Before an application can be implemented executives would like to see a prototype of the application or system to see how it will function within their existing systems. A prototype is a scaled model of an application or system that allows developers to present the application although it may not be fully functional but has enough functionality that allows executives and end users to get the basic understanding of what the system or application does. When it comes to prototyping there are several approaches that can be used, such as the waterfall approach which is the most common method of prototyping used. The waterfall approach “relies heavily on written specs, and leave testing and user feedback until late in the development cycle. A waterfall approach works well when there is a desire to consciously limit user options and force the adoption of out-of the-box functionality.” (Llieva, Mizuno 2013) When taking into consideration the work environment today, everything is fast paced, and interactive and requires a faster process for prototyping. This is where rapid prototyping comes in, rapid prototyping provides incremental prototypes at points throughout the development of the application or system. There are 4 key advantages to using the rapid prototyping method: 1. Allows adaptation...

Words: 1408 - Pages: 6

Premium Essay

Security Plan Outline for Richman Investments

...Security Plan Outline for Richman Investments User Domain • Restrict access to data and applications that is not required for employee to do their job. • Review and Revise user conduct and security polices every six months. • Conduct annual security training seminars with system users and staff. Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP) for which users will be informed of what is and what is not acceptable use of the system. Workstation Domain • In house testing of operating system updates prior to user workstation deployment. • Strict access control policies and procedures for user access to system and data. • 72 Day password renewal for workstation and 180 day user password renewal. • Content filtering and anti-virus scanning of all incoming data. Quarantine of unknown file types. Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed. LAN Domain • Proper identification and two key turners to be granted access to Data Centers and wiring closets with 24/7 CCTV monitoring. • Periodic LAN vulnerability assessments. Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. LAN to WAN Domain • Disable ping, probing, and port scanning of exterior devices. • Strict monitoring for intrusion detection on inbound IP...

Words: 501 - Pages: 3

Free Essay

Situation: Operation Richman’s Company

...Dial-In Access Policy 1.0 Purpose The purpose of this policy is to protect The Company’s electronic information from being inadvertently compromised by authorized personnel using a dial-in connection. 2.0 Scope The scope of this policy is to define appropriate dial-in access and its use by authorized personnel. 3.0 Policy The Company employees and authorized third parties (customers, vendors, etc.) can use dial-in connections to gain access to the corporate network. Dial-in access should be strictly controlled, using one-time password authentication. It is the responsibility of employees with dial-in access privileges to ensure a dial-in connection to The Company is not used by non-employees to gain access to company information system resources. An employee who is granted dial-in access privileges must remain constantly aware that dial-in connections between their location and The Company are literal extensions of The Company's corporate network, and that they provide a potential path to the company's most sensitive information. The employee and/or authorized third party individual must take every reasonable measure to protect The Company's assets. Analog and non-GSM digital cellular phones cannot be used to connect to The Company's corporate network, as their signals can be readily scanned and/or hijacked by unauthorized individuals. Only GSM standard digital cellular phones are considered secure enough for connection to The Company's network. For additional...

Words: 380 - Pages: 2