Free Essay

Green Works

In:

Submitted By EJIKEMEIKEABA
Words 2387
Pages 10
E-Business Security Concerns

The Internet can seem like an entrepreneur's dream come true. The Web offers instant access to millions of consumers around the world and the ability to set up a virtual store, which can limit start-up costs. While the Web does offer a powerful platform for launching new ventures, e-businesses are subject to a variety of unique security concerns.
Ads by Google
Network Security Scan
Antivirus, Network Management & Asset Tracking in 10 min or less! www.gficloud.com / Start-Trial 1.1 Viruses and Other Malware
E-businesses count on their Web servers and computers to run smoothly to keep business humming along. Computers that communicate with other devices on the Internet have the potential to download malicious software like computer viruses, worms and other malware that can inhibit a machine's ability to function properly. Malware can potentially result in data loss or the need for maintenance, both of which can cost e-businesses time and money. Malware can also impair customers' ability to use their own computers and access e-business sites. According to Consumer Reports, malware cost consumers about $2.3 billion in 2010. 2.1 Software Bugs
The term software bug sounds similar to a virus or worm, which are themselves types of malicious programs, but it means something different entirely. A software bug is simply a mistake or oversight in a computer program or website coding that makes the site or program behave in an unintended way. A bug could result in something relatively benign, like minor aesthetic errors on a website. On the other hand, a bug could potentially cause major problems like site crashes and allowing users access to data that they are not supposed to see.
Related Reading: Business Security Inspection Checklist 3.1 Active Malicious Threats
While malware can passively infect computers, outside parties can also actively attack web companies. An e-businesses usually lets users interact with a website, possibly by registering for an account and submitting various forms to the business's web server. Experienced computer users may be able to exploit weaknesses in a website to gain access to or "hack" into data that they are not supposed to be able to access. Hackers can potentially steal information like customer names, credit card numbers and passwords, or they may inject malicious code into a website that causes data loss. For example, Sony's PlayStation Network was the victim of a major hacking operation in 2011 that resulted in the theft of millions of users' personal information. Malicious users may also pretend to be trusted authorities or friends in an attempt to trick employees or managers into divulging sensitive information. This method of stealing data is called "phishing." 4.1 Physical Data Theft
Most of the threats to e-businesses come through the Internet itself, but businesses can also be subject to physical data theft. If a thief steals the physical hardware that a company uses to conduct business, such as hard drives or Web servers, he may be able to recover confidential information. Since there are several ways e-businesses can potentially lose important data, it is important to make backup copies of data on a regular basis and ensure that physical plants are secure. 5.1 Wireless and Mobile Security
Many businesses use wireless Internet connections and mobile devices to access the Web. Wireless networks present a security hazard, since outside users can attempt to connect to a wireless network, allowing them to potentially eavesdrop on communications. Securing a wireless network with a password can make it more difficult for outside users to connect to the network and access sensitive information, but a wireless connection is not as secure as a wired connection, even if it has password protection. Mobile devices can be a security concern both because they use wireless communication and because they are easy to misplace.
Security aspects of e-business
The perceived lack of security in transacting and communicating online continues to be seen as an obstacle to the uptake of e-business. This guide gives a brief overview of the subject.
Security products and services
There are three main security issues relevant to doing business online: * Verifying the identity of the person you are doing business with. * Ensuring that messages you send and receive have not been tampered with. * Obtaining evidence of the date, time and place at which a contract was made.
These three issues are addressed by a variety of means including:
Encryption
The process of encryption underpins many information and communications technology security arrangements. Generally, the encryption process involves encoding a message using an encryption algorithm so that only the sender and intended recipients can access it. The encryption algorithm uses a key that at the receiving end is used to decode the message.
Traditionally, encryption used a secret key of which both the sender and receiver were aware. However, when transacting online, it could not be guaranteed that the secret key could be transmitted securely to the recipient. For this reason, public key cryptography is now often used for secure internet communication. Each recipient has a secret private key, and a public key that is published. The sender looks up the recipient's public key and uses it to encrypt the message, and the recipient uses a private key to decrypt the message.
Encryption not only protects the content of the message; the use of an encrypted digital signature may also be used to provide evidence of the sender and of the integrity of the message.
Digital signatures
These are primarily intended to serve the same purpose as 'wet' ink-on-paper signatures – to allow the recipient of a document to confirm the sender's identity (although they also serve to show that a document has not been tampered with). They are authenticated by means of digital certificates. A digital certificate is simply the owner's public key, which a certificate authority has digitally signed.
Laws governing the use of digital (and other forms of electronic) signatures are changing. Our guide on the European Commission's proposal for a new Regulation on electronic identification and trust services for electronic transactions outlines what has been proposed.
Certification authorities
Certification authorities (CAs) are independent third parties which issue digital certificates to individuals after verifying that a public key belongs to an individual. The process of certification varies depending on the certification authority and the level of certification. The more rigorous the CA's identity-checking procedures, the more reliable the certificates which it issues.
Laws on electronic signatures
There are laws in the UK on electronic signatures, at European level and even at an international level. In the UK, the Electronic Communications Act was passed in June 2000. The following month, the part dealing with electronic signatures came into force.
The UN adopted in 2005 the Convention on the Use of Electronic Communications in International Contracts, building on the the UNCITRAL Model Law on Electronic Signatures. You may notice that the word 'digital' is replaced here by 'electronic', because digital signatures are just one of the many types of electronic signature.
Digital signatures are a particular type of electronic signature and most legislation is drafted to include electronic signatures which utilise means other than digital signatures (for example, biometrics).
UK Electronic Communications Act
The parties involved in e-business need to know that, if a dispute arises, the Courts will treat electronic evidence in a similar fashion to the way they treat paper evidence for paper-based transactions. The Electronic Communications Act states that an electronic signature shall be admissible in evidence in court in relation to any question as to the authenticity of the communication with which the signature is associated.
EU Directive on a Community Framework for Electronic Signatures
The European Commission adopted this Directive in December 1999. The aim of the Directive is to harmonise the rules relating to electronic signatures across the member states of the European Union and to promote the inter-operability of electronic signature products.
The Directive has the following key features: * it lays down guidelines for the use of electronic signatures; * it establishes that electronic signatures meeting certain criteria are deemed to satisfy the legal requirements for signatures in the same manner as hand-written signatures; * it establishes that electronic signatures meeting certain criteria are admissible as evidence in legal proceedings.
The Directive distinguishes between different types of electronic signatures, giving greater effect to digital signatures.
As noted above, laws governing electronic signatures are changing. Our guide on the European Commission's proposal for a new Regulation on electronic identification and trust services for electronic transactions outlines what has been proposed.
United Nations Convention on the Use of Electronic Communications in International Contracts
The United Nations adopted the Convention in 2005 as a means of facilitating international e-commerce by ensuring that electronic signatures do not invalidate a contract and the admissibility of electronic signatures in court. The Convention applies to most types of electronic communications exchanged between parties, (although a number of financial transactions are excluded from the Convention's scope of application), whose places of business are in different States when at least one party has its place of business in a Contracting State, or by parties' choice. Less than 20 States have signed the Convention, most of which are developing nations. The Convention enters into force for ratifying countries on 1 March 2013, although at this stage there appears to be only three such countries.
Although the Convention does not specifically address the issue of security in online transacting, it does give users a right to refuse to fulfill contractual obligations where they have accidentally input data into automated processing systems. The Convention provides that if someone makes an input error in seeking to purchase goods or services through a website, where the website incorporates an automated processing system (for example, requesting 30,000 boxes instead of 3,000) and the website does not also give the user an opportunity to correct the input error, then the user under the Convention would have the right to withdraw the portion of the electronic communication in which the input error was made, if the user notifies the provider of the goods or services (through the website) of the error as soon as possible after having learned of the error. Users will only be entitled to rely on this right if they have not used or received any material benefit or value from the goods or services unintentionally purchased on the website.
Other laws and guidelines relevant to security
The UK Regulation of Investigatory Powers Act controls, among other matters, the powers of authorities such as the police and Customs & Excise to intercept electronic communications. The Act, which came into force in July 2000, defines the circumstances in which the police may demand access to encryption keys. Failure to comply with such a demand is a criminal offence.
On 14 June 2012 a draft Communications Data Bill was published. It is intended that the Bill introduce new powers that will enable law enforcement agencies to access 'communications data ', often described as the 'who, where and when' of communication but not the 'what' (that is, the content of the communication).
Since its publication, the Bill has undergone pre-legislative scrutiny with reviews having been carried out by both a parliamentary Joint Committee and the Intelligence and Security Committee (ISC) (a body established under legislation for the purposes of examining the policies, administration and expenditure of the Security Service, Secret Intelligence Service (SIS) and the Government Communications Headquarters (GCHQ)).
Lord Blencathra, Chair of the Joint Committee has stated that "There needs to be some substantial re-writing of the Bill before it is brought before Parliament..." and that the Bill is too wide in respect of the types of data to which it extends. Instead, according to Lord Blencathra the Bill should be limited to only * "...data matching IP addresses to specific users, * data showing which internet services a user has accessed, and * data from overseas communications providers providing services in the UK."
The ISC has recommended that security agencies be provided with further powers to enable them to covertly inspect data when overseas communications service providers (CSPs) are unwilling or unable to respond to requests for access. The ISC has supported the view that the Bill should be amended to enable security agencies to leverage the support of UK CSPs in order to use Deep Packet Inspection technologies to collect communications data from overseas CSPs.
Data protection
The Data Protection Act 1998 sets out eight principles which data controllers must follow in relation to the data which they hold. You can find these and more information about the Act in our Data Protection guide. In terms of security, the 7th data protection principle is the most relevant.
The 7th data protection principle states that 'appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data'. It is important to note that data controllers must take into account both the harm that might result from unauthorised processing and the nature of the data to be protected.
The ICO have ordered numerous bodies to use encryption techniques after personal data was leaked, and in some cases have imposed a fine.
Information Security Management Systems
In the early 1990s the British Standards Institution laid down recommendations and guidance for identifying the range of controls needed for most situations where information systems are used in industry and commerce. This code of practice, formerly known as BS7799, has now been developed into an international standard known worldwide as ISO/IEC 27001. In the UK it is usually referred to as BS ISO/IEC 27001. The Standard has three key bases: * Confidentiality – prevention of unauthorised access to data, incorporating data protection and encryption principles; * Integrity – how to ensure the accuracy of information and control data processing; and * Availability – how to allow individuals to have access to information.
Businesses can be certified to show they comply with the standards, as a way of promoting trust and confidence between traders and customers.
Controls considered to be common best practice for information security include: * information security policy document; * allocation of information security responsibilities; * information security education and training; * reporting security incidents; * business continuity management.

Similar Documents

Free Essay

The Symbolic Meaning of the Green Light

...The green light has a many different symbolic meaning that what first comes to thought. Gatsby would often reach towards or look at the light. Also, Gatsby built his house across from Daisy and used the light to feel closer to Daisy. When the green light is first introduced to the book, it seems very miniscule in the grand scheme of things, but when further looked into, the role of the light is revealed as a important symbol to the story. The most obvious symbol of the green light is Gatsby’s desire and hope to be with Daisy once more. In chapter one Gatsby is at his dock looking longingly towards Daisy’s dock with the green light. Then later on in chapter five Gatsby is caught reaching towards the green light as if he expects Daisy’s hand to be next to his. Gatsby has a sense of hope when looking at the light. That hope is carried on throughout the book. He believes that it is his way of staying connected to Daisy and hope to be reunited once again with her. He hopes that Daisy will learn to love him like she once did, and things would go back to like they were before. Daisy, of course, can’t bring herself to leave Tom for Gatsby. Gatsby continues in his hopeful fantasy of the past. He becomes overly consumed by his fantasies that his thought process in the present is manipulated into thinking that are just simply not reality. Its a dream that Gatsby strives for, and will go to any lengths to get it. When Gatsby realizes at the hotel that Daisy also shares love for Tom...

Words: 1410 - Pages: 6

Premium Essay

What Does Green Symbolize In The Great Gatsby

...Colors are always used by novelists or artists in their work to show their mood or attitude. In The Great Gatsby by F. Scott Fitzgerald, many colors are repeated many times to show Fitzgerald’s attitude toward certain character. The most important color in this book is green, more specifically the green light, shows Gatsby’s hope and ambition to achieve his American dream in the beginning to how he eventually fail to attain it with money. The color green reminds us of hope and renew. In the book, Gatsby himself views the green light as a sign of he should go for his dream. He always believes Daisy will leave Tom and choose to marry him again. In real life, when the traffic light turns green, it is a sign tells us it is safe to go. Gatsby interprets this as he is right with everything he is doing right now and he will soon achieve his goals. When he says “I’m going to fix everything just the way it was before,” he said, nodding determinedly. “She’ll see.”(Fitzgerald, 110.), it shows he has the confidence that he is on the right track. However, the narrator Nick...

Words: 999 - Pages: 4

Free Essay

Vincent Van Gogh - Self Portrait with Bandaged Ear

...Portrait, the subject matter depicted is like the title aptly puts, himself, albeit in a more unconventional and abstracted manner. This is as opposed to the more realistic manner in which van Gogh has depicted himself in Self Portrait with Bandaged Ear. In Self Portrait, Affandi has characterised himself as a semi-abstracted figure against a plain background, with the highly detailed face in stark contrast with his torso, which as suggested by its dark green contour only (without any colouring within), appears to only be vaguely apparent. Affandi also seems to be placing extreme focus on the human emotions or mood, presumably meant to be conveyed by the extremely detailed expression on the face that he has painted. In fact,everything is lumped together (in fact, most of the colours used) on the face in his painting. Upon closer examination, one would find that Affandi’s face as depicted in this work is actually more of a mass of red rather than anything else, and lined with blobs of different colours (namely yellow and green) presumably to represent the hair. Details on the face are not clearly made out, rather only a faint outline of the eyebrows, eyes and nose is apparent. This is as opposed to Self Portrait with Bandaged Ear in which van Gogh has similarly depicted himself, albeit in a far more realistic manner, where all his facial features are clearly visible and modelled. Close attention is also paid to his body, clothing (as evidenced by the precise and exacting brushstrokes...

Words: 1160 - Pages: 5

Premium Essay

Review Of The Song It's Not Easy Being Green

...Being Green: A Life of Opportunity When I hear the iconic Kermit the Frog’s statement about the hardships of being green, I assume that being such an unordinary color could be seen as a difficult lifestyle because of the perpetual contrast the color places between the frog and the rest of society. Nobody else within society seems to be green, and the world must judge Kermit because he is out of the ordinary. However, in his song “It’s Not Easy Being Green,” Kermit is actually lamenting about how this life is difficult because he is in fact ordinary, blending in with the greenness of the natural landscape around him. Unlike Kermit, however, I believe that both the contrast of Kermit with modern society and the comparison of the frog with nature...

Words: 686 - Pages: 3

Free Essay

Art Mark Rothko

...Mark Rothko American artist, Mark Rothko, is one of the major abstract expressionists painter. His works are more than just paintings, as they represent pure and complex internal meaning. Rothko’s paintings each have some sort of underlying meaning. His uses of colors were meant to get attention of the audience. The Rothko room at the Phillips collection museum is comprised of four paintings of his. The room is small but the paintings are quite large and almost fill most of the wall. Being in the room gives a sensation of closeness with the artist. To understand his work, each painting should be looked at individually with some knowledge of the artist’s intentions. Each color, shade, layer, composition brings his paintings to life. Color is the main component in Rothko’s paintings and it is what he is known for. Certain colors of each individual painting represent some kind of an emotion. Dark colors give a sensation of negative emotions such as anger, sadness, and sorrow. In contrast to dark colors, bright colors have a feeling of positive emotions such as happiness. Some of Rothko paintings have both colors, which makes the painting even more complex and difficult to comprehend. The way his paintings are painted, it is easy to tell that there is a message that it is trying to convey. Rothko uses more than just simple colors but layers of them. Each layer is painted on so eloquently that it is visibly calling for attention. Layers of colors give his painting more depth...

Words: 565 - Pages: 3

Free Essay

Retail Merchandising

...The beautiful you…. ABOUT SCHON SCHON was introduced in the year 2004 with a foresight to dress the young females with the latest fashion and style in casual wear. SCHON in German means “BEAUTIFUL”. The Brand has been steadily marching ahead to meet the challenges of the fashion-conscious woman. Its zeal and vision to pioneer is being reflected by an almost self-effacing work-style, where the greater good ensures the individual good. As a result, SCHON is emerging as an elegant trendsetter for the feminine apparel industry. They are amongst the first few to modernize the traditional knitwear into the sophistication which makes a Fashion Statement every day, day by day... The Company believes in building a reliable and constructive relationship with its suppliers who provide the best quality in materials and the Consumer who has been appreciating the Product since a long time now. The success-secret of SCHON lies in its dedicated and diligent work force, led by a progressive management. The major focus remains on quality & design which has earned us the repute and appreciation of our customer. SCHON SPRING SUMMER COLLECTION- The SCHON Spring/Summer 2011 fashion collection is rich in tales that are seemingly worlds apart, but in fact have a common link: a passion for elegance. SCHON finds romantic tales of flowers; sparkling, sunny afternoons dominated by white; lively evenings ablaze with colour. CLASSIFICATION & SUB-CLASSIFICATION About the STORE…. Location:...

Words: 2481 - Pages: 10

Free Essay

Frida Paintings

...Frida’s forehead is that she always has him on her mind and she loves him so deeply no matter how badly he hurts her, Diego is Frida’s third eye. Diego on the other hand, has an actual third eye resembling lying, and cheating, it shows that Diego does not think about Frida because if he did Frida would have painted herself on his forehead. The third eye references Frida made in her painting shows how their relationship works or how it was formed. The portrait includes a variety of symbols and objects including tears falling down her cheeks, a third on Diegos forehead, Diegos face on the middle of Fridas forehead, hair closing around Fridas neck and her mono-brow. The paint has been well blended and has been applied smoothly, but not to the extent that the portrait looks photographic. Her painting style is naive as she had no formal art education. Although critics have labelled her artwork as surrealistic, Frida counters that she paints her reality. Her artworks were influenced by Diego and her traumatic life experiences. There is a naturalistic colour scheme with green and flesh hues. Splashes of colour such as the deep scarlet of her lips and...

Words: 973 - Pages: 4

Premium Essay

Painting Critique

...the spectacular landscape of the North Cascade Mountain Range. The rugged wilderness and plentiful wildlife of the Northwest inspired many of his earlier paintings. Much of his work is displayed in his own gallery, Doug Miller Gallery, located in the Bavarian-style village of Leavenworth. Doug’s paintings have been acknowledged for numerous awards in Northwest art shows that he attends, including the former Arts for the Parks competition, held annually in Jackson Hole, Wyoming. Collectors often remark that his paintings are peaceful and serene; they exhibit a depth that “makes you feel like you can escape into the painting.” In this painting, there are pink carnations, with green stems and are hanging in the air or are baseless. The pink color of the flowers is bright while the foreground color is a subdued brown. The background color ranges from a smudgy yellow to a light green. The shape of the painting is asymmetrical, and the texture of the flowers, foreground, and background is rough. There is a bunch of pink carnations with green stems. The landscape of the painting is indoors because there is no source of light, and the bunch has been suspended in the air. The color of the background is light green with some elements of yellow, and it creates an illusion of a light-source. The orange and green colors are very intense. The colors of the carnations contrast with the subdued brown color that is in the foreground and is acting as a "base" to the carnations. The lines of...

Words: 707 - Pages: 3

Premium Essay

No Child Left Behind

...do their day to day activities. These professional athletes model their product by focusing in on the product and what is it doing for them, whether it be hydration, filling their stomachs, or getting them through that one week of mood swings and bloating. This advertisement is slightly different; the athletes are not the only main focus in the advertisement. The breakfast sandwich in the bottom left corner along with “dive into a scrumptious breakfast” in large font on the lower half of the page. This draws attention to what the rugby team would have for breakfast before training or competing. What really catches the eye in this advertisement is the color coordination. Everything needing to be noticed is colored to stand out in the dark green background, but the extra information about the sandwich and the rugby tournament are different...

Words: 770 - Pages: 4

Free Essay

Topography

...they say going green or other colors that remind you of earth or protecting the environment I wanted to use colors that where close to that theme as you see with the greens, yellows, and blues. As for the first font I chose a well of handwritten font but digital where it looks homemade and I used the color yellow which is a color in my research that catch’s attention also keep the weight of the font regular keeps it simple an easy to read. The headings I wanted to use a bolder font which catch’s your attention and can clearly be read using earth color green to complement the website. The next following fonts are considered to be more web-safe fonts which means can be easily read and understood by many operating systems. Keeping the text and text links as the norm of 12 PT allows the customer to easily read the website. The Font set can also be using during the finalization of the website to help bring the hole project together as this font family works together. Font Set # 2 Title Font – Brush Script Mt 30 Pt –Sky Blue Headings Font – Impact 24PT – Black & Green Subheadings – Century Gothic 18 Pt – moss green Text fonts – Myriad Pro 12 Pt – Black Text links – Verdana 12 Pt – Blue underline Rationale: This font set which was also created like the pervious font set by reopening the wireframe that was created in the previous weeks and finding what works well together. For the first font as it is the title I decided to you a more different font that works well with the...

Words: 787 - Pages: 4

Free Essay

Art Critique

...Name: Instructor: Course Date: Art Report; critique Critique refers to a systematic and discipline analysis which is always written or can be presented in an oral form. In most cases, critique has been viewed as the acts of analyzing documents, literary work or pictures with an aim of making judgments that are negative and trying to find some faults in the analysis. However, critique does contain some form of recognizing the merits entailed in the subject matter and can be given a philosophical view of a practice that involves doubt. The entire sense of critique has been contemporarily been influenced by the critique of enlighten which involves authority and prejudice. This is always shaped by the autonomy and emancipation from the authorities in the political fronts and the religious authorities. The Florida Scene Florida scene is a pictorial presentation by Thomas Moran. Moran in his presentation greatly bases on nature, which largely is in the center of influencing his art. In his scene, Thomas uses shapes that are predominantly organic and gives his art the natural and environmental taste. Analysis of the artwork The landscape in the artwork presents an irregular scope on the southern side of the landscape accompanied by vegetation which is often rounded and carved. The artwork has the sky and the ocean too. Visible are some trees which have their branches curved and there is a layer of wild flowers and...

Words: 1676 - Pages: 7

Free Essay

Nsci 101 Lab Report Form

...NSCI 101 Lab Report Form Name: Date: Class Name/Number: NSCI101 Section E801 Semester 1006 Lab Activity Title Input the title of the activity. Statement of the Problem What are the ph levels for items we come into contact with on a daily basis? Hypothesis I expect the 7 sample items to have a wide variety of ph Levels. However, I expect that items we consume as humans will be closer to the neutral range of the ph scale while items we use to clean around the house will be inversely proportional to the items we consume. I believe the household items will be on the extremes, either extremely basic or extremely acidic. Methods Items for experiment were purchased from the Commissary and the Nhetto. They include: 1 x .608 kg head of red Cabbage 2 x Melitta white coffee filters 1 x 12 oz coke 1x Tums antacid 1x Tilex Mold and Mildew Remover 1x 22oz bottle of Clorax bleach 1x bx of Arm and Hammer Baking Soda 1x toilet bowl cleaner 1x hohes C orange juice 750ml of tap water The following steps from the guide was followed (with changes from the instructor): 1. Using a standard cheese grater, I took the entire head of red cabbage and shredded it into small pieces. After shredding was complete the pile of cabbage was placed into a stainless steel cook pot. 2. In order to attempt to get the most accurate results I used my fish tank ph test to identify the ph level of my tap water. The result was my tap water is about a 7.8 (slightly higher than the 7.0 that...

Words: 1689 - Pages: 7

Premium Essay

The Pink Cloud

...information plaque). The painting depicts a small purple sailboat with a green and red sail in the sea underneath an enormous, majorly, pink cloud in the light blue sky with two other red sailboats and purple steam boats. The enormous pink cloud and the light blue sky is reflected into the sea and the purple sailboat has a dark reflection in the sea as well. The sailboat is in the center of the painting while the cloud is above and behind the sailboat. The other sailboats are to the right and behind the main sailboat and the steam boats are all the way to the right in the far distance. The time of day in the work, which can be determined from the color of the cloud and sky, appears to be sunset and the sun is off canvas at the top left corner. The viewer is meant to be looking at this view of the boats and massive cloud from land and to be peering at the landscape from the very edge of the water due to no land being shown. The primary focus of the painting is the sailboat that is located within the foreground of the painting. The focus divides the painting nearly symmetrically, the sky and the lake are almost even and the boat is right in the center to keep the painting balanced. The sailboat also in a way creates a dark arrow that makes the eye go to the pink cloud. The painting contains primary colors (blue, red, and yellow). There are many hues of purple for darker clouds, pink for the cloud, light greens for the sea and sail, various blues for the sky and shadow for the pink...

Words: 1597 - Pages: 7

Premium Essay

Gallery Critique

...Gallery Critique On October 30, 2013, I went to UWL gallery to see amazing works of art. I had a deep impression on a picture named No One Will Ever Know that is made by Izel Vargas. 1. Firstly, I would like to discuss the use of color in this picture. Wearing a dark green T-shirt, with two broken and bloody arms, holding a dark black gun, a policeman whose head is an arguing man and woman is in the picture. The hues of this artwork are red, green, orange and yellow, and each hue has a value. The artist uses a dark value of pure red, green and yellow, a light value of pure orange. Similarly, the tint of this picture is light orange, and shades of this picture are dark red, green and yellow. For example, the skin of the arms are light orange; the bloody arms are dark red; the T-shirt is dark green; the logos of the shirt are dark yellow. The artist also uses the neutral colors which are white, black, dark black and dull brown. For example, the gun and leather belt are dark black; the background of the arguing man and woman is white; the background of the whole picture is black. The artist used the color temperature. The dark red of the bloody arms and dark green of T-shirt are warm, because the background is black that is the cooler color. 2. Secondly, I want to describe the use of line in this picture. The processes used in this particular work are contour line, hatching and cross-hatching. The artist uses the contour line to draw the outer edge of the man, woman and house...

Words: 673 - Pages: 3

Premium Essay

Color in the Great Gastby

...The Great Gatsby, F Scott Fitzgerald Chapter 6 Color Analysis May 24, 2011 Jay Gatsby | -“torn green jersey” (104): The color green symbolizes wealth and money. At this time in the book, Gatsby is working for Dan Cody, the guy who greatly supplies his wealth. The fact that the jersey is torn signifies the hard work that Gatsby demonstrates which then leads to him reaping the benefits of hard work. This section furthers to talk about his parents and how they were “unsuccessful farm people” also that Gatsby “was a son of God.” This is to say that although Gatsby’s parents were hard workers, they were unsuccessful in reaching their ideal “American dream”. Gatsby is currently making those dreams happen. He was helping to complete his father’s business, and is therefore relatively “a son of God.”---- The green jersey also symbolizes the new life that he yearns for that is full of wealth. Right at this stage in the book, Gatsby is called different names: Gatsby, James Gats, Jay Gatsby, young Gats: Each name recognizes a different stages of growth towards the Wealthy life.-“His brown, hardened body lived naturally through the half fierce, half lazy work of the bracing days.” (104): Brown is the color of earth, and of “getting down and dirty”. It further symbolizes the humility Gatsby underwent while with Dan Cody. Because the idea of wealth plagued Gatsby (“his heart was in a constant turbulent riot.”), he reaped the fruit of his labor as discussed with the color change discussed...

Words: 1593 - Pages: 7